Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Digital forensics (5)
- Computer forensics (4)
- Privacy (3)
- Cloud Computing (2)
- Cyber forensics (2)
-
- Cyber-harassment (2)
- Cyberbullying (2)
- Data mining (2)
- Digital Forensics (2)
- Forensic imaging (2)
- Fuzzy hashing (2)
- Social Media (2)
- Addresses (1)
- Algorithm (1)
- Amazon kindle (1)
- Amcache.hve (1)
- Analog representation (1)
- Analytics (1)
- Analytics Adoption (1)
- And principal component analysis (PCA) (1)
- Anti-Blacklisting (1)
- Application Software (1)
- Approximate Matching (1)
- Approximate matching (1)
- Area Under Curve (1)
- Assessment (1)
- Association rule (1)
- Automation (1)
- BOINC (1)
- Big data (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (31)
- Journal of International Technology and Information Management (19)
- Andrews Agenda: Campus News (2)
- Claremont-UC Undergraduate Research Conference on the European Union (1)
- Kansas Library Association College and University Libraries Section Proceedings (1)
Articles 1 - 30 of 60
Full-Text Articles in Social and Behavioral Sciences
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley
Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley
Military Cyber Affairs
Lexical Link Analysis (LLA) is a form of text mining in which word meanings represented in lexical terms (e.g., word pairs) are treated as if they are in a community of a word network. LLA can provide automated awareness for analyzing text data and reveal previously unknown, data-driven themed connections. We applied LLA to develop authentic archetypes and conversely determine potential imposters of that same archetype. We use publically available social media data to develop a cyber professional as an example. This paper reports the development of the algorithm, the collection and labeling of data, as well as the results …
Recent Semantic Changes For The Term "Digital", Tore Brattli
Recent Semantic Changes For The Term "Digital", Tore Brattli
Proceedings from the Document Academy
The term digital originates from the Latin word for finger/counting and has for many years been used to denote discrete signals and information, as opposed to analog. Discrete representation is an important principle, not only in computers, but also for (printed) text, music scores and even our genes. Recently however, the use of the term has increased and the meaning expanded to include almost everything related to information technology, e.g. digital natives and digital addiction. This study investigates the core principles of digital representation and compares this concept with the recent usage, with a focus on Norwegian media. The purpose …
Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon
Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon
Kansas Library Association College and University Libraries Section Proceedings
K-State Libraries have many complex digital workflows that involve multiple people and departments. One, in particular, had the ongoing issues of tracking different stages, individual responsibilities, information gathering, notifications, and uploads done manually. Due to the inefficiency that this caused, it led to the development of an open source workflow management system (WMS)
Jitim Volume 25 Issue 3 - Front Page
Jitim Volume 25 Issue 3 - Front Page
Journal of International Technology and Information Management
JITIM volume 25, issue 3
Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz
Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz
The University of New Hampshire Law Review
The presumption of innocence and the right to a fair trial lie at the core of the United States justice system. While existing rules and practices serve to uphold these principles, the administration of justice is significantly compromised by a covert but influential factor: namely, implicit racial biases. These biases can lead to automatic associations between race and guilt, as well as impact the way in which judges and jurors interpret information throughout a trial. Despite the well-documented presence of implicit racial biases, few steps have been taken to ameliorate the problem in the courtroom setting. This Article discusses the …
How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr.
How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr.
The Winthrop McNair Research Bulletin
The purpose of this study is to further understand the relationship of family background and how it affects self-esteem and the perception of gender roles in online imagery. This study focuses on how our history serves as a lens to see gender roles. The schema theory, created by Robert Axelrod, is a model suggesting that people have a “pre-existing assumption about the way the world is organized” (Axelford, 1974). Furthering this theory is Bem's (1981) Gender Schema Theory, which proposes that one's sexual self-concept affects how one structures items in memory. These theories, applied to the understood roles and activities …
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Journal of International Technology and Information Management
With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Virginia Journal of Science
The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
Journal of International Technology and Information Management
Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
Journal of International Technology and Information Management
This research studies attitude and readiness of STEM majoring and success with
the data from a survey with a total of 501 viable responses, with respect to STEM
(science, technology, engineering, and mathematics) related majors that are
essential and fundamental to skills relevant to big data business analytics.
Recruiting and keeping students in STEM areas have attracted a large body of
attention in pedagogical studies. An effective way of achieving such a goal is to
show them how rewarding and self-fulfilling STEM careers can be toward
perspective students. One example of the abundance of STEM careers is the rapid
growth …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Journal of International Technology and Information Management
The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington
Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington
Journal of Digital Forensics, Security and Law
Empirical and anecdotal evidence indicates that cyberharassment is more prevalent as the use of social media becomes increasingly widespread, making geography and physical proximity irrelevant. Cyberharassment can take different forms (e.g., cyberbullying, cyberstalking, cybertrolling), and be motivated by the objectives of inflicting distress, exercising control, impersonation, and defamation. Little is currently known about the modus operandi of offenders and their psychological characteristics. Investigation of these behaviours is particularly challenging because it involves digital evidence distributed across the devices of both alleged offenders and victims, as well as online service providers, sometimes over an extended period of time. This special issue …
Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar
Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar
Journal of Digital Forensics, Security and Law
Cyberbullying and internet trolling are both forms of online aggression or cyberharassment; however, research has yet to assess the prevalence of these behaviors in relationship to one another. In addition, the current study was the first to investigate whether individual differences and self-esteem discerned between self-reported cyberbullies and/or internet trolls (i.e., Never engaged in either, Cyberbully-only, Troll-only, Both Cyberbully and Troll). Of 308 respondents solicited from Mechanical Turk, 70 engaged in cyberbullying behaviors, 20 engaged in only trolling behaviors, 129 self-reported both behaviors, and 89 self-reported neither behavior. Results yielded low self-esteem, low conscientiousness, and low internal moral values for …
The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins
The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins
Journal of Digital Forensics, Security and Law
Developing Internet technology has increased the rates of youth online harassment. This study examines online harassment from adolescents with low self-control and the moderating effect of opportunity. The data used in this study were collected by the Korea Institute of Criminology in 2009. The total sample size was 1,091. The results indicated that low self-control, opportunity, and gender have a significant influence on online harassment. However, these results differed according to gender; for males, low self-control significantly impacted online harassment; for females, however, only low self-control significantly impacted online harassment. Furthermore, the interaction between low self-control and opportunity did not …
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Journal of Digital Forensics, Security and Law
Threats are communicative acts, but it is not always obvious what they communicate or when they communicate imminent credible and serious risk. This paper proposes a research- and theory-based set of over 20 potential linguistic risk indicators that may discriminate credible from non-credible threats within online threat message corpora. Two prongs are proposed: (1) Using expert and layperson ratings to validate subjective scales in relation to annotated known risk messages, and (2) Using the resulting annotated corpora for automated machine learning with computational linguistic analyses to classify non-threats, false threats, and credible threats. Rating scales are proposed, existing threat corpora …
A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White
A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White
Journal of Digital Forensics, Security and Law
This paper examines the current state of the statutes in the United States as they relate to cyber-harassment in the context of "revenge porn". Revenge porn refers to websites which cater to those wishing to exploit, harass, or otherwise antagonize their ex partners using pornographic images and videos which were obtained during their relationships. The paper provide examples and illustrations as well as a summary of current statute in the United States. The paper additionally explores some of the various legal remedies available to victims of revenge pornography.
After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino
After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino
Claremont-UC Undergraduate Research Conference on the European Union
The revelations of PRISM and XKeyscore by ex-National Security Agency (NSA) analyst Edward Snowden resulted in arguably the largest intelligence leak so far in the 21st century. The leak revealed that the NSA was working with the British Government Communications Headquarters (GCHQ) on surveillance and data collection of individuals throughout Europe. Similarly, the NSA also colluded with the German Federal Intelligence Service (BND) on similar data collection and surveillance activities. Whereas the British government reacted relatively benignly to the revelations despite cries of government abuse, the German government reacted negatively to the revelations, eventually opening a rift between Washington …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Journal of International Technology and Information Management
Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Journal of International Technology and Information Management
The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …