Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,590 Full-Text Articles 4,395 Authors 3,876,593 Downloads 132 Institutions

All Articles in Computer Law

Faceted Search

4,590 full-text articles. Page 128 of 144.

Judges’ Awareness, Understanding, And Application Of Digital Evidence, Gary C. Kessler 2011 Gary Kessler Associates

Judges’ Awareness, Understanding, And Application Of Digital Evidence, Gary C. Kessler

Journal of Digital Forensics, Security and Law

As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges’ relationship with digital evidence. This paper describes a recent study, using grounded theory methods, into judges’ awareness, knowledge, and perceptions of digital evidence. This study is the …


Technology Corner: Analysing E-Mail Headers For Forensic Investigation, M. T. Banday 2011 Banday University of Kashmir India

Technology Corner: Analysing E-Mail Headers For Forensic Investigation, M. T. Banday

Journal of Digital Forensics, Security and Law

Electronic Mail (E-Mail), which is one of the most widely used applications of Internet, has become a global communication infrastructure service. However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions. A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies …


Kindle Forensics: Acquisition & Analysis, Peter Hannay 2011 School of Computer and Security Science

Kindle Forensics: Acquisition & Analysis, Peter Hannay

Journal of Digital Forensics, Security and Law

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.


Column: The Consortium Of Digital Forensics Specialists (Cdfs), Christopher Kelly 2011 CDFS Board Chair

Column: The Consortium Of Digital Forensics Specialists (Cdfs), Christopher Kelly

Journal of Digital Forensics, Security and Law

Digital forensic practitioners are faced with an extraordinary opportunity. In fact, we may never again be faced with such an opportunity, and this opportunity will challenge us in ways we may never again be challenged. At this point in the history of the Digital Forensics profession, digital forensic specialists have the unique opportunity to help this profession emerge from its infancy. But for this profession to mature -- and to flourish -- individuals and organizations integral to the practice must assemble and shape its future. This is our opportunity. In fact, this is our mandate.


Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker, Stephen P. Danese 2011 University of South Florida, St. Petersburg

Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker, Stephen P. Danese

Journal of Digital Forensics, Security and Law

Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as …


Column: The Physics Of Digital Information, Fred Cohen 2011 CEO, Fred Cohen & Associates President, California Sciences Institute

Column: The Physics Of Digital Information, Fred Cohen

Journal of Digital Forensics, Security and Law

No abstract provided.


Analysis Of Data Remaining On Second Hand Adsl Routers, Patryk Szewczyk 2011 Edith Cowan University; Perth, Western Australia

Analysis Of Data Remaining On Second Hand Adsl Routers, Patryk Szewczyk

Journal of Digital Forensics, Security and Law

In theory, an ADSL router can provide an additional layer of security to a wired and wireless network through; access control, wireless encryption, firewall rule sets, and network event logging. An ADSL router may also contain the users’ usage habits and broadband account credentials. However, end-users may be unaware of the intricacies of the security measures available and the potentially confidential information stored on their device. As a result a second hand ADSL router may contain a wealth of user-specific information if not wiped and disposed of in a secure manner. This paper shows the data that was acquired from …


Exploring The Iphone Backup Made By Itunes, Mario Piccinelli, Paolo Gubian 2011 University of Brescia, Italy

Exploring The Iphone Backup Made By Itunes, Mario Piccinelli, Paolo Gubian

Journal of Digital Forensics, Security and Law

Apple’s™ iPhone™ is one of the widest selling mobile on the market, thanks to its simple and user-friendly interface and ever growing pool of available high quality applications for both personal and business use. The increasing use of the iPhone leads forensics practitioners towards the need for tools to access and analyze the information stored in the device. This research aims at describing the process to forensically analyze a logical backup of an iPhone made by the Apple iTunes™ utility, understanding the backup’s structure, and creating a simple tool to automate the process of decoding and analyzing the data. In …


Book Review: Online Privacy: Issues In The Digital Age, Darlene M. Tester 2011 Metropolitan State University

Book Review: Online Privacy: Issues In The Digital Age, Darlene M. Tester

Journal of Digital Forensics, Security and Law

This book is one of a series of books Currie has written about online areas of concern. This is the sixth book in the series. The purpose of the book is to act as a primer for people in the IT field who may need a point of reference for Internet issues such as gaming, security and privacy. The book takes a high level look at the complexities of privacy online from social networking to hackers and provides insight into what the most pressing issues of privacy are online today.


Working Inside The Box: An Example Of Google Desktop Search In A Forensic Examination, Timothy J. LaTulippe 2011 Embry-Riddle Aeronautical University

Working Inside The Box: An Example Of Google Desktop Search In A Forensic Examination, Timothy J. Latulippe

Journal of Digital Forensics, Security and Law

Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades. As the total amount of data stored rapidly increases in conjunction with the amount of widely available computer-driven devices being used, solutions are being developed to better harness this data. These types of advancements are continually assisting investigators and computer forensic examiners. One such application which houses copious amounts of fruitful data is the Google Desktop Search program. Coupled with tested and verified techniques, examiners can exploit the power of this application to cater to their investigative needs. …


Column: File Cabinet Forensics, Simson Garfinkel 2011 Naval Postgraduate School, California

Column: File Cabinet Forensics, Simson Garfinkel

Journal of Digital Forensics, Security and Law

Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face. Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and phones) to the commercial market. These artifacts are bought and used by billions. Some have evil intent, and (if society is lucky), the computers end up in the hands of law enforcement. Unfortunately the …


Legal Issues Regarding Digital Forensic Examiners Third Party Consent To Search, Thomas Lonardo, Doug White, Tricia P. Martland, Alan Rea 2011 Roger Williams University

Legal Issues Regarding Digital Forensic Examiners Third Party Consent To Search, Thomas Lonardo, Doug White, Tricia P. Martland, Alan Rea

Journal of Digital Forensics, Security and Law

This paper focuses on Federal law as it relates to consent to search relating to Fourth Amendment privacy in the practice of Digital Forensics. In particular, Digital Examiners should be aware of how decisions in Federal Court may impact their ability to acquire evidence in both civil and criminal settings. Digital Forensics, being a relatively new field, is particularly subject to change as cases and appeals are decided. This paper provides an overview of relevant case law relating to issues in Digital Forensics. More importantly, our research provides Digital Forensic Examiners (DFE), as defined by Lonardo, White, and Rea (2008, …


Technology Corner: Virtual Crime Scene Reconstruction: The Basics Of 3d Modeling, Nick V. Flor 2011 University of New Mexico

Technology Corner: Virtual Crime Scene Reconstruction: The Basics Of 3d Modeling, Nick V. Flor

Journal of Digital Forensics, Security and Law

Digital crime scenes take place in the context of physical crime scenes. Virtual crime scene reconstruction is an activity where investigators create a 3- dimensional (3-D) model of an actual crime scene for the purpose of determining the events that lead to the crime. While virtual crime scene reconstruction is currently used for analyzing physical scenes, it can also help investigators visualize and explore ways digital media could have been used to perpetrate a crime. In this technology corner we explore one of the technologies underlying virtual crime scene reconstruction: 3-D modeling.


Book Review: Iphone And Ios Forensics: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Christopher Schulte 2011 EnCE & ACE, LuciData Inc

Book Review: Iphone And Ios Forensics: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Christopher Schulte

Journal of Digital Forensics, Security and Law

These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV) space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate …


Table Of Contents, 2011 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents, 2011 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents, 2011 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers 2011 University of Georgia School of Law

To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers

LLM Theses and Essays

This article proposes a new test called the “Anonymous Public Concern Test” which incorporates public concern analysis in enforcing Internet Service Provider [ISP] subpoenas in online defamation suits. Anonymous speech is an important aspect of First Amendment rights that warrants protection. Current tests used by courts to analyze whether to enforce ISP subpoenas are either too pro-plaintiff or too pro-defendant. The article’s proposed “Anonymous Public Concern Test” is the best approach in dealing with ISP subpoenas because it protects both anonymous speeches and preserves online defamation plaintiffs’ rights.


Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan 2011 IIT Chicago-Kent College of Law

Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan

All Faculty Scholarship

Unauthorized access to online information costs billions of dollars per year. Software vulnerabilities are a key. Software currently contains an unacceptable number of vulnerabilities. The standard solution notes that the typical software business strategy is to keep costs down and be the first to market even if that means the software has significant vulnerabilities. Many endorse the following remedy: make software developers liable for negligent or defective design. This remedy is unworkable. We offer an alternative based on an appeal to product-risk norms. Product-risk norms are social norms that govern the sale of products. A key feature of such norms …


Defending Disclosure In Software Licensing, Robert A. Hillman, Maureen O'Rourke 2011 Cornell Law School

Defending Disclosure In Software Licensing, Robert A. Hillman, Maureen O'Rourke

Cornell Law Faculty Publications

This Article surveys prominent kinds of disclosures in contract law-of facts, contract terms, and performance intentions. We show why the disclosure tool, although subject to substantial criticism, promotes important social values and goals, including efficiency, autonomy, corrective justice, fairness, and the legitimacy of the contract process. Further, proposals to replace disclosure with other alternatives are unrealistic because they are too expensive or complex. Our working example is the American Law Institute's Principles of the Law of Software Contracts.


Digital Commons powered by bepress