Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Embry-Riddle Aeronautical University

Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 571

Full-Text Articles in Social and Behavioral Sciences

Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum Feb 2024

Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum

National Training Aircraft Symposium (NTAS)

Voluntary Safety Reporting Programs (VSRPs) are a critical tool in the aviation industry for monitoring safety issues observed by the frontline workforce. While VSRPs primarily focus on operational safety, report narratives often describe factors such as fatigue, workload, culture, staffing, and health, directly or indirectly impacting mental health. These reports can provide individual and organizational insights into aviation personnel's physical and psychological well-being. This poster introduces the AVIation Analytic Neural network for Safety events (AVIAN-S) model as a potential tool to extract and monitor these insights. AVIAN-S is a novel machine-learning model that leverages natural language processing (NLP) to analyze …


Virtual Reality & Pilot Training: Existing Technologies, Challenges & Opportunities, Tim Marron M.S., Niall Dungan Bsc, Captain, Brian Mac Namee Phd, Anna Donnla O'Hagan Phd Jan 2024

Virtual Reality & Pilot Training: Existing Technologies, Challenges & Opportunities, Tim Marron M.S., Niall Dungan Bsc, Captain, Brian Mac Namee Phd, Anna Donnla O'Hagan Phd

Journal of Aviation/Aerospace Education & Research

The introduction of virtual reality (VR) to flying training has recently gained much attention, with numerous VR companies, such as Loft Dynamics and VRpilot, looking to enhance the training process. Such a considerable change to how pilots are trained is a subject that warrants careful consideration. Examining the effect that VR has on learning in other areas gives us an idea of how VR can be suitably applied to flying training. Some of the benefits offered by VR include increased safety, decreased costs, and increased environmental sustainability. Nevertheless, some challenges ahead for developers to consider are negative transfer of learning, …


A Quantitative Analysis Of Seaplane Accidents From 1982-2021, David C. Ison Jan 2024

A Quantitative Analysis Of Seaplane Accidents From 1982-2021, David C. Ison

International Journal of Aviation, Aeronautics, and Aerospace

This study aimed to assess and analyze all historical National Transportation Safety Board accident reports since 1982. For analysis, reports were bisected into seaplane (float, amphibian, and hull) and non-seaplane groups. Findings showed that there is a deficiency in the level of available detail on the seaplane fleet and cadre of seaplane pilots in the U.S. During the most recent ten years of complete data (2012-2021) showed a negative trend in all accidents and fatal accidents, although only the latter being statistically convincing. During this timeframe, seaplane accident pilots had significantly higher total time and age than other groups (non-seaplane …


Is The Declining Birthrate Really An Issue For The Economy?, Harsh Ramesh Pednekar, Theodore Lee, Darrion Chin Dec 2023

Is The Declining Birthrate Really An Issue For The Economy?, Harsh Ramesh Pednekar, Theodore Lee, Darrion Chin

Introduction to Research Methods RSCH 202

This study aims to explore the complex implications of declining birth rates on the economy, focusing on GDP per capita as a crucial metric, and aims to uncover both potential opportunities and challenges stemming from this demographic transformation using regression analysis. Using a quantitative methodology and secondary data from OECD.stat, World Population Review, and World Bank, the study explores the relationship between declining birth rates and economic impacts. GDP per capita serves as an essential dependent variable, and it accounts for control variables such as labour force participation, literacy, and education levels, child dependence ratio, and physical capital. Past studies …


The Evolution Of Ai On The Commercial Flight Deck: Finding Balance Between Efficiency And Safety While Maintaining The Integrity Of Operator Trust, Mark Miller, Sam Holley, Leila Halawi Jan 2023

The Evolution Of Ai On The Commercial Flight Deck: Finding Balance Between Efficiency And Safety While Maintaining The Integrity Of Operator Trust, Mark Miller, Sam Holley, Leila Halawi

Publications

As artificial intelligence (AI) seeks to improve modern society, the commercial aviation industry offers a significant opportunity. Although many parts of commercial aviation including maintenance, the ramp, and air traffic control show promise to integrate AI, the highly computerized digital flight deck (DFD) could be challenging. The researchers seek to understand what role AI could provide going forward by assessing AI evolution on the commercial flight deck over the past 50 years. A modified SHELL diagram is used to complete a Human Factors (HF) analysis of the early use for AI on the commercial flight deck through introduction of the …


Directional Speaker Poster, Eugene Ng, Bryan Wong, Ruhaan Das Jan 2023

Directional Speaker Poster, Eugene Ng, Bryan Wong, Ruhaan Das

Student Works

Changi Airport is set to expand with a new terminal, Terminal 5. Currently, many of the airport's processes are manual, requiring a high dependence on staff. This proposal aims to incorporate automation and AI for a smoother passenger experience.


Using Unmanned Aircraft Systems To Investigate The Detectability Of Burmese Pythons In South Florida, Joseph Cerreta Ph.D., William Austin Ed.D., David Thirtyacre Ph.D., Scott S. Burgess Ph.D., Peter Miller Jan 2023

Using Unmanned Aircraft Systems To Investigate The Detectability Of Burmese Pythons In South Florida, Joseph Cerreta Ph.D., William Austin Ed.D., David Thirtyacre Ph.D., Scott S. Burgess Ph.D., Peter Miller

Journal of Aviation/Aerospace Education & Research

Burmese pythons are an invasive, non-native species of snake to southern Florida and attempts at eradicating the snakes had yielded mixed results. The current rate of detection had been reported as 0.05%. The purpose of this research project was to determine if a UAS equipped with a near-infrared (NIR) camera could be used to detect pythons at a higher rate when compared to a RGB camera. The approach involved collecting 55 images from RGB and NIR cameras, over carcass pythons at flying heights of 3, 6, 9, 12, and 15 meters. A likelihood ratio consisting of a true positive rate …


Meteor Radar Vertical Wind Observation Biases And Mathematical Debiasing Strategies Including The 3dvar+Div Algorithm, Alan Z. Liu, Zishun Qiao, Gunter Stober, Alexander Kozlovsky, Ales Kuchar, Christoph Jacobi, Chris Meek, Diego Janches, Guiping Liu, Masaki Tsutsumi, Njål Gulbrandsen, Satonori Nozawa, Mark Lester, Evgenia Belova, Johan Kero, Nicholas Mitchell Oct 2022

Meteor Radar Vertical Wind Observation Biases And Mathematical Debiasing Strategies Including The 3dvar+Div Algorithm, Alan Z. Liu, Zishun Qiao, Gunter Stober, Alexander Kozlovsky, Ales Kuchar, Christoph Jacobi, Chris Meek, Diego Janches, Guiping Liu, Masaki Tsutsumi, Njål Gulbrandsen, Satonori Nozawa, Mark Lester, Evgenia Belova, Johan Kero, Nicholas Mitchell

Publications

Meteor radars have become widely used instruments to study atmospheric dynamics, particularly in the 70 to 110 km altitude region. These systems have been proven to provide reliable and continuous measurements of horizontal winds in the mesosphere and lower thermosphere. Recently, there have been many attempts to utilize specular and/or transverse scatter meteor measurements to estimate vertical winds and vertical wind variability. In this study we investigate potential biases in vertical wind estimation that are intrinsic to the meteor radar observation geometry and scattering mechanism, and we introduce a mathematical debiasing process to mitigate them. This process makes use of …


Public Acceptance Of Medical Screening Recommendations, Safety Risks, And Implied Liabilities Requirements For Space Flight Participation, Cory J. Trunkhill Oct 2022

Public Acceptance Of Medical Screening Recommendations, Safety Risks, And Implied Liabilities Requirements For Space Flight Participation, Cory J. Trunkhill

Doctoral Dissertations and Master's Theses

The space tourism industry is preparing to send space flight participants on orbital and suborbital flights. Space flight participants are not professional astronauts and are not subject to the rules and guidelines covering space flight crewmembers. This research addresses public acceptance of current Federal Aviation Administration guidance and regulations as designated for civil participation in human space flight.

The research utilized an ordinal linear regression analysis of survey data to explore the public acceptance of the current medical screening recommended guidance and the regulations for safety risk and implied liability for space flight participation. Independent variables constituted participant demographic representations …


Validated Question Bank For Assessing Pilot Knowledge Of Aviation Weather Appendix: Weather Product Interpretation Questions, Robert Thomas, Cassandra Dommingo, John Kleber, Jackie Mcsorely, Amber Cole, Thomas Guinn, Elizabeth Blickensderfer Aug 2022

Validated Question Bank For Assessing Pilot Knowledge Of Aviation Weather Appendix: Weather Product Interpretation Questions, Robert Thomas, Cassandra Dommingo, John Kleber, Jackie Mcsorely, Amber Cole, Thomas Guinn, Elizabeth Blickensderfer

General Aviation Weather Display Interpretation

This appendix supplements the Thomas et al. (2022) paper titled “Validated Question Bank for Assessing Pilot Knowledge of Aviation Weather ” which validates a set of weather product interpretation questions that can be used to measure a pilot’s understanding of weather. The assessment consists of 15 weather product interpretation topics which can be administered as a single 65-question survey or, as in the Thomas et al. (2022) study, two assessments of 33 and 32 questions each separated by topic. The set of 65 questions can be found in this appendix along with a table which demonstrates how to separate the …


Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle Jan 2022

Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle

Journal of Digital Forensics, Security and Law

An exploration of the technological behaviours of previously convicted child sexual exploitation material (CSEM) offenders provides a foundation for future applied research into deterrence, investigation, and treatment efforts. This study evaluates the technology choices and transitions of individuals previously convicted of CSEM offenses. Based on their inclusion in two sex offender registries, anonymous survey results (n=78) were collected from English-speaking adults within the United States. CSEM offenders chose technologies based on both utility and perceived risk; peer-to-peer and web-browsers were the most common gateway technologies and showed substantial sustained usage; a substantial minority of users never stored CSEM and only …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Applying Human Factors Heuristic Evaluation Tools To Improve Aviation Weather Displays: A Mismatch, John Kleber, Paige Lawton, Beth Blickensderfer May 2021

Applying Human Factors Heuristic Evaluation Tools To Improve Aviation Weather Displays: A Mismatch, John Kleber, Paige Lawton, Beth Blickensderfer

General Aviation Weather Display Interpretation

The evaluation of current Heuristic Evaluation Tools for use in assessing Aviation Weather Displays.


Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri May 2021

Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri

Publications

As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.


Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri Apr 2021

Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri

Publications

The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of …


Social Media User Relationship Framework (Smurf), Anne David, Sarah Morris, Gareth Appleby-Thomas Feb 2021

Social Media User Relationship Framework (Smurf), Anne David, Sarah Morris, Gareth Appleby-Thomas

Journal of Digital Forensics, Security and Law

The use of social media has spread through many aspects of society, allowing millions of individuals, corporate as well as government entities to leverage the opportunities it affords. These opportunities often end up being exploited by a small percentage of the user community who use it for objectionable or unlawful activities; for example, trolling, cyber bullying, grooming, luring. In some cases, these unlawful activities result in investigations where swift retrieval of critical evidence required in order to save a life.

This paper presents a proof of concept (PoC) framework for social media user attribution. The framework aims to provide digital …


Aviation Human-In-The-Loop Simulation: Best Practices For Subjective Performance Measurement, John Kleber, Beth Blickensderfer Jan 2021

Aviation Human-In-The-Loop Simulation: Best Practices For Subjective Performance Measurement, John Kleber, Beth Blickensderfer

Aviation Weather Training Research

Subjective performance measurements are a useful tool for researchers and instructors to evaluate tasks that are difficult to quantify with objective data pulled from a simulator or the physiological data of pilots. Subjective performance measurements are non-intrusive measures typically conducted by human raters. Some recommendations for utilizing subjective measures include reducing the workload of the human raters, concealing the aim of the experiment from participants, utilizing multiple raters to evaluate each participant, providing raters with proper training, developing error-resistant rater forms and, including both subjective and objective measures when possible.


Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh Jan 2021

Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh

Journal of Aviation/Aerospace Education & Research

Virtual reality (VR)-based flight simulator provides pilots the enhanced reality from the first-person view. Mixed reality (MR) technology generates effective 3D graphics. The users who wear the MR headset can walk around the 3D graphics to see all its 360 degrees of vertical and horizontal aspects maintaining the consciousness of real space. A VR flight simulator and an MR application were connected to create the capability of both first-person view and third-person view for a comprehensive pilot training system. This system provided users the capability to monitor the aircraft progress along the planned path from the third-person view as well …


Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara Oct 2020

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara

Journal of Digital Forensics, Security and Law

Following a series of high profile miscarriages of justice in the UK linked to questionable expert evidence, the post of the Forensic Science Regulator was created in 2008. The main objective of this role is to improve the standard of practitioner competences and forensic procedures. One of the key strategies deployed to achieve this is the push to incorporate a greater level of scientific conduct in the various fields of forensic practice. Currently there is no statutory requirement for practitioners to become accredited to continue working with the Criminal Justice System of England and Wales. However, the Forensic Science Regulator …


A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas Aug 2020

A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas

Journal of Digital Forensics, Security and Law

This paper proposes a two-stage model for identifying and contextualizing features from artefacts created as a result of social networking activity. This technique can be useful in digital investigations and is based on understanding and the deconstruction of the processes that take place prior to, during and after user activity; this includes corroborating artefacts. Digital Investigations are becoming more complex due to factors such as, the volume of data to be examined; different data formats; a wide range of sources for digital evidence; the volatility of data and the limitations of some of the standard digital forensic tools. This paper …


Wage-Productivity Analysis Of U.S. Domestic Airlines, Jesse Lucas, Khairul Azuar, Justin Tan, Syed Ilyas Jan 2020

Wage-Productivity Analysis Of U.S. Domestic Airlines, Jesse Lucas, Khairul Azuar, Justin Tan, Syed Ilyas

Introduction to Research Methods RSCH 202

This study examines the impact of wages on productivity by examining US domestic airlines.

Current literature places emphasis on jobs conducted in-flight, specifically pilots and cabin crew. This paper considers all job titles involved in the operations of the airline, including executives and management. Existing research focuses on factors such as governance, domestic economic level, and personal attributes such as intrinsic motivation, gender, and age. There is insufficient research regarding the relationship between wage and productivity. Thus, it is uncertain if high wage leads to high productivity. Preliminary findings suggest higher wage equates to higher productivity.