Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

Embry-Riddle Aeronautical University

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 691

Full-Text Articles in Law

High Times, Higher Stakes: Mental Health Impacts In New Recreational Marijuana Legal Landscape, Jason T. Lorenzon J.D., Chris Pezalla, Diana Semilia Feb 2024

High Times, Higher Stakes: Mental Health Impacts In New Recreational Marijuana Legal Landscape, Jason T. Lorenzon J.D., Chris Pezalla, Diana Semilia

National Training Aircraft Symposium (NTAS)

This presentation delves into the societal and mental health consequences arising from the increasing trend of legalizing recreational marijuana. Specifically, we will examine the potential normalization of unconventional behavior among aviation college students, who may grapple with substance use challenges due to stress, sleep difficulties, and the demands of college life. Given the rigorous nature of flight training, prioritizing the mental well-being of pilots becomes imperative.

With the recent legalization of recreational marijuana in Ohio, this presentation integrates insights from Diana Semilia's 2022 study on Kent State Flight Students Ages 19-26. The study's objective was to extract practical recommendations applicable …


Public Acceptance Of Medical Screening Recommendations, Safety Risks, And Implied Liabilities Requirements For Space Flight Participation, Cory J. Trunkhill Oct 2022

Public Acceptance Of Medical Screening Recommendations, Safety Risks, And Implied Liabilities Requirements For Space Flight Participation, Cory J. Trunkhill

Doctoral Dissertations and Master's Theses

The space tourism industry is preparing to send space flight participants on orbital and suborbital flights. Space flight participants are not professional astronauts and are not subject to the rules and guidelines covering space flight crewmembers. This research addresses public acceptance of current Federal Aviation Administration guidance and regulations as designated for civil participation in human space flight.

The research utilized an ordinal linear regression analysis of survey data to explore the public acceptance of the current medical screening recommended guidance and the regulations for safety risk and implied liability for space flight participation. Independent variables constituted participant demographic representations …


Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle Jan 2022

Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle

Journal of Digital Forensics, Security and Law

An exploration of the technological behaviours of previously convicted child sexual exploitation material (CSEM) offenders provides a foundation for future applied research into deterrence, investigation, and treatment efforts. This study evaluates the technology choices and transitions of individuals previously convicted of CSEM offenses. Based on their inclusion in two sex offender registries, anonymous survey results (n=78) were collected from English-speaking adults within the United States. CSEM offenders chose technologies based on both utility and perceived risk; peer-to-peer and web-browsers were the most common gateway technologies and showed substantial sustained usage; a substantial minority of users never stored CSEM and only …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Uas For Public Safety: Active Threat Recognition, Joseph Cerreta, Tray Denney, Scott S. Burgess, Anthony Galante, David Thirtyacre, Gloria A. Wilson, Patrick Sherman Jan 2022

Uas For Public Safety: Active Threat Recognition, Joseph Cerreta, Tray Denney, Scott S. Burgess, Anthony Galante, David Thirtyacre, Gloria A. Wilson, Patrick Sherman

International Journal of Aviation, Aeronautics, and Aerospace

The Center for Homeland Defense and Security identified an increase of active threat events, such as mass shootings, annually since 1999. Literature suggests that 90% of shootings were over before law enforcement arrived at the scene and the first responder response was limited to “surround and contain” until Special Weapons and Tactics Teams (SWAT) arrived on the scene. Using Unmanned Aircraft Systems (UAS) to detect which individual was the threat and type of weapon used can provide useful information to increase the speed of the response for first-on-scene rather than waiting for SWAT if the type of weapon was known. …


Community-Based Rehabilitation's Effectiveness In Reducing Singapore Juvenile Recidivism, Denzil Neo, June Hyuk Lee, Mervin Xin Hong Chew, Munisraj Sarfoji, Timothy Prakash Dec 2021

Community-Based Rehabilitation's Effectiveness In Reducing Singapore Juvenile Recidivism, Denzil Neo, June Hyuk Lee, Mervin Xin Hong Chew, Munisraj Sarfoji, Timothy Prakash

Introduction to Research Methods RSCH 202

Singapore's juvenile recidivism rate has climbed by around 5% since 2013, putting the country at risk of increased youth crime. With several mandatory rehabilitative programmes classified into two categories, Community-Based Rehabilitation (CBR) and Institutional-Based Rehabilitation (IBR), it is unclear whether the mandatory individual rehabilitative programmes for offenders were actually effective in achieving their corrective goals. This proposal would undertake a regression analysis to compare the effectiveness of CBR and IBR programmes utilizing secondary data gathered by the Ministry of Social and Family Development (MSF) and primary data from a survey. The survey will provide previously unstudied insights into the offender's …


Social Media User Relationship Framework (Smurf), Anne David, Sarah Morris, Gareth Appleby-Thomas Feb 2021

Social Media User Relationship Framework (Smurf), Anne David, Sarah Morris, Gareth Appleby-Thomas

Journal of Digital Forensics, Security and Law

The use of social media has spread through many aspects of society, allowing millions of individuals, corporate as well as government entities to leverage the opportunities it affords. These opportunities often end up being exploited by a small percentage of the user community who use it for objectionable or unlawful activities; for example, trolling, cyber bullying, grooming, luring. In some cases, these unlawful activities result in investigations where swift retrieval of critical evidence required in order to save a life.

This paper presents a proof of concept (PoC) framework for social media user attribution. The framework aims to provide digital …


Digital Disruption Solution For Airlines In Brazil, Camila Bisinoto Borges, Cristiane Lunardi Das Neves Rodrigues, Daniel Dias Landroni, Tatiane Mendonça, Leila Halawi Jan 2021

Digital Disruption Solution For Airlines In Brazil, Camila Bisinoto Borges, Cristiane Lunardi Das Neves Rodrigues, Daniel Dias Landroni, Tatiane Mendonça, Leila Halawi

Publications

Since March 2017, the cost of denied boarding began to draw all Brazilian airlines' attention because of the Resolution 400 of the Brazilian National Civil Aviation Agency. This Resolution covers several items, but we will focus on the penalty that the airlines need to pay for each passenger who had his boarding denied involuntarily in domestic flights. Our goal is to create a plugin that any airline could use in their self-service check-in channels and direct communication with the passenger. It could also become a way to offer proactive accommodation options and monetary compensations due to itinerary or ticket schedule …


Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara Oct 2020

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara

Journal of Digital Forensics, Security and Law

Following a series of high profile miscarriages of justice in the UK linked to questionable expert evidence, the post of the Forensic Science Regulator was created in 2008. The main objective of this role is to improve the standard of practitioner competences and forensic procedures. One of the key strategies deployed to achieve this is the push to incorporate a greater level of scientific conduct in the various fields of forensic practice. Currently there is no statutory requirement for practitioners to become accredited to continue working with the Criminal Justice System of England and Wales. However, the Forensic Science Regulator …


A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas Aug 2020

A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas

Journal of Digital Forensics, Security and Law

This paper proposes a two-stage model for identifying and contextualizing features from artefacts created as a result of social networking activity. This technique can be useful in digital investigations and is based on understanding and the deconstruction of the processes that take place prior to, during and after user activity; this includes corroborating artefacts. Digital Investigations are becoming more complex due to factors such as, the volume of data to be examined; different data formats; a wide range of sources for digital evidence; the volatility of data and the limitations of some of the standard digital forensic tools. This paper …


Aircraft Rescue And Fire Fighting Capabilities: Are Today’S Standards Protecting Passenger’S Futures?, Kaetlyn Blocker May 2020

Aircraft Rescue And Fire Fighting Capabilities: Are Today’S Standards Protecting Passenger’S Futures?, Kaetlyn Blocker

Student Works

Few studies have been conducted that have truly considered the relevance and inadequacies of applicable aircraft rescue and firefighting (ARFF) regulations. Fewer still have studied and explored accident cases that directly exemplify the deficiencies and inconsistencies of various regulatory standards and requirements. This study seeks to expose and explain those inadequacies by utilizing a historical, case-study type research method to examine accident cases during which time the governing regulations played a significant role in the ARFF operations. The findings discovered as a result of this multi-case analysis provide evidence that the current regulations governing United States ARFF operations are both …


Title Ix Effectiveness At American Universities, Corrine K. Girard Apr 2020

Title Ix Effectiveness At American Universities, Corrine K. Girard

Discovery Day - Prescott

The purpose of this research is to contribute to and improve existing university knowledge of the effectiveness of the University Title IX reporting process. After discussing experiences with Title IX with students at ERAU, it is apparent that there is a negative connotation among university students with this program. This research will build off of the research completed last year in which ERAU Title IX processes were compared to that of Occidental College and CalTech. This research aims to provide clarity to Title IX offices at the University to aid in successfully adapting their program to the needs of the …


Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D. Mar 2020

Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D.

National Training Aircraft Symposium (NTAS)

Unmanned Aerial Systems (UAS), Unmanned Aeronautical Vehicles (UAV), drones and Personal Aerial Vehicles (PAV) constitute the greatest technological advancement since the jet age. (Elaine Chao, Secretary of Transportation, October 26, 2017) This technological advancement has prompted significant public policy challenges and the need for new laws regarding navigable airspace. This proposal investigates how airspace used by drones will evolve given existing Constitutional and common law principals. These principals will influence the creation, development and modification of UAS airspace regulations by the Federal Aviation Administration (FAA).

Two critical but unanswered questions concerning the National Airspace System, are where does navigable airspace …


Iran, Diane M. Zorri Jan 2020

Iran, Diane M. Zorri

Publications

Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


New Standards For An Old Problem: The Role Of The Federal Communications Commission In Fulfilling Space Policy Directive-3, Michael S. Dodge Feb 2019

New Standards For An Old Problem: The Role Of The Federal Communications Commission In Fulfilling Space Policy Directive-3, Michael S. Dodge

Space Traffic Management Conference

The recent Space Policy Directive-3, issued on June 18th, 2018, commands several sectors of the federal executive apparatus to reassess their current and future efforts to address space traffic management and space situational awareness issues. The reasons for this Directive can be boiled down to the belief that the continued use of the orbital realm depends on responsible management, which in turn depends on myriad factors that include the development of new technologies, the refinement of data gathering, and the clarification of governmental operational roles. In particular, the Directive calls for enhanced standardization of safety and best practices, …


Rethinking Consumer Protection: Escaping Death By Regulation, Thomas L. Tacker Jan 2019

Rethinking Consumer Protection: Escaping Death By Regulation, Thomas L. Tacker

Publications

This book is designed to appeal to anyone who is at all interested in topics related to making life better and safer—for all us consumers. Our current approach to consumer protection is extremely flawed; sometimes costing lives rather than saving them. There are better ways to protect ourselves and the people we love.


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy Oct 2018

A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy

Journal of Digital Forensics, Security and Law

As technology improves and economies become more globalized, the concept of currency has evolved. Bitcoin, a cryptographic digital currency, has been embraced as a secure and convenient type of money. Due to its security and privacy for the user, Bitcoin is a good tool for conducting criminal trades. The Financial Crimes Enforcement Network (FinCEN) has regulations in place to make identification information of Bitcoin purchasers accessible to law enforcement, but enforcing these rules with cash-for-Bitcoin traders is difficult. This study surveyed cash-for-Bitcoin vendors in Oklahoma, Texas, Arkansas, Missouri, Kansas, Colorado, and New Mexico to determine personal demographic information, knowledge of …


Commentary On The Investigation: The April 20, 2001 Peruvian Shootdown Accident, Ibpp Editor Aug 2018

Commentary On The Investigation: The April 20, 2001 Peruvian Shootdown Accident, Ibpp Editor

International Bulletin of Political Psychology

This article critiques an investigative report officially intended (1) to establish the facts and circumstances contributing to the April 20, 2001 interdiction of a United States (US) missionary floatplane and the death of two US citizens and (2) to make recommendations to minimize another such accident. The report was issued by the US Department of State Bureau for International Narcotics and Law Enforcement Affairs.


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.