Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

Conference

2014

Institution
Keyword
Publication

Articles 1 - 30 of 40

Full-Text Articles in Entire DC Network

Challenges Facing The Elderly Care Industry In Hong Kong: The Shortage Of Frontline Workers, Sin Tung, Stella Kwok, Wai Ning Kris Wong, Shun Lai Yang Dec 2014

Challenges Facing The Elderly Care Industry In Hong Kong: The Shortage Of Frontline Workers, Sin Tung, Stella Kwok, Wai Ning Kris Wong, Shun Lai Yang

Practical Social and Industrial Research Symposium

No abstract provided.


Where Is Space? And Why Does That Matter?, Bhavya Lal, Emily Nightingale Nov 2014

Where Is Space? And Why Does That Matter?, Bhavya Lal, Emily Nightingale

Space Traffic Management Conference

Despite decades of debate on the topic, there is no consensus on what, precisely, constitutes the boundary between airspace and outer space. The topic is mired in legal and political conundrums, and the easy solution to-date has been to not agree on a definition of space. Lack of a definition, some experts claim, has not limited space-based activities, and therefore is not a hurdle that must be overcome. There are increasing calls however in light of increasing (and expectations of increasing) space traffic, both orbital and sub-orbital. This paper summarizes the proposed delimitation of space, the current debate on whether …


Library Resources And Understanding The Focus On Stem, Heidi Blackburn Aug 2014

Library Resources And Understanding The Focus On Stem, Heidi Blackburn

CPAR Presents: A Data and Research Series for Community Impact

This presentation discusses: What the heck is STEM?; Why is it always in the news?; Why should I care about it?; and Where do I find reliable information from the government?


Opportunities And Challenges Of Data Publication: A Case From Purdue, David Scherer, Lisa Zilinski, Courtney Matthews Jun 2014

Opportunities And Challenges Of Data Publication: A Case From Purdue, David Scherer, Lisa Zilinski, Courtney Matthews

Charleston Library Conference

Beginning in 2011, there have been several policy changes directly affecting the management, preservation, and accessibility of publically funded research and resulting research data in the United States. On January 18, 2011 the National Science Foundation (NSF) required data management plans to be submitted with all grant proposals (National Science Foundation, 2013). On February 22, 2013, the Office of Science and Technology Policy of the President of the United States extended a similar requirement to all federal agencies that have a research and development budget of more than $100 million (Holdren, 2013). These requirements illustrate the need for further coordination …


Support When It Counts: Library Roles In Public Access To Federally Funded Research, Kristine M. Alpi, William M. Cross, Hilary M. Davis Jun 2014

Support When It Counts: Library Roles In Public Access To Federally Funded Research, Kristine M. Alpi, William M. Cross, Hilary M. Davis

Charleston Library Conference

In November 2012, the National Institutes of Health (NIH) announced it would begin enforcing its April 2008 mandate of public access to NIH-funded research by delaying processing of investigators’ grants reporting noncompliant publications. In response, the North Carolina State University (NCSU) Libraries offered to assist the University’s sponsored research administration in supporting NCSU researchers who had publications stemming from NIH funding and had not achieved compliance. Since the 2008 NIH mandate, over 1,000 articles based on NIH-funding have been published by NCSU across research areas including veterinary medicine, life sciences, physical sciences, social sciences, engineering, textiles, design, math, and statistics. …


Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague May 2014

Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague

Annual ADFSL Conference on Digital Forensics, Security and Law

Email is the most common and comparatively the most efficient means of exchanging information in today's world. However, given the widespread use of emails in all sectors, they have been the target of spammers since the beginning. Filtering spam emails has now led to critical actions such as forensic activities based on mining spam email. The data mine for spam emails at the University of Alabama at Birmingham is considered to be one of the most prominent resources for mining and identifying spam sources. It is a widely researched repository used by researchers from different global organizations. The usual process …


Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen May 2014

Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

There has been extensive work in crime scene reconstruction of physical locations, and much is known in terms of digital forensics of computing devices. However, the network has remained a nebulous combination of entities that are largely ignored during an investigation due to the transient nature of the data that flows through the networks. This paper introduces an architecture for network path reconstruction using the network layer reachability information shared via OSPF Link State Advertisements and the routines and functions of OSPF::rt_sched() as applied to the construction of identical Link State Databases for all routers within an Area.


Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt May 2014

Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt

Annual ADFSL Conference on Digital Forensics, Security and Law

As cybercrime continues to increase, new cyber forensics techniques are needed to combat the constant challenge of Internet anonymity. In instant messaging (IM) communications, criminals use virtual identities to hide their true identity, which hinders social accountability and facilitates cybercrime. Current instant messaging products are not addressing the anonymity and ease of impersonation over instant messaging. It is necessary to have IM cyber forensics techniques to assist in identifying cyber criminals as part of the criminal investigation. Instant messaging behavioral biometrics include online writing habits, which may be used to create an author writeprint to assist in identifying an author …


Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack May 2014

Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack

Annual ADFSL Conference on Digital Forensics, Security and Law

Botnets are responsible for a large percentage of damages and criminal activity on the Internet. They have shifted attacks from push activities to pull techniques for the distribution of malwares and continue to provide economic advantages to the exploiters at the expense of other legitimate Internet service users. In our research we asked; what is the cost of the procedural steps for forensically investigating a Botnet attack? The research method applies investigation guidelines provided by other researchers and evaluates these guidelines in terms of the cost to a digital forensic investigator. We conclude that investigation of Botnet attacks is both …


Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang May 2014

Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang

Annual ADFSL Conference on Digital Forensics, Security and Law

The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …


Computer Forensics For Accountants, Grover S. Kearns May 2014

Computer Forensics For Accountants, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …


Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter May 2014

Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Existing digital forensic investigation process models have provided guidelines for identifying and preserving potential digital evidence captured from a crime scene. However, for any of the digital forensic investigation process models developed across the world to be adopted and fully applied by the scientific community, it has to be tested. For this reason, the Harmonized Digital Forensic Investigation Process (HDFIP) model, currently a working draft towards becoming an international standard for digital forensic investigations (ISO/IEC 27043), needs to be tested.

This paper, therefore, presents the findings of a case study used to test the HDFIP model implemented in the ISO/IEC …


Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson May 2014

Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson

Annual ADFSL Conference on Digital Forensics, Security and Law

During the present age and time, it seems as though people in society have become addicted to nearly anything and everything, whether it be to a substance, an activity or an object. The Internet and pornography is no exception. While commonly thought of as a deviant behavior, many are displaying addictions towards the Internet and pornography. More alarming, however, are those who are viewing, downloading, or trading child pornography and displaying addictive Internet behaviors, for they are spending excessive amounts of time engaging in the proliferation of child pornographic materials. For this reason, addiction to the Internet and usage of …


Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar May 2014

Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …


Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore May 2014

Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence …


The Effects Of American Involvement In Northern Uganda's Conflict With The Lord's Resistance Army, Karen J. Norris May 2014

The Effects Of American Involvement In Northern Uganda's Conflict With The Lord's Resistance Army, Karen J. Norris

Celebration

This project explores the impact of American governmental and non-governmental actors in the Lord's Resistance Army (LRA) conflict in northern Uganda and southern Sudan, particularly the U.S. military, United States Agency for International Development (USAID), and various non-governmental organizations (NGOs). It also examines the efficacy of these various forms of intervention, specifically the deployment of U.S. Special Forces tracking the LRA, and the initiation of various soldier reintegration, governance, and sustainability programs organized by USAID and NGOs such as Invisible Children. Additionally, this project seeks to uncover underlying geopolitical objectives, such as gaining alliances in the 'Global War on Terror' …


Spark Across The Ages': Freya Von Moltke In The Memory Of The German Resistance To National Socialism, Sarah E. Hayes May 2014

Spark Across The Ages': Freya Von Moltke In The Memory Of The German Resistance To National Socialism, Sarah E. Hayes

Celebration

Freya von Moltke was a member of the Kreisau Circle, a German resistance group to Nazism that was active from 1940-1944. Although the group's existence was uncovered in the wake of the July Plot in 1944, von Moltke became highly influential in preserving the history of the Circle until her death in 2010. This paper will examine the role of von Moltke in the German collective memory today due to her exemplification of the values of the Berlin Republic.


Desert Fog: The Disappearing Memory Of The Herero Genocide, Elizabeth S. Topolosky May 2014

Desert Fog: The Disappearing Memory Of The Herero Genocide, Elizabeth S. Topolosky

Celebration

This paper examines why certain human-created traumas, especially genocides, are forgotten while others become established topics of public and intellectual discourse. The Herero Genocide in German West-Africa of 1904 to 1907 serves as the main example of these "forgotten traumas." In particular this paper focuses on the time period of the genocide, the progress of technology at this time, and the identity of the victims as possible reasons for the "weakness" of the memory of this event.


Long May She Reign: A Rhetorical Analysis Of Gender Expectations In Disney’S Tangled And Disney/Pixar’S Brave, Caitlin J. Saladino Apr 2014

Long May She Reign: A Rhetorical Analysis Of Gender Expectations In Disney’S Tangled And Disney/Pixar’S Brave, Caitlin J. Saladino

Graduate Research Symposium (GCUA) (2010 - 2017)

This project addresses messages about gender expectations in Disney princess narratives. The two films included in my project are Tangled (2010) and Brave (2012), which feature the most recently inducted princesses to the marketed Disney Princess line (Rapunzel and Merida, respectively). Using genre as an organizing principle, I argue that Rapunzel and Merida are different from the past Disney princesses (Snow White, Cinderella, Ariel, Jasmine, etc.) because their narratives reflect new ideas about gender expectations in modern society. The central tension appearing in both films is the opposition between the image of woman as traditional, domestic, and dependent and woman …


“We’Re Doin’ Ok” An Investigation Of Parental Account-Giving For Divorce-Related Financial Stress, Monique Makhlouf Apr 2014

“We’Re Doin’ Ok” An Investigation Of Parental Account-Giving For Divorce-Related Financial Stress, Monique Makhlouf

Graduate Research Symposium (GCUA) (2010 - 2017)

Divorce is a prevalent issue facing many Americans today with nearly one-third of first marriages ending in divorce within 10 years, and 50% of all first marriages ending in divorce at some point in the lifespan (Frisby, Booth-Butterfield, Dillow, Martin, & Weber, 2012). Considerable evidence suggests that divorce can increase the likelihood of adverse effects on the psychological well-being of family members, particularly in families with children (Brown, Portes, & Christensen, 1989). Among the many issues that confront families going through a divorce is a shift in socioeconomic status or a loss of financial stability during and after a divorce …


The Role Of Self Concept In Consumer Behavior, Marisa Toth Apr 2014

The Role Of Self Concept In Consumer Behavior, Marisa Toth

Graduate Research Symposium (GCUA) (2010 - 2017)

Understanding the processes that underlie consumer behavior has become an increasingly important area of research, especially for businesses and marketers. One of the most commonly studied variables believed to impact consumer behavior is self-concept.

The purpose of the current study is to examine the influence of self-concept in consumer behavior and identify factors that influence the relationship. Specifically, what is the relationship between different aspects of the self-concept and the consumption of publicly and privately consumed luxuries and necessities? Furthermore, how will this relationship be affected by the level of self-monitoring an individual displays?


Walt Disney And The Propaganda Complex: Government Funded Animation And Hollywood Complicity During Wwii, Amanda Cunningham Apr 2014

Walt Disney And The Propaganda Complex: Government Funded Animation And Hollywood Complicity During Wwii, Amanda Cunningham

Graduate Research Symposium (GCUA) (2010 - 2017)

Walt Disney’s work as an animator during World War II had a measurable impact on culture and in the development of government produced messages. It is important to examine this understudied area of Disney’s life and his studio’s efforts to produce wartime training and propaganda films during WWII. Government agencies, including the U.S. Treasury, contracted Disney to produce 32 animated shorts between 1941 and 1945 (Gabler, 2007).

Employing a semiotic approach of cinema, this study focuses on the cartoons The New Spirit (1942), Der Fuehrer’s Face (1943) and Education for Death: The Making of the Nazi (1943). While American wartime …


Exploring The Community Factor Of Economic Resiliency, Al G. Gourrier Apr 2014

Exploring The Community Factor Of Economic Resiliency, Al G. Gourrier

Graduate Research Symposium (GCUA) (2010 - 2017)

Resilience takes on many different meanings, but when we speak of the resilience of a market we are generally referencing the capability of that market’s capacity to respond, regroup and move forward, usually after an event or series of events that impede or encumber a market’s economic sustainability. The outcomes of a stable and performing market are indicated by its economic performance. Using economic indicators as a base, this study analyzes three markets as they recover from destabilizing events and attempt to respond, regroup and move forward. The study analyzes the Las Vegas, New Orleans and Detroit markets from an …


Gilded Age Visual Media As The Impetus For Social Change: Jacob Riis’S Reform Photography And The Antecedents Of Documentary Film, Denitsa Yotova Apr 2014

Gilded Age Visual Media As The Impetus For Social Change: Jacob Riis’S Reform Photography And The Antecedents Of Documentary Film, Denitsa Yotova

Graduate Research Symposium (GCUA) (2010 - 2017)

This study examines the birth and evolution of the social documentary genre in visual media. It suggests that a mixture of ideology, technology, and social awareness are necessary for a successful social reform. It finds that despite the limitations of technology during the nineteenth century, social documentaries were produced long before they were part of the genres of photography and film. By focusing on the work of Danish photographer Jacob Riis and tracing the emergence of film, this study demonstrates a connection between documentary film and Riis’s social documentary photography and public slide exhibitions. The study concludes that in order …


Comparing Perceptions Of Motivation To Change: Clinicians Versus Their Substance-Abuse Clients, Arthur Tabrizi Apr 2014

Comparing Perceptions Of Motivation To Change: Clinicians Versus Their Substance-Abuse Clients, Arthur Tabrizi

Graduate Research Symposium (GCUA) (2010 - 2017)

Although some clients enter treatment voluntarily to seek intervention for their substance abuse problems, most enter under coercive external pressures that may be perceived by clinicians as less influenced by addressing substance abuse than by appeasing mandates from the judicial system, family, or employers. Little research has examined and compared how clinicians assess clients’ extrinsic and intrinsic motivation to change as opposed to how the clients assess themselves. A congruency between the two parties’ assessments may inform the quality of the therapeutic relationship and facilitate an effective treatment plan. Using the Circumstance, Motivation, and Readiness Scales (CMR) and availability sampling …


The Rhetoric Of Gay Christians: Matthew Vines And Reverend Nancy Wilson As Exemplars, Josu Miller Apr 2014

The Rhetoric Of Gay Christians: Matthew Vines And Reverend Nancy Wilson As Exemplars, Josu Miller

Graduate Research Symposium (GCUA) (2010 - 2017)

In the United States, there is a perception that the gay rights debate situates Christians against gay rights advocates. According to this perception, Christians oppose gay rights, because the Bible condemns homosexuality as a sin, and those who support gay rights do so using purely secular arguments. This perception of the gay rights debate is flawed and overly simplistic, because simply not all Christians oppose gay rights. In fact, there are multiple interpretations of biblical texts that support homosexuality and have caused a gay rights debate within the church that is as complex and intricate as gay rights debate outside …


Examining The Target Levels Of State Renewable Portfolio Standards, Laurence D. Helwig Apr 2014

Examining The Target Levels Of State Renewable Portfolio Standards, Laurence D. Helwig

Graduate Research Symposium (GCUA) (2010 - 2017)

At present 37 US states have passed Renewable Portfolio Standards (RPS) or have a legislative driven goal that supports investment in renewable energy (RE) technologies. Previous research has identified economic, governmental, ideological and infrastructural characteristics as key predictors of policy adoption and renewable energy deployment efforts (Carley, 2009; Davis & Davis, 2009; Bohn & Lant, 2009; Lyon & Yin, 2010). To date, only a few studies have investigated the target levels of renewable portfolio standards. Carley & Miller (2012) found that policies of differing stringencies were motivated by systematically different factors that included governmental ideology. The purpose of this study …


The Perspective Of College Seniors In Rotc On Becoming A Commissioned Officer, Natasha Kreft, Hans Stoltzfus, Luke M. Tse, Ruth L. Markham Apr 2014

The Perspective Of College Seniors In Rotc On Becoming A Commissioned Officer, Natasha Kreft, Hans Stoltzfus, Luke M. Tse, Ruth L. Markham

The Research and Scholarship Symposium (2013-2019)

While there is growing research into Military and Mental health issues, the focus of such research has primarily been restricted to those populations who are retired from Military or who step-down from Active Duty. Following a case study with Reservists, we became aware that mental health issues in the Military Population may potentially stem from concepts involved the initial training phases. With the hypothesis that ROTC Cadets are among the youngest persons engaging in Military training, we approached ROTC Air Force and ROTC Army Cadets who were Seniors by credit at Cedarville University. The Cadets were asked to participate in …


The Belo Monte Dam Complex And Its Effects On Indigenous Communities, Alexis Lynn Powers Apr 2014

The Belo Monte Dam Complex And Its Effects On Indigenous Communities, Alexis Lynn Powers

Georgia State Undergraduate Research Conference

No abstract provided.


Examining The Influence Of Geospatial Variables On Primitive Roadside Campsite Conditions, David A. Graefe, Min Kook Kim Apr 2014

Examining The Influence Of Geospatial Variables On Primitive Roadside Campsite Conditions, David A. Graefe, Min Kook Kim

National Environment and Recreation Research Symposium

No abstract provided.