Proceedings of the Conference on Digital Forensics, Security, and Law 2012 Richmond, Virginia May 30-31

Total Page:16

File Type:pdf, Size:1020Kb

Proceedings of the Conference on Digital Forensics, Security, and Law 2012 Richmond, Virginia May 30-31 Proceedings of the Conference on Digital Forensics, Security, and Law 2012 Richmond, Virginia May 30-31 Richmond, Virginia May 30-31, 2012 Conference Chair Glenn S. Dardick Longwood University Virginia, USA Association of Digital Forensics, Security and Law Copyright © 2012 ADFSL, the Association of Digital Forensics, Security and Law. Permission to make digital or printed copies of all or any part of this journal is granted without fee for personal or classroom use only and provided that such copies are not made or distributed for profit or commercial use. All copies must be accompanied by this copyright notice and a full citation. Permission from the ADFSL is required to make digital or printed copies of all or any part of this journal for-profit or commercial use. Permission requests should be sent to Dr. Glenn S. Dardick, Association of Digital Forensics, Security and Law, 1642 Horsepen Hills Road, Maidens, Virginia 23102 or emailed to [email protected]. ISSN 1931-7379 ADFSL Conference on Digital Forensics, Security and Law, 2012 Sponsors 2 ADFSL Conference on Digital Forensics, Security and Law, 2012 Contents Committee ................................................................................................................................................ 4 Schedule ................................................................................................................................................... 5 Update on the State of the Science of Digital Evidence Examination ................................................. 7 Fred Cohen* A Proposal for Incorporating Programming Blunder as Important Evidence in Abstraction-Filtration-Comparison Test ............................................................................................ 19 P. Vinod Bhattathiripad* The Xbox 360 and Steganography: How Criminals and Terrorists could be “Going Dark” ......... 33 Ashley Podhradsky*, Rob D’Ovidio and Cindy Casey Double-Compressed JPEG Detection in a Steganalysis System ........................................................ 53 Jennifer L. Davidson* and Pooja Parajape Toward Alignment between Communities of Practice and Knowledge-Based Decision Support ................................................................................................................................................... 79 Jason Nichols*, David Biros* and Mark Weiser A Fuzzy Hashing Approach Based on Random Sequences and Hamming Distance ...................... 89 Frank Breitinger* and Harald Baier Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud .. 101 Yi-Jun He, Echo P. Zhang*, Lucas C.K. Hui, Siu Ming Yiu* and K.P. Chow iPad2 Logical Acquisition: Automated or Manual Examination? .................................................. 113 Somaya Ali*, Sumaya AlHosani*, Farah AlZarooni and Ibrahim Baggili Multi-Parameter Sensitivity Analysis of a Bayesian Network from a Digital Forensic Investigation ......................................................................................................................................... 129 Richard E. Overill, Echo P. Zhang* and Kam-Pui Chow Facilitating Forensics in the Mobile Millennium Through Proactive Enterprise Security .......... 141 Andrew R. Scholnick* A Case Study of the Challenges of Cyber Forensics Analysis of Digital Evidence in a Child Pornography Trial .................................................................................................................... 155 Richard Boddington* After Five Years of E-Discovery Missteps: Sanctions or Safe Harbor? ......................................... 173 Milton Luoma* and Vicki Luoma* Digital Evidence Education in Schools of Law ................................................................................. 183 Aaron Alva* and Barbara Endicott-Popovsky Pathway into a Security Professional: A new Cyber Security and Forensic Computing Curriculum .......................................................................................................................................... 193 Elena Sitnikova* and Jill Slay * Author Presenting and/or Attending 3 ADFSL Conference on Digital Forensics, Security and Law, 2012 Conference Committee The 2012 ADFSL Conference on Digital Forensics, Security and Law is pleased to have the following members of the conference committee. Glenn Dardick [email protected] General chair Longwood University Virginia USA John Bagby Nick Vincent Flor Jigang Liu [email protected] [email protected] [email protected] The Pennsylvania State University of New Mexico Metropolitan State University University New Mexico Minnesota Pennsylvania USA USA USA Diane Barrett Felix Freiling John Riley [email protected] [email protected] [email protected] University of Advanced erlangen.de Bloomsburg University Technology, Arizona University of Erlangen Pennsylvania USA Nürnberg USA Germany David Biros Simson Garfinkel Pedro Luis Prospero Sanchez [email protected] [email protected] [email protected] Oklahoma State University Naval Postgraduate School University of Sao Paulo Oklahoma Monterey, CA Sao Paulo USA USA Brazil Mohamed Chawki Andy Jones Jill Slay [email protected] [email protected] [email protected] University of Aix-Marseille III Khalifa University Polytechnic of Namibia France UAE Windhoek Namibia Fred Cohen Gregg Gunsch Eli Weintraub [email protected] [email protected] [email protected] California Sciences Institute Defiance College Afeka Tel Aviv Academic College Livermore, CA Ohio of Engineering USA USA Israel David Dampier Gary Kessler Craig Valli [email protected] [email protected] [email protected] Mississippi State University Gary Kessler Associates Edith Cowan University Mississippi Vermont Western Australia USA USA Australia Denis Edgar-Nevill Ki Jung Lee denis.edgar-nevill@ [email protected] canterbury.ac.uk Drexel University Canterbury Christ Church Pennsylvania University USA UK 4 ADFSL Conference on Digital Forensics, Security and Law, 2012 Schedule Wednesday, May 30 07:30 AM CONTINENTAL BREAKFAST 07:30 AM On-site Registration 08:30 AM Introductions . Glenn S. Dardick, Conference Chair and Director of the ADFSL 08:40 AM Welcome . Paul Barrett, Dean of the College of Business and Economics at Longwood University 08:50 AM Papers/Presentation Session I . Fred Cohen, USA: Update on the State of the Science of Digital Evidence Examination . P. Vinod Bhattathiripad, India: A Proposal for Incorporating Programming Blunder as Important Evidence in Abstraction- Filtration-Comparison Test 10:10 AM BREAK 10:30 AM Papers/Presentation Session II . Ashley L. Podhradsky, USA: The Xbox 360 and Steganography: How Criminals and Terrorists Could Be “Going Dark” . Jennifer Davidson, USA: Double-Compressed JPEG Detection in a Steganalysis System . Jason Nichols and David Biros, USA: Toward Alignment Between Communities of Proactive and Knowledge-Based Decision Support 12:30 PM LUNCH (provided) 01:15 PM Keynote . Mohamed Chawki, Senior Judge at the Council of State, Egypt and Founder-Chairman of the International Association of Cybercrime Prevention (AILCC) in Paris - "IT and Regime Change" 01:45 PM Papers/Presentation Session III . Frank Breitinger, Germany: A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance 03:00 PM BREAK 03:20 PM Papers/Presentation Session IV . Echo P. Zhang and Siu Ming Yiu, China: Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in the Cloud . Somaya Ali AlWejdani and Sumaya AbdulAziz AlHosani, UAE iPad2 logical acquisition: Automated or Manual Examination? 04:40 PM Conference Close for Day 5 ADFSL Conference on Digital Forensics, Security and Law, 2012 Schedule Thursday, May 31 07:30 AM CONTINENTAL BREAKFAST 07:30 AM On-site Registration 08:30 AM Papers/Presentation Session I . Paul Poroshin, US Branch Vice-President, Group-IB, Russia: The Analysis of the 2011 Russian Cybercrime Scene . Gareth Davies, UK: NAND Memory Technology Forensics 10:15 AM BREAK 10:30 AM Papers/Presentation Session II . Ping Zhang, China: Multi-Parameter Sensitivity Analysis of a Bayesian Network From a Digital Forensic Investigation . Andrew Scholnick, USA: Facilitating Forensics in the Mobile Millennium Through Proactive Enterprise Security 12:30 PM LUNCH (provided) 01:15 PM Keynote Speech . Nigel Wilson, Senior Lecturer at the University of Adelaide Law School in Australia - "Digital Experts – Why is Effective Communication So Important to Both the Admissibility and Persuasiveness of Expert Opinion?" 01:45 PM Papers/Presentation Session III . Richard Boddington, Australia: A Case Study of the Challenges of Cyber Forensics Analysis of Digital Evidence in a Child Pornography Trial . Milton Luoma and Vicki Luoma, USA: After Five Years of E-Discovery Missteps: Sanctions or Safe Harbor? 03:00 PM BREAK 03:20 PM Papers/Presentation Session IV . Aaron Alva, USA: Digital Evidence Education in Schools of Law . Elena Sitnikova, Australia: Pathway into a Security Professional: A New Cyber Security and Forensic Computing Curriculum 04:40 PM Conference Close 6 ADFSL Conference on Digital Forensics, Security and Law, 2012 UPDATE ON THE STATE OF THE SCIENCE OF DIGITAL EVIDENCE EXAMINATION Fred Cohen CEO, Fred Cohen & Associates President, California Sciences Institute ABSTRACT This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions
Recommended publications
  • ESSAY Untangling Attribution David D. Clark* and Susan Landau**
    ESSAY Untangling Attribution David D. Clark* and Susan Landau** I. Introduction In February 2010, former Director of the National Security Agency Mike McConnell wrote, "We need to develop an early-warning system to monitor cyberspace, identify intrusions and locate the source of attacks with a trail of evidence that can support diplomatic, military and legal options and we must be able to do this in milliseconds. More specifically, we need to reengineer the Internet to make attribution, geolocation, intelligence analysis and impact assessment - who did it, from where, why and what was the result - more manageable."I The Internet was not designed with the goal of deterrence in mind, and perhaps a future Internet should be designed differently. McConnell's statement is part of a recurring theme that a secure Internet must provide better attribution for actions occurring on the network. Although attribution generally means assigning a cause to an action, as used here attribution refers to identifying the agent responsible for the action (specifically, "determining * David Clark, Senior Research Scientist, MIT, Cambridge MA 02139, ddc acsail.mit.edu. Clark's effort on this work was funded by the Office of Naval Research under award number N00014-08-1-0898. Any opinions, findings, and conclusions or recommendations expressed in this Essay are those of the authors and do not necessarily reflect the views of the Office of Naval Research. " Susan Landau, Fellow, Radcliffe Institute for Advanced Study, Harvard University, Cambridge, MA 02138, susan.landau(a) rivacvink.oru. An earlier version of this Essay appeared in COMMI. ON DLTLRRING CYBERATTACKS, NAT'L RLSLARCH COUNCIL, PROCELDINGS OF A WORKSHOP ON DLTLRRING CYBLRATTACKS: INFORMING STRATEGILS AND DLVLLOPING OPTIONS FOR U.S.
    [Show full text]
  • Reality Is Broken a Why Games Make Us Better and How They Can Change the World E JANE Mcgonigal
    Reality Is Broken a Why Games Make Us Better and How They Can Change the World E JANE McGONIGAL THE PENGUIN PRESS New York 2011 ADVANCE PRAISE FOR Reality Is Broken “Forget everything you know, or think you know, about online gaming. Like a blast of fresh air, Reality Is Broken blows away the tired stereotypes and reminds us that the human instinct to play can be harnessed for the greater good. With a stirring blend of energy, wisdom, and idealism, Jane McGonigal shows us how to start saving the world one game at a time.” —Carl Honoré, author of In Praise of Slowness and Under Pressure “Reality Is Broken is the most eye-opening book I read this year. With awe-inspiring ex­ pertise, clarity of thought, and engrossing writing style, Jane McGonigal cleanly exploded every misconception I’ve ever had about games and gaming. If you thought that games are for kids, that games are squandered time, or that games are dangerously isolating, addictive, unproductive, and escapist, you are in for a giant surprise!” —Sonja Lyubomirsky, Ph.D., professor of psychology at the University of California, Riverside, and author of The How of Happiness: A Scientific Approach to Getting the Life You Want “Reality Is Broken will both stimulate your brain and stir your soul. Once you read this remarkable book, you’ll never look at games—or yourself—quite the same way.” —Daniel H. Pink, author of Drive and A Whole New Mind “The path to becoming happier, improving your business, and saving the world might be one and the same: understanding how the world’s best games work.
    [Show full text]
  • Pgpfone Pretty Good Privacy Phone Owner’S Manual Version 1.0 Beta 7 -- 8 July 1996
    Phil’s Pretty Good Software Presents... PGPfone Pretty Good Privacy Phone Owner’s Manual Version 1.0 beta 7 -- 8 July 1996 Philip R. Zimmermann PGPfone Owner’s Manual PGPfone Owner’s Manual is written by Philip R. Zimmermann, and is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Pretty Good Privacy™, PGP®, Pretty Good Privacy Phone™, and PGPfone™ are all trademarks of Pretty Good Privacy Inc. Export of this software may be restricted by the U.S. government. PGPfone software is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Phil’s Pretty Good engineering team: PGPfone for the Apple Macintosh and Windows written mainly by Will Price. Phil Zimmermann: Overall application design, cryptographic and key management protocols, call setup negotiation, and, of course, the manual. Will Price: Overall application design. He persuaded the rest of the team to abandon the original DOS command-line approach and designed a multithreaded event-driven GUI architecture. Also greatly improved call setup protocols. Chris Hall: Did early work on call setup protocols and cryptographic and key management protocols, and did the first port to Windows. Colin Plumb: Cryptographic and key management protocols, call setup negotiation, and the fast multiprecision integer math package. Jeff Sorensen: Speech compression. Will Kinney: Optimization of GSM speech compression code. Kelly MacInnis: Early debugging of the Win95 version. Patrick Juola: Computational linguistic research for biometric word list. -2- PGPfone Owner’s
    [Show full text]
  • Digital Forensics and Preservation 1
    01000100 01010000 Digital 01000011 Forensics 01000100 and Preservation 01010000 Jeremy Leighton John 01000011 01000100 DPC Technology Watch Report 12-03 November 2012 01010000 01000011 01000100 01010000 Series editors on behalf of the DPC 01000011 Charles Beagrie Ltd. Principal Investigator for the Series 01000100 Neil Beagrie 01010000 01000011DPC Technology Watch Series © Digital Preservation Coalition 2012 and Jeremy Leighton John 2012 Published in association with Charles Beagrie Ltd. ISSN: 2048-7916 DOI: http://dx.doi.org/10.7207/twr12-03 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing from the publisher. The moral right of the author has been asserted. First published in Great Britain in 2012 by the Digital Preservation Coalition. Foreword The Digital Preservation Coalition (DPC) is an advocate and catalyst for digital preservation, ensuring our members can deliver resilient long-term access to digital content and services. It is a not-for- profit membership organization whose primary objective is to raise awareness of the importance of the preservation of digital material and the attendant strategic, cultural and technological issues. It supports its members through knowledge exchange, capacity building, assurance, advocacy and partnership. The DPC’s vision is to make our digital memory accessible tomorrow. The DPC Technology Watch Reports identify, delineate, monitor and address topics that have a major bearing on ensuring our collected digital memory will be available tomorrow. They provide an advanced introduction in order to support those charged with ensuring a robust digital memory, and they are of general interest to a wide and international audience with interests in computing, information management, collections management and technology.
    [Show full text]
  • Design Principles and Patterns for Computer Systems That Are
    Bibliography [AB04] Tom Anderson and David Brady. Principle of least astonishment. Ore- gon Pattern Repository, November 15 2004. http://c2.com/cgi/wiki? PrincipleOfLeastAstonishment. [Acc05] Access Data. Forensic toolkit—overview, 2005. http://www.accessdata. com/Product04_Overview.htm?ProductNum=04. [Adv87] Display ad 57, February 8 1987. [Age05] US Environmental Protection Agency. Wastes: The hazardous waste mani- fest system, 2005. http://www.epa.gov/epaoswer/hazwaste/gener/ manifest/. [AHR05a] Ben Adida, Susan Hohenberger, and Ronald L. Rivest. Fighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed Emails (to appear), 2005. Available at http://theory.lcs.mit.edu/⇠rivest/ publications.html. [AHR05b] Ben Adida, Susan Hohenberger, and Ronald L. Rivest. Separable Identity- Based Ring Signatures: Theoretical Foundations For Fighting Phishing Attacks (to appear), 2005. Available at http://theory.lcs.mit.edu/⇠rivest/ publications.html. [AIS77] Christopher Alexander, Sara Ishikawa, and Murray Silverstein. A Pattern Lan- guage: towns, buildings, construction. Oxford University Press, 1977. (with Max Jacobson, Ingrid Fiksdahl-King and Shlomo Angel). [AKM+93] H. Alvestrand, S. Kille, R. Miles, M. Rose, and S. Thompson. RFC 1495: Map- ping between X.400 and RFC-822 message bodies, August 1993. Obsoleted by RFC2156 [Kil98]. Obsoletes RFC987, RFC1026, RFC1138, RFC1148, RFC1327 [Kil86, Kil87, Kil89, Kil90, HK92]. Status: PROPOSED STANDARD. [Ale79] Christopher Alexander. The Timeless Way of Building. Oxford University Press, 1979. 429 430 BIBLIOGRAPHY [Ale96] Christopher Alexander. Patterns in architecture [videorecording], October 8 1996. Recorded at OOPSLA 1996, San Jose, California. [Alt00] Steven Alter. Same words, different meanings: are basic IS/IT concepts our self-imposed Tower of Babel? Commun. AIS, 3(3es):2, 2000.
    [Show full text]
  • Xbox 360 Physical Dimensions - Xbox
    Xbox 360 Physical Dimensions - Xbox http://news.teamxbox.com/xbox/8417/Xbox-360-Physical-Dimensions/ IGN Entertainment Games: IGN | GameSpy | FilePlanet | TeamXbox | GameStats | Direct2Drive | What They Play | Battlefield Heroes Home | Xbox 360 | TXBase | Forums | Games | Previews | Reviews | News | Cheats | Guides | RSS | Contact Us The Web TXB Forums TeamXbox.com 1 of 3 3/29/2012 3:10 PM Xbox 360 Physical Dimensions - Xbox http://news.teamxbox.com/xbox/8417/Xbox-360-Physical-Dimensions/ Content Sections Welcome, Guest. You are not logged in. TeamXbox Home Xbox 360 Physical Dimensions [Register] [Login Now] Xbox News By: César A. Berardini - "Cesar" Share This Article Add TeamXbox to Google Features Jun. 1st, 2005 4:30 pm Editorials Xbox 360 (Xbox) Interviews REVIEWS PREVIEWS MOVIES SCREENSHOTS INTERVIEWS CHEATS NEWS Xbox Events Search TeamXbox You have seen user-made pictures comparing the RSS Feeds Xbоx 360 dimensions with the Xbоx, which gave you Xbox Games a good idea of the size of the console. But until now, the exact physical dimensions of the Xbоx 360 were Xbox Games unknown. Well, the dimensions of the Xbоx 360 are New Releases no longer a mystery. We have just received the official info regarding the Xbоx 360 physical Xbox Previews dimensions, including its weight. Xbox Reviews The Xbоx 360 weights 7.7 pounds (3.5 kg) and is: Editor's Choice Reader Reviews 309 mm wide x 83 mm high x 258 mm deep Xbox Cheats 12.15 in wide x 3.27 in high x 10.15 in deep Xbox Guides Screenshots The Xbоx weight 8.8 pounds (4 kg) and is: Movies 320
    [Show full text]
  • Attribute-Based, Usefully Secure Email
    Dartmouth College Dartmouth Digital Commons Dartmouth College Ph.D Dissertations Theses and Dissertations 8-1-2008 Attribute-Based, Usefully Secure Email Christopher P. Masone Dartmouth College Follow this and additional works at: https://digitalcommons.dartmouth.edu/dissertations Part of the Computer Sciences Commons Recommended Citation Masone, Christopher P., "Attribute-Based, Usefully Secure Email" (2008). Dartmouth College Ph.D Dissertations. 26. https://digitalcommons.dartmouth.edu/dissertations/26 This Thesis (Ph.D.) is brought to you for free and open access by the Theses and Dissertations at Dartmouth Digital Commons. It has been accepted for inclusion in Dartmouth College Ph.D Dissertations by an authorized administrator of Dartmouth Digital Commons. For more information, please contact [email protected]. Attribute-Based, Usefully Secure Email A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science by Christopher P. Masone DARTMOUTH COLLEGE Hanover, New Hampshire August, 2008 Examining Committee: (chair) Sean W. Smith, Ph.D. David F. Kotz, Ph.D. Christopher J. Bailey-Kellogg, Ph.D. Denise L. Anthony, Ph.D. M. Angela Sasse, Ph.D. Charles K. Barlowe, PhD Dean of Graduate Studies Abstract A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer Interaction and Security (HCISEC) refutes this assumption. All researchers in this field agree that focusing on aligning usability and security goals can enable the design of systems that will be more secure under actual usage.
    [Show full text]
  • Jason I. Hong
    Jason I. Hong Human Computer Interaction Institute Office: +1 412 268 1251 School of Computer Science Fax: +1 412 268 1266 Carnegie Mellon University Email: jasonh at cs cmu edu 5000 Forbes Ave Web: http://www.cs.cmu.edu/~jasonh 3523 Newell Simon Hall GScholar: https://scholar.google.com/citations?user=MoFbcc0AAAAJ Pittsburgh, PA 15213‐3891 Citizenship: USA ORCID: http://orcid.org/0000‐0002‐9856‐9654 Research Interests In the near future, our smart devices will know almost everything about us. How can we make use of all of this rich sensor and behavioral data to improve our lives? At the same time, this same data poses many new kinds of risks. How can we make privacy and security easily understandable by people who are not experts? How can we ensure that machine learning models built on this data is fair, accountable, transparent, and ethical? In my research, I draw on ideas and methods from human‐computer interaction, systems, behavioral sciences, and machine learning. Most of my current work centers on smartphones and the emerging Internet of Things. I also make use of data from crowdsourcing or social media, both to better understand people’s behaviors as well as to “outsource” the labor required to manage privacy and security. Education 2005 Ph.D., Computer Science, University of California at Berkeley Advisor: James Landay Thesis topic: An Architecture for Privacy‐Sensitive Ubiquitous Computing 1997 B.S., Discrete Mathematics, Georgia Institute of Technology Highest honors 1997 B.S., Computer Science, Georgia Institute of Technology
    [Show full text]
  • Playing Computer Games Int
    DARC — Digital Aesthetics Research Center www.digital-aestetik.dk Playing Computer Games: Somatic Experience and Experience of the Somatic Copyright © 2012 Henrik Smed Nielsen Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". www. gnu.org/licenses Layout, illustration and cover design: Ida Knudsen Publisher: Digital Aesthetics Research Center A copy of the book can be found at www.digital-aestetik.dk ISBN 978-87-91810-21-3 EAN 9788791810213 Table of Contents Preface 10 Introduction Addressing Lived Experience 13 Forgetting the Soma 17 A Disembodied Discipline? 17 Thinking Too Much About Rules ... 19 An Aesthetics of Mind 20 The Physical Corpus 22 The Living, Feeling, Sentient, Purposive Body 25 The Moving Body 26 The Technological Body 26 The Fictional Body 27 Between Somatic Experience and Experience of the Somatic 28 Defining Computer Games: A Human–Machine Relationship 31 The Automatic and the Proto-interactive 33 The Somatic Dimension of Human–Machine Relationship 35 An Overview of the Dissertation 38 Chapter 1 A (Post-)Phenomenological Foundation 43 The Phenomenological Movement 44 A Return to ‘Essence’? 47 The Phenomenological Reduction 49 The Intentional Soma 52 A Phenomenology of Computer Games? 56 The Patron Saint
    [Show full text]
  • TITLE PAGE a Usability Analysis of Video Games
    TITLE PAGE A Usability Analysis of Video Games: The Development of Assessment Standards A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFULLMENT OF THE REQUIREMENTS FOR THE DEGREE MASTER OF ARTS OF DIGITAL STORYTELLING BY TAKEISHA T. YOUNG ADVISOR: DR. JAMES W. CHESEBRO BALL STATE UNIVERSITY MUNCIE, INDIANA APRIL 2011 2 Table of Contents TITLE PAGE .................................................................................................................................. 1 ACKNOWLEDGEMENTS ............................................................................................................ 3 ABSTRACT .................................................................................................................................... 4 Chapter 1: Introduction ................................................................................................................. 6 Chapter 2: Literature Review ..................................................................................................... 15 Chapter 3: Method ...................................................................................................................... 28 Chapter 4: Results and Findings .............................................................................................. 40 Chapter 5: Discussion ................................................................................................................ 54 Works Cited: ................................................................................................................................
    [Show full text]
  • Why Patents Are Bad for Software
    SOFI SIMSON L. GARFINKEL firm RICHARD M. STALLMAN mos MITCHELL KAPOR serve their case! sole l Lotu shee Why Patents Are Bad patei whic whei for Software since cept ticip, one Patents can't protect with or invigorate the pear! computer software ligen sheel "i% Septembeer 1990, users of the industry; they can longer be able to automatically cor- thep ,opular XyVVrite word processing only cripple it. rect common spelling errors by near] ........ 4-a M _ in Ai~~~~trhints otter ~~~~nroc~cin a th~ae not' e ht ft- tp program got a Ulstur1ll1 ltLLUtI Il F",aall~r, C11%,aF"`1 u"L 1 LL L%. gram . "~ T .1 " "-----" ·-- -'-·-L----- - the .tmail trom Xy1uest, Inc., me mlsspelle word. In audtion, to ex- is exi program's publisher: pand abbreviations stored in your so el personal dictionary, you will have prob] "In June of 1987, we introduced an automatic cor- to press control-R or another designated hot key." r rection and abbreviation expansion feature in XyWrite netw III Plus. Unbeknownst to us, a patent application for a XyQuest had been bitten by a software patent- on a related capability had been filed in 1984 and was sub- one of the more than two thousand patents on com- thou sequently granted in 1988. The company holding the puter algorithms and software techniques that have pater patent contacted us in late 1989 and apprised us of the been granted by the U.S. Patent and Trademark Office softm existence of their patent. since the mid- 1980s. The owner of the patent, Produc- comI We have decided to modify XyWrite III Plus so tivity Software, had given XyQuest a choice: license any c that it cannot be construed as infringing.
    [Show full text]
  • IGN: Dirty Harry - the Ultimate Collection Review 6/4/08 2:40 PM
    IGN: Dirty Harry - The Ultimate Collection Review 6/4/08 2:40 PM IGN.com | AskMen.com | Rotten Tomatoes | GameSpy | FilePlanet | TeamXbox | CheatsCodesGuides | GameStats | Direct2Drive IGN.com | PC Games | PS2 | PS3 | PSP | Xbox 360 | Wii | DS | Wireless | Retro | Cheats | Guides | FAQs | Insider | Movies | TV | DVD | Stars | Comics | Anime | Music | Gear | Sports | Cars Search: The Web IGN.com IGN DVD Search ► Today's Top Videos Log In | Register ► Out Now My Account | My Alerts ▼ New Trailers Games & movies: My Blog | My Wishlist | My Collection ► Violent Videos Wanted Sonic Chronicles Golden Axe Hancock Trailer Street Fighter 4 Resident Evil 5 SECTIONS IGN » Entertainment » DVD » Reviews DVD Details for Dirty Harry - The Ultimate C... · DVDs Dirty Harry - The Ultimate Collection · Blu-ray · HD DVDs Watching Now · Reviews Get Alerts · Reader Reviews Blogs Boards News Reviews Previews Features · Previews Wishlist Collection · Videos The Dirty Harry Collection Neither · Images by Phil Pirrello and Christopher Monfette · Features Edit List Details · News ◄ Previous 1 2 3 4 5 Next ► · Digigods Podcast · Editors' Choice · Release Dates Discs One & Two: · Easter Eggs Dirty Harry · Message Boards The brunt of the set's most · Compare Prices worthwhile extras can be MPAA Rating: R · Download Movies found on the original Dirty MSRP: Harry film – the only movie in US: $74.98 · Contact Us Publisher: Warner Home Video the seven-disc package to CHANNELS Genre: Crime come spread across two Release Date: Insider DVDs. US: June 3, 2008 More Movie Info: · Features Dirty Harry · Video Features Commentary by · Join Insider Richard Schickel · Founders' Club Dirty Harry's Way Click Here for More DVD Info Dirty Harry: The Games Original · PC Games The Long Shadow of · PlayStation 2 Dirty Harry Buy Posters and Prints · PlayStation 3 Clint Eastwood: The Man from Malpaso Huge selection and savings.
    [Show full text]