Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

Conference

2017

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 65

Full-Text Articles in Physical Sciences and Mathematics

Building Academic/Practitioner Teams For Human Rights Projects: Examples, Lessons Learned, And Pitfalls To Avoid, Theresa Harris Nov 2017

Building Academic/Practitioner Teams For Human Rights Projects: Examples, Lessons Learned, And Pitfalls To Avoid, Theresa Harris

Biennial Conference: The Social Practice of Human Rights

Academics are increasingly interested in getting out of their classrooms and labs to contribute their knowledge, expertise, and resources to help communities develop evidence-based policies. In addition to post-election initiatives such as the March for Science and 314 Action, many academics are joining “without borders”-type programs and organizations that connect academics with opportunities to volunteer their time and talents for “social good.”

One of the longest-running of these is On-call Scientists, an initiative of the American Association for the Advancement of Science (AAAS) that connects human rights organizations with pro bono scientists across all fields — life, physical, behavioral, and …


Informing Responders Using Gis And Gps, Deidre Mccarthy Oct 2017

Informing Responders Using Gis And Gps, Deidre Mccarthy

CHAR

Hurricane Katrina devastated the Gulf Coast in August 2005 and created the single largest disaster for cultural resources that the United States has witnessed since the inception of the National Historic Preservation Act (NHPA) in 1966. Notably, the NHPA created the National Register of Historic Places, our nation’s catalog of important cultural resources. The NHPA also stipulates that any federal undertaking which may adversely affect National Register eligible resources be mitigated. For the Federal Emergency Management Agency (FEMA), Katrina created the largest compliance project ever under Section 106 of the NHPA.

Although causing a great deal of damage, Katrina also …


Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft Oct 2017

Keynote Address: Climate Change: From Global To New York Scale, Christopher D. Thorncroft

CHAR

This talk is concerned with the science and impacts of climate change from global to New York scales. It will provide an assessment of how the climate has changed over the past Century based on a purely observational perspective. The scientific basis for anthroprogenic climate change will be explained and discussed including a description of the “greenhouse effect” and why it is important for life on this planet. We will briefly discuss global and local consequences of a warmer climate and what we need to be prepared for going forward in the coming decades.


Wrangle Your Data Like A Pro With The Data Processing Power Of Python, Geoffrey P. Timms, Jeremy M. Brown Oct 2017

Wrangle Your Data Like A Pro With The Data Processing Power Of Python, Geoffrey P. Timms, Jeremy M. Brown

Charleston Library Conference

Management, delivery, and marketing of library resources and collections necessitate interaction with a plethora of data from many sources and in many forms. Accessing and transforming data into meaningful information or different formats used in library automation can be time consuming, but a working knowledge of a programming language can improve efficiency in many facets of librarianship. From processing lists to creating extensible markup language (XML), from editing machine-readable cataloging (MARC) records before upload to automating statistical reports, the Python programming language and third-party application programming interfaces (APIs) can be used to accomplish both behind-the-scenes tasks and end-user facing projects. …


Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie Oct 2017

Cloud‐Based Text Analytics Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie

Commonwealth Computational Summit

No abstract provided.


Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie Oct 2017

Cloud-Based Text Analytics: Harvesting, Cleaning And Analyzing Corporate Earnings Conference Calls, Michael Chuancai Zhang, Vikram Gazula, Dan Stone, Hong Xie

Commonwealth Computational Summit

Does management language cohesion in earnings conference calls matter to the capital market? As a part of the research on the above question, and taking advantage of the modern IT technologies, this project:

  • harvested 115,882 earnings conference call transcripts from SeekingAlpha.com
  • parsed and structured 89,988 transcripts using regular expressions in Stata
  • analyzed 179,976 text files using Amazon Elastic Compute Cloud (Amazon EC2), which
  • saved almost 2 years (675 days) of the project time
As this project is related to big data, text analytics, and big computing, it may be a good case to show how we can benefit from modern …


Modeling Voting Dynamics In A Two-Party System: Social Interaction And Media Consumption, Caleb Ignace Oct 2017

Modeling Voting Dynamics In A Two-Party System: Social Interaction And Media Consumption, Caleb Ignace

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Acoustic Signatures Of Habitat Types In The Miombo Woodlands Of Western Tanzania, Sheryl Vanessa Amorocho, Dante Francomano, Kristen M. Bellisario, Ben Gottesman, Bryan C. Pijanowski Aug 2017

Acoustic Signatures Of Habitat Types In The Miombo Woodlands Of Western Tanzania, Sheryl Vanessa Amorocho, Dante Francomano, Kristen M. Bellisario, Ben Gottesman, Bryan C. Pijanowski

The Summer Undergraduate Research Fellowship (SURF) Symposium

The Miombo Woodlands of Tanzania comprise several habitat types that are home to a great number of flora and fauna. Understanding their responses to increasing human disturbance is important for conservation, especially in places where people depend so directly on their local ecosystem services to survive. Soundscapes are a powerful approach to study complex biomes undergoing change. The sounds emitted by soniferous fauna characterize the acoustic profile of the landscapes they inhabit such that habitats with the highest acoustic abundance are considered as the most diverse and possibly more ecologically resilient. However, acoustic variability within similar habitat types may pose …


Shape Features Underlying The Perception Of Liquids, Jan Jaap R. Van Assen, Pascal Barla, Roland W. Fleming May 2017

Shape Features Underlying The Perception Of Liquids, Jan Jaap R. Van Assen, Pascal Barla, Roland W. Fleming

MODVIS Workshop

No abstract provided.


Dynamic Modeling Of Problem Drinkers Undergoing Behavioral Treatment, Rebecca A. Everett May 2017

Dynamic Modeling Of Problem Drinkers Undergoing Behavioral Treatment, Rebecca A. Everett

Biology and Medicine Through Mathematics Conference

No abstract provided.


Large-Scale Discovery Of Visual Features For Object Recognition, Drew Linsley, Sven Eberhardt, Dan Shiebler, Thomas Serre May 2017

Large-Scale Discovery Of Visual Features For Object Recognition, Drew Linsley, Sven Eberhardt, Dan Shiebler, Thomas Serre

MODVIS Workshop

A central goal in vision science is to identify features that are important for object and scene recognition. Reverse correlation methods have been used to uncover features important for recognizing faces and other stimuli with low intra-class variability. However, these methods are less successful when applied to natural scenes with variability in their appearance.

To rectify this, we developed Clicktionary, a web-based game for identifying features for recognizing real-world objects. Pairs of participants play together in different roles to identify objects: A “teacher” reveals image regions diagnostic of the object’s category while a “student” tries to recognize the object. Aggregating …


Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland May 2017

Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland

Annual ADFSL Conference on Digital Forensics, Security and Law

Investigations of crimes against children are often complex, both in terms of the varied and large amount of digital technology encountered and the offensive nature of the crimes. Such cases are numerous, large, and prioritised, requiring digital forensics competence. Earlier digital forensics was considered and treated as a typical forensic science like fingerprint analysis, performed in a laboratory isolated from the investigative team. This decoupled way of working has proved to be both inefficient and error prone.

At the Digital Forensic Unit of Oslo Police District we have developed a new way of working that addresses many of the problems …


Exploring Digital Evidence With Graph Theory, Imani Palmer, Boris Gelfand, Roy Campbell May 2017

Exploring Digital Evidence With Graph Theory, Imani Palmer, Boris Gelfand, Roy Campbell

Annual ADFSL Conference on Digital Forensics, Security and Law

The analysis phase of the digital forensic process is the most complex. The analysis phase remains very subjective to the views of the forensic practitioner. There are many tools dedicated to assisting the investigator during the analysis process. However, they do not address the challenges. Digital forensics is in need of a consistent approach to procure the most judicious conclusions from the digital evidence. The objective of this paper is to discuss the ability of graph theory, a study of related mathematical structures, to aid in the analysis phase of the digital forensic process. We develop a graph-based representation of …


Digital Forensics Tool Selection With Multi-Armed Bandit Problem, Umit Karabiyik, Tugba Karabiyik May 2017

Digital Forensics Tool Selection With Multi-Armed Bandit Problem, Umit Karabiyik, Tugba Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics investigation is a long and tedious process for an investigator in general. There are many tools that investigators must consider, both proprietary and open source. Forensics investigators must choose the best tool available on the market for their cases to make sure they do not overlook any evidence resides in suspect device within a reasonable time frame. This is however hard decision to make, since learning and testing all available tools make their job only harder. In this project, we define the digital forensics tool selection for a specific investigative task as a multi-armed bandit problem assuming that …


Downstream Competence Challenges And Legal/Ethical Risks In Digital Forensics, Michael M. Losavio, Antonio Losavio May 2017

Downstream Competence Challenges And Legal/Ethical Risks In Digital Forensics, Michael M. Losavio, Antonio Losavio

Annual ADFSL Conference on Digital Forensics, Security and Law

Forensic practice is an inherently human-mediated system, from processing and collection of evidence to presentation and judgment. This requires attention to human factors and risks which can lead to incorrect judgments and unjust punishments.

For digital forensics, such challenges are magnified by the relative newness of the discipline and the use of electronic evidence in forensic proceedings. Traditional legal protections, rules of procedure and ethics rules mitigate these challenges. Application of those traditions better ensures forensic findings are reliable. This has significant consequences where findings may impact a person's liberty or property, a person's life or even the political direction …


Detecting Deception In Asynchronous Text, Fletcher Glancy May 2017

Detecting Deception In Asynchronous Text, Fletcher Glancy

Annual ADFSL Conference on Digital Forensics, Security and Law

Glancy and Yadav (2010) developed a computational fraud detection model (CFDM) that successfully detected financial reporting fraud in the text of the management’s discussion and analysis (MDA) portion of annual filings with the United States Securities and Exchange Commission (SEC). This work extends the use of the CFDM to additional genres, demonstrates the generalizability of the CFDM and the use of text mining for quantitatively detecting deception in asynchronous text. It also demonstrates that writers committing fraud use words differently from truth tellers.


Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe May 2017

Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital content created by picture recording devices is often stored internally on the source device, on either embedded or removable media. Such storage media is typically limited in capacity and meant primarily for interim storage of the most recent image files, and these devices are frequently configured to delete older files as necessary to make room for new files. When investigations involve such devices and media, it is sometimes these older deleted files that would be of interest. It is an established fact that deleted file content may persist in part or in its entirety after deletion, and identifying the …


Development Of A Professional Code Of Ethics In Digital Forensics, Kathryn C. Seigfried-Spellar, Marcus Rogers, Danielle M. Crimmins 2184089 May 2017

Development Of A Professional Code Of Ethics In Digital Forensics, Kathryn C. Seigfried-Spellar, Marcus Rogers, Danielle M. Crimmins 2184089

Annual ADFSL Conference on Digital Forensics, Security and Law

Academics, government officials, and practitioners suggest the field of digital forensics is in need of a professional code of ethics. In response to this need, the authors developed and proposed a professional code of ethics in digital forensics. The current paper will discuss the process of developing the professional code of ethics, which included four sets of revisions based on feedback and suggestions provided by members of the digital forensic community. The final version of the Professional Code of Ethics in Digital Forensics includes eight statements, and we hope this is a step toward unifying the field of digital forensics …


Defining A Cyber Jurisprudence, Peter R. Stephenson Phd May 2017

Defining A Cyber Jurisprudence, Peter R. Stephenson Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Jurisprudence is the science and philosophy or theory of the law. Cyber law is a very new concept and has had, compared with other, older, branches of the law, little structured study. However, we have entered the cyber age and the law - on all fronts - is struggling to keep pace with technological advances in cyberspace. This research explores a possible theory and philosophy of cyber law, and, indeed, whether it is feasible to develop and interpret a body of law that addresses current and emerging challenges in cyber space.

While there is an expanding discussion of the nature …


Fast Filtering Of Known Png Files Using Early File Features, Sean Mckeown, Gordon Russell, Petra Leimich May 2017

Fast Filtering Of Known Png Files Using Early File Features, Sean Mckeown, Gordon Russell, Petra Leimich

Annual ADFSL Conference on Digital Forensics, Security and Law

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media, comparing individual digests with a database of known contraband. However, the large capacities of modern storage media, and increased time pressure on forensics examiners, necessitates that more efficient processing mechanisms be developed. This work describes a technique for creating signatures for images of the PNG format which only requires a tiny fraction of the file to effectively distinguish between a large number of images. Highly …


Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou May 2017

Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …


Detect Kernel-Mode Rootkits Via Real Time Logging & Controlling Memory Access, Satoshi Tanda, Irvin Homem, Igor Korkin May 2017

Detect Kernel-Mode Rootkits Via Real Time Logging & Controlling Memory Access, Satoshi Tanda, Irvin Homem, Igor Korkin

Annual ADFSL Conference on Digital Forensics, Security and Law

Modern malware and spyware platforms attack existing antivirus solutions and even Microsoft PatchGuard. To protect users and business systems new technologies developed by Intel and AMD CPUs may be applied. To deal with the new malware we propose monitoring and controlling access to the memory in real time using Intel VT-x with EPT. We have checked this concept by developing MemoryMonRWX, which is a bare-metal hypervisor. MemoryMonRWX is able to track and trap all types of memory access: read, write, and execute. MemoryMonRWX also has the following competitive advantages: fine-grained analysis, support of multi-core CPUs and 64-bit Windows 10. MemoryMonRWX …


An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora May 2017

An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.


Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner May 2017

Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates the recent behavior of the Kelihos botnet, a spam-sending botnet that accounts for many millions of emails sent each day. The paper demonstrates how a team of students are able to perform a longitudinal malware study, making significant observations and contributions to the understanding of a major botnet using tools and techniques taught in the classroom. From this perspective the paper has two objectives: encouragement and observation. First, by providing insight into the methodology and tools used by student researchers to document and understand a botnet, the paper strives to embolden other academic programs to follow a …


An Operational Drought Prediction Framework With Application Of Vine Copula Functions, Mahkameh Zarekarizi May 2017

An Operational Drought Prediction Framework With Application Of Vine Copula Functions, Mahkameh Zarekarizi

Student Research Symposium

Early and accurate drought predictions can benefit water resources and emergency managers by enhancing drought preparedness. Soil moisture memory is shown to contain helpful information for prediction of future values. This study uses the soil moisture memory to predict their future states via multivariate statistical modeling. We present a drought forecasting framework which issues monthly and seasonal drought forecasts. This framework estimates droughts with different lead times and updates the forecasts when more data become available. Forecasts are generated by conditioning future soil moisture values on antecedent drought status. The statistical model is initialized by soil moisture simulations retrieved from …


The Importance Of Urban Habitat Connectivity And Influence On Native Avian Species And Community Science, Kristen S. Gulick May 2017

The Importance Of Urban Habitat Connectivity And Influence On Native Avian Species And Community Science, Kristen S. Gulick

Student Research Symposium

In what ways do small-scale urban backyards contribute to local bird abundance and biodiversity? In what ways might these yards serve as an ‘extension’ of neighboring native forest areas? This project investigates the contribution that a group of backyards, certified through the Backyard Habitat Certification Program, have in the suburb of Hillsdale, Oregon, which is adjacent to the natural area of Keller Woodland. Backyard owners functioning as citizen or community scientists assisted with conducting residential bird point-counts once a week in each backyard and the natural area. Counts were done for a total of 8 weeks during nesting season to …


Recognition, Internalization, Growth: Intuitive Design For Archival Representation, Jaime L. Ganzel May 2017

Recognition, Internalization, Growth: Intuitive Design For Archival Representation, Jaime L. Ganzel

Graduate Student Symposium

Although there is a pressing need for archival description and access systems to be more intuitive and user-friendly, the uniqueness of archival records presents significant barriers to establishing simplistic and standardized conventions for the representation of archival materials. Indecipherable finding aids and access tools prevent new and inexperienced researchers from accessing the unique information and documentation held in archives. This article aims to help open the archival record to new and non-traditional archival users, support individual development of archival literacy skills, and cultivate a greater level of archival awareness in our society by developing a usable model for archivists to …


Investigating Trust And Trust Recovery In Human-Robot Interactions, Abigail L. Thomson May 2017

Investigating Trust And Trust Recovery In Human-Robot Interactions, Abigail L. Thomson

Celebration of Learning

As artificial intelligence and robotics continue to advance and be used in increasingly different functions and situations, it is important to look at how these new technologies will be used. An important factor in how a new resource will be used is how much it is trusted. This experiment was conducted to examine people’s trust in a robotic assistant when completing a task, how mistakes affect this trust, and if the levels of trust exhibited with a robot assistant were significantly different than if the assistant were human. The task was to watch a computer simulation of the three-cup monte …


Mapping Community Space And Place In Mto Wa Mbu, Tanzania Through Surveys And Gis, Jessica Craigg Apr 2017

Mapping Community Space And Place In Mto Wa Mbu, Tanzania Through Surveys And Gis, Jessica Craigg

Georgia College Student Research Events

Cities throughout the African continent have been developing at an unprecedented pace, many of them due to the influence of the tourism industry. This is particularly true in Tanzania, a country famous for its national parks and their draw to tourists who help provide money for development. However, the only way to get the whole story on how to spend this money is through the experiences and needs of the people themselves. This study focuses on a small town in northeastern Tanzania, Mto wa Mbu, situated near Lake Manyara National Park, and its people’s perceptions of the park and community. …


2017 Symposium Overview, Cedarville University Apr 2017

2017 Symposium Overview, Cedarville University

The Research and Scholarship Symposium (2013-2019)

Click the "Download" button in the top right corner to view the abstract booklet.