Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 14251 - 14280 of 16633

Full-Text Articles in Physical Sciences and Mathematics

A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl Jun 2013

A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl

Annual ADFSL Conference on Digital Forensics, Security and Law

For Microsoft Windows Operating Systems, both anti-virus products and kernel rootkits often hook the System Service Dispatch Table (SSDT). This research paper investigates the interaction between these two in terms of the SSDT. To investigate these matters, we extracted digital evidence from volatile memory, and studied that evidence using the Volatility framework. Due to the diversity in detection techniques used by the anti-virus products, and the diversity of infection techniques used by rootkits, our investigation produced diverse results, results that helped us to understand several SSDT hooking strategies, and the interaction between the selected anti-virus products and the rootkit samples. …


An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin Jun 2013

An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin

Annual ADFSL Conference on Digital Forensics, Security and Law

The analysis of forensic investigation results has generally been identified as the most complex phase of a digital forensic investigation. This phase becomes more complicated and time consuming as the storage capacity of digital devices is increasing, while at the same time the prices of those devices are decreasing. Although there are some tools and techniques that assist the investigator in the analysis of digital evidence, they do not adequately address some of the serious challenges, particularly with the time and effort required to conduct such tasks. In this paper, we consider the use of semantic web technologies and in …


First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen Jun 2013

First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

The Tor network is a low-latency overlay network for TCP flows that is designed to provide privacy and anonymity to its users. It is currently in use by many as a means to avoid censorship of both information to be shared and information to be retrieved. This paper details the architecture of the Tor network as a platform for evaluating the current state of forensic analysis of the Tor network. Specific attempts to block access to the Tor network are examined to identify (a) the processes utilized to identify Tor nodes, and (b) the resulting exposure of potentially inculpatory evidence. …


A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia Jun 2013

A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia

Annual ADFSL Conference on Digital Forensics, Security and Law

The adoption of computer and internet technology has greatly improved the way businesses operate. However the risk to the confidentiality, integrity and availability of organizational data and systems has greatly increased too. Information security is an ever present concern for all organizations. Financial estimates of the impact of security breaches to information and technology resources range from hundreds of billions to over one trillion dollars each year worldwide (D'Arcy et al., 2011b). Organizations have therefore developed a combination of technical, administrative, and physical controls to reduce this risk (D'Arcy et al., 2011a). Administrative measures include the development of information security …


Journey Into Windows 8 Recovery Artifacts, W. K. Johnson Jun 2013

Journey Into Windows 8 Recovery Artifacts, W. K. Johnson

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most difficult processes of digital forensics is to understand how new technology interacts with current technology and how digital forensic analysts can utilize current Digital Forensics technologies and processes to recover and find information hidden. Microsoft has released their new operating system Windows 8, with this new release Microsoft has added some features to the operating system that will present some interesting complications to digital forensics. Since the initial release of the Windows 8 Release Candidates there have been some research released that focus primarily on the new user created artifacts and a few artifacts that have …


An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok Jun 2013

An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper proposes an image forensic scheme with both robust and fragile watermarking techniques for business documents. Through a dual watermarking approach, the proposed scheme can achieve image forensics objectives of (a) identification of source; (b) authentication of documents; and (c) locating the tempered areas of documents due to attacks. An example is presented to prove the concepts of the proposed scheme.

Keywords: Image Forensics, Fragile and Robust Watermarking, Business Document.


Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter Jun 2013

Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics (DF) is a growing field that is gaining popularity among many computer professionals, law enforcement agencies and other stakeholders who must always cooperate in this profession. Unfortunately, this has created an environment replete with semantic disparities within the domain that needs to be resolved and/or eliminated. For the purpose of this study, semantic disparity refers to disagreements about the meaning, interpretation, descriptions and the intended use of the same or related data and terminologies. If semantic disparity is not detected and resolved, it may lead to misunderstandings. Even worse, since the people involved may not be from the …


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter Jun 2013

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz Jun 2013

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Annual ADFSL Conference on Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …


Identifying Peer-To-Peer Traffic On Shared Wireless Networks, Simon Piel, Ej Jung Jun 2013

Identifying Peer-To-Peer Traffic On Shared Wireless Networks, Simon Piel, Ej Jung

Annual ADFSL Conference on Digital Forensics, Security and Law

Tracing contraband downloads leads investigators to an IP address, and in turn Internet Service Providers (ISP) can provide a physical location using this IP address. However, most homes and offices share this IP address among many computers using wireless networks. In other words, there needs to be another investigation to find out which computer was responsible for contraband downloads. To make matters worse, these shared wireless networks often have vulnerabilities in access control such as using WEP or using weak passwords. In such cases, any computer in range, not necessarily at the given physical address, could be responsible. We use …


On Resolving The Cloud Forensics Conundrum, John Bagby Jun 2013

On Resolving The Cloud Forensics Conundrum, John Bagby

Annual ADFSL Conference on Digital Forensics, Security and Law

The “cloud” is idiom for an ill-defined set of online services. The cloud simultaneously offers IT savings and promises advances in functionality (e.g., ubiquity). However, the cloud also imposes poorly understood burdens on security and it may provoke injustice. Thus, the cloud presents a durable and seemingly irreconcilable conundrum for the digital forensics communit(ies). First, cloud proponents make efficiency promises for cloud services (SaaS, IaaS, PaaS). These translate well into the digital forensics domain. Indeed, the cloud may enable crowd sourcing of investigatory data vastly lowering costs of dispute resolution. For example, cloud-based litigation war rooms may reduce electronic discovery …


Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha Jun 2013

Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha

Annual ADFSL Conference on Digital Forensics, Security and Law

This conceptual piece analyzes the role of criminal punishment and the nature of cyber crime to investigate whether the current punishment schemes are appropriate given the deontological and utilitarian goals of punishment: retribution, deterrence, incapacitation, and rehabilitation. The research has implications for policymaking in cybercriminal law.

Keywords: cybercrime, criminal law, punishment, retribution, deterrence, information economics


The Development Of Computer Forensic Legal System In China, Yonghao Mai, K. P. Chow, Rongsheng Xu, Gang Zhou, Fei Xu, Jun Zhang Jun 2013

The Development Of Computer Forensic Legal System In China, Yonghao Mai, K. P. Chow, Rongsheng Xu, Gang Zhou, Fei Xu, Jun Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

The computer forensic discipline was established around 2000 in China, which was further developed along with Chinese judicial appraisal system in 2005. The new criminal and civil procedure laws of the People’s Republic of China was enacted on 1 Jan 2013. The new laws specified electronic data is legal evidence and has great impact on the current practice on handling electronic evidence. This paper introduces the electronic data and electronic evidence examination procedure in mainland China, the general concept of computer forensic legal system, the management of computer judicial experts, the management of computer judicial expertise institutions.

Keywords: China legal …


Session 4-2-C: Dissociating The Roles Of Delay And Probability Discounting In Gambling Behavior, Will Shead, Emad Talisman May 2013

Session 4-2-C: Dissociating The Roles Of Delay And Probability Discounting In Gambling Behavior, Will Shead, Emad Talisman

International Conference on Gambling & Risk Taking

Now or Later?

How would you like a gift?

Now vs. 1 week

Rewards now are worth more than later

- Delayed rewards are discounted


Session 4-2-A: Taking The Disorder Out Of Gambling Disorder, Denise F. Quirk, Colin M. Hodgen May 2013

Session 4-2-A: Taking The Disorder Out Of Gambling Disorder, Denise F. Quirk, Colin M. Hodgen

International Conference on Gambling & Risk Taking

DSM‐5 Gambling Disorder

A. Persistent and recurrent problematic gambling behavior leading to clinically significant impairment or distress, as indicated by four (or more) of the following in a 12‐month period:

A. Persistent and recurrent maladaptive gambling behavior as indicated by five (or more) of the following:


Session 4-1-D: The Experience Of Lotto 6/49 And The Capacity To Trust: Elements For An Anthropology Of Gambling, Jocelyn Gadbois May 2013

Session 4-1-D: The Experience Of Lotto 6/49 And The Capacity To Trust: Elements For An Anthropology Of Gambling, Jocelyn Gadbois

International Conference on Gambling & Risk Taking

Anthropologists study Lotto 6/49 as an experience.

Lévy-Bruhl tries to compare the magical beliefs of serious gamblers with the magical beliefs of individuals he refers to as the ‘‘primitives’’ (1924).

After that, Henslin studied the superstitions of St.Louis taxi drivers who play craps during their work breaks and compared them to Skinner’s pigeon (1967).

I wanted in my thesis to help anthropology to reconstruct lost knowledge regarding gambling and beliefs about magic in capitalist society.


Session 4-1-B: Casino Legalization As An Evolutionary Game -- Who Will Be The Next?, Miao He May 2013

Session 4-1-B: Casino Legalization As An Evolutionary Game -- Who Will Be The Next?, Miao He

International Conference on Gambling & Risk Taking

Introduction

For the community/governor who has a strong preposition to casino gaming (e.g., gambler, religious group), his/her motivation to participate/accept casino legalization is

∆PAEA+tA>cî and ∆PB(RB+EB)+tB>cĴ

What’s the motivation for the other community/governors who are neutral to casino gaming?

How the casino legalization process evolved and finally reached the equilibrium state?


Session 4-1-C: Social Media Gambling Games: Impact On Young People, Sally Gainsbury, Jeffrey L. Derevensky May 2013

Session 4-1-C: Social Media Gambling Games: Impact On Young People, Sally Gainsbury, Jeffrey L. Derevensky

International Conference on Gambling & Risk Taking

Key concerns for youth

Normalisation & positive impressions of gambling

Misrepresenting the odds of winning

Encouraging transition to real money gambling

Development of problems


Session 4-1-D: The Ant And The Grasshopper: Western Casino Operators In Macau And Singapore, Sudhir Kale May 2013

Session 4-1-D: The Ant And The Grasshopper: Western Casino Operators In Macau And Singapore, Sudhir Kale

International Conference on Gambling & Risk Taking

Objectives

Understand the impact of market conditions and managerial orientation on employee satisfaction, organizational identification, and service quality in Macau/ Singapore Casino Industry.

Highlight long-term adverse impact of poor service quality on market share and profitability.

Provide guidelines for action.


Session 4-1-A: The Problem Gambling Center, Robert Hunter May 2013

Session 4-1-A: The Problem Gambling Center, Robert Hunter

International Conference on Gambling & Risk Taking

Provides information and statistics on the Problem Gambling Center.


Session 3-4-B: Evaluating The Performance Of Macao’S Gaming Industry, Day-Yang Liu May 2013

Session 3-4-B: Evaluating The Performance Of Macao’S Gaming Industry, Day-Yang Liu

International Conference on Gambling & Risk Taking

The purpose of research

The stringently competitive nature of the casino entertainment market in the Macao necessitates that managers fully utilize knowledge expertise to increase efficiency in operations management.

Therefore, this study employs data envelopment analysis (DEA) model to estimate the efficiency and productivity of the casino entertainment industry in Macao.


Session 3-4-A: Public Opinion And Problem Gambling, Don Feeney May 2013

Session 3-4-A: Public Opinion And Problem Gambling, Don Feeney

International Conference on Gambling & Risk Taking

What do we need to know?

How does the public perceive addiction?

Do they stigmatize addiction?

Do they recognize gambling addiction?

Do they understand the causes?

Do they understand the solutions?

Do they know where to go for help?

Do they know preventative factors?

What are they willing to do?

What messages are credible and appealing?


Session 3-3-A: An Improved Pathways Development Model Of Problem Gambling: A Summary Of 11 Studies In Hong Kong And Macau, Amy Chiu Sau Lam, Alice Chan Ying Ying, Chi Chuen Chan May 2013

Session 3-3-A: An Improved Pathways Development Model Of Problem Gambling: A Summary Of 11 Studies In Hong Kong And Macau, Amy Chiu Sau Lam, Alice Chan Ying Ying, Chi Chuen Chan

International Conference on Gambling & Risk Taking

Introduction

The rationale of this study came from a casual meeting of our supervisor Dr. Chan Chi Chuen and Professor Blaszczynski on a bus after the 2009 Reno conference.

On the bus, C. C. promised Mr. Blaszczynski that he would validate the pathways model in Hong Kong and Macau. And in the next 5 years, Dr. C.C. Chan and his students conducted 11 research projects on problem gambling in Hong Kong and Macau.

Purposes of current study

  • To arrive on a summary finding from 11 studies on problem gambling
  • To validate the pathways development model proposed by Blaszczynski & Nower …


Session 3-3-C: The National Longitudinal Study Of Gambling Behaviour (Nlsgb): Preliminary Results, Andrew Dellis, Andre Hofmeyr, Harold Kincaid, Don Ross May 2013

Session 3-3-C: The National Longitudinal Study Of Gambling Behaviour (Nlsgb): Preliminary Results, Andrew Dellis, Andre Hofmeyr, Harold Kincaid, Don Ross

International Conference on Gambling & Risk Taking

Introduction

The NLSGB tracked 300 gamblers over a 15-month period.

A comprehensive survey instrument was compiled to analyse factors that might influence changes in risk of gambling problems over time.

The study was conducted in the four major metropolitan areas of South Africa: Johannesburg, Tshwane, Durban and Cape Town. We will discuss the study’s design and implementation and some preliminary results.


Session 3-3-A: The ‘Circles Concept’ Of Gambling Addiction: An Empowered Framework For Change, Harry B. Mayr May 2013

Session 3-3-A: The ‘Circles Concept’ Of Gambling Addiction: An Empowered Framework For Change, Harry B. Mayr

International Conference on Gambling & Risk Taking

The original ‘Circles Concept of (Gambling) Addiction’ was developed by Harry Mayr in 1982, while working as an addictions counsellor in a community-based health centre. It has always been a ‘user friendly’ concept … applicable and understood by people from all cultures, across all ages, and with or without an addiction issue. Years later, people have informed Mr Mayr how they still remember ‘those circles’, and how the concept helped them.

The ‘Circles Concept of (Gambling) Addiction’ is therefore a concept remembered as much for its visual cues as its verbal explanation – and thus applicable across languages, cognitive and …


Session 3-3-F: Measuring The Price Of Discrimination With Data On Poker Games, Ingo Fiedler May 2013

Session 3-3-F: Measuring The Price Of Discrimination With Data On Poker Games, Ingo Fiedler

International Conference on Gambling & Risk Taking

Introduction

Economic theory suggests that discrimination is price sensitive and money an equalizer

This means that discrimination decreases the higher the private costs for the discriminator

Economic reasoning: Discrimination comes at a price for the discriminator

  • Example: an employer discriminates against potential employees with a non-white skin tone and thus may miss the best employees who then work for a competitor.
  • Imperfect competition leads to rents and rents can be used to discriminate and they can be discrimination in itself. [Jomo, 2003].
  • Competition reduces discrimination


Session 3-3-B: The Interplay Between Law, Development And Spillover Effects Of Casino Gaming: Theory And The Asian Evidences, Ricardo Chi Sen Siu May 2013

Session 3-3-B: The Interplay Between Law, Development And Spillover Effects Of Casino Gaming: Theory And The Asian Evidences, Ricardo Chi Sen Siu

International Conference on Gambling & Risk Taking

Taking into consideration of the unique features and practice of casino gaming, the significance of law in the development of this industry, and the onging interactions between law, the industry’s succeeding performance and its spillover effects are generalized and illustrated in this paper. Based on the rationales of law and economics, and the institutional approach to economic analysis, a functional model is constructed to depict the related interplaying forces and the development of casino gaming. In principle, it is shown that business scope and scale of casino gaming is largely defined by law on one hand, and the revisions of …


Session 3-2-F: Baccarat Solved?, David Sofer May 2013

Session 3-2-F: Baccarat Solved?, David Sofer

International Conference on Gambling & Risk Taking

Provides information and statistics on Baccarat.


Session 3-2-B: What Changing Public Policies Toward Gambling Mean For Gaming Law, I. Nelson Rose May 2013

Session 3-2-B: What Changing Public Policies Toward Gambling Mean For Gaming Law, I. Nelson Rose

International Conference on Gambling & Risk Taking

The Three Waves Of Legal Gambling

First Wave - Colonial period to mid-19th century: Legal Debris: “Lotteries” prohibited in state constitutions and Canada (except Quebec)

Second Wave - Wild West; South after the Civil War , new inventions. Crash - Victorian morality Legal Debris: Statutes prohibit bookmaking, slot machines; U.S. federal and Quebec anti-lottery laws

Third Wave - Depression to present: Legal Debris: Piecemeal legalization by states, provinces


Session 3-1-E: Modeling Change In The Profile Of The Atlantic City Visitor, Brian J. Tyrrell, Israel Posner Ph.D. May 2013

Session 3-1-E: Modeling Change In The Profile Of The Atlantic City Visitor, Brian J. Tyrrell, Israel Posner Ph.D.

International Conference on Gambling & Risk Taking

The Atlantic City casino market has faced increasing competition over the past decade, particularly since the introduction of Pennsylvania gaming in 2006. In response to this increased competition, the State of New Jersey, through legislation, created a public private partnership to both redevelop parts of the city and devote significant marketing dollars into shaping the image of the city. The private side of that partnership, the Atlantic City Alliance (ACA), found in their earliest consumer research that Atlantic City’s image as a gaming destination was well established, but that the city was less known for the retail, entertainment and restaurants …