[AISWorld] TOC: Journal of Digital Forensics, Security and Law (V10N3)

Glenn S. Dardick gdardick at dardick.net
Sun Oct 18 20:30:08 EDT 2015







JDFSL: Journal of Digital Forensics, Security and Law





[Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: adfslgraphic.jpg]


Table of Contents

Volume 10 Number 3
http://www.jdfsl.org









Dear colleagues:



Volume 10 Number 3 of the JDFSL (Journal of Digital Forensics, Security and Law) is now available.



The JDFSL is published quarterly by the Association of Digital Forensics, Security and Law (ADFSL) and recently became an Open Access journal licensed under the Creative Commons Attribution 4.0 International License.



The JDFSL focuses on research, and the current and expanding role, of digital forensics within investigations and the courts as well as its important role within cyber security - both national as well as corporate. Topics not only include technology and evidence, but also are very much focused on curriculum preparing students for careers, academic and practitioner, in digital forensics..



The JDFSL is of particular interest to individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas of digital forensics, security, and law. This JDFSL is of value to both academic and practitioner audiences.



Contents of Volume 10 Number 3 (2015)



In this issue, we continue our multidisciplinary tradition.



The first paper, Computer Forensic Projects for Accountants, argues the importance of computer forensics to accounting students and offers a set of exercises to provide an introduction to obtaining and analyzing data with free online forensics software. In the paper, figures of important steps are provided.



In the second paper, Identification and Exploitation of Inadvertent Spectral Artifacts in Digital Audio, the authors show that modulation products from local oscillators in a variety of commercial camcorders are coupled into the recorded audio track, creating narrow band time invariant spectral features. The authors show that those spectral features, left largely intact by transcoding, compression and other forms of audiovisual post processing, can encode characteristics of specific camcorders used to capture the audio files, including the make and model. The paper demonstrates an average probability of detection approaching 0.95 for identification of a specific camcorder in a population of thousands of similar recordings, with a probability of false alarm of only about 0.11.



In the third paper, On The Network Performance of Digital Evidence Acquisition of Small Scale Devices Over Public Networks, the authors describe the architecture of a comprehensive proactive digital investigation system, termed as the Live Evidence Information Aggregator (LEIA) to be used to collect digital evidence from potentially any device in real time over the Internet. Particular focus is made on the importance of the efficiency of the network communication in the evidence acquisition phase, in order to retrieve potentially evidentiary information remotely and with immediacy.



Finally, in the fourth paper, A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo, the authors discuss a key piece of forensics evidence in the assassination of U.S. President Kennedy - photographic evidence that is still debated today as to whether the famous backyard photo of Oswald, holding the same type of rifle used to assassinate the President, is a fake. Those claims include, among others, that Oswald's pose in the photo is physically implausible. The authors, in their paper, describe a detailed 3-D stability analysis to determine if those claims are warranted.



Submissions



All research papers and case studies are double blind peer reviewed.



Instructions for authors may be found at the following link:



http://www.jdfsl.org



Suggested Topics



The conference committee is calling for papers and proposals in, or related to, the following areas:



CURRICULUM

1) Digital forensics curriculum

2) Cyber law curriculum

3) Information security curriculum

4) Accounting digital forensics curriculum



TEACHING METHODS

5) Digital forensics teaching methods

6) Cyber law teaching methods

7) Information security teaching methods

8) Accounting digital forensics teaching methods



CASES

9) Digital forensics case studies

10) Cyber law case studies

11) Information security case studies

12) Accounting digital forensics case studies



INFORMATION TECHNOLOGY

13) Digital forensics and information technology

14) Cyber law and information technology

15) Information security and information technology

16) Accounting digital forensics information technology



NETWORKS AND THE INTERNET

17) Digital forensics and the Internet

18) Cyber law and the Internet

19) Information security and Internet

20) Digital forensics accounting and the Internet



ANTI-FORENSICS AND COUNTER ANTI-FORENSICS

21) Steganography

22) Stylometrics and author attribution

23) Anonymity and proxies

24) Encryption and decryption



INTERNATIONAL ISSUES

25) International issues in digital forensics

26) International issues in cyber law

27) International issues in information security

28) International issues in accounting digital forensics



THEORY

29) Theory development in digital forensics

30) Theory development in information security

31) Methodologies for digital forensic research

32) Analysis techniques for digital forensic and information security research



PRIVACY ISSUES

33) Privacy issues in digital forensics

34) Privacy issues in information security

35) Privacy issues in cyber law



SOFTWARE FORENSICS

36) Software piracy investigation

37) Software quality forensics



NATIONAL SECURITY AND CYBERCRIME

38) Cyber culture and cyber terrorism



Additional Information



Association for Digital Forensics, Security and Law

Website: http://www.adfsl.org



Journal of Digital Forensics, Security and Law

Website: http://www.jdfsl.org


[cid:image002.png at 01CF2F92.0333F0A0]
" Verum Vacuus Praeiudicio"

Glenn S. Dardick, Ph.D., CCE (ISFCE), CCFP (ISC2)
804-402-9239
gdardick at dardick.net<mailto:gdardick at dardick.net>
gdardick (Skype)

Director
Association for Digital Forensics, Security and Law
[cid:image006.png at 01CF2F92.0333F0A0] [cid:image007.png at 01CF2F92.0333F0A0]
Publisher of the Journal of Digital Forensics, Security and Law
gdardick at adfsl.org<mailto:gdardick at adfsl.org>

Shipping/Postal Address:
Glenn S. Dardick / ADFSL
4350 Candlewood Ln
Ponce Inlet, Florida 32127
This electronic message is intended only for the use of the individual or company named above. If the intended recipient is a client, the information contained in this message is considered confidential, proprietary, privileged, and may contain client confidential information and work product. It may also contain trade secrets protected by State and Federal law. If you are not the addressee please do not copy or deliver this message to anyone. You should immediately delete the message without reading the contents and notify us by return email that the message was misdirected. I apologize for the inconvenience. Any other use of this information is strictly prohibited.
















-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 2741 bytes
Desc: image001.jpg
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20151019/ed4b0761/attachment.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.png
Type: image/png
Size: 3349 bytes
Desc: image002.png
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20151019/ed4b0761/attachment.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image006.png
Type: image/png
Size: 15396 bytes
Desc: image006.png
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20151019/ed4b0761/attachment-0001.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image007.png
Type: image/png
Size: 1887 bytes
Desc: image007.png
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20151019/ed4b0761/attachment-0002.png>


More information about the AISWorld mailing list