Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Social and Behavioral Sciences

Touch Dna In A Complicated Alleged Child Abuse Case, Heather Miller Coyle Dec 2015

Touch Dna In A Complicated Alleged Child Abuse Case, Heather Miller Coyle

Forensic Science Publications

Touch DNA can be of use in establishing what may have occurred through reconstruction of events based on biological evidence transfer. However, interpretation of results and patterns must be approached with some caution as in the alleged child abuse case detailed here. This case was brought forward as a touch DNA and body fluid case where the male in question was a father reported to have forced a young child to perform oral sex on him. Her pajamas were collected and evaluated for presence of body fluids and associated DNA. The sleeves of the pajamas tested positive for amylase, a …


Print Is Dead: The Promise And Peril Of Online Media For Subcultural Resistance, Jeffrey S. Debies-Carl Dec 2015

Print Is Dead: The Promise And Peril Of Online Media For Subcultural Resistance, Jeffrey S. Debies-Carl

Sociology Faculty Publications

Researchers have maintained a consistent interest in subcultural resistance: marginalized groups challenging their subordinate positions in society through words or deeds. Resisting groups increasingly use online media for resistance, but we know little about the web’s consequences for subcultural challengers. In this article, I explore the promise and peril of digital media for resistance relative to traditional, printed media, from an ethnographic exploration of punk subculture. Rather than finding support for either supporters or critics of online resistance, I find evidence for an alternative, dialectical perspective in which the Internet simultaneously invigorates and problematizes punk resistance. It provides the oppositional …


Enhanced Thermal Decomposition Kinetics Of Poly(Lactic Acid) Sacrificial Polymer Catalyzed By Metal Oxide Nanoparticles, Lu Liu, Michael R. Zachariah, Stanislav I. Stoliarov, Jing Li Nov 2015

Enhanced Thermal Decomposition Kinetics Of Poly(Lactic Acid) Sacrificial Polymer Catalyzed By Metal Oxide Nanoparticles, Lu Liu, Michael R. Zachariah, Stanislav I. Stoliarov, Jing Li

Fire Science and Professional Studies Faculty Publications

Poly Lactic Acid (PLA) has been used as a sacrificial polymer in the fabrication of battery separators and can be employed in 0D–3D Vaporization of a Sacrificial Component (VaSC) fabrication. In this study, 1 wt% PLA/Fe2O3, PLA/CuO and PLA/Bi2O3 composites are prepared by solvent evaporation casting. Scanning Electron Microscopy (SEM) images indicate that the embedded nanoparticles are well dispersed in the polymer matrix and X-ray diffraction (XRD) verifies the crystallinity of these Metal Oxides (MOs). Thermal stability analysis of the PLA and PLA/MO composites is performed using a thermogravimetric analyzer (TGA) and Differential Scanning Calorimeter (DSC). The overall heat of …


Factors Influencing The Impact Of Aggressive And Violent Media On Children And Adolescents, Ashlee M. Wiedeman, Jacqueline A. Black, Autumn L. Dolle, Emmanuel J. Finney, Kendell L. Coker Nov 2015

Factors Influencing The Impact Of Aggressive And Violent Media On Children And Adolescents, Ashlee M. Wiedeman, Jacqueline A. Black, Autumn L. Dolle, Emmanuel J. Finney, Kendell L. Coker

Psychology Faculty Publications

The influence of aggressive and violent media on children and adolescents has been a topic of concern for several decades. Research on this topic has suggested that both short term and long term exposure to aggressive/violent media can negatively impact this population. The purpose of this literature review is to discuss relevant research on the topic and examine various factors that may impact the risk of being influenced by this type of media. These factors can include time spent viewing media, content of the media viewed, gender, age, psychological characteristics, family, and peers. Various theoretical approaches to explaining the influence …


Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger Oct 2015

Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

WhatsApp is a widely adopted mobile messaging application with over 800 million users. Recently, a calling feature was added to the application and no comprehensive digital forensic analysis has been performed with regards to this feature at the time of writing this paper. In this work, we describe how we were able to decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the: a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination. We explain the methods and tools used …


Professor Frank Breitinger's Full Bibliography, Frank Breitinger Oct 2015

Professor Frank Breitinger's Full Bibliography, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

No abstract provided.


Self-Reported Barriers To Treatment Engagement: Adolescent Perspectives From The National Comorbidity Survey-Adolescent Supplement (Ncs-A), Amy Sylwestrzak, Chelsea E. Overholt, Kelly I. Ristau, Kendell L. Coker Oct 2015

Self-Reported Barriers To Treatment Engagement: Adolescent Perspectives From The National Comorbidity Survey-Adolescent Supplement (Ncs-A), Amy Sylwestrzak, Chelsea E. Overholt, Kelly I. Ristau, Kendell L. Coker

Psychology Faculty Publications

The objective of this study was to assess youth self-reported treatment barriers in the past 12 months to obtain youth’s perspective on reasons they seek treatment, do not engage in treatment, or terminate treatment. The present study uses data from the National Comorbidity Survey-Adolescent Supplement (NCS-A), a nationally representative survey administered to youth ages 13–18 that was conducted between February 1, 2001 and January 30, 2004. A total of 10,123 youth participated in the NCS-A study and provided the information on which the current paper draws its data. Within the past 12 months over 63 % of youth reported seeking …


Emerging Cultural Conflicts In Italy: A Challenge For Criminal Law, Raffaele Muzzica, Tracy Tamborra, Giuseppe Amarelli Jul 2015

Emerging Cultural Conflicts In Italy: A Challenge For Criminal Law, Raffaele Muzzica, Tracy Tamborra, Giuseppe Amarelli

Criminal Justice Faculty Publications

Because of recent and rapid increases in immigration rates, Italy has been confronted with new forms of cultural conflicts. Cultural conflicts have resulted in cultural offenses; these are acts committed and promoted by people belonging to a minority culture that are considered to be offenses by the majority controlled legal system. In addition to defining cultural offenses and presenting defenses that are presented when cultural offenses are tried, this paper highlights pros, cons and potential pitfalls of considering culture under Italian law. Finally, suggestions to improve legal considerations of cultural diversity in Italy are presented; specifically the creation of laws …


Administering A Victim Impact Curriculum To Inmates: A Multi-Site Replication, Christopher M. Sedelmaier, Mario Thomas Gaboury Jun 2015

Administering A Victim Impact Curriculum To Inmates: A Multi-Site Replication, Christopher M. Sedelmaier, Mario Thomas Gaboury

Criminal Justice Faculty Publications

While restorative justice has been the topic of much research, a specific type of program included in restorative justice, Impact of Crime on Victims programs, has not been widely studied or assessed for effectiveness. This study examines Impact of Crime (IOC) on Victims Curriculum Development Programs. Offenders from programs in California, Ohio, Tennessee, and Virginia were participants in this research. A four state evaluation methodology was developed in order to assess the effectiveness of these programs in educating offenders about victims’ right and victim facts, as well as increasing their sensitivity to victims’ difficulties. The findings in this evaluation lend …


Parameterization And Validation Of Pyrolysis Models For Polymeric Materials, Stanislav I. Stoliarov, Jing Li May 2015

Parameterization And Validation Of Pyrolysis Models For Polymeric Materials, Stanislav I. Stoliarov, Jing Li

Fire Science and Professional Studies Faculty Publications

A methodology for parameterization of pyrolysis models for polymeric solids is proposed. This methodology is based on a series of experiments including thermogravimetric analysis, differential scanning calorimetry, infrared radiation absorption measurement and controlled atmosphere, radiation-driven gasification experiments involving simultaneous sample mass and temperature monitoring. These experiments are interpreted using a transient pyrolysis model run in an infinitely fast (0D) and one-dimensional (1D) transport modes to derive a complete property set. This property set is subsequently validated by comparing the mass loss rate histories obtained from the gasification experiments to the model predictions. For a range of previously studied materials, these …


Development Of Pyrolysis Models For Charring Polymers, Jing Li, Junhui Gong, Stanislav I. Stoliarov May 2015

Development Of Pyrolysis Models For Charring Polymers, Jing Li, Junhui Gong, Stanislav I. Stoliarov

Fire Science and Professional Studies Faculty Publications

Controlled atmosphere, radiation-driven gasification experiments were conducted on a series of synthetic polymers including poly(acrylonitrile butadiene styrene), poly(ethylene terephthalate), poly(methyl methacrylate)-poly(vinyl chloride) alloy (Kydex) and polyetherimide. Mass loss rate and non-radiated surface temperature of coupon-sized material samples were measured simultaneously and recorded as a function of time. These temperature data were combined with the results of broadband radiation absorption measurements and previously conducted thermogravimetric analysis (TGA) and differential scanning calorimetry (DSC) to characterize the transport of thermal energy inside the gasifying materials through inverse modeling. Subsequently, complete pyrolysis models, based on the kinetics and thermodynamics of the thermal decomposition derived …


Prenatal And Neighborhood Correlates Of Oppositional Defiant Disorder (Odd), Andrea A. Russell, Claire L. Johnson, Arwa Hammad, Kelly I. Ristau, Sandra Zawadzki, Luz Del Alba Villar, Kendell Coker Feb 2015

Prenatal And Neighborhood Correlates Of Oppositional Defiant Disorder (Odd), Andrea A. Russell, Claire L. Johnson, Arwa Hammad, Kelly I. Ristau, Sandra Zawadzki, Luz Del Alba Villar, Kendell Coker

Psychology Faculty Publications

This study investigates the link between prenatal exposure to alcohol and drugs, parental perceptions of neighborhood safety and support, and the diagnosis of oppositional defiant disorder (ODD) among a nationally representative sample of youth. A subset of variables from a larger study, the 2001–2004 National Comorbidity Survey-Adolescent Supplement (NCS-A), as well as its supplemental parental surveys, was analyzed in this study. This study used a specific selection of 5,924 adolescents and their parents from the NCS-A. Results suggest a correlation between prenatal caffeine use and a subsequent ODD diagnosis in female adolescents. Overall correlations between neighborhood drug use/sales and minority …


An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer Jan 2015

An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer

Electrical & Computer Engineering and Computer Science Faculty Publications

Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …


Mraps, Irregular Warfare, And Pentagon Reform, Christopher J. Lamb, Matthew J. Schmidt, Berit G. Fitzsimmons Jan 2015

Mraps, Irregular Warfare, And Pentagon Reform, Christopher J. Lamb, Matthew J. Schmidt, Berit G. Fitzsimmons

Political Science Faculty Publications

The controversial MRAPs raise two questions. First, does the MRAP experience support the contention that the Pentagon is not sufficiently able to field irregular warfare capabilities? Second, what factors best explain the MRAP failure, whether that failure is determined to be their delayed fielding or the fact that they were fielded at all? We conclude that MRAPs are a valid irregular warfare requirement and that the Pentagon should have been better prepared to field them, albeit not on the scale demanded by events in Iraq. We also argue that the proximate cause of the failure to quickly field MRAPs is …


A Guerra Como Trabalho Político: Como Utilizar As Ciências Sociais Para O Êxito Estratégico, Matthew J. Schmidt Jan 2015

A Guerra Como Trabalho Político: Como Utilizar As Ciências Sociais Para O Êxito Estratégico, Matthew J. Schmidt

Political Science Faculty Publications

As Ciências Sociais estudam fenômenos sociais em termos de variáveis interdependentes, em vez de variáveis independentes e dependentes. No caso de fenômenos compostos de variáveis interdependentes — como a guerra — tentar estabelecer teorias claras sobre causa e efeito é algo frustrante até para cientistas sociais acostumados com esse tipo de pesquisa. Com efeito, variáveis interdependentes fazem com que seja impossível fazer previsões como as das ciências exatas. Isso não significa, porém, que se devam desconsiderar abordagens qualitativas. Ao contrário, compreender o valor e as limitações dos métodos qualitativos é essencial para uma profissão incumbida de empregar a força para …


Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger Jan 2015

Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collection purposes by digital forensic practitioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of …