Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

2014

Public Affairs, Public Policy and Public Administration

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 86

Full-Text Articles in Social and Behavioral Sciences

Challenges Facing The Elderly Care Industry In Hong Kong: The Shortage Of Frontline Workers, Sin Tung, Stella Kwok, Wai Ning Kris Wong, Shun Lai Yang Dec 2014

Challenges Facing The Elderly Care Industry In Hong Kong: The Shortage Of Frontline Workers, Sin Tung, Stella Kwok, Wai Ning Kris Wong, Shun Lai Yang

Practical Social and Industrial Research Symposium

No abstract provided.


Where Is Space? And Why Does That Matter?, Bhavya Lal, Emily Nightingale Nov 2014

Where Is Space? And Why Does That Matter?, Bhavya Lal, Emily Nightingale

Space Traffic Management Conference

Despite decades of debate on the topic, there is no consensus on what, precisely, constitutes the boundary between airspace and outer space. The topic is mired in legal and political conundrums, and the easy solution to-date has been to not agree on a definition of space. Lack of a definition, some experts claim, has not limited space-based activities, and therefore is not a hurdle that must be overcome. There are increasing calls however in light of increasing (and expectations of increasing) space traffic, both orbital and sub-orbital. This paper summarizes the proposed delimitation of space, the current debate on whether …


Exurban Residents’ Perceptions Of Naturally Returning Predators: Connecticut Case Study, Margaret E. Sackrider, Susan G. Clark, Isaac M. Ortega Sep 2014

Exurban Residents’ Perceptions Of Naturally Returning Predators: Connecticut Case Study, Margaret E. Sackrider, Susan G. Clark, Isaac M. Ortega

Yale Day of Data

As a result of reforestation, growth of exurban areas and wildlife adaptation, it is believed that the public is currently encountering more human-wildlife conflicts than ever before. The key to balancing wildlife conservation and human development is understanding the dynamic relationship between humans and carnivores. Specifically, gaining insight into the complexity of this relationship will aide in the creation of more effective conservation policy and outreach.

Reforestation throughout Connecticut has supported a tremendous population growth of pray species and subsequently the growth of predator populations including coyotes, Canis latrans, and black bears, Ursus americanus. According to some biologists, …


Online Data Mapping Systems, Melanie Kiper, Michael Pippen Aug 2014

Online Data Mapping Systems, Melanie Kiper, Michael Pippen

CPAR Presents: A Data and Research Series for Community Impact

This presentation on Target Map discusses: Strengths; Weaknesses; Software Limits And Requirements; Connect and Register; About their “Home Page”; Main Screen Elements; Create A Map; Basics About the Map; The Legend; Map Editor; Map Labels; and Saving.


State And Local Population Trends, Jerry Deichert, David J. Drozd Aug 2014

State And Local Population Trends, Jerry Deichert, David J. Drozd

CPAR Presents: A Data and Research Series for Community Impact

This presentation features: Three Major Demographic Trends; State Population Summary; County Population Summary; Natural Change = Births ‐ Deaths; Net Migration; City and Town Population Summary; Race and Hispanic/Latino Origin; Race and Hispanic/Latino Origin Change 2000-2010; Changing Composition of Nebraska Households; Major Employment Trends; Major Per Capita Income Trends; and Nebraska Vital Statistics.


Data Websites/Tools And Basic Data Mapping, Jerry Deichert Aug 2014

Data Websites/Tools And Basic Data Mapping, Jerry Deichert

CPAR Presents: A Data and Research Series for Community Impact

Today we are going to look at 3 websites: Census Bureau, Bureau of Economic Analysis, and the Bureau of Labor Statistics.


Information For Grant Writers And Data Users, Frank Shimerdla Aug 2014

Information For Grant Writers And Data Users, Frank Shimerdla

CPAR Presents: A Data and Research Series for Community Impact

This presentation features what makes a grant proposal "fundable"?; Good data is essential to support all essential proposal elements; Strengthening alignment; Using data to demonstrate need; Visuals highlight key data; Text effects and key data; Strategies for presenting data effectively; Common sources of grant data; Strategies to find the data; When the data do not exist; Surveys; Pre- and post-tests; Be proactive; We can do it... we have before; Restate baselines; Past results instill confidence; and Data is a program management strategy; Five final tips for using data.


Migration Statistics And Brain Drain/Gain, David J. Drozd, Randy Cantrell Aug 2014

Migration Statistics And Brain Drain/Gain, David J. Drozd, Randy Cantrell

CPAR Presents: A Data and Research Series for Community Impact

This presentation discusses: About migration; Often used sources of migration data; How many people move and why: an example of CPS data; Atlas Van Line Data show current level of outbound moves from Nebraska not as high as the late 1990s, but the increasing trend is concerning; Recent migration including by race/ethnicity; Migration differences for Nebraska counties; Breakdown for the <10,000 city size categories; Historical perspective: How do the 2000s changes compare to recent decades; What about the migration of those specifically the college degrees - the brain drain/gain; and Summary.


Poverty Data And The New Supplemental Poverty Measure, David J. Drozd Aug 2014

Poverty Data And The New Supplemental Poverty Measure, David J. Drozd

CPAR Presents: A Data and Research Series for Community Impact

This presentation features: Introduction; The basics: what is poverty; How the Census Bureau measures poverty; Poverty thresholds are a measure of need; 2013 Poverty Thresholds; Not Everyone has a Poverty Calculation!; Income Used to Compute “Official” Poverty; The ratio of income to poverty; The “bible” of current and historical poverty data; Graph from the 2012 report showing poverty trends over time: Note that poverty peaks out at about 15% following major recessions; Some Relevant Current Data from the ACS; High Poverty Counties are Fairly Dispersed but Primarily Rural; Census Bureau June 2014 report on “Changes in Concentrated Poverty” (census tracts …


Library Resources And Understanding The Focus On Stem, Heidi Blackburn Aug 2014

Library Resources And Understanding The Focus On Stem, Heidi Blackburn

CPAR Presents: A Data and Research Series for Community Impact

This presentation discusses: What the heck is STEM?; Why is it always in the news?; Why should I care about it?; and Where do I find reliable information from the government?


Basic Factfinder Computer Training, Pauline Nunez Aug 2014

Basic Factfinder Computer Training, Pauline Nunez

CPAR Presents: A Data and Research Series for Community Impact

Basic FactFinder Computer Training session.


Census Data Product Update, Randy Cantrell, Becky Vogt, David J. Drozd, Jerry Deichert Aug 2014

Census Data Product Update, Randy Cantrell, Becky Vogt, David J. Drozd, Jerry Deichert

CPAR Presents: A Data and Research Series for Community Impact

This presentation features: Background information; Why a metro and rural poll simultaneously; A Look at the Covers of the Two Polls; Common Methodology; Common Questionnaires and Survey Topics; 2014 Rural Poll Results on Items Asked Annually; 2014 Rural Poll vs. Metro Poll Results on Items Asked Annually; 2014 Rural Poll vs. Metro Poll Results on Safety & Crime; and Overall Summary.


Census Overview: Basics, Acs, And Estimates, David J. Drozd Aug 2014

Census Overview: Basics, Acs, And Estimates, David J. Drozd

CPAR Presents: A Data and Research Series for Community Impact

This presentation features: Terminology & Definitions; Census Datafiles; ACS Data are Released Based Upon the Population of the Geographic Unit; Questionnaires & Concepts; How does CPAR typically analyze race/ethnicity?; Geography; FactFinder Address Search Page & Results; Geography vs. Data (A Duel); Relationship between Data/Datafiles and Geography; PUMA geography; The American Community Survey: What is it?; ACS Methodology in Brief; ACS New Subject Areas; Point Estimates, MOE and Confidence Intervals; Multi-year Aggregate Estimates: Advantages; ACS Sample Size Increase Began in 2011 and Continues!!; 2012 ACS Data to be released later in 2014; The 2009 ACS Nebraska “Double Whammy”; Population Estimates Program: …


Intermediate Factfinder Computer Training, Pauline Nunez Aug 2014

Intermediate Factfinder Computer Training, Pauline Nunez

CPAR Presents: A Data and Research Series for Community Impact

Intermediate FactFinder Computer Training session.


The Far Reaching Impacts Of Aging, Louis Pol, Scott Strain, Martha Hakenkamp, Connie Benjamin Aug 2014

The Far Reaching Impacts Of Aging, Louis Pol, Scott Strain, Martha Hakenkamp, Connie Benjamin

CPAR Presents: A Data and Research Series for Community Impact

This presentation features the session's panelists and Nebraska population statistics and projections.


Opportunities And Challenges Of Data Publication: A Case From Purdue, David Scherer, Lisa Zilinski, Courtney Matthews Jun 2014

Opportunities And Challenges Of Data Publication: A Case From Purdue, David Scherer, Lisa Zilinski, Courtney Matthews

Charleston Library Conference

Beginning in 2011, there have been several policy changes directly affecting the management, preservation, and accessibility of publically funded research and resulting research data in the United States. On January 18, 2011 the National Science Foundation (NSF) required data management plans to be submitted with all grant proposals (National Science Foundation, 2013). On February 22, 2013, the Office of Science and Technology Policy of the President of the United States extended a similar requirement to all federal agencies that have a research and development budget of more than $100 million (Holdren, 2013). These requirements illustrate the need for further coordination …


Support When It Counts: Library Roles In Public Access To Federally Funded Research, Kristine M. Alpi, William M. Cross, Hilary M. Davis Jun 2014

Support When It Counts: Library Roles In Public Access To Federally Funded Research, Kristine M. Alpi, William M. Cross, Hilary M. Davis

Charleston Library Conference

In November 2012, the National Institutes of Health (NIH) announced it would begin enforcing its April 2008 mandate of public access to NIH-funded research by delaying processing of investigators’ grants reporting noncompliant publications. In response, the North Carolina State University (NCSU) Libraries offered to assist the University’s sponsored research administration in supporting NCSU researchers who had publications stemming from NIH funding and had not achieved compliance. Since the 2008 NIH mandate, over 1,000 articles based on NIH-funding have been published by NCSU across research areas including veterinary medicine, life sciences, physical sciences, social sciences, engineering, textiles, design, math, and statistics. …


Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague May 2014

Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague

Annual ADFSL Conference on Digital Forensics, Security and Law

Email is the most common and comparatively the most efficient means of exchanging information in today's world. However, given the widespread use of emails in all sectors, they have been the target of spammers since the beginning. Filtering spam emails has now led to critical actions such as forensic activities based on mining spam email. The data mine for spam emails at the University of Alabama at Birmingham is considered to be one of the most prominent resources for mining and identifying spam sources. It is a widely researched repository used by researchers from different global organizations. The usual process …


Investigative Techniques Of N-Way Vendor Agreement And Network Analysis Demonstrated With Fake Antivirus, Gary Warner, Mike Nagy, Kyle Jones, Kevin Mitchem May 2014

Investigative Techniques Of N-Way Vendor Agreement And Network Analysis Demonstrated With Fake Antivirus, Gary Warner, Mike Nagy, Kyle Jones, Kevin Mitchem

Annual ADFSL Conference on Digital Forensics, Security and Law

Fake AntiVirus (FakeAV) malware experienced a resurgence in the fall of 2013 after falling out of favor after several high profile arrests. FakeAV presents two unique challenges to investigators. First, because each criminal organization running a FakeAV affiliate system regularly alters the appearance of their system, it is sometimes difficult to know whether an incoming criminal complaint or malware sample is related to one ring or the other. Secondly, because FakeAV is delivered in a “Pay Per Install” affiliate model, in addition to the ring-leaders of each major ring, there are many high-volume malware infection rings who are all using …


Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen May 2014

Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

There has been extensive work in crime scene reconstruction of physical locations, and much is known in terms of digital forensics of computing devices. However, the network has remained a nebulous combination of entities that are largely ignored during an investigation due to the transient nature of the data that flows through the networks. This paper introduces an architecture for network path reconstruction using the network layer reachability information shared via OSPF Link State Advertisements and the routines and functions of OSPF::rt_sched() as applied to the construction of identical Link State Databases for all routers within an Area.


Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake May 2014

Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake

Annual ADFSL Conference on Digital Forensics, Security and Law

Most of the Live Video Systems do not preserve the Confidentiality principle, and send all frames of the video without any protection, allowing an easy “man in the middle” attack. But when it does, it uses cryptographic techniques over streaming data or makes use of secure channel systems. This generates low frame rate and demands many processor resources. In fact native Live Video Streaming demands many resources of all System.

In this paper we propose a technique to preserve confidentiality in Video Live Streaming applying a confusing visual method making use of the Toral Automorphism Spatial Transformation over each frame. …


Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt May 2014

Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt

Annual ADFSL Conference on Digital Forensics, Security and Law

As cybercrime continues to increase, new cyber forensics techniques are needed to combat the constant challenge of Internet anonymity. In instant messaging (IM) communications, criminals use virtual identities to hide their true identity, which hinders social accountability and facilitates cybercrime. Current instant messaging products are not addressing the anonymity and ease of impersonation over instant messaging. It is necessary to have IM cyber forensics techniques to assist in identifying cyber criminals as part of the criminal investigation. Instant messaging behavioral biometrics include online writing habits, which may be used to create an author writeprint to assist in identifying an author …


Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack May 2014

Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack

Annual ADFSL Conference on Digital Forensics, Security and Law

Botnets are responsible for a large percentage of damages and criminal activity on the Internet. They have shifted attacks from push activities to pull techniques for the distribution of malwares and continue to provide economic advantages to the exploiters at the expense of other legitimate Internet service users. In our research we asked; what is the cost of the procedural steps for forensically investigating a Botnet attack? The research method applies investigation guidelines provided by other researchers and evaluates these guidelines in terms of the cost to a digital forensic investigator. We conclude that investigation of Botnet attacks is both …


Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang May 2014

Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang

Annual ADFSL Conference on Digital Forensics, Security and Law

The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …


Computer Forensics For Accountants, Grover S. Kearns May 2014

Computer Forensics For Accountants, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …


Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov May 2014

Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov

Annual ADFSL Conference on Digital Forensics, Security and Law

Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient to various anti-forensic techniques, and others that require a reboot or are highly platform dependent. New resilient tools have certain disadvantages such as low speed or vulnerability to rootkits which directly manipulate kernel structures, e.g., page tables. A new memory forensic system – Malware Analysis System for Hidden Knotty Anomalies (MASHKA) is described in this paper. It is resilient to popular …


The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha May 2014

The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha

Annual ADFSL Conference on Digital Forensics, Security and Law

Pre-trial discovery is perpetually controversial. Parties advantaged by strict privacy can often avoid justice when this is disadvantageous to their interests. Contrawise, parties advantaged by relaxed litigation privacy can achieve justice when all facts are accessible irrespective of their repositories, ownership or control. American-style pre-trial discovery in civil and regulatory enforcement is relatively rare around the world. U.S. discovery rules open nearly all relevant and non-privileged data for use by opposing parties. The traditional discovery process was costly and time consuming in the world of tangible paper data. However, these burdens have increased, rather than diminished as often predicted, as …


Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter May 2014

Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Existing digital forensic investigation process models have provided guidelines for identifying and preserving potential digital evidence captured from a crime scene. However, for any of the digital forensic investigation process models developed across the world to be adopted and fully applied by the scientific community, it has to be tested. For this reason, the Harmonized Digital Forensic Investigation Process (HDFIP) model, currently a working draft towards becoming an international standard for digital forensic investigations (ISO/IEC 27043), needs to be tested.

This paper, therefore, presents the findings of a case study used to test the HDFIP model implemented in the ISO/IEC …


Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf May 2014

Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf

Annual ADFSL Conference on Digital Forensics, Security and Law

An important area in digital forensics is images of hard disks. The correct production of the images as well as the integrity and authenticity of each hard disk image is essential for the probative force of the image to be used at court. Integrity and authenticity are under suspicion as digital evidence is stored and used by software based systems. Modifications to digital objects are hard or even impossible to track and can occur even accidentally. Even worse, vulnerabilities occur for all current computing systems. Therefore, it is difficult to guarantee a secure environment for forensic investigations. But intended deletions …


Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson May 2014

Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson

Annual ADFSL Conference on Digital Forensics, Security and Law

During the present age and time, it seems as though people in society have become addicted to nearly anything and everything, whether it be to a substance, an activity or an object. The Internet and pornography is no exception. While commonly thought of as a deviant behavior, many are displaying addictions towards the Internet and pornography. More alarming, however, are those who are viewing, downloading, or trading child pornography and displaying addictive Internet behaviors, for they are spending excessive amounts of time engaging in the proliferation of child pornographic materials. For this reason, addiction to the Internet and usage of …