Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Adirondack Park (2)
- Animated films (2)
- Disney characters (2)
- Walt Disney Productions (2)
- 1849-1914 (1)
-
- Aceh (1)
- Acess (1)
- Air Force ROTC (1)
- Alcoholism (1)
- Alternative Transportation (1)
- American (1)
- AnyLogic (1)
- Army ROTC (1)
- Autonomy (1)
- Awareness--Social aspects (1)
- Basic needs (1)
- Bass Anglers (1)
- Bible and homosexuality (1)
- Brown’s Ten Point Scale (1)
- Capitalism (1)
- Careless population (1)
- Children's films (1)
- Christian gay men (1)
- Christian gays (1)
- Christian lesbians (1)
- Christianity (1)
- Collaborative Governance (1)
- Commissioned officer life (1)
- Compulsive behavior (1)
- Conflict (1)
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (10)
- Graduate Research Symposium (GCUA) (2010 - 2017) (9)
- National Environment and Recreation Research Symposium (7)
- Celebration (3)
- International Institute for Infrastructure Resilience and Reconstruction (I3R2) Conference (3)
-
- Charleston Library Conference (2)
- CPAR Presents: A Data and Research Series for Community Impact (1)
- Georgia Municipal Association Practicum (1)
- Georgia State Undergraduate Research Conference (1)
- Practical Social and Industrial Research Symposium (1)
- Space Traffic Management Conference (1)
- The Research and Scholarship Symposium (2013-2019) (1)
Articles 1 - 30 of 40
Full-Text Articles in Entire DC Network
Challenges Facing The Elderly Care Industry In Hong Kong: The Shortage Of Frontline Workers, Sin Tung, Stella Kwok, Wai Ning Kris Wong, Shun Lai Yang
Challenges Facing The Elderly Care Industry In Hong Kong: The Shortage Of Frontline Workers, Sin Tung, Stella Kwok, Wai Ning Kris Wong, Shun Lai Yang
Practical Social and Industrial Research Symposium
No abstract provided.
Where Is Space? And Why Does That Matter?, Bhavya Lal, Emily Nightingale
Where Is Space? And Why Does That Matter?, Bhavya Lal, Emily Nightingale
Space Traffic Management Conference
Despite decades of debate on the topic, there is no consensus on what, precisely, constitutes the boundary between airspace and outer space. The topic is mired in legal and political conundrums, and the easy solution to-date has been to not agree on a definition of space. Lack of a definition, some experts claim, has not limited space-based activities, and therefore is not a hurdle that must be overcome. There are increasing calls however in light of increasing (and expectations of increasing) space traffic, both orbital and sub-orbital. This paper summarizes the proposed delimitation of space, the current debate on whether …
Library Resources And Understanding The Focus On Stem, Heidi Blackburn
Library Resources And Understanding The Focus On Stem, Heidi Blackburn
CPAR Presents: A Data and Research Series for Community Impact
This presentation discusses: What the heck is STEM?; Why is it always in the news?; Why should I care about it?; and Where do I find reliable information from the government?
Opportunities And Challenges Of Data Publication: A Case From Purdue, David Scherer, Lisa Zilinski, Courtney Matthews
Opportunities And Challenges Of Data Publication: A Case From Purdue, David Scherer, Lisa Zilinski, Courtney Matthews
Charleston Library Conference
Beginning in 2011, there have been several policy changes directly affecting the management, preservation, and accessibility of publically funded research and resulting research data in the United States. On January 18, 2011 the National Science Foundation (NSF) required data management plans to be submitted with all grant proposals (National Science Foundation, 2013). On February 22, 2013, the Office of Science and Technology Policy of the President of the United States extended a similar requirement to all federal agencies that have a research and development budget of more than $100 million (Holdren, 2013). These requirements illustrate the need for further coordination …
Support When It Counts: Library Roles In Public Access To Federally Funded Research, Kristine M. Alpi, William M. Cross, Hilary M. Davis
Support When It Counts: Library Roles In Public Access To Federally Funded Research, Kristine M. Alpi, William M. Cross, Hilary M. Davis
Charleston Library Conference
In November 2012, the National Institutes of Health (NIH) announced it would begin enforcing its April 2008 mandate of public access to NIH-funded research by delaying processing of investigators’ grants reporting noncompliant publications. In response, the North Carolina State University (NCSU) Libraries offered to assist the University’s sponsored research administration in supporting NCSU researchers who had publications stemming from NIH funding and had not achieved compliance. Since the 2008 NIH mandate, over 1,000 articles based on NIH-funding have been published by NCSU across research areas including veterinary medicine, life sciences, physical sciences, social sciences, engineering, textiles, design, math, and statistics. …
Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague
Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague
Annual ADFSL Conference on Digital Forensics, Security and Law
Email is the most common and comparatively the most efficient means of exchanging information in today's world. However, given the widespread use of emails in all sectors, they have been the target of spammers since the beginning. Filtering spam emails has now led to critical actions such as forensic activities based on mining spam email. The data mine for spam emails at the University of Alabama at Birmingham is considered to be one of the most prominent resources for mining and identifying spam sources. It is a widely researched repository used by researchers from different global organizations. The usual process …
Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen
Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen
Annual ADFSL Conference on Digital Forensics, Security and Law
There has been extensive work in crime scene reconstruction of physical locations, and much is known in terms of digital forensics of computing devices. However, the network has remained a nebulous combination of entities that are largely ignored during an investigation due to the transient nature of the data that flows through the networks. This paper introduces an architecture for network path reconstruction using the network layer reachability information shared via OSPF Link State Advertisements and the routines and functions of OSPF::rt_sched() as applied to the construction of identical Link State Databases for all routers within an Area.
Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt
Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt
Annual ADFSL Conference on Digital Forensics, Security and Law
As cybercrime continues to increase, new cyber forensics techniques are needed to combat the constant challenge of Internet anonymity. In instant messaging (IM) communications, criminals use virtual identities to hide their true identity, which hinders social accountability and facilitates cybercrime. Current instant messaging products are not addressing the anonymity and ease of impersonation over instant messaging. It is necessary to have IM cyber forensics techniques to assist in identifying cyber criminals as part of the criminal investigation. Instant messaging behavioral biometrics include online writing habits, which may be used to create an author writeprint to assist in identifying an author …
Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack
Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack
Annual ADFSL Conference on Digital Forensics, Security and Law
Botnets are responsible for a large percentage of damages and criminal activity on the Internet. They have shifted attacks from push activities to pull techniques for the distribution of malwares and continue to provide economic advantages to the exploiters at the expense of other legitimate Internet service users. In our research we asked; what is the cost of the procedural steps for forensically investigating a Botnet attack? The research method applies investigation guidelines provided by other researchers and evaluates these guidelines in terms of the cost to a digital forensic investigator. We conclude that investigation of Botnet attacks is both …
Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang
Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang
Annual ADFSL Conference on Digital Forensics, Security and Law
The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …
Computer Forensics For Accountants, Grover S. Kearns
Computer Forensics For Accountants, Grover S. Kearns
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …
Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter
Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter
Annual ADFSL Conference on Digital Forensics, Security and Law
Existing digital forensic investigation process models have provided guidelines for identifying and preserving potential digital evidence captured from a crime scene. However, for any of the digital forensic investigation process models developed across the world to be adopted and fully applied by the scientific community, it has to be tested. For this reason, the Harmonized Digital Forensic Investigation Process (HDFIP) model, currently a working draft towards becoming an international standard for digital forensic investigations (ISO/IEC 27043), needs to be tested.
This paper, therefore, presents the findings of a case study used to test the HDFIP model implemented in the ISO/IEC …
Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson
Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson
Annual ADFSL Conference on Digital Forensics, Security and Law
During the present age and time, it seems as though people in society have become addicted to nearly anything and everything, whether it be to a substance, an activity or an object. The Internet and pornography is no exception. While commonly thought of as a deviant behavior, many are displaying addictions towards the Internet and pornography. More alarming, however, are those who are viewing, downloading, or trading child pornography and displaying addictive Internet behaviors, for they are spending excessive amounts of time engaging in the proliferation of child pornographic materials. For this reason, addiction to the Internet and usage of …
Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar
Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …
Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore
Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence …
The Effects Of American Involvement In Northern Uganda's Conflict With The Lord's Resistance Army, Karen J. Norris
The Effects Of American Involvement In Northern Uganda's Conflict With The Lord's Resistance Army, Karen J. Norris
Celebration
This project explores the impact of American governmental and non-governmental actors in the Lord's Resistance Army (LRA) conflict in northern Uganda and southern Sudan, particularly the U.S. military, United States Agency for International Development (USAID), and various non-governmental organizations (NGOs). It also examines the efficacy of these various forms of intervention, specifically the deployment of U.S. Special Forces tracking the LRA, and the initiation of various soldier reintegration, governance, and sustainability programs organized by USAID and NGOs such as Invisible Children. Additionally, this project seeks to uncover underlying geopolitical objectives, such as gaining alliances in the 'Global War on Terror' …
Spark Across The Ages': Freya Von Moltke In The Memory Of The German Resistance To National Socialism, Sarah E. Hayes
Spark Across The Ages': Freya Von Moltke In The Memory Of The German Resistance To National Socialism, Sarah E. Hayes
Celebration
Freya von Moltke was a member of the Kreisau Circle, a German resistance group to Nazism that was active from 1940-1944. Although the group's existence was uncovered in the wake of the July Plot in 1944, von Moltke became highly influential in preserving the history of the Circle until her death in 2010. This paper will examine the role of von Moltke in the German collective memory today due to her exemplification of the values of the Berlin Republic.
Desert Fog: The Disappearing Memory Of The Herero Genocide, Elizabeth S. Topolosky
Desert Fog: The Disappearing Memory Of The Herero Genocide, Elizabeth S. Topolosky
Celebration
This paper examines why certain human-created traumas, especially genocides, are forgotten while others become established topics of public and intellectual discourse. The Herero Genocide in German West-Africa of 1904 to 1907 serves as the main example of these "forgotten traumas." In particular this paper focuses on the time period of the genocide, the progress of technology at this time, and the identity of the victims as possible reasons for the "weakness" of the memory of this event.
Long May She Reign: A Rhetorical Analysis Of Gender Expectations In Disney’S Tangled And Disney/Pixar’S Brave, Caitlin J. Saladino
Long May She Reign: A Rhetorical Analysis Of Gender Expectations In Disney’S Tangled And Disney/Pixar’S Brave, Caitlin J. Saladino
Graduate Research Symposium (GCUA) (2010 - 2017)
This project addresses messages about gender expectations in Disney princess narratives. The two films included in my project are Tangled (2010) and Brave (2012), which feature the most recently inducted princesses to the marketed Disney Princess line (Rapunzel and Merida, respectively). Using genre as an organizing principle, I argue that Rapunzel and Merida are different from the past Disney princesses (Snow White, Cinderella, Ariel, Jasmine, etc.) because their narratives reflect new ideas about gender expectations in modern society. The central tension appearing in both films is the opposition between the image of woman as traditional, domestic, and dependent and woman …
“We’Re Doin’ Ok” An Investigation Of Parental Account-Giving For Divorce-Related Financial Stress, Monique Makhlouf
“We’Re Doin’ Ok” An Investigation Of Parental Account-Giving For Divorce-Related Financial Stress, Monique Makhlouf
Graduate Research Symposium (GCUA) (2010 - 2017)
Divorce is a prevalent issue facing many Americans today with nearly one-third of first marriages ending in divorce within 10 years, and 50% of all first marriages ending in divorce at some point in the lifespan (Frisby, Booth-Butterfield, Dillow, Martin, & Weber, 2012). Considerable evidence suggests that divorce can increase the likelihood of adverse effects on the psychological well-being of family members, particularly in families with children (Brown, Portes, & Christensen, 1989). Among the many issues that confront families going through a divorce is a shift in socioeconomic status or a loss of financial stability during and after a divorce …
The Role Of Self Concept In Consumer Behavior, Marisa Toth
The Role Of Self Concept In Consumer Behavior, Marisa Toth
Graduate Research Symposium (GCUA) (2010 - 2017)
Understanding the processes that underlie consumer behavior has become an increasingly important area of research, especially for businesses and marketers. One of the most commonly studied variables believed to impact consumer behavior is self-concept.
The purpose of the current study is to examine the influence of self-concept in consumer behavior and identify factors that influence the relationship. Specifically, what is the relationship between different aspects of the self-concept and the consumption of publicly and privately consumed luxuries and necessities? Furthermore, how will this relationship be affected by the level of self-monitoring an individual displays?
Walt Disney And The Propaganda Complex: Government Funded Animation And Hollywood Complicity During Wwii, Amanda Cunningham
Walt Disney And The Propaganda Complex: Government Funded Animation And Hollywood Complicity During Wwii, Amanda Cunningham
Graduate Research Symposium (GCUA) (2010 - 2017)
Walt Disney’s work as an animator during World War II had a measurable impact on culture and in the development of government produced messages. It is important to examine this understudied area of Disney’s life and his studio’s efforts to produce wartime training and propaganda films during WWII. Government agencies, including the U.S. Treasury, contracted Disney to produce 32 animated shorts between 1941 and 1945 (Gabler, 2007).
Employing a semiotic approach of cinema, this study focuses on the cartoons The New Spirit (1942), Der Fuehrer’s Face (1943) and Education for Death: The Making of the Nazi (1943). While American wartime …
Exploring The Community Factor Of Economic Resiliency, Al G. Gourrier
Exploring The Community Factor Of Economic Resiliency, Al G. Gourrier
Graduate Research Symposium (GCUA) (2010 - 2017)
Resilience takes on many different meanings, but when we speak of the resilience of a market we are generally referencing the capability of that market’s capacity to respond, regroup and move forward, usually after an event or series of events that impede or encumber a market’s economic sustainability. The outcomes of a stable and performing market are indicated by its economic performance. Using economic indicators as a base, this study analyzes three markets as they recover from destabilizing events and attempt to respond, regroup and move forward. The study analyzes the Las Vegas, New Orleans and Detroit markets from an …
Gilded Age Visual Media As The Impetus For Social Change: Jacob Riis’S Reform Photography And The Antecedents Of Documentary Film, Denitsa Yotova
Gilded Age Visual Media As The Impetus For Social Change: Jacob Riis’S Reform Photography And The Antecedents Of Documentary Film, Denitsa Yotova
Graduate Research Symposium (GCUA) (2010 - 2017)
This study examines the birth and evolution of the social documentary genre in visual media. It suggests that a mixture of ideology, technology, and social awareness are necessary for a successful social reform. It finds that despite the limitations of technology during the nineteenth century, social documentaries were produced long before they were part of the genres of photography and film. By focusing on the work of Danish photographer Jacob Riis and tracing the emergence of film, this study demonstrates a connection between documentary film and Riis’s social documentary photography and public slide exhibitions. The study concludes that in order …
Comparing Perceptions Of Motivation To Change: Clinicians Versus Their Substance-Abuse Clients, Arthur Tabrizi
Comparing Perceptions Of Motivation To Change: Clinicians Versus Their Substance-Abuse Clients, Arthur Tabrizi
Graduate Research Symposium (GCUA) (2010 - 2017)
Although some clients enter treatment voluntarily to seek intervention for their substance abuse problems, most enter under coercive external pressures that may be perceived by clinicians as less influenced by addressing substance abuse than by appeasing mandates from the judicial system, family, or employers. Little research has examined and compared how clinicians assess clients’ extrinsic and intrinsic motivation to change as opposed to how the clients assess themselves. A congruency between the two parties’ assessments may inform the quality of the therapeutic relationship and facilitate an effective treatment plan. Using the Circumstance, Motivation, and Readiness Scales (CMR) and availability sampling …
The Rhetoric Of Gay Christians: Matthew Vines And Reverend Nancy Wilson As Exemplars, Josu Miller
The Rhetoric Of Gay Christians: Matthew Vines And Reverend Nancy Wilson As Exemplars, Josu Miller
Graduate Research Symposium (GCUA) (2010 - 2017)
In the United States, there is a perception that the gay rights debate situates Christians against gay rights advocates. According to this perception, Christians oppose gay rights, because the Bible condemns homosexuality as a sin, and those who support gay rights do so using purely secular arguments. This perception of the gay rights debate is flawed and overly simplistic, because simply not all Christians oppose gay rights. In fact, there are multiple interpretations of biblical texts that support homosexuality and have caused a gay rights debate within the church that is as complex and intricate as gay rights debate outside …
Examining The Target Levels Of State Renewable Portfolio Standards, Laurence D. Helwig
Examining The Target Levels Of State Renewable Portfolio Standards, Laurence D. Helwig
Graduate Research Symposium (GCUA) (2010 - 2017)
At present 37 US states have passed Renewable Portfolio Standards (RPS) or have a legislative driven goal that supports investment in renewable energy (RE) technologies. Previous research has identified economic, governmental, ideological and infrastructural characteristics as key predictors of policy adoption and renewable energy deployment efforts (Carley, 2009; Davis & Davis, 2009; Bohn & Lant, 2009; Lyon & Yin, 2010). To date, only a few studies have investigated the target levels of renewable portfolio standards. Carley & Miller (2012) found that policies of differing stringencies were motivated by systematically different factors that included governmental ideology. The purpose of this study …
The Perspective Of College Seniors In Rotc On Becoming A Commissioned Officer, Natasha Kreft, Hans Stoltzfus, Luke M. Tse, Ruth L. Markham
The Perspective Of College Seniors In Rotc On Becoming A Commissioned Officer, Natasha Kreft, Hans Stoltzfus, Luke M. Tse, Ruth L. Markham
The Research and Scholarship Symposium (2013-2019)
While there is growing research into Military and Mental health issues, the focus of such research has primarily been restricted to those populations who are retired from Military or who step-down from Active Duty. Following a case study with Reservists, we became aware that mental health issues in the Military Population may potentially stem from concepts involved the initial training phases. With the hypothesis that ROTC Cadets are among the youngest persons engaging in Military training, we approached ROTC Air Force and ROTC Army Cadets who were Seniors by credit at Cedarville University. The Cadets were asked to participate in …
The Belo Monte Dam Complex And Its Effects On Indigenous Communities, Alexis Lynn Powers
The Belo Monte Dam Complex And Its Effects On Indigenous Communities, Alexis Lynn Powers
Georgia State Undergraduate Research Conference
No abstract provided.
Examining The Influence Of Geospatial Variables On Primitive Roadside Campsite Conditions, David A. Graefe, Min Kook Kim
Examining The Influence Of Geospatial Variables On Primitive Roadside Campsite Conditions, David A. Graefe, Min Kook Kim
National Environment and Recreation Research Symposium
No abstract provided.