Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

2012

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 88

Full-Text Articles in Social and Behavioral Sciences

Histological Changes In The Target Organs Of Channa Punctatus After Exposure To Anthraquinone Vat Dyes, Rajee Olaganathan, Jamila Patterson Dec 2012

Histological Changes In The Target Organs Of Channa Punctatus After Exposure To Anthraquinone Vat Dyes, Rajee Olaganathan, Jamila Patterson

Publications

The present study is an attempt on histopathology of gill, liver, kidney and intestine of Channa punctatus after exposure to sublethal concentrations of anthraquinone vat dyes viz., vat blue 4 and vat green 1. The dyes has been found to produce several damages in the vital organs of C. punctatus leading to various lesions like extensive lamellar hypertrophy with some proliferation at the base of secondary lamellae and hyperplasia of intercellular epithelial cells in the gill; fat accumulation, hepatic necrosis, aggregation of polymorphonuclear leucocytes, hepatocellular degeneration and aggregation of hepatocytes in liver; while in kidney it caused hyperplastic of the …


The Effects Of Feedback Delivery Mechanisms On Employee Engagement Participation, Augusto Espinosa Oct 2012

The Effects Of Feedback Delivery Mechanisms On Employee Engagement Participation, Augusto Espinosa

Doctoral Dissertations and Master's Theses

The effects of different feedback mechanisms on safety engagement were examined in an industrial manufacturing setting with twenty employees. During a 30-day period, participants who received feedback showed a significant increase in safety engagement participation when compared to a five-month baseline period of no feedback. There was no significant difference in safety engagement participation between employees who received verbal feedback versus those who received written feedback. Furthermore, survey responses indicated that feedback improved employee attitudes toward the plant's safety program. Together, these findings suggest that feedback systems can be used to effectively improve industrial safety programs.


The Knowledge Base As An Extension Of Distance Learning Reference Service, Anne Marie Casey Sep 2012

The Knowledge Base As An Extension Of Distance Learning Reference Service, Anne Marie Casey

Staff Works - Hunt Library

This study explores knowledge bases as extension of reference services for distance learners. Through a survey and follow-up interviews with distance learning librarians, this paper discusses their interest in creating and maintaining a knowledge base as a resource for reference services to distance learners. It also investigates their perceptions about the feasibility and practicality of a reference knowledge base. Primary findings indicate that the majority of participants view a knowledge base as an extension of distance learning reference services positively but see issues related to workload and quality control, in particular, which might hinder the development and maintenance of this …


Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay Aug 2012

Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay

Applied Aviation Sciences - Daytona Beach

This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …


Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay Aug 2012

Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay

Security Studies & International Affairs - Daytona Beach

This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …


Effects Of Oxygen Deprivation On Pilot Performance And Cognitive Processing Skills: A Pilot Study, David Francis Shideler Aug 2012

Effects Of Oxygen Deprivation On Pilot Performance And Cognitive Processing Skills: A Pilot Study, David Francis Shideler

Doctoral Dissertations and Master's Theses

According to Federal Aviation Administration (FAA) regulations, pilots flying above 14,000 ft. are required to use supplemental oxygen. The purpose of this study was to examine how oxygen deprivation below 14,000 ft. affects pilot performance using the Frasca Mentor Advanced Aviation Training Device (AATD), and cognitive processing skills using the Automated Neuropsychological Assessment Metrics (ANAM(TM)) cognitive test. The study was conducted in a Normobaric High Altitude Laboratory at simulated altitudes of 5,000 ft. and 14,000 ft. In this pilot study, only five participants were tested; non-significant results of the analysis were anticipated; however, as oxygen levels decreased and time of …


Florida Energy Assurance Plan, Niescja E. Turner, William Murtagh, Kevin Guthrie, Katariina Nykyri, William A. Radasky, Eric Senkowicz Aug 2012

Florida Energy Assurance Plan, Niescja E. Turner, William Murtagh, Kevin Guthrie, Katariina Nykyri, William A. Radasky, Eric Senkowicz

Publications

This spring, Florida held the nation’s first statewide emergency preparedness training and exercises geared specifically to the aftermath of severe geomagnetic events. Funded by the State of Florida Division of Emergency Management (FDEM) via a Department of Energy grant and held in collaboration with Watch House International, Inquesta Corporation, and the Florida Institute of Technology, the 17–19 April 2012 workshop had 99 on-site attendees in an oceanfront hotel in Melbourne, Florida, as well as 16 over live Web streaming. The workshop was the capstone to a three-month season of 21 regional space weather training sessions and workshops serving 386 attendees …


Product Review: Mendeley Or Zotero: Which Should The Mobile Researcher Use?, Laura Pope Robbins Jul 2012

Product Review: Mendeley Or Zotero: Which Should The Mobile Researcher Use?, Laura Pope Robbins

Publications

Laura Pope Robbins is an advisor for The Charleston Advisor, and the comparative review below is included in Scholarly Commons with the permission of the publisher.

Today’s bibliographic managers provide cloud storage so that papers can be attached to citations and syncing services, in order for papers and citations to be available in multiple mediums. Mendeley and Zotero are two services that offer online storage of papers and citations, desktop applications, and tablet integration. Mendeley has an iPad application and an open API so that developers can create apps for Android tablets. Zotero is an open-source project that encourages developers …


Do "Suicide Bombers" Really Commit Suicide?, Ibpp Editor Jul 2012

Do "Suicide Bombers" Really Commit Suicide?, Ibpp Editor

International Bulletin of Political Psychology

By Israel Oron (Ostre), Ph.D., Psychologist, National Program for Suicide Prevention, Ministry of Health, Israel, and The Department for Psychology, Health and Ethics/ University of Haifa, Israel.

[Dr. Oron (Ostre) was formerly Psychologist, Behavior Section/The Department of Criminal Investigations & Intelligence, Israel Police HQ].

This article applies a psychological approach to explore and to explain the behavior of Palestinian terrorists who blow themselves up in the light of their own words. It is shown that terrorists have no suicidal intent; hence, their behavior is not an act of suicide. Psychological analysis point to a behavioral reaction to stress situations that …


Abstinence Mission At Odds With Evidence: Sticky Shame And Forbidden Pleasures, Lynn Koller Jul 2012

Abstinence Mission At Odds With Evidence: Sticky Shame And Forbidden Pleasures, Lynn Koller

Humanities & Communication - Daytona Beach

Abstinence-only-until-marriage (AOUM) programs made prevalent over the last decade remain widespread in U.S. public schools, despite failure to demonstrate effectiveness at reducing the onset of teenage sexual activity or decreasing unplanned pregnancies or the transmission of sexually transmitted infections (STIs) (Kirby, 2007; Trenholm, et al., 2007). These programs remain popular in the face of The Personal Responsibility and Education Program (PREP) (2010), which created a funding stream for medically-accurate sexuality education programs that have demonstrated evidence of success at meeting program goals. Long-standing objections about the efficacy and ethics of AOUM programs are valid and compelling; however opponents often fail …


Exploration Of Sensemaking In The Education Of Novices To The Complex Cognitive Work Domain Of Air Traffic Control, Travis J. Wiltshire Jul 2012

Exploration Of Sensemaking In The Education Of Novices To The Complex Cognitive Work Domain Of Air Traffic Control, Travis J. Wiltshire

Doctoral Dissertations and Master's Theses

Many current complex business and industry jobs consist primarily of cognitive work; however, current approaches to training may be inadequate for this type of work (Hoffman, Feltovich, Fiore, Klein, & Ziebell, 2009). To try and improve training and education for cognitive work, Klein and Baxter (2006) have proposed cognitive transformation theory (CTT), a learning theory that claims that sensemaking activities are essential for acquiring expertise that is adaptive and thus well suited for cognitive work domains. In the present research, cognitive task analysis methods were used to identify and assess sensemaking support in the instruction and learning of complex concepts …


The Effects Of Familiarity And Persuasion On Risk Assessment, Casey L. Smith Jul 2012

The Effects Of Familiarity And Persuasion On Risk Assessment, Casey L. Smith

Doctoral Dissertations and Master's Theses

Cognitive biases influence decisions and the analyses of risk. They are often derived from two separate processes: bias based on familiarity (familiarity bias) and bias as the result of influences from outside sources (persuasion bias). Research suggests that familiarity-based bias may lead to acceptance of an activity's drawbacks and a leniency of its risks.

In addition, research has tried to measure and analyze different types of biases individually, but few have compared the interactions of more than one bias at once. Because different biases may derive from different mental phenomena it is important to tease out the distinctions, and observe …


The Effects Of Expertise And Information Location On Change Blindness Detection Within An Aviation Domain, Dinorah Zárate Jul 2012

The Effects Of Expertise And Information Location On Change Blindness Detection Within An Aviation Domain, Dinorah Zárate

Doctoral Dissertations and Master's Theses

Change blindness is a phenomenon where the viewer fails to detect change in an object or scene during a visual disturbance. During a flight, a pilot samples multiple displays for information about the task at hand. It is imperative that the changes in the displays are being correctly viewed by pilots to ensure a safe flight. However, it is unknown how much change blindness affects pilots or if pilot expertise plays a role in change detection.

A change blindness experiment was performed with twenty four participants divided into two groups based on expertise. Expert pilots were defined as instructor pilots …


The Effect Of Control And Display Lag On Uas Internal Pilot Manual Landing Performance, Marshall Everett Lloyd Jul 2012

The Effect Of Control And Display Lag On Uas Internal Pilot Manual Landing Performance, Marshall Everett Lloyd

Doctoral Dissertations and Master's Theses

An important characteristic of UASs is lag because it can become a considerable challenge to successful human-in-the-loop control. As such, UASs are designed and configured to minimize system lag, though this can increase acquisition and operation costs considerably. In an effort to cut costs, an organization may choose to accept greater risk and deploy a UAS with high system lag. Before this risk can be responsibly accepted, it must be quantified.

While many studies have examined system lag, very few have been able to quantify the risk that various levels of lag pose to an internally piloted, manually landed UAS. …


Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen Jun 2012

Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen

Journal of Digital Forensics, Security and Law

This paper presents an algorithm for comparing large numbers of traces to each other and identifying and presenting groups of traces with similar features. It is applied to forensic analysis in which groups of similar traces are automatically identified and presented so that attribution and other related claims may be asserted, and independently confirmed or refuted. The approach of this paper is to identify an approximate algorithm that will find a large subset of greatest common factor similar groups of arbitrary factors in far less time and space than an exact algorithm using examiner-provided selection criteria for factor definition.


Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky May 2012

Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky

Annual ADFSL Conference on Digital Forensics, Security and Law

An examination of State of Connecticut v. Julie Amero provides insight into how a general lack of understanding of digital evidence can cause an innocent defendant to be wrongfully convicted. By contrast, the 101-page opinion in Lorraine v. Markel American Insurance Co. provides legal precedence and a detailed consideration for the admission of digital evidence. An analysis of both cases leads the authors to recommend additions to Law School curricula designed to raise the awareness of the legal community to ensure such travesties of justice, as in the Amero case, don’t occur in the future. Work underway at the University …


After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma May 2012

After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …


A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington May 2012

A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington

Annual ADFSL Conference on Digital Forensics, Security and Law

Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …


Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick May 2012

Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick

Annual ADFSL Conference on Digital Forensics, Security and Law

This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.

Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.


Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow May 2012

Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …


Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili May 2012

Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …


Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow May 2012

Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …


A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier May 2012

A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …


The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey May 2012

The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser May 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Annual ADFSL Conference on Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …


Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape May 2012

Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape

Annual ADFSL Conference on Digital Forensics, Security and Law

The detection of hidden messages in JPEG images is a growing concern. Current detection of JPEG stego images must include detection of double compression: a JPEG image is double compressed if it has been compressed with one quality factor, uncompressed, and then re-compressed with a different quality factor. When detection of double compression is not included, erroneous detection rates are very high. The main contribution of this paper is to present an efficient double-compression detection algorithm that has relatively lower dimensionality of features and relatively lower computational time for the detection part, than current comparative classifiers. We use a model-based …


A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad May 2012

A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phenomenon of blunders needs to be studied systematically from its very genetic origins to their surface realizations in contrast to bugs and flaws, especially in view of their importance in software copyright infringement …


Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen May 2012

Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions are made explicit, suggesting that, while there is a scientific agreement around some of the basic notions identified, the use of a common language is lacking.

Keywords: Digital forensics examination, terminology, scientific methodology, testability, validation, classification, scientific consensus


Communicating Effectively In Rapidly Changing Times, Anne Marie Casey May 2012

Communicating Effectively In Rapidly Changing Times, Anne Marie Casey

Staff Works - Hunt Library

This presentation explores communication in academic libraries that experienced rapid changes during the Great Recession and its aftermath. The investigator conducted a multi-case study, in which she interviewed library and university participants in three U.S. academic libraries in 2010. Results show that communication existed for the most part in the three libraries, all of which were maintaining strategic priorities while experiencing dramatic changes.


State Based Determinants Of Inward Fdi Flow In The Us Economy, Lucyna Kornecki, E. M. Ekanayake May 2012

State Based Determinants Of Inward Fdi Flow In The Us Economy, Lucyna Kornecki, E. M. Ekanayake

Accounting, Economics, Finance, and Information Sciences - Daytona Beach

Inward foreign direct investment (FDI) represents an integral part of the US economy. The flow of international capital has been a key factor expanding economy. The inward US FDI constitutes important factor contributing to output growth in the US economy. This paper investigates factors affecting the inward FDI flow among fifty states of the United States. The analysis uses annual data for the period from 1997 to 2007. The study identifies several state-specific determinants of FDI and investigates the changes in their importance during the study period. Our results show that among the major determinants, the real per capita income, …