scispace - formally typeset
Search or ask a question
Author

William E. Baugh

Bio: William E. Baugh is an academic researcher. The author has contributed to research in topics: Encryption & Organised crime. The author has an hindex of 4, co-authored 4 publications receiving 76 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Use of encryption, passwords, digital compression, steganography, and remote storage by criminals and terrorists is discussed, and how that use has affected investigations and prosecutions.
Abstract: Criminals have at their disposal a variety of technologies for hiding communications and evidence stored on computers from law enforcement. These include encryption, passwords, digital compression, steganography, remote storage, and audit disabling. They can also hide crimes through anonymity tools and techniques such as anonymous remailers, anonymous digital cash, looping, cloned cellular phones, and cellular phone cards. This paper discusses use of these technologies by criminals and terrorists, and how that use has affected investigations and prosecutions. Options available to law enforcement for dealing with the technologies, especially encryption, are also discussed. Numerous case studies are presented for illustration.

46 citations

Journal ArticleDOI
TL;DR: Encryption policy must facilitate and encourage the use of encryption so that businesses can protect their corporate assets from economic espionage by foreign governments and competitors, so that law enforcement agencies can counter the surveillance activities of organized crime, and so that all organizations and individuals can safeguard sensitive information from criminals and intruders as discussed by the authors.
Abstract: Encryption is essential in today’s information and network age. Encryption policy must facilitate and encourage the use of encryption so that businesses can protect their corporate assets from economic espionage by foreign governments and competitors, so that law enforcement agencies can counter the surveillance activities of organized crime, and so that all organizations and individuals can safeguard sensitive information from criminals and intruders. At the same time, because encryption can be exploited by criminals and terrorists, its completely unfettered proliferation may not be in our national interest. The Clinton administration and National Research Council reached a similar conclusion, although they recommended different approaches.

10 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The extent to which security issues have been addressed by existing research efforts are examined, and new directions for studying information security from an information systems viewpoint are suggested, with respect to research methodology and research questions.
Abstract: This paper identifies four security issues (access to Information Systems, secure communication, security management, development of secure Information Systems), and examines the extent to which these security issues have been addressed by existing research efforts. Research contributions in relation to these four security issues are analyzed from three viewpoints: a meta-model for information systems, the research approaches used, and the reference disciplines used. Our survey reveals that most information security research has focused on the technical context, and on issues of access to IS and secure communication. The corresponding security issues have been resolved by using mathematical approaches as a research approach. The reference disciplines most commonly reflected have been mathematics, including philosophical logic. Based on this analysis, we suggest new directions for studying information security from an information systems viewpoint, with respect to research methodology and research questions. Empirical studies in relation to the issues of security management and the development of secure IS, based on suitable reference theories (e.g., psychology, sociology, semiotics, and philosophy), are particularly necessary.

265 citations

Journal ArticleDOI
TL;DR: A two-phase method of key recovery which will be referred to as Secure Key Recovery (SKR) is presented, which permits a portion of the key recovery information to be generated once and then used for multiple encrypted data communications sessions and encrypted file applications.

237 citations

Journal ArticleDOI
TL;DR: This research presents a model of personal information privacy (PIP) that includes not only transactional data gathering, but also interorganisational data sharing.
Abstract: This research presents a model of personal information privacy (PIP) that includes not only transactional data gathering, but also interorganisational data sharing. Emerging technologies are used as a lens through which the discussion of PIP management is extended. Research directions are developed for aspects of privacy, privacy-preserving technologies, interorganisational data sharing and policy development.

109 citations

Journal Article
TL;DR: In this article, the authors describe the most common and newest technologies, and how they are used for the sexual exploitation of women and children, and describe how these technologies enable sexual predators to harm or exploit women or children efficiently and anonymously.
Abstract: New communications and information technologies have created a global revolution in communications, access to information, and media delivery. These new communications and information technologies are facilitating the sexual exploitation of women and girls locally, nationally and transnationally. The sexual exploitation of women and children is a global human rights crisis that is being escalated by the use of new technologies. Using new technologies, sexual predators and pimps stalk women and children. New technical innovations facilitate the sexual exploitation of women and children because they enable people to easily buy, sell and exchange millions of images and videos of sexual exploitation of women and children. These technologies enable sexual predators to harm or exploit women and children efficiently and, anonymously. The affordability and access to global communications technologies allow users to carry out these activities in the privacy of their home. The increase of types of media, media formats, and applications diversifies the means by which sexual predators can reach their victims. This paper will not attempt to categorize all the types and uses of this new technology. However, this paper will describe the most common and newest of these technologies, and how they are used for the sexual exploitation of women and children.

95 citations

30 Jun 2005
TL;DR: To provide better customer service, NCJRS has made this Federally-funded grant final report available online in addition to traditional paper copies as mentioned in this paper, which is the first time that NC JRS has done so.
Abstract: To provide better customer service, NCJRS has made this Federally-funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.

93 citations