Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2008

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 30

Full-Text Articles in Entire DC Network

Inside Unlv, Diane Russell, Michelle Mouton, Mamie Peers, Shane Bevell Dec 2008

Inside Unlv, Diane Russell, Michelle Mouton, Mamie Peers, Shane Bevell

Inside UNLV

No abstract provided.


Automated Data Type Identification And Localization Using Statistical Analysis Data Identification, Sarah Jean Moody Dec 2008

Automated Data Type Identification And Localization Using Statistical Analysis Data Identification, Sarah Jean Moody

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This research presents a new and unique technique called SÁDI, statistical analysis data identification, for identifying the type of data on a digital device and its storage format based on data type, specifically the values of the bytes representing the data being examined. This research incorporates the automation required for specialized data identification tools to be useful and applicable in real-world applications. The SÁDI technique utilizes the byte values of the data stored on a digital storage device in such a way that the accuracy of the technique does not rely solely on the potentially misleading metadata information but rather …


Student Fact Book, Fall 2008, Thirty-Second Annual Edition, Wright State University, Office Of Student Information Systems, Wright State University Oct 2008

Student Fact Book, Fall 2008, Thirty-Second Annual Edition, Wright State University, Office Of Student Information Systems, Wright State University

Wright State University Student Fact Books

The student fact book has general demographic information on all students enrolled at Wright State University for Fall Quarter, 2008.


Inside Unlv, Diane Russell, Shane Bevell, Jennifer Vaughan Oct 2008

Inside Unlv, Diane Russell, Shane Bevell, Jennifer Vaughan

Inside UNLV

No abstract provided.


Arts And Sciences Newsletter, Volume 12, Issue 1, College Of Arts & Sciences Oct 2008

Arts And Sciences Newsletter, Volume 12, Issue 1, College Of Arts & Sciences

Arts and Sciences Newsletters

No abstract provided.


Inside Unlv, Diane Russell, Shane Bevell, Michelle Mouton, Erin O'Donnell, Mamie Peers, Grace Russell, Deana Waddell Sep 2008

Inside Unlv, Diane Russell, Shane Bevell, Michelle Mouton, Erin O'Donnell, Mamie Peers, Grace Russell, Deana Waddell

Inside UNLV

No abstract provided.


The Paradigm Shift In Transnational Organised Crime, K. Michael Jul 2008

The Paradigm Shift In Transnational Organised Crime, K. Michael

Associate Professor Katina Michael

The definition of “organized crime” remains contentious because it has meant different things to different stakeholders over time. Does “organized crime” refer to illegal activities, relations between illegal organizations, how actors work together to engage in crimes, the infrastructure supporting crimes, or to the bricks and mortar of an illegal organization? Depending on the definition embraced by a stakeholder, their unit of analysis (eg crime group under investigation), and the particular time the study was conducted, an analyst may well be led to believe that some organized crime is really “disorganized” in nature. The two typologies of “organized” versus “disorganized” …


Fall 2008 Nova Southeastern University Undergraduate Student Catalog, Nova Southeastern University Jul 2008

Fall 2008 Nova Southeastern University Undergraduate Student Catalog, Nova Southeastern University

Undergraduate Programs Course Catalogs

No abstract provided.


Cyberspace Governance In The People’S Republic Of China, Kam C. Wong Jul 2008

Cyberspace Governance In The People’S Republic Of China, Kam C. Wong

Kam C. Wong

This project investigates into and reports upon computer related crime and control in China. Particularly, it investigates into the nature and extent of computer related crime in China and reports upon the effectiveness of legal measures addressing computer related crime. This research project is a first attempt to study cyberspace governance and Internet regulations in China with indigenous PRC data and from a China perspective


An Integrated Evaluation Method For Module-Based Undergraduate Information Retrieval Education, Yong Shi, Lei Zhu, Jane Wong, Bradley Sturz, Chun Tang Jun 2008

An Integrated Evaluation Method For Module-Based Undergraduate Information Retrieval Education, Yong Shi, Lei Zhu, Jane Wong, Bradley Sturz, Chun Tang

Faculty Articles

In the Information Age, career and life-long learning increasingly depend on information-retrieval (IR) skills to utilize digital and on-line information effectively. Consequently, IR has become a valuable integral element of many disciplines. To address primary problems in the current college-level IR education, we have proposed a module-based curricular model that facilitates the development of an array of IR course modules that enable flexible adoption and integration. In addition, these modules can be designed to meet the specific needs of various disciplines and programs. This paper presents a preliminary integrated evaluation method which combines subjective and objective evaluation in order to …


Social And Organizational Aspects Of Information Security Management, Katina Michael May 2008

Social And Organizational Aspects Of Information Security Management, Katina Michael

Professor Katina Michael

This paper aims to explore social and organizational aspects of information security management. The changing nature of security is revealed against the backdrop of globalization. It provides a thorough review of literature on the topics of cyberethics as related to information security and transnational law. The objective of the paper is to cover broadly socio-organizational themes providing for the purpose of definition and a basis for further research. It thus raises a number of pressing issues facing organizations today, and offers an overview discussion on potential solutions. The main outcome of the paper is in showing that successful security strategies …


Lend Me Your Arms: The Use And Implications Of Humancentric Rfid, Amelia Masters, Katina Michael May 2008

Lend Me Your Arms: The Use And Implications Of Humancentric Rfid, Amelia Masters, Katina Michael

Professor Katina Michael

Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans. With a gap in literature identified between current technological development and future humancentric possibility, little has been previously known about the nature of contemporary humancentric applications. By employing usability context analyses in control, convenience and care-related application areas, we begin to piece together a cohesive view of the current development state of humancentric RFID, as detached from predictive conjecture. This is supplemented by an understanding of the market-based, social and ethical concerns which plague …


Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose May 2008

Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose

Professor Katina Michael

The objective of this paper is to explore the role of human tracking technology, primarily the use of global positioning systems (GPS) in locating individuals for the purposes of mutual legal assistance (MLA), and providing location intelligence for use in inter-state police cooperation within the context of transnational crime. GPS allows for the 24/7 continuous real-time tracking of an individual, and is considered manifold more powerful than the traditional visual surveillance often exercised by the police. As the use of GPS for human tracking grows in the law enforcement sector, federal and state laws in many countries are to a …


The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael May 2008

The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael

Professor Katina Michael

Location-based services (LBS) are those applications that utilize the position of an end-user, animal or thing based on a given device (handheld, wearable, interwoven into fabric or implanted), executed for a particular purpose. LBS applications range from those that are mission-critical to those that are used for convenience, from those that are mandatory to those that are voluntary, from those that are targeted at the mass market to those that cater for the needs of a niche market. Location services can be implemented using a variety of access mediums including global positioning systems and radio-frequency identification, rendering approximate or precise …


The Virtual Digital Forensics Lab - Expanding Law Enforcement Capabilities, Mark Mccoy, Sean A. Ensz Apr 2008

The Virtual Digital Forensics Lab - Expanding Law Enforcement Capabilities, Mark Mccoy, Sean A. Ensz

Annual ADFSL Conference on Digital Forensics, Security and Law

Law enforcement is attempting to respond to the growing and complex need to examine all manner of digital evidence using stand-alone forensic workstations and limited storage solutions. Digital forensic investigators often find their cases stalled by cumbersome and inflexible technology limiting their effectiveness. The Virtual Digital Forensics Lab (VDFL) is a new concept that applies existing enterprise host, storage, and network virtualization technologies to current forensic investigative methods. This paper details the concept of the VDFL, the technology solutions it employs, and the flexibility it provides for digital forensic investigators.

Keywords: Virtual Digital Forensics, digital forensic investigations, law enforcement, virtual …


Digital Forensic Certification Versus Forensic Science Certification, Nena Lim Apr 2008

Digital Forensic Certification Versus Forensic Science Certification, Nena Lim

Annual ADFSL Conference on Digital Forensics, Security and Law

Companies often rely on certifications to select appropriate individuals in disciplines such as accounting and engineering. The general public also tends to have confidence in a professional who has some kinds of certification because certification implies a standard of excellence and that the individual has expert knowledge in a specific discipline. An interesting question to the digital forensic community is: How is a digital forensic certification compared to a forensic science certification? The objective of this paper is to compare the requirements of a digital forensic certification to those of a forensic science certification. Results of the comparison shed lights …


2008 - The Thirteenth Annual Symposium Of Student Scholars Apr 2008

2008 - The Thirteenth Annual Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Thirteenth Annual Symposium of Student Scholars, held on April 14, 2008. Includes abstracts from the presentations and posters.


Social And Organizational Aspects Of Information Security Management, Katina Michael Apr 2008

Social And Organizational Aspects Of Information Security Management, Katina Michael

Faculty of Informatics - Papers (Archive)

This paper aims to explore social and organizational aspects of information security management. The changing nature of security is revealed against the backdrop of globalization. It provides a thorough review of literature on the topics of cyberethics as related to information security and transnational law. The objective of the paper is to cover broadly socio-organizational themes providing for the purpose of definition and a basis for further research. It thus raises a number of pressing issues facing organizations today, and offers an overview discussion on potential solutions. The main outcome of the paper is in showing that successful security strategies …


Docketology, District Courts, And Doctrine, David A. Hoffman, Alan J. Izenman, Jeffrey R. Lidicker Apr 2008

Docketology, District Courts, And Doctrine, David A. Hoffman, Alan J. Izenman, Jeffrey R. Lidicker

David A Hoffman

Empirical legal scholars have traditionally modeled judicial opinion writing by assuming that judges act rationally, seeking to maximize their influence by writing opinions in politically important cases. Support for this hypothesis has reviewed published opinions, finding that civil rights and other “hot” topics are more to be discussed than other issues. This orthodoxy comforts consumers of legal opinions, because it suggests that opinions are largely representative of judicial work. The orthodoxy is substantively and methodologically flawed. This paper starts by assuming that judges are generally risk averse with respect to reversal, and that they provide opinions when they believe that …


Volume 01, Jessica Fields, Stephanie Neeley, Derek W. Hambright, Mary E. Lehman, Andrew R. Grzankowski, Zachary Johnson, Boone M. Prentice, Ashley M. Swandby, Victoria Morgan, Katie Williamson, Kristine G. Bender, Katelyn N. Romaine, D. Nicole Swann, Jessica Fox, Mike Mcateer, Alex Grabiec, Laura Nodtvedt, Nick Costa, Rachel Wolfe, Zack Dalton Apr 2008

Volume 01, Jessica Fields, Stephanie Neeley, Derek W. Hambright, Mary E. Lehman, Andrew R. Grzankowski, Zachary Johnson, Boone M. Prentice, Ashley M. Swandby, Victoria Morgan, Katie Williamson, Kristine G. Bender, Katelyn N. Romaine, D. Nicole Swann, Jessica Fox, Mike Mcateer, Alex Grabiec, Laura Nodtvedt, Nick Costa, Rachel Wolfe, Zack Dalton

Incite: The Journal of Undergraduate Scholarship

Introduction from Dean Dr. Charles Ross

Three Decades of Digging: Undergraduate Archeology at Longwood by Jessica Fields and Stephanie Neeley

Interactions of Allelopathy and Heat Stress in Plants by Derek W. Hambright and Mary E. Lehman

Inertial Electrostatic Confinement D-D Fusion Device: Construction and Simulation by Andrew R. Grzankowski

Shackled Nim by Zachary Johnson

Development of GC-MS and Chemometric Methods for the Analysis of Accelerants in Arson Cases by Boone M. Prentice

A Comparison of Image Analysis Methods in cDNA Microarrays by Ashley M. Swandby

Perceived Sexual Activity of Short and Long-Term Relationships by Victoria Morgan and Katie Williamson

Elderly …


Inside Unlv, Shane Bevell, Donna Mcaleer, David Ashley, Grace Russell, Michelle Mouton, Mamie Peers Mar 2008

Inside Unlv, Shane Bevell, Donna Mcaleer, David Ashley, Grace Russell, Michelle Mouton, Mamie Peers

Inside UNLV

No abstract provided.


Wrongly Accused Redux: How Race Contributes To Convicting The Innocent: The Informants Example, Andrew E. Taslitz Jan 2008

Wrongly Accused Redux: How Race Contributes To Convicting The Innocent: The Informants Example, Andrew E. Taslitz

Andrew E. Taslitz

This article analyzes five forces that may raise the risk of convicting the innocent based upon the suspect's race: the selection, ratchet, procedural justice, bystanders, and aggressive-suspicion effects. In other words, subconscious forces press police to focus more attention on racial minorites, the ratchet makes this focus every-increasing, the resulting sense by the community of unfair treatment raises its involvment in crime while lowering its willingness to aid the police in resisting crime, innocent persons suffer when their skin color becomes associated with criminality, and the police use more aggressive techniques on racial minorities in a way that raises the …


The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland Jan 2008

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland

Research outputs pre 2011

All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …


The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland Jan 2008

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland

Journal of Digital Forensics, Security and Law

All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …


Wrongly Accused Redux: How Race Contributes To Convicting The Innocent: The Informants Example, Andrew E. Taslitz Jan 2008

Wrongly Accused Redux: How Race Contributes To Convicting The Innocent: The Informants Example, Andrew E. Taslitz

School of Law Faculty Publications

This article analyzes five forces that may raise the risk of convicting the innocent based upon the suspect's race: the selection, ratchet, procedural justice, bystanders, and aggressive-suspicion effects. In other words, subconscious forces press police to focus more attention on racial minorites, the ratchet makes this focus every-increasing, the resulting sense by the community of unfair treatment raises its involvment in crime while lowering its willingness to aid the police in resisting crime, innocent persons suffer when their skin color becomes associated with criminality, and the police use more aggressive techniques on racial minorities in a way that raises the …


University Of Texas At Tyler Catalog, 2008 - 2010, University Of Texas At Tyler Jan 2008

University Of Texas At Tyler Catalog, 2008 - 2010, University Of Texas At Tyler

Catalogs

No abstract provided.


Winter 2008 Nova Southeastern University Undergraduate Student Catalog, Nova Southeastern University Jan 2008

Winter 2008 Nova Southeastern University Undergraduate Student Catalog, Nova Southeastern University

Undergraduate Programs Course Catalogs

No abstract provided.


To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea Jan 2008

To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea

Journal of Digital Forensics, Security and Law

In this paper the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. After contacting all state agencies the authors present a distinct grouping organizing state approaches to professional Digital Examiner licensing. The authors conclude that states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.


An Analysis Of The Feasibility Of A Joint Economic Development District Between The City Of Brunswick And Hinckley Township, Kevin O'Brien, Claudette Robey, Daila Shimek, Michael Mcgoun, Ryan Foster Jan 2008

An Analysis Of The Feasibility Of A Joint Economic Development District Between The City Of Brunswick And Hinckley Township, Kevin O'Brien, Claudette Robey, Daila Shimek, Michael Mcgoun, Ryan Foster

All Maxine Goodman Levin School of Urban Affairs Publications

No abstract provided.


Gjxdm Documents And Small Law Enforcement Agencies, Darin Dillard Jan 2008

Gjxdm Documents And Small Law Enforcement Agencies, Darin Dillard

Regis University Student Publications (comprehensive collection)

The purpose of this paper is to demonstrate that while the Global Justice XML Data Model (GJXDM) is a complete and effective solution for criminal justice agencies it is complex to implement and difficult for smaller law enforcement agencies to put into practice. The paper presents the current implementation steps for a new GJXDM document and describes the process of implementing an existing GJXDM document. The paper also presents a tool for agencies to start using and processing GJXDM documents. Also offered within the paper is a design for a central repository for increasing GJXDM information sharing and dissemination of …