Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Library and Information Science (122)
- Sociology (94)
- Education (74)
- Information Literacy (65)
- Curriculum and Instruction (61)
-
- Service Learning (48)
- Environmental Studies (40)
- Physical Sciences and Mathematics (21)
- Psychology (15)
- Law (13)
- Computer Sciences (12)
- Educational Administration and Supervision (12)
- Higher Education Administration (12)
- Computer Engineering (11)
- Computer Law (11)
- Electrical and Computer Engineering (11)
- Engineering (11)
- Forensic Science and Technology (11)
- Information Security (11)
- Legal Studies (11)
- Public Affairs, Public Policy and Public Administration (10)
- Economics (8)
- Environmental Sciences (8)
- Oil, Gas, and Energy (7)
- Public Policy (6)
- Environmental Policy (5)
- Geography (5)
- International and Area Studies (5)
- Sustainability (5)
- Institution
-
- Lingnan University (102)
- Georgia Southern University (61)
- Western University (40)
- Purdue University (39)
- Western Kentucky University (12)
-
- Embry-Riddle Aeronautical University (11)
- University of Massachusetts Amherst (11)
- Utah State University (11)
- University of Nevada, Las Vegas (8)
- Georgetown University Law Center (7)
- Stephen F. Austin State University (6)
- Western Michigan University (2)
- Illinois Wesleyan University (1)
- Institute of Business Administration (1)
- Northern Michigan University (1)
- Keyword
-
- Information literacy (54)
- Library instruction (10)
- Research skills (10)
- Library-faculty collaboration (6)
- Source evaluation (4)
-
- Academic databases (3)
- Library orientation (3)
- Nevada (3)
- Wikipedia (3)
- Embedded librarian programs (2)
- Ethiopia (2)
- Faculty development (2)
- Google (2)
- Google Scholar (2)
- Information literacy instruction (2)
- Internet (2)
- Library resources (2)
- Renewable energy sources Research (2)
- Renewable energy sources Study and teaching (Higher) (2)
- Sustainability (2)
- Writing and composition (2)
- Academic libraries (1)
- Academic probation (1)
- Academic success (1)
- Accuracy (1)
- Active Scholarship Project (1)
- Active learning (1)
- Active learning activities (1)
- Active participation (1)
- Africa (1)
- Publication
-
- Georgia International Conference on Information Literacy (61)
- Asia-Pacific Regional Conference on Service-Learning 亞太地區服務研習會議 (48)
- Conference on China and Global Climate Change : Reconciling International Fairness and Protection of the Atmospheric Commons (40)
- Proceedings of the IATUL Conferences (39)
- Health over the Life Course Conference (2009) (30)
-
- Conference on “Improving the Human Destiny" (14)
- Staff Council (12)
- Annual ADFSL Conference on Digital Forensics, Security and Law (11)
- Institutional Repositories: Disseminating, Promoting, and Preserving Scholarship (11)
- Migration and Ethnic Relations Colloquium Series (10)
- Undergraduate Research Conference (6)
- Future of Today's Legal Scholarship Symposium (5)
- Rudd Adoption Research Program Annual Conferences (5)
- National Clean Energy Summit (4)
- New England Library Instruction Group (4)
- UNLV Renewable Energy Symposium (3)
- Conferences, Panels, and Events (2)
- International Conference on African Development Archives (2)
- Education for a Global Future: 21st Century Challenges in Sustainability & Climate Change Education (1)
- International Conference on Information and Communication Technologies (1)
- John Wesley Powell Student Research Conference (1)
- Library Career Reception (1)
- Open Access Week (1)
- Presentation (1)
- File Type
Articles 271 - 300 of 313
Full-Text Articles in Social and Behavioral Sciences
The Innovation Challenge: Transformational Leadership In Technological University Libraries, Charles Townley
The Innovation Challenge: Transformational Leadership In Technological University Libraries, Charles Townley
Proceedings of the IATUL Conferences
No abstract provided.
From Biomedical Library To E-Only Learning Centre Supported By A Co-Operative Depot Service, Mel Collier
From Biomedical Library To E-Only Learning Centre Supported By A Co-Operative Depot Service, Mel Collier
Proceedings of the IATUL Conferences
No abstract provided.
Bibliometric Analysis Of The Output Of German Technological Universities By Means Of The J Factor, Bernhard Mittermaier
Bibliometric Analysis Of The Output Of German Technological Universities By Means Of The J Factor, Bernhard Mittermaier
Proceedings of the IATUL Conferences
No abstract provided.
Innovation In Libraries, Stephen Abram
Innovation In Libraries, Stephen Abram
Proceedings of the IATUL Conferences
No abstract provided.
The Green And Gold Roads To Open Access, Stevan Harnad, Ainslie Dewe
The Green And Gold Roads To Open Access, Stevan Harnad, Ainslie Dewe
Proceedings of the IATUL Conferences
No abstract provided.
Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill
Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill
Annual ADFSL Conference on Digital Forensics, Security and Law
The London 2012 Olympics is just three years away and the clock is ticking to put in place plans get it right. The potential for cybercrime to cause harm during this event is very great; harm to national reputation, harm to the reputation to the Olympic movement, and harm to individuals competing, watching or officiating. This paper considers the need to address these risks by taking a look at what has happened in the past at sporting events and the rising wave of electronic security threats and fraud facilitated by computers at recent Olympics. The problems for law enforcement are …
Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski
Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski
Annual ADFSL Conference on Digital Forensics, Security and Law
When investigators from either the private or public sector review digital data surrounding a case for evidentiary value, they typically conduct a systematic categorization process to identify the relevant digital devices. Armed with the proper methodology to accomplish this task, investigators can quickly recognize the appropriate digital devices for forensic processing and review. This paper purposes a methodology for investigating an individual’s online social networking persona.
Keywords: Social Networking, Web 2.0, Internet Investigations, Online Social Networking Community
Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler
Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.
Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking
Concerning File Slack, Stephen P. Larson
Concerning File Slack, Stephen P. Larson
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we discuss the phenomena known as file slack. File slack is created each time a file is created on a hard disk, and can contain private or confidential data. Unfortunately, the methods used by Microsoft Windows operating systems to organize and save files require file slack, and users have no control over what data is saved in file slack. This document will help create awareness about the security issue of file slack and discuss research results concerning file slack.
Keywords : Computer Forensics, File Slack, Ram Slack, Disk Slack
The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma
The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma
Annual ADFSL Conference on Digital Forensics, Security and Law
One of the most unanticipated results of the Computer Fraud and Abuse Act arose from the law of unintended consequences. The CFAA was originally enacted in 1984 to protect federal government computers from intrusions and damage caused by hackers, identity thieves, and other cyber criminals. The law was later amended to extend the scope of its application to financial institutions’, business’s and consumers’ computers. To aid in the pursuit of cyber criminals, one of the subsequent revisions to the law included provision “G” that gave the right to private parties to seek compensation for damages in a civil action for …
Why Are We Not Getting Better At Data Disposal?, Andy Jones
Why Are We Not Getting Better At Data Disposal?, Andy Jones
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes two sets of research, the first of which has been carried out over a period of four years into the levels and types of information that can be found on computer hard disks that are offered for sale on the second hand market. The second research project examined a number of second-hand hand held devices including PDAs, mobile (cell) phones and RIM Blackberry devices. The primary purpose of this research was to gain an understanding of the reasons for the failure to effectively remove potentially sensitive information from the disks and handheld devices. Other objectives included determining …
Don’T Touch That! And Other E-Discovery Issues, Linda Volonino
Don’T Touch That! And Other E-Discovery Issues, Linda Volonino
Annual ADFSL Conference on Digital Forensics, Security and Law
The ability to preserve and access electronically stored information (ESI) took on greater urgency when amendments to the Federal Rules of Civil Procedure went into effect in December 2006. These amendments, referred to as the electronic discovery (e-discovery) amendments, focus on the discovery phase of civil litigation, audits, or investigations. Discovery is the investigative phase of a legal case when opponents learn what evidence is available and how accessible it is. When ESI is the subject of discovery, it is called e-discovery. Recognizing that most business and personal records and communications are electronic, Judge Shira A. Scheindlin stated, "We used …
Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi
Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi
Annual ADFSL Conference on Digital Forensics, Security and Law
The Windows Registry stores a wide variety of data representing a host of different user properties, settings and program information. The data structures used by the registry are designed to be adaptable to store these differences in a simple format. In this paper we will highlight the existence of a rare data structure that is used to store a large amount of data within the registry hives. We analyse the manner in which this data structure stores its data and the implications that it may have on evidence retrieval and digital investigation. In particular, we reveal that the three of …
Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi
Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi
Annual ADFSL Conference on Digital Forensics, Security and Law
Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …
Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns
Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns
Annual ADFSL Conference on Digital Forensics, Security and Law
Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 …
Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli
Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.
Keywords: honeypot, network forensics, visualization, Graphviz, Afterglow
Migrant Domestic Workers In Asia: The Case Of Singapore, Kayoko Ueno
Migrant Domestic Workers In Asia: The Case Of Singapore, Kayoko Ueno
Migration and Ethnic Relations Colloquium Series
No abstract provided.
Meeting Minutes, Wku Staff Council
Nelig Meeting - April 27, 2009, New England Library Instruction Group
Nelig Meeting - April 27, 2009, New England Library Instruction Group
New England Library Instruction Group
NELIG quarterly meeting, co-sponsored by ITIG, Focus on Online Education.
Keynote Speaker: Dr. Andrew Postlewaite, University Of Pennsylvania: "Where Do People's Preferences Come From?"
John Wesley Powell Student Research Conference
No abstract provided.
Meeting Minutes, Wku Staff Council
Religion As The Cause Of Temperance And Abstinence: How The Second Great Awakening Took The Fun Out Of Nineteenth Century America, Savannah L. Williamson
Religion As The Cause Of Temperance And Abstinence: How The Second Great Awakening Took The Fun Out Of Nineteenth Century America, Savannah L. Williamson
Undergraduate Research Conference
Pre-Marital sex and consumption of alcohol are a continuous presence in America. While many may think this statement would describe a modern day college campus, it is actually an accurate portrayal of the 19th century in the United States. These trends continued until one reform movement resulted in a sudden decrease in pre-marital sexual activity and constant intoxication. This reform came in the shape of religion. The Second Great Awakening brought about several changes in society that altered the way Americans lived their lives. After the mid-19th century, sex and alcohol would never be the same. Ultimately, the Second Great …
Elder Abuse: A Policy Analysis, Cortni Davis
Elder Abuse: A Policy Analysis, Cortni Davis
Undergraduate Research Conference
Elder abuse is a growing social problem in the United States. It takes on many forms, and is prevalent throughout various cultures. Elder Abuse Reporting Laws have been enacted throughout various states to prevent and intervene in elder abuse cases. California’s Financial Abuse Reporting Act of 2005 is one among many laws in the United States which was formed to help ensure social justice for the elderly citizens of America.
Gender,Social Facilitation, And Task Influences On Leadership Selection, Paul Harwell
Gender,Social Facilitation, And Task Influences On Leadership Selection, Paul Harwell
Undergraduate Research Conference
The opportunities for women to be placed in leadership positions are steadily increasing. With the rise in these positions and the fact that in many cases women are competing with men for the same leadership position, it is very important to understand how gender or other variables may affect who is chosen for such roles. Past research has shown that men are chosen much more frequently than women for leadership roles (Porter, Geis, & Jennings, 1983). The current study examined how additional variables may affect or interact with the selection of leaders of different genders.
Hebl(1995) found that characteristics of …
What Makes Stephen F. Austin State University Students Happy?, Tyler Bishop, Nicole Kurr, Jennifer Mcfarland, Brandon Rogers
What Makes Stephen F. Austin State University Students Happy?, Tyler Bishop, Nicole Kurr, Jennifer Mcfarland, Brandon Rogers
Undergraduate Research Conference
When we began our research we believed most people would be happier owning a pet, attending church, or exercising. However, we determined this was not the case, instead concluded students have different things that make them happy. In addition, after reviewing our results we were surprised that holding all else constant, having a hobby, owning a pet, attending church, and exercising will increase a student’s level of happiness.
When Old-Order Amish Meet New Order Science: Genetic Maladies And The Amish Dilemma, Kelley Downey
When Old-Order Amish Meet New Order Science: Genetic Maladies And The Amish Dilemma, Kelley Downey
Undergraduate Research Conference
The Old World Amish, an Anabaptist Christian domination in the United States and Canada are know for their plain dress, avoidance of modern technology, and separation from the mainstream society.
A traditional agricultural religious group, the Old World Amish maintains isolation from the rest of the community. Financially well-off, they are homogeneous on education, occupation by gender, age at marriage, religion/ethnicity, and health care.
Although the Amish strongly discourage marriage between close cousins, the Lancaster Amish genealogy is described as mutational - inbreeding from multiple, remote connections rather than close consanguinity (first-cousin marriages).
Amish settlements have been identified with certain …
Communication Across Random Landings, Kerron Joseph, Jay Walbran
Communication Across Random Landings, Kerron Joseph, Jay Walbran
Undergraduate Research Conference
The idea to do this project began with a simple question: Suppose that people carrying communication radios parachute out of a plane, if each device has a certain range, what is the probability that once everyone lands they will be able to communicate. To study this problem I assumed that the spot where each individual lands is normally distributed.
We discuss the different ways the communication radios can work. In particular we examine the situation where all the radios have to be within a certain radius r to operate correctly and the situation where the radios work on a relay …
To Be An Immigrant: Generation, Location And Negotiation, Kay Deaux
To Be An Immigrant: Generation, Location And Negotiation, Kay Deaux
Migration and Ethnic Relations Colloquium Series
No abstract provided.
Morning Concurrent Track 2: Creation And Correction Of Myths About Global Warming, Matthew S. Lachniet, Gale Sinatra, Carolanne Kardash, Gita Taasoobshirazi, Doug Lombardi, E. Michael Nussbaum
Morning Concurrent Track 2: Creation And Correction Of Myths About Global Warming, Matthew S. Lachniet, Gale Sinatra, Carolanne Kardash, Gita Taasoobshirazi, Doug Lombardi, E. Michael Nussbaum
Education for a Global Future: 21st Century Challenges in Sustainability & Climate Change Education
MORNING CONCURRENT TRACK 2: CREATION AND CORRECTION OF MYTHS ABOUT GLOBAL WARMING Moderator Robert Futrell Student Union Room 211 Matthew Lachniet – Global Warming Misconceptions and Myths: Barriers and Opportunities for Communicating Climate Change Science to a Non-scientific Audience Abstract: Opinions on an anthropogenic influence in global warming abound. Within the non-scientific public, the strength of one’s opinion commonly seems to be in inverse proportion to their knowledge of climate science. One reason for this disconnect between reality and opinion is the persistence of many climate change myths in popular knowledge of global warming. These myths are regularly propagated in …
Meeting Minutes, Wku Staff Council