Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

2016

Discipline
Keyword
Publication
Publication Type
File Type

Articles 151 - 161 of 161

Full-Text Articles in Social and Behavioral Sciences

Electronic Voting Service Using Block-Chain, Kibin Lee, Joshua I. James, Tekachew G. Ejeta, Hyoung J. Kim Jan 2016

Electronic Voting Service Using Block-Chain, Kibin Lee, Joshua I. James, Tekachew G. Ejeta, Hyoung J. Kim

Journal of Digital Forensics, Security and Law

Cryptocurrency, and its underlying technologies, has been gaining popularity for transaction management beyond financial transactions. Transaction information is maintained in the block-chain, which can be used to audit the integrity of the transaction. The focus on this paper is the potential availability of block-chain technology of other transactional uses. Block-chain is one of the most stable open ledgers that preserves transaction information, and is difficult to forge. Since the information stored in block-chain is not related to personally identify information, it has the characteristics of anonymity. Also, the block-chain allows for transparent transaction verification since all information in the block-chain …


Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot Jan 2016

Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot

Journal of Digital Forensics, Security and Law

Image splicing is a common and widespread type of manipulation, which is defined as pasting a portion of an image onto a second image. Several forensic methods have been developed to detect splicing, using various image properties. Some of these methods exploit the noise statistics of the image to try and find discrepancies. In this paper, we propose a new counter-forensic approach to eliminate the noise differences that can appear in a spliced image. This approach can also be used when creating computer graphics images, in order to endow them with a realistic noise. This is performed by changing the …


An Automated Approach For Digital Forensic Analysis Of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, Fudong Li Jan 2016

An Automated Approach For Digital Forensic Analysis Of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, Fudong Li

Journal of Digital Forensics, Security and Law

The major challenges with big data examination and analysis are volume, complex interdependence across content, and heterogeneity. The examination and analysis phases are considered essential to a digital forensics process. However, traditional techniques for the forensic investigation use one or more forensic tools to examine and analyse each resource. In addition, when multiple resources are included in one case, there is an inability to cross-correlate findings which often leads to inefficiencies in processing and identifying evidence. Furthermore, most current forensics tools cannot cope with large volumes of data. This paper develops a novel framework for digital forensic analysis of heterogeneous …


Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera Jan 2016

Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera

Journal of Digital Forensics, Security and Law

Drives found during investigations often have useful information in the form of email addresses which can be acquired by search in the raw drive data independent of the file system. Using this data we can build a picture of the social networks that a drive owner participated in, even perhaps better than investigating their online profiles maintained by social-networking services because drives contain much data that users have not approved for public display. However, many addresses found on drives are not forensically interesting, such as sales and support links. We developed a program to filter these out using a Naïve …


Verification Of Recovered Digital Evidence On The Amazon Kindle, Marcus Thompson, Raymond Hansen Jan 2016

Verification Of Recovered Digital Evidence On The Amazon Kindle, Marcus Thompson, Raymond Hansen

Journal of Digital Forensics, Security and Law

The Amazon Kindle is a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various types of files a typical user may introduce using one method, the USB interface. The Kindle was forensically imaged with AccessData’s Forensic Toolkit Imager before and after each Kindle was populated. Each file was deleted through …


Table Of Contents Jan 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Macroconstants Of Development: A New Benchmark For The Strategic Development Of Advanced Countries And Firms, Andrey V. Bystrov, Vyacheslav N. Yusim, Tamilla Curtis Jan 2016

Macroconstants Of Development: A New Benchmark For The Strategic Development Of Advanced Countries And Firms, Andrey V. Bystrov, Vyacheslav N. Yusim, Tamilla Curtis

Publications

This research proposed a new indicator of countries’ development called “macroconstants of development”. The literature review indicates that the concept of "macroconstants of development" is not used at the moment in neither the theory nor the practice of industrial policy. Research of longitudinal data of total GDP, GDP per capita and their derivatives for most countries of the world was conducted. An analysis of statistical information has been done by employing econometric analyses.

Based on the analysis of the statistical data, which characterizes the development of large, technologically advanced countries in ordinary conditions, it was identified that the average acceleration …


Customer Service Training In An Academic Technical Library, Anne Marie Casey, Kathleen Citro Jan 2016

Customer Service Training In An Academic Technical Library, Anne Marie Casey, Kathleen Citro

Publications

Training research librarians to provide highly technical research assistance as well a exemplary customer service is the goal at the Hunt Library. The process involved with the training process is delineated and the Table of Contents headings from the training manual are included.


Me And My Ve, Part 4, Laura Strater, Christina M. Frederick, Monifa Vaughn-Cooke, Jim Bliss, Smruti Shah Jan 2016

Me And My Ve, Part 4, Laura Strater, Christina M. Frederick, Monifa Vaughn-Cooke, Jim Bliss, Smruti Shah

Publications

Virtual environments, augmented reality, serious games, simulations, and other digitally mediated experiences are revolutionizing the way that we work, learn, and interact with people and systems. The employment of these technologies is driving innovation in research, training, education, evaluation, and various business endeavors. This session will provide a brief overview of some of the diverse uses of virtual environments (VEs) in an alternate demonstration format that leaves just over half of the session time for hands on, interactive demonstrations. Unlike most demonstration sessions, where possible, we encourage session attendees to personally interact with the demonstrations. The session will begin with …


Understanding The Sunni Awakening With Complexity Theory, Diane Maye Zorri Jan 2016

Understanding The Sunni Awakening With Complexity Theory, Diane Maye Zorri

Publications

Concurrent to the surge of U.S. forces in Iraq between 2006 and 2008, Sunni tribesmen in the U.S. Marine‐controlled western Anbar province of Iraq experienced an “awakening” movement, which led them to side with U.S. and coalition forces. The Sunni Awakening demonstrates that individuals will often realign because of betrayal and opportunities for advancement. It also demonstrates that individual motives can have macrolevel social consequences. Complexity theory suggests that political factions will realign based on individual considerations that then develop into macrolevel movements. Complexity theory also combines both agency (in terms of microbehaviors) and structure (in terms of initial conditions). …


Editorial: Selected Papers From The 18th Air Transport Research Society World Conference, Bordeaux (France), 2014, Chunyan Yu, Seock-Jin Hong Jan 2016

Editorial: Selected Papers From The 18th Air Transport Research Society World Conference, Bordeaux (France), 2014, Chunyan Yu, Seock-Jin Hong

Publications

The 18th Air Transport Research Society World Conference (ATRS) was held in Bordeaux, France, from July 17 to July 20, 2014. The conference attracted some 347 participants, and 321 papers were presented. The guest editors have selected six papers to be included in this special issue. These papers cover a wide range of topics presented and discussed at the conference and offer important contribution to the literature on air transport.