Open Access. Powered by Scholars. Published by Universities.®

Legal Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

12,910 Full-Text Articles 9,004 Authors 9,627,018 Downloads 250 Institutions

All Articles in Legal Studies

Faceted Search

12,910 full-text articles. Page 213 of 216.

Bill Clinton's Parting Pardon Party, Albert W. Alschuler 2010 Northwestern University School of Law

Bill Clinton's Parting Pardon Party, Albert W. Alschuler

Journal of Criminal Law and Criminology

No abstract provided.


The Heller Promise Versus The Heller Reality: Will Statutes Prohibiting The Possession Of Firearms By Ex-Felons By Upheld After Britt V. State, Deborah Bone 2010 Northwestern Pritzker School of Law

The Heller Promise Versus The Heller Reality: Will Statutes Prohibiting The Possession Of Firearms By Ex-Felons By Upheld After Britt V. State, Deborah Bone

Journal of Criminal Law and Criminology

No abstract provided.


Book Reviews, Juliet S. Sorensen 2010 Northwestern Pritzker School of Law

Book Reviews, Juliet S. Sorensen

Journal of Criminal Law and Criminology

No abstract provided.


Lost In Translation: Domestic Violence, The Personal Is Political, And The Criminal Justice System, Kimberly D. Bailey 2010 Northwestern Pritzker School of Law

Lost In Translation: Domestic Violence, The Personal Is Political, And The Criminal Justice System, Kimberly D. Bailey

Journal of Criminal Law and Criminology

No abstract provided.


Capital Punishment In Illinois In The Aftermath Of The Ryan Commutations: Reforms, Economic Realities, And A New Saliency For Issues Of Cost, Leigh B. Bienen 2010 Northwestern University School of Law

Capital Punishment In Illinois In The Aftermath Of The Ryan Commutations: Reforms, Economic Realities, And A New Saliency For Issues Of Cost, Leigh B. Bienen

Journal of Criminal Law and Criminology

No abstract provided.


Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley 2010 California State Polytechnic University

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley

Journal of Digital Forensics, Security and Law

The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task ...


Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum 2010 University of Alabama, Birmingham

Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many ...


Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz 2010 AGH University of Science and Technology

Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz

Journal of Digital Forensics, Security and Law

Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.


Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay 2010 University of South Australia

Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay

Journal of Digital Forensics, Security and Law

The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed ...


Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli 2010 Edith Cowan University

Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli

Journal of Digital Forensics, Security and Law

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP ...


Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns 2010 University of South Florida, St. Petersburg

Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills ...


Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler 2010 Gary Kessler Associates

Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler

Journal of Digital Forensics, Security and Law

On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won ...


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


The Unity Of Interpretation, Lawrence B. Solum 2010 Georgetown University Law Center

The Unity Of Interpretation, Lawrence B. Solum

Georgetown Law Faculty Publications and Other Works

What is interpretation? One can imagine a range of answers to this question. One answer might begin with the observation that the English word “interpretation” is used to refer to a variety of human activities. Translators at the United Nations interpret remarks made in French when they offer an English translation. Literary critics interpret novels when they investigate the deep and sometimes unconscious motivations of the author. Conductors interpret a score when they make decisions about meter, tempo, and dynamic range. Actors interpret a screenplay when they improvise new lines based on their understanding of the characters. Judges interpret statutes ...


The Interpretation-Construction Distinction, Lawrence B. Solum 2010 Georgetown University Law Center

The Interpretation-Construction Distinction, Lawrence B. Solum

Georgetown Law Faculty Publications and Other Works

The interpretation-construction distinction, which marks the difference between linguistic meaning and legal effect, is much discussed these days. I shall argue that the distinction is both real and fundamental – that it marks a deep difference in two different stages (or moments) in the way that legal and political actors process legal texts. My account of the distinction will not be precisely the same as some others, but I shall argue that it is the correct account and captures the essential insights of its rivals. This Essay aims to mark the distinction clearly!

The basic idea can be explained by distinguishing ...


Exporting U.S. Criminal Justice, Allegra M. McLeod 2010 Georgetown University Law Center

Exporting U.S. Criminal Justice, Allegra M. Mcleod

Georgetown Law Faculty Publications and Other Works

This article explores how and why, in the Cold War’s wake, the U.S. government began to export U.S.-style criminal law and procedure models to developing and politically transitioning states. U.S. criminal law and development consultants now work in countries across the globe. This article reveals how U.S. initiatives have shaped state and non-state actors’ responses to a range of global challenges, even as this approach suffers from a deep democratic deficit. Further, this article argues that U.S. programs perpetuate U.S.-style legal institutional idolatry (which is often tied to systemic dysfunction both ...


Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma 2010 Metropolitan State University

Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma

Journal of Digital Forensics, Security and Law

The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers ...


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Honest-Services Fraud: A (Vague) Threat To Millions Of Blissfully Unaware (And Non-Culpable) American Workers, Julie R. O'Sullivan 2010 Georgetown University Law Center

Honest-Services Fraud: A (Vague) Threat To Millions Of Blissfully Unaware (And Non-Culpable) American Workers, Julie R. O'Sullivan

Georgetown Law Faculty Publications and Other Works

The author believes that statute 18 U.S.C. § 1346 is unconstitutionally vague, at least as applied to cases in which employees of private entities are prosecuted for depriving their employers of a right to their honest services (so-called “private cases”). Objections to vagueness rest on due process. “Vagueness may invalidate a criminal law for either of two independent reasons. First, it may fail to provide the kind of notice that will enable ordinary people to understand what conduct it prohibits; second, it may authorize and even encourage arbitrary and discriminatory enforcement.” The Supreme Court’s vagueness precedents do not ...


Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington 2010 Murdoch University, Perth

Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington

Journal of Digital Forensics, Security and Law

Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard ...


Digital Commons powered by bepress