Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Embry-Riddle Aeronautical University

2011

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 67

Full-Text Articles in Social and Behavioral Sciences

The Effects Of Caffeine And Expectancy On Short Term Memory, Sara O'Brien Oct 2011

The Effects Of Caffeine And Expectancy On Short Term Memory, Sara O'Brien

Doctoral Dissertations and Master's Theses

Although caffeine is the most widely used drug in the world, research on the effects of caffeine on mental performance tasks (especially short term memory tasks) is inconclusive. One possible explanation for this limited understanding is the lack of studies accounting for participant expectancy surrounding caffeine. This study examined the effects of caffeine dosage (0mg, 200mg, and 400mg) and expectancy related to past caffeine use (positive, negative) on short term memory span task. A two-way Analysis of Variance showed that the two independent variables (caffeine dose and expectancy), did not significantly influence the short term memory span score. However, the …


The Effects Of Observers’ Expectations And The Probability Of A Change Occurring On Change Detection Performance, Robert A. Brown Oct 2011

The Effects Of Observers’ Expectations And The Probability Of A Change Occurring On Change Detection Performance, Robert A. Brown

Doctoral Dissertations and Master's Theses

The change probability effect is a term coined by Beck et al. (2004) and it suggests that changes that are expected or "probable" are detected more easily than changes that are unexpected or "improbable". This research study investigates the change probability effect and the differences between observers who are looking for changes and those who are unaware that changes may exist. The results suggest that observers who are not expecting a change to occur are more likely to detect an improbable change than a probable change. The findings from this study have real world applications and also have implications for …


Investigating Factors Associated With Burglary Crime Analysis Using Logistic Regression Modeling, Daniel Antolos Oct 2011

Investigating Factors Associated With Burglary Crime Analysis Using Logistic Regression Modeling, Daniel Antolos

Doctoral Dissertations and Master's Theses

This study conducted a logistic regression to determine the relationship of factors associated with burglary to determine the variables necessary to predict criminal activity. Predictors utilized in the study; included time of day, day of week, connectors, barriers, and repeat victimization. These predictors were all incorporated to develop a model that would best predict burglary activity as it relates from a determine epicenter of activity. The predictors selected have all be shown, through research to be significant, characteristics of activity as they relate to burglary but have not been incorporated together to develop a significant model. The model compared the …


Toward GemeinschaftsgefüHl: Exploring Subordinate And Manager Perceptions Of Trust And Perceptions Regarding Behavioral Change Potential, Bobby G. Martin Sep 2011

Toward GemeinschaftsgefüHl: Exploring Subordinate And Manager Perceptions Of Trust And Perceptions Regarding Behavioral Change Potential, Bobby G. Martin

Publications

In this qualitative, phenomenological study, Maslow‘s Eupsychian theory was used as the guiding framework for exploring the perceptions of trust and the behavioral change potential of subordinates (includes frontline supervisors) and managers (excludes frontline supervisors) within selected aviation maintenance organizations in Arizona. The problem addressed in the study was the growing concern that managers willfully mistreated subordinates, which led to decreased trust, motivation, and productivity. A combined representative sample of 10 maintenance technicians and frontline supervisors was purposively selected from the production lines of a large commercial aviation repair and overhaul station located in Arizona. An additional combined representative sample …


Staff Terminations In The Church: A Beastly Endeavor, James Shoopman Jul 2011

Staff Terminations In The Church: A Beastly Endeavor, James Shoopman

Publications

Excerpt from article: "I suspect I have felt a similar beast on the prowl in Christian congregations more often than any of us should have. Perhaps you too have seen abusive and overly authoritarian pastors dismissed. Predatory church members are sometimes openly "disfellowshiped" or privately "disinvited." However, even such measures on the part of a congregation may sometimes become the use and abuse of power. We do not always recognize the abuse of power when we see it."


The Effects Of System Reliability And Time Pressure On Unoccupied Aircraft Systems Operator Performance And Mental Workload, Rania Wageh Ghatas Jul 2011

The Effects Of System Reliability And Time Pressure On Unoccupied Aircraft Systems Operator Performance And Mental Workload, Rania Wageh Ghatas

Doctoral Dissertations and Master's Theses

Unoccupied Aircraft Systems (UAS) are in the midst of aviation`s next generation. UAS are being utilized at an increasing rate by military and security operations and are becoming widely popular in usage from search and rescue and weather research to homeland security and border patrol. The Federal Aviation Administration (FAA) is currently working to define acceptable UAS performance standards and procedures for routine access for their use in the National Airspace System (NAS). This study examined the effects of system reliability and time pressure on unoccupied aircraft systems operator performance and mental workload. Twenty-four undergraduate and graduate students, male and …


The Effects Of Eye Gaze Based Control On Operator Performance In Monitoring Multiple Displays, Allison Popola Jul 2011

The Effects Of Eye Gaze Based Control On Operator Performance In Monitoring Multiple Displays, Allison Popola

Doctoral Dissertations and Master's Theses

This study investigated the utility and efficacy of using eye tracking technology as a method for selecting control of a camera within a multiple display configuration. A task analysis with a Keystroke-Level-Model (KLM) was conducted to acquire an estimated time for switching between cameras. KLM estimates suggest that response times are faster using an eye tracker than manual control -indicating a time savings. To confirm these estimates, and test other hypotheses a 2 × 2 within-subjects factorial design was used to examine the effects of Control (Using an eye tracker, or manual) under different Task Loads (Low, High). Dependent variables …


Psychological Assessment: What Will The Future Bring?, Ibpp Editor Jun 2011

Psychological Assessment: What Will The Future Bring?, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the (de)valuation of psychological assessment from various perspectives.


The Distance Between Colors; Using Deltae* To Determine Which Colors Are Compatible, Rosandra N. Abeyta May 2011

The Distance Between Colors; Using Deltae* To Determine Which Colors Are Compatible, Rosandra N. Abeyta

Doctoral Dissertations and Master's Theses

The focus of this study was to identify colors that can be easily distinguished from one another by normal color vision and slightly deficient color vision observers, and then test those colors to determine the significance of color separation as an indicator of color discriminability for both types of participants. There were 14 color normal and 9 color deficient individuals whose level of color deficiency were determined using standard diagnostic tests. The colors were selected by avoiding co-linearity in the color confusion line graphs for deuteranopes, protanopes and tritanopes. The difference between each of the colors was then calculated. The …


Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld May 2011

Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to recover forensic artifacts from mobile devices is proving to be an ever-increasing challenge for investigators. Coupling this with the ubiquity of mobile devices and the increasing complexity and processing power they contain results in a reliance on them by suspects. In investigating Apple’s iOS devices -- namely the iPhone and iPad -- an investigator’s challenges are increased due to the closed nature of the platforms. What is left is an extremely powerful and complex mobile tool that is inexpensive, small, and can be used in suspect activities. Little is known about the internal data structures of the …


Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt May 2011

Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to the ubiquitous use of smartphones, these devices become an increasingly important source of digital evidence in forensic investigations. Thus, the recovery of digital traces from smartphones often plays an essential role for the examination and clarification of the facts in a case. Although some tools already exist regarding the examination of smartphone data, there is still a strong demand to develop further methods and tools for forensic extraction and analysis of data that is stored on smartphones. In this paper we describe specifications of smartphones running Android. We further introduce a newly developed tool – called ADEL – …


Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi May 2011

Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we present the current results and analysis of the survey “Cloud forensics and critical criteria for cloud forensic capability” carried out towards digital forensic experts and practitioners. This survey was created in order to gain a better understanding on some of the key questions of the new field - cloud forensics - before further research and development. We aim to understand concepts such as its definition, the most challenging issues, most valuable research directions, and the critical criteria for cloud forensic capability.

Keywords: Cloud Forensics, Cloud Computing, Digital Forensics, Survey, Cloud Forensic Capability


Kindle Forensics: Acquisition & Analysis, Peter Hannay May 2011

Kindle Forensics: Acquisition & Analysis, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

Keywords: forensics, digital forensics, kindle, mobile, embedded, ebook, ereader


Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis May 2011

Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis

Annual ADFSL Conference on Digital Forensics, Security and Law

The need to professionally and successfully conduct computer forensic investigations of incidents has never been greater. This has launched an increasing demand for a skilled computer security workforce (Locasto, et al., 2011). This paper examines the extent to which AACSB-accredited universities located in Virginia, Maryland and Washington, D.C. are working towards providing courses that will meet this demand. The authors conduct an online research of the information security courses and programs offered by the 27 AACSB-accredited business schools in the selected area.

The preliminary investigation revealed that eight of the 27 participating universities did not offer any courses in cybersecurity, …


Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston May 2011

Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston

Annual ADFSL Conference on Digital Forensics, Security and Law

Creating, building, managing a cost effective digital forensics lab including a team of qualified examiners can be a challenge for colleges [1] with multiple campuses in multiple towns, counties and states. Leaving such examination responsibilities to each of the campuses results in not only disparity in the results but more than likely excessive duplication of efforts as well as the potential for compromise of evidence. Centralizing the forensic efforts results in a team that is not subject to the political pressures of a campus and virtually eliminates the possibility of examiner favoritism. Learn what it takes to create a cost …


Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay May 2011

Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The authors were involved in extensive vulnerability assessment and penetration testing of over 15 large organisations across various industry sectors in the Perth CBD. The actual live testing involved a team of five people for approximately a four week period, and was black box testing. The scanning consisted of running network and web vulnerability tools, and in a few cases, exploiting vulnerability to establish validity of the tools. The tools were run in aggressive mode with no attempt made to deceive or avoid detection by IDS/IPS or firewalls. The aim of the testing was to determine firstly whether these organisations …


Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton May 2011

Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton

Annual ADFSL Conference on Digital Forensics, Security and Law

We present work on the design, implementation, distribution, and use of realistic forensic datasets to support digital forensics and security education. We describe in particular the “M57-Patents” scenario, a multi-modal corpus consisting of hard drive images, RAM images, network captures, and images from other devices typically found in forensics investigations such as USB drives and cellphones. Corpus creation has been performed as part of a scripted scenario; subsequently it is less “noisy” than real-world data but retains the complexity necessary to support a wide variety of forensic education activities. Realistic forensic corpora allow direct comparison of approaches and tools across …


Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker May 2011

Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker

Annual ADFSL Conference on Digital Forensics, Security and Law

Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as …


Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara May 2011

Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara

Annual ADFSL Conference on Digital Forensics, Security and Law

If information leakage occurs, an investigator is instructed to specify what documents were leaked and who leaked them. In the present work, a distributed print-out monitoring system—which consists of a virtual printer driver and print-out policy/log management servers—was developed. For easily matching the discovered (i.e., leaked) paper document with the print-out log, the virtual printer driver acquires full-text of printed-out documents by DDI hooking technique to check the content, transforms a spool file to a picture file and creates both a thumbnail and text log for forensic investigation afterwards. The log size is as only about 0.04 times bigger than …


Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman May 2011

Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman

Annual ADFSL Conference on Digital Forensics, Security and Law

OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an investigator discovers in an OS X environment has the potential for use in discovering other such passwords, and any discovered passwords may also be useful in other aspects of an investigation, not directly related to the OS X environment. This research advises the use of multiple attack vectors in approaching the password problem in an OS X system, including the more generally applicable non-OS X-specific techniques such as social engineering or well-known password cracking techniques …


Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo May 2011

Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo

Annual ADFSL Conference on Digital Forensics, Security and Law

Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so …


Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman May 2011

Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman

Annual ADFSL Conference on Digital Forensics, Security and Law

The inevitable vulnerabilities and criminal targeting of cloud environments demand an understanding of how digital forensic investigations of the cloud can be accomplished. We present two hypothetical case studies of cloud crimes; child pornography being hosted in the cloud, and a compromised cloudbased website. Our cases highlight shortcomings of current forensic practices and laws. We describe significant challenges with cloud forensics, including forensic acquisition, evidence preservation and chain of custody, and open problems for continued research.

Keywords: Cloud computing, cloud forensics, digital forensics, case studies


A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey May 2011

A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Given the ubiquitous nature of computing, individuals now have nearly 24-7 access to the internet. People are not just going online through traditional means with a PC anymore, they are now frequently using nontraditional devices such as cell phones, smart phones, and gaming consoles. Given the increased use of gaming consoles for online access, there is also an increased use of gaming consoles to commit criminal activity. The digital forensic community has been tasked with creating new approaches for forensically analyzing gaming consoles. In this research paper the authors demonstrate different tools, both commercial and open source, available to forensically …


Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma May 2011

Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

With the huge volumes of electronic data subject to discovery in virtually every instance of litigation, time and costs of conducting discovery have become exceedingly important when litigants plan their discovery strategies. Rather than incurring the costs of having lawyers review every document produced in response to a discovery request in search of relevant evidence, a cost effective strategy for document review planning is to use statistical sampling of the database of documents to determine the likelihood of finding relevant evidence by reviewing additional documents. This paper reviews and discusses how sampling can be used to make document review more …


Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier May 2011

Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier

Annual ADFSL Conference on Digital Forensics, Security and Law

As computers and digital devices become more entrenched in our way of life, they become tools for both good and nefarious purposes. When the digital world collides with the legal world, a vast chasm is created. This paper will reflect how the legal community is failing to meet its obligation to provide adequate representation due to a lack of education about digital (computer) forensics. Whether in a civil litigation setting or a criminal setting, attorneys, prosecutors and judges have inadequate knowledge when it comes to the important questions they need to ask regarding digital evidence. Reliance on expert witnesses is …


Optimizing High Volume Traffic Surges Using Discrete Event Simulation, Claire L. Johnson May 2011

Optimizing High Volume Traffic Surges Using Discrete Event Simulation, Claire L. Johnson

Doctoral Dissertations and Master's Theses

The purpose of this applied research study is to determine the fidelity of a discrete event simulation tool called the Evacuation Simulation Prediction Tool (ESP) in predicting transit times during a high volume surge in traffic flow. The ESP tool was developed for the purpose of predicting and optimizing large-scale evacuations of counties or regions as an aide in emergency and disaster preparedness planning. The goal of the ESP model is to ascertain the balance of traffic flow capacity by managing the human factor events that impinge upon orderly highway travel without immobilizing the travel route. The objective of this …


Addressing Water Quality Issues In Rural Cameroon With Household Biosand Filters, Laine Klopfensten, Laura Petrasky, Valerie Winton, Jeff Brown Apr 2011

Addressing Water Quality Issues In Rural Cameroon With Household Biosand Filters, Laine Klopfensten, Laura Petrasky, Valerie Winton, Jeff Brown

Publications

This paper describes an ongoing collaboration between the Hope College student chapter of Engineers Without Borders – USA and the rural community of Nkuv in the Northwest Province of Cameroon related to improving drinking water quality using Manz biosand filters. The collaboration began in 2006 and focused on developing a community-based construction and distribution model for household water treatment units. Results from microbiology testing of the constructed filters indicate that this water treatment method is effective for improving water quality in rural areas. The results also highlight the need for ongoing assessment and adapting community education programs to provide necessary …


Effects Of Interpreter Use On Rapport And Humint Collection, James E. Driskell Iii Apr 2011

Effects Of Interpreter Use On Rapport And Humint Collection, James E. Driskell Iii

Doctoral Dissertations and Master's Theses

The aim of this research was to examine how the introduction of a third party impacts interviewee rapport in an investigative setting. Prior to this research it has been speculated that a "third person in the communications loop" during an investigative interview may negatively impact critical components of the collection process, including the establishment of rapport. There are several advantages to the approach offered. First, it addresses the current concern of how the use of interpreters affects the quality, quantity, and nature of information collected from human sources. Second, it examines the construct of rapport, a core aspect of the …


Taking It Off In The Mideast, Ibpp Editor Feb 2011

Taking It Off In The Mideast, Ibpp Editor

International Bulletin of Political Psychology

The author explores the concept of democracy and the impact of financial, moral, and sexual corruption in the Middle East.


The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor Jan 2011

The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the relevance of blame in the context of terrorism.