Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

2015

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 97

Full-Text Articles in Social and Behavioral Sciences

Blurring The Lines: The Overlapping Interests Of High Altitude Unmanned Aircraft, Commercial Space, And Aviation Policy, Ruth E. Stilwell Nov 2015

Blurring The Lines: The Overlapping Interests Of High Altitude Unmanned Aircraft, Commercial Space, And Aviation Policy, Ruth E. Stilwell

Space Traffic Management Conference

The commercialization of space operations, coupled with the rapid development in unmanned aircraft systems creates a new policy dynamic between otherwise disparate industries. Existing structures do not adequately address issues of access, governance, and sovereignty across the distinct domains of air transport, space operations, and high altitude unmanned aircraft operations. Globally, aviation policy and space policy have evolved independently as distinct fields. High altitude unmanned aircraft are rapidly increasing utilization of airspace not previously occupied by civil aircraft or spacecraft, where regulation of both safety and access is sparse. Rather than consider operations in this airspace as a third category …


Framing The Mh17 Disaster – More Heat Than Light?, Simon A. Bennett Oct 2015

Framing The Mh17 Disaster – More Heat Than Light?, Simon A. Bennett

International Journal of Aviation, Aeronautics, and Aerospace

Despite the reductionist analyses produced by politicians and the Fourth Estate, the loss of Malaysia Airlines Flight MH17 was a systems accident – a product of the interactions between the actants that compose the commercial aviation system network-space. As an antidote to reductionism’s ‘fundamental attribution error’, this paper presents a systems-thinking-informed analysis of the MH17 disaster. To this end it draws on Actor-Network Theory and the work of Reason, Toft, Dekker, Hollnagel and other systems-thinking advocates. Whether intentional or not, politicians’ reductionist analyses generated political capital. European Union and American finger-pointing distracted from aviation authorities’ and airlines’ ill-advised routing policies. …


Studying Human Relatedness Through A Shared Gaming Experience, Christina Frederick, Rachel Cunningham, Leo Alex, Christopher Via Oct 2015

Studying Human Relatedness Through A Shared Gaming Experience, Christina Frederick, Rachel Cunningham, Leo Alex, Christopher Via

Publications

The importance of relatedness in collocated multiplayer video games should not be underestimated. Interpersonal relationships which develop from social interactions that occur during gameplay contribute to player motivation and meaningful and memorable experiences for the players. In this study we examined how interpersonal touch within a gameplay experience impacted player motivation and inter-player impressions. Dyads played one of two iPad-based games in three different conditions, one of which required physical contact between the players. Results indicated those in the touch-based conditions scored higher on several measures of intrinsic motivation and impressions of their teammate.


Cross-Sectional Assessment Of Safety Culture Perceptions And Safety Behavior In Collegiate Aviation Programs In The United States, Daniel Kwasi Adjekum, Julius Keller, Micah Walala, John P. Young, Cody Christensen, Randal J. Demik, Gary J. Northam Ph.D. Sep 2015

Cross-Sectional Assessment Of Safety Culture Perceptions And Safety Behavior In Collegiate Aviation Programs In The United States, Daniel Kwasi Adjekum, Julius Keller, Micah Walala, John P. Young, Cody Christensen, Randal J. Demik, Gary J. Northam Ph.D.

International Journal of Aviation, Aeronautics, and Aerospace

A cross-sectional quasi- mixed-method approach was used to determine the relationships between safety culture perceptions and safety reporting behavior among flight students with and without certified flight instructor (CFI) ratings. Respondents (n=259) were recruited from five collegiate aviation programs in the US and took part in the study. Survey Items adopted from the Collegiate Aviation Perception of Safety Culture Assessment Survey (CAPSCAS) were validated using factor analysis analyzed for reliability before use in the study. Researchers sought to find out if the safety reporting behavior (reporting frequency) of respondents could be predicted from their safety culture perceptions. Pearson’s …


Impact Of Declining Proposal Success Rates On Scientific Productivity, Ted Von Hippel, Priscilla Cushman, Todd Hoeksema, Chryssa Kouveliotou, James Lowenthal, Bradley Peterson, Keivan G. Stassun, Sep 2015

Impact Of Declining Proposal Success Rates On Scientific Productivity, Ted Von Hippel, Priscilla Cushman, Todd Hoeksema, Chryssa Kouveliotou, James Lowenthal, Bradley Peterson, Keivan G. Stassun,

Publications

Over the last decade proposal success rates in the fundamental sciences have dropped significantly. Astronomy and related fields funded by NASA and NSF are no exception. Data across agencies show that this is not principally the result of a decline in proposal merit (the proportion of proposals receiving high rankings is largely unchanged), nor of a shift in proposer demographics (seniority, gender, and institutional affiliation have all remained unchanged), nor of an increase (beyond inflation) in the average requested funding per proposal, nor of an increase in the number of proposals per investigator in any one year. Rather, the statistics …


Making The Case For Lending Assessment: Or, Why Do They Keep Putting My Symbol In Their Lending String?, Elizabeth Sterthaus Sep 2015

Making The Case For Lending Assessment: Or, Why Do They Keep Putting My Symbol In Their Lending String?, Elizabeth Sterthaus

Publications

Why do libraries choose one library over another to send interlibrary loan requests to? The answer to one survey is freely available here.


Evolving Homeland And Civil Security Mission Space And Research A Cross-Disciplinary And Global Challenge, Alexander Siedschlag Sep 2015

Evolving Homeland And Civil Security Mission Space And Research A Cross-Disciplinary And Global Challenge, Alexander Siedschlag

Publications

Homeland security has evolved from a governmental function to a networked community with shared responsibility for addressing all-hazards challenges to globalized societies, moving from an ‘Americanized’ term to a generic concept. It aims at ensuring civil security – a broader effort not geographically, culturally, or functionally bound. The paradigm of civil security research provides an insightful framework for research and teaching in homeland security as part of a global and holistic effort, calling for a cross-disciplinary perspective.


Shifts In Practice Based On Rapid Re-Housing For Rural Homelessness: An Exploratory Study Of Micropolitan Homeless Service Provision, Margaret F. Sloan, Daisha M. Merritt Ph.D., Karen A. Ford Sep 2015

Shifts In Practice Based On Rapid Re-Housing For Rural Homelessness: An Exploratory Study Of Micropolitan Homeless Service Provision, Margaret F. Sloan, Daisha M. Merritt Ph.D., Karen A. Ford

Publications

Based on interviews with rural homeless service providers, the authors examine in this practice note how policy has created shifts in practice for organizations serving homeless populations. Homeless individuals find a decreasing opportunity for assistance while awaiting Rapid Re-Housing. Some organizations, dependent on Rapid Re-Housing monies, are facing a lack of funding to pay for general homeless care provision. Organizations are creating care networks to address requirements of the new policy in addition to pooling resources in underserved areas.


Economic Interrelationships And Impacts Of The Aviation/Aerospace Industry In The State Of Florida Using Input-Output Analysis, Kelly A. Whealan-George, Tim Brady, Ian Mcandrew, Irwin Price, Robert T. Clair Aug 2015

Economic Interrelationships And Impacts Of The Aviation/Aerospace Industry In The State Of Florida Using Input-Output Analysis, Kelly A. Whealan-George, Tim Brady, Ian Mcandrew, Irwin Price, Robert T. Clair

International Journal of Aviation, Aeronautics, and Aerospace

The study provided a detailed description of the interrelatedness of the aviation and aerospace industry with principal industries in Florida and Volusia County (VC) using Input-Output (IO) analysis. The economic impact measures included not only direct economic output and industry employment descriptions but also described the multiplier effects in the form of indirect and induced impacts using data for 2012.

This research concluded the average labor income of the aviation and aerospace industry was higher than average labor income in Florida and VC. A substantive difference between the Florida and VC average labor income for the aviation and aerospace industry …


An Analysis Of Airline Quality Rating Components Using Bayesian Methods, John H. Mott, Branden K. Avery Aug 2015

An Analysis Of Airline Quality Rating Components Using Bayesian Methods, John H. Mott, Branden K. Avery

International Journal of Aviation, Aeronautics, and Aerospace

The Airline Quality Rating, a unique metric that is of interval scale and is comparable across carriers and time periods, is a quantitative evaluation of the quality of U.S. domestic air carriers based on data that is collected and published by the U.S. Bureau of Transportation Statistics. One may gain insight into the relationship of the AQR metric to the carriers to which it is applied by grouping those carriers and examining the effects of the resulting groupings on the four individual factors that comprise the AQR. This study used Bayesian hierarchical modeling techniques to examine the differences between three …


Cultural Dimensions: A Comparative Analysis Of Aviation Students In China And The U.S., Julius Keller, Yu Wang, Jacqueline Cooney, Anthony Erstad, Chientsung Lu Aug 2015

Cultural Dimensions: A Comparative Analysis Of Aviation Students In China And The U.S., Julius Keller, Yu Wang, Jacqueline Cooney, Anthony Erstad, Chientsung Lu

International Journal of Aviation, Aeronautics, and Aerospace

Research has shown cultural dimensions can provide insight into effective management within diverse work and school environments. (Sandal & Manzey, 2009). In this study, researchers distributed a research questionnaire based on Hofstede’s original four cultural dimensions: power distance, masculinity vs femininity, uncertainty avoidance and individualism vs collectivism. Participants were recruited from two collegiate aviation programs, one in China and the other in the United States.

Independent t-tests were used to compare mean cultural dimensions scores for the groups. Study findings suggested significant differences between the two groups for the cultural dimensions: power distance, masculinity vs femininity and individualism vs …


Examining How Breakdowns In Pilot Monitoring Of The Aircraft Flight Path, Robert Sumwalt, David Cross, Dennis Lessard Aug 2015

Examining How Breakdowns In Pilot Monitoring Of The Aircraft Flight Path, Robert Sumwalt, David Cross, Dennis Lessard

International Journal of Aviation, Aeronautics, and Aerospace

Aircraft accident and incident data reveal that serious safety consequences can arise when flight crewmembers fail to properly monitor the aircraft flight path. This research study reviewed human factors literature to better understand why pilots fail to properly monitor, and analyzed accident and incident data. Recommendations for improving monitoring performance were formulated, which may be useful to air carriers in implementing a new Federal Aviation Administration requirement that calls for specific training in monitoring.


How Do Depression Medications Taken By Pilots Affect Passengers' Willingness To Fly? A Mediation Analysis, Stephen Rice, Scott R. Winter, Keegan Kraemer, Rian Mehta, Korhan Oyman Jul 2015

How Do Depression Medications Taken By Pilots Affect Passengers' Willingness To Fly? A Mediation Analysis, Stephen Rice, Scott R. Winter, Keegan Kraemer, Rian Mehta, Korhan Oyman

Publications

The mental health of airline pilots has been a concern for decades. In 2010, the United States Federal Aviation Administration began allowing four types of selective serotonin reuptake inhibitors (SSRIs) to be used by pilots suffering from depression. After a procedural wait period, pilots may be awarded a special issuance of their medical certificates to maintain flight currency. Missing from the literature was any research on consumer’s perceptions of pilots taking antidepressants, along with some other approved medications. Therefore, the purpose of the current study was to examine consumer’s willingness to fly once told that the pilot of their hypothetical …


Test-Retest Reliability Of The Sway Balance Mobile Application, Ryan Z. Amick, Alex Chaparro, Jeremy A. Patterson, Michael J. Jorgensen Jul 2015

Test-Retest Reliability Of The Sway Balance Mobile Application, Ryan Z. Amick, Alex Chaparro, Jeremy A. Patterson, Michael J. Jorgensen

Publications

The SWAY Balance Mobile Application is an FDA-cleared balance testing system which uses the built-in tri-axial accelerometers of a mobile electronic device to objectively assess postural movement. The system was designed to provide a means of quantitative balance assessment in clinical and on-field environments. The purpose of this study was to determine the intrasession and intersession reliability, as well as the minimum difference to be considered real, of the SWAY Balance Mobile Application.


Effect Of Weather Delays On Shareholder Value: Evidence From The Airline Industry, Jayendra Gokhale, Sunder Raghavan Jun 2015

Effect Of Weather Delays On Shareholder Value: Evidence From The Airline Industry, Jayendra Gokhale, Sunder Raghavan

Publications

Airlines measure service quality based on different factors such as on-time performance, delays and cancellations, mishandled baggage and denied boardings. Among the above factors, recent studies show that long delays and cancellations have a major impact on airlines bottom line not only in terms of current costs but also in terms of loss of future revenue. Finance literature tells us that stock prices reflect the present value of future cash flows. In this paper we use event study methodology to examine how weather delay and cancellations affect current stock market returns for our sample airlines. We find some evidence that …


Researching Mbti Personality Types: Project Management Master’S Degree Students, Thomas G. Henkel, James W. Marion Jr, Debra T. Bourdeau Jun 2015

Researching Mbti Personality Types: Project Management Master’S Degree Students, Thomas G. Henkel, James W. Marion Jr, Debra T. Bourdeau

Publications

The purpose of this research study was twofold: 1) to explore if a university’s Master of Science in Project Management students’ MBTI® personalities differ significantly; 2) to gain a better understanding if the MBTI® personality traits of university students enrolled in a project management degree differ significantly from those MBTI® personalities of the general population. The goodness of fit test was used in order to test the hypotheses that the 177 graduate project management students (observed data) have the same MBTI® distribution as in the general population (expected data). Overall, the present study showed that the student population has 27.18% …


Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner May 2015

Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

The 2014 Digital Forensics Research Experience for Undergraduates (REU) Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on tracking criminal forums and Facebook groups. The UAB-REU Facebook team was provided with a list of about 60 known criminal groups on Facebook, with a goal to track illegal information posted in these groups and ultimately store the information in a searchable database for use by digital forensic analysts. Over the course of about eight weeks, the UAB-REU Facebook team created a database with over 400 Facebook groups conducting criminal activity along with over 100,000 unique users …


Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba May 2015

Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes an approach that UMUC has initiated to revise its graduate programs to a Competency-Based Education (CBE) curriculum. The approach, which is Learning Demonstration (LD) centric, includes the identification of learning goals and competences, identification and description of the LDs, mapping of the LDs to the competences, scripting the LDs, placing the LDs into the respective courses, validating the developed materials, and the development of the open learning resources. Programs in the Cybersecurity and Information Assurance Department, including the Digital Forensics and Cyber Investigations program, are being revised. An LD centric approach to curriculum development helps align programs …


Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner May 2015

Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

Phishing websites, phish, attempt to deceive users into exposing their passwords, user IDs, and other sensitive information by imitating legitimate websites, such as banks, product vendors, and service providers. Phishing investigators need fast automated tools to analyze the volume of phishing attacks seen today. In this paper, we present the Simple Set Comparison tool. The Simple Set Comparison tool is a fast automated tool that groups phish by imitated brand allowing phishing investigators to quickly identify and focus on phish targeting a particular brand. The Simple Set Comparison tool is evaluated against a traditional clustering algorithm over a month's worth …


Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros May 2015

Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros

Annual ADFSL Conference on Digital Forensics, Security and Law

Malicious insiders account for large proportion of security breaches or other kinds of loss for organizations and have drawn attention of both academics and practitioners. Although methods and mechanism have been developed to monitor potential insider via electronic data monitoring, few studies focus on predicting potential malicious insiders. Based on the theory of planned behavior, certain cues should be observed or expressed when an individual performs as a malicious insider. Using text mining to analyze various media content of existing insider cases, we strive to develop a method to identify crucial and common indicators that an individual might be a …


Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen May 2015

Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

We present a new framework (and its mechanisms) of a Continuous Monitoring System (CMS) having new improved capabilities, and discuss its requirements and implications. The CMS is based on the real-time actual configuration of the system and the environment rather than a theoretic or assumed configuration. Moreover, the CMS predicts organizational damages taking into account chains of impacts among systems' components generated by messaging among software components. In addition, the CMS takes into account all organizational effects of an attack. Its risk measurement takes into account the consequences of a threat, as defines in risk analysis standards. Loss prediction is …


Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi May 2015

Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent months there has been an increase in the popularity and public awareness of secure, cloudless file transfer systems. The aim of these services is to facilitate the secure transfer of files in a peer-to-peer (P2P) fashion over the Internet without the need for centralized authentication or storage. These services can take the form of client installed applications or entirely web browser based interfaces. Due to the P2P nature, there is generally no limit to the file sizes involved or to the volume of data transmitted - and where these limitations do exist they will be purely reliant on …


Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich May 2015

Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich

Annual ADFSL Conference on Digital Forensics, Security and Law

Hackers pose a continuous and unrelenting threat to organizations. Industry and academic researchers alike can benefit from a greater understanding of how hackers engage in criminal behavior. A limiting factor of hacker research is the inability to verify that self-proclaimed hackers participating in research actually possess their purported knowledge and skills. This paper presents current work in developing and validating a conceptual-expertise based tool that can be used to discriminate between novice and expert hackers. The implications of this work are promising since behavioral information systems researchers operating in the information security space will directly benefit from the validation of …


Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard May 2015

Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper is an investigation focusing on activities detected by SSH honeypots that utilised kippo honeypot software. The honeypots were located across a variety of geographical locations and operational platforms. The honeynet has suffered prolonged, persistent and attack from a /24 network which appears to be of Chinese geographical origin. In addition to these attacks, other attackers have been successful in compromising real hosts in a wide range of other countries that were subsequently involved in attacking the honeypot machines in the honeynet.

Keywords: Cyber Security, SSH, Secure Shell, Honeypots, Kippo


Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby May 2015

Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby

Annual ADFSL Conference on Digital Forensics, Security and Law

The Federal Rules of Civil Procedure (FRCP) are subject to a unique process also once used in revising the Federal Rules of Evidence (FRE). Today, this process is followed in revisions of the FRCP, the Federal Rules of Criminal Procedure and the Federal Bankruptcy Rules. This unique rulemaking process differs significantly from traditional notice and comment rulemaking required for a majority of federal regulatory agencies under the Administrative Procedure Act (APA).1 Most notably, rule-making for the federal courts’ procedural matters remain unaffected by the invalidation of legislative veto. It is still widely, but wrongly believed, that the legislative veto was …


On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis May 2015

On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis

Annual ADFSL Conference on Digital Forensics, Security and Law

While cybercrime proliferates – becoming more complex and surreptitious on the Internet – the tools and techniques used in performing digital investigations are still largely lagging behind, effectively slowing down law enforcement agencies at large. Real-time remote acquisition of digital evidence over the Internet is still an elusive ideal in the combat against cybercrime. In this paper we briefly describe the architecture of a comprehensive proactive digital investigation system that is termed as the Live Evidence Information Aggregator (LEIA). This system aims at collecting digital evidence from potentially any device in real time over the Internet. Particular focus is made …


A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers May 2015

A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics is a new field without established models of investigation. This study uses thematic analysis to explore the different issues seen in the prosecution of digital forensic investigations. The study looks at 100 cases from different federal appellate courts to analyze the cause of the appeal. The issues are categorized into one of four categories, ‘search and seizure’, ‘data analysis’, ‘presentation’ and ‘legal issues’. The majority of the cases reviewed related to the search and seizure activity.

Keywords: Computer Investigation, Case Law, Digital Forensics, Legal Issues, and Courts


A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil May 2015

A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil

Annual ADFSL Conference on Digital Forensics, Security and Law

The objective of this paper is to propose a new cyber forensic philosophy for watermark in the context of copyright laws for the benefit of the forensic community and the judiciary worldwide. The paper first briefly introduces various types of watermarks, and then situates watermarks in the context of the ideaexpression dichotomy and the copyright laws. It then explains the forensic importance of watermarks and proposes a forensic philosophy for them in the context of copyright laws. Finally, the paper stresses the vital need to incorporate watermarks in the forensic tests to establish software copyright infringement and also urges the …


A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao May 2015

A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao

Annual ADFSL Conference on Digital Forensics, Security and Law

Employing a fast string matching algorithm is essential for minimizing the overhead of extracting structured files from a raw disk image. In this paper, we summarize the concept, implementation, and main features of ten software-based string matching algorithms, and evaluate their applicability for forensic analysis. We provide comparisons between the selected software-based string matching algorithms from the perspective of forensic analysis by conducting their performance evaluation for file carving. According to the experimental results, the Shift-Or algorithm (R. Baeza-Yates & Gonnet, 1992) and the Karp-Rabin algorithm (Karp & Rabin, 1987) have the minimized search time for identifying the locations of …


Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian May 2015

Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian

Annual ADFSL Conference on Digital Forensics, Security and Law

Starting with Windows 7, Microsoft introduced a new feature to the Windows Operating Systems called Jump Lists. Jump Lists stores information about user activities on the host machine. These activities may include links to the recently visited web pages, applications executed, or files processed. Computer forensics investigators may find traces of misuse in Jump Lists auto saved files. In this research, we investigate the forensics values of Jump Lists data. Specifically, we use several tools to view Jump Lists data on a virtual machine. We show that each tool reveal certain types of information about user’s activity on the host …