Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

Journal

2007

Institution
Keyword
Publication

Articles 181 - 193 of 193

Full-Text Articles in Social and Behavioral Sciences

Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song Jan 2007

Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song

Journal of Digital Forensics, Security and Law

Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …


Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas Jan 2007

Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas

Journal of Digital Forensics, Security and Law

Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate.

Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current …


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell Jan 2007

Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell

Journal of Digital Forensics, Security and Law

A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel. These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability. This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study …


Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani Jan 2007

Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani

Journal of Digital Forensics, Security and Law

Many education organizations have adopted for security the enterprise best practices for implementation on their campuses, while others focus on ISO Standard (or/and) the National Institution of Standards and Technology.

All these adoptions are dependent on IT personal and their experiences or knowledge of the standard. On top of this is the size of the education organizations. The larger the population in an education organization, the more the problem of information and security become very clear. Thus, they have been obliged to comply with information security issues and adopt the national or international standard. The case is quite different when …


Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor Jan 2007

Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor

Journal of Digital Forensics, Security and Law

Security research published in academic journals rarely finds its way to the business community or into the classroom. Even though the research is of high quality, it is written in a manner that is difficult to read and to understand. This paper argues that one way to get this academic research into the business community is to incorporate it into security classrooms. To do so, however, academic articles need to be adapted into a classroom-friendly format. This paper suggests ways to do this and provides an example of an academic article that was adapted for use in a security management …


The Design And Implementation Of An Automated Security Compliance Toolkit: A Pedagogical Exercise, Guillermo Francia, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins Jan 2007

The Design And Implementation Of An Automated Security Compliance Toolkit: A Pedagogical Exercise, Guillermo Francia, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins

Journal of Digital Forensics, Security and Law

The demand, through government regulations, for the preservation of the security, integrity, and privacy of corporate and customer information is increasing at an unprecedented pace. Government and private entities struggle to comply with these regulations through various means—both automated and manual controls. This paper presents an automated security compliance toolkit that is designed and developed using mostly open source tools to demonstrate that 1) meeting regulatory compliance does not need to be a very expensive proposition and 2) an undertaking of this magnitude could be served as a pedagogical exercise for students in the areas of collaboration, project management, software …


Network And Database Security: Regulatory Compliance, Network, And Database Security - A Unified Process And Goal, Errol A. Blake Jan 2007

Network And Database Security: Regulatory Compliance, Network, And Database Security - A Unified Process And Goal, Errol A. Blake

Journal of Digital Forensics, Security and Law

Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role …


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Mapping Alimony: From Status To Contract And Beyond, Gaytri Kachroo Jan 2007

Mapping Alimony: From Status To Contract And Beyond, Gaytri Kachroo

The University of New Hampshire Law Review

[Excerpt] “With the introduction of no-fault divorce, one spouse could unilaterally petition for divorce, in most states, by demonstrating a period of separation or the impossibility of reconciliation. The possibility that a marriage can be dissolved without a showing of fault has obliterated the need to seek consent from the other spouse contesting it. This can preclude the need for a mutually designed financial arrangement. Courts now play a greater role in such financial arrangements and are more likely to conform such financial arrangements to statutory standards. From state to state, despite the prevalence of such conforming by courts, resulting …


The Core Plan Or How I Learned To Stop Worrying And Love The Central City: Shifting Control Of Regional Mass Transit To The Central City, Jeffrey Baltruzak Jan 2007

The Core Plan Or How I Learned To Stop Worrying And Love The Central City: Shifting Control Of Regional Mass Transit To The Central City, Jeffrey Baltruzak

The University of New Hampshire Law Review

[Excerpt] “Mass transit in the United States is moribund: it plays a meaningful transportation role in only a handful of American regions. It is clear that the status quo—where state-created special-purpose districts (SPDs) provide limited regional mass transit options and new mass transit construction progresses at a glacial pace—is a colossal failure. This failure necessitates a new model of mass transit ownership and management. It is time for the region’s central city to own and operate the region’s mass transit system extraterritorially, free from significant control by the outer cities (the suburbs) and the state. This article calls this arrangement …


Human Zoning: The Constitutionality Of Sex-Offender Residency Restrictions As Applied To Post-Conviction Offenders, Ryan Hawkins Jan 2007

Human Zoning: The Constitutionality Of Sex-Offender Residency Restrictions As Applied To Post-Conviction Offenders, Ryan Hawkins

The University of New Hampshire Law Review

[H]igh recidivism rates shows that the threat of jail time alone is not sufficient to curb sex crimes. With this in mind, legislators sought to find other ways that would protect potential victims. Community notification laws were the first policy to be implemented. Community notification methods included press releases, flyers, phone calls, door-to-door contact, neighborhood meetings, and Internet sites, which informed citizens of the name, location, and/or other information of persons who had been convicted of sex crimes.

Part II of this note will describe current sex-offender restrictions in place across the country. Part III will provide a constitutional analysis …