856,122 research outputs found

    A description of the software analysis from flight and simulation data of the course cut limiter in the TCV b-737 area navigation computer

    Get PDF
    During automatic horizontal path captures, the (Terminal Configured Vehicle) B-737 airplane maintained smaller than designed path intercept angles and experienced a sawtooth bank angle oscillation during its turn towards the path. From flight data, it was determined that these anomalies were caused by the improper output of the course cut limiter in the horizontal path control law. The output from the course cut limiter did not obtain its full value and it was calculated stepwise discontinuously. The automatic horizontal path captures were then conducted on the TCV B-737 airplane real-time simulation. The path intercept angles were maintained properly and no bank angle oscillation was encountered. Data showed that the course cut limiter was calculated at its full value in a continuous manner. The intermediate calculations of the course cut limiter in the airplane's navigation computer were rewritten and rescaled in such a manner that truncation errors could be minimized. The horizontal path capture tests were then reflown. The airplane maintained the proper path intercept angle and no bank angle oscillations occurred on any of the tests

    Computer forensics methodology and praxis.

    Get PDF
    This thesis lays the groundwork for creation of a graduate-level computer forensics course. It begins with an introduction explaining how computing has invaded modern life and explains what computer forensics is and its necessity. The thesis then argues why universities need to be at the forefront of educating students in the science of computer forensics as opposed to proprietary education courses and the benefits to law enforcement agencies of having a computer scientist perform forensic analyses. It continues to detail what computer forensics is and is not. The thesis then addresses legal issues and the motivation for the topic. Following this section is a review of current literature pertaining to the topic. The last half of the thesis lays a groundwork for design of a computer forensics course at the graduate level by detailing a methodology to implement which contains associated laboratory praxis for the students to follow

    Data-driven personalisation and the law - a primer: collective interests engaged by personalisation in markets, politics and law

    Get PDF
    Interdisciplinary Workshop on �Data-Driven Personalisation in Markets, Politics and Law' on 28 June 2019Southampton Law School will be hosting an interdisciplinary workshop on the topic of �Data-Driven Personalisation in Markets, Politics and Law' on Friday 28 June 2019, which will explore the pervasive and growing phenomenon of �personalisation� � from behavioural advertising in commerce and micro-targeting in politics, to personalised pricing and contracting and predictive policing and recruitment. This is a huge area which touches upon many legal disciplines as well as social science concerns and, of course, computer science and mathematics. Within law, it goes well beyond data protection law, raising questions for criminal law, consumer protection, competition and IP law, tort law, administrative law, human rights and anti-discrimination law, law and economics as well as legal and constitutional theory. We�ve written a position paper, https://eprints.soton.ac.uk/428082/1/Data_Driven_Personalisation_and_the_Law_A_Primer.pdf which is designed to give focus and structure to a workshop that we expect will be strongly interdisciplinary, creative, thought-provoking and entertaining. We like to hear your thoughts! Call for papers! Should you be interested in disagreeing, elaborating, confirming, contradicting, dismissing or just reflecting on anything in the paper and present those ideas at the workshop, send us an abstract by Friday 5 April 2019 (Ms Clare Brady [email protected] ). We aim to publish an edited popular law/social science book with the most compelling contributions after the workshop.Prof Uta Kohl, Prof James Davey, Dr Jacob Eisler<br/

    Teaching the Methods of White-Collar Practice: Investigatios

    Get PDF
    When Ijoined the George Washington University Law School [GW] faculty after practice as a federal prosecutor and white-collar criminal defense attorney, I quickly learned that a GW law student interested in exploring white-collar crime had a great many courses from which to choose. Several of my full-time colleagues teach courses that cover various topics relevant to white-collar crime, including a computer crimes course, a course in criminal tax litigation, and courses on anti-corruption in government contracting and the Foreign Corrupt Practices Act [FCPA]. GW is also fortunate to have a dedicated and talented adjunct faculty, which includes a former senior federal white-collar prosecutor who teaches a very popular white-collar crime survey course, and two of my former colleagues from the Justice Department\u27s Public Integrity Section, who co-teach a seminar on public corruption. There is also a terrific seminar on congressional investigations taught by a sitting federal district judge with experience as both a full-time law professor and an investigative lawyer on the Hill, and a federal sentencing seminar taught by a sitting federal district judge who also is vice-chair of the U.S. Sentencing Commission

    Development and Dissemination of a New Multidisciplinary Undergraduate Curriculum in Digital Forensics

    Get PDF
    The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively by faculty experts in multiple fields of computer science, law, psychology, social sciences, and accountancy. A preliminary plan for the introductory course was presented to a workshop of digital forensics experts in May 2013 and received their strong approval. Pilot versions of the introductory and introductory lab courses were taught to a mixture of computer science and law students at the University of Illinois in the fall of 2013, and were very positively received by the students, who made it clear that they appreciated the multidisciplinary approach. The curriculum, which is designed to obviate the need for expensive labs or team-teaching by specialized faculty, will be made available to other colleges and universities in order to improve the content and quality of existing digital forensics programs, to inspire and greatly facilitate the creation of new programs, and, ultimately, to increase the number of educated practitioners. The developed resources can be used as the basis for future academic programs, distance learning, and multidisciplinary, multi-institutional programs that meet evolving digital forensics educational standards. Much of the material, including a virtual laboratory, will be provided on-line. Introductory course materials will be distributed to other institutions beginning in the summer of 2014; advanced course materials should be available for distribution in 2015. Related outreach activities have been undertaken and will be continued. Keywords: Digital forensics, Computer forensics, Curriculum development, Curriculum standards, Education standards, Training standards, Undergraduate education, Interdisciplinary studie

    Developing an Autonomous and Interdisciplinary Teaching of Cyberlaw in Argentinean Universities

    Get PDF
    The conceptualizations that doctrine has elaborated on cyberlaw have a visible interrelation between two disciplines: law and computer science. For this reason, this paper proposes to provide a foundation on the importance of teaching its contents at the university level in an autonomous method: encompassing them in a single course, and interdisciplinary; analyzing the information and communication technologies that underlie the legal regulation. To this end, we will examine the curriculum of the subject of Computer Law at a university in the Autonomous City of Buenos Aires, and will also inquire about the current status of its inclusion in the curricula of other universities in the district.Fil: Zermo Dopico, Patricio Alan. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina. Universidad Argentina de la Empresa. Secretaria Academica y de Investigacion. Instituto de Ciencias Sociales y Disciplinas Proyectuales.; Argentina. Universidad de Buenos Aires; Argentin

    Information Warfare and Civilian Populations: How the Law of War Addresses a Fear of the Unknown

    Get PDF
    Imagine a civilian communications system is being temporarily relied upon by an opposing military force for vital operations. If one launches a computer network attack against the communications system, the operation may disable the opposing force’s ability to function adequately and, as a result, prompt their surrender. The alternative course of action is to launch a traditional kinetic weapons attack in the hopes of inflicting enough casualties on the troops to induce surrender. Given these options, the law of war would encourage the utilization of the computer network attack because it would result in less unnecessary suffering. But is the same true if we are unsure of the collateral consequences of the computer network attack on a large civilian population that also relies on this communications system? For instance, because civilians use the same communications system to gather critical information, disabling the system might result in rioting, civil disorder, serious injuries, and deaths. Further, civilians may be unable to call for help, seek out medical assistance, or locate emergency response centers. Given these unknown yet potentially severe collateral consequences to civilians, it becomes less clear that a proportionality analysis under the law of war would favor the computer network attack over the traditional kinetic operation. In this article, Professor Lucian E. Dervan examines the application of the law of war to information operations and analyses the role of the Geneva Convention’s utilitarian goals in determining the validity of computer network attacks against dual-use civilian objectives

    Reflections from CALICon19: Two Best Sessions

    Full text link
    Rachel Evans summarizes the recent Computer Assisted Legal Education (CALI) conference held in Columbia, SC in June 2019. Specifically Evans reviews two sessions related to automating work in institutional repositories and using eResources for more affordable course materials. TechScans is a blog to share the latest trends and technology tools for technical services law librarians. The official blog of the TS-SIS and OBS-SIS AALL groups

    Book Review: Privacy Law in Canada by Colin H.H. McNairn and Alexander K. Scott

    Get PDF
    Privacy Law in Canada is a 360-page work that broadly covers legislation at both the federal and provin- cial level, and criminal and civil liability for privacy intru- sions in the context of case law from across Canada. Particular focus is given to privacy issues associated with the workplace, personal health information, technolog- ical surveillance, and protecting consumers and debtors. The authors take a practical approach in examining chal- lenging questions, such as whether a consumer’s consent is required to obtain a credit report; disclosure of med- ical information; monitoring an employee’s computer use and voice mail; how the PIPEDA affects businesses; the status of a common law tort of privacy; and when a person, who is subject to a search or surveillance, has a reasonable expectation of privacy. Informative, timely and straightforward, Privacy Law in Canada, is a very useful reference for practitioners and other professionals, as well as a good course supplement for law students or faculty studying, researching or interested in this area
    • …
    corecore