Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Conference

Discipline
Institution
Keyword
Publication
File Type

Articles 271 - 300 of 313

Full-Text Articles in Social and Behavioral Sciences

The Innovation Challenge: Transformational Leadership In Technological University Libraries, Charles Townley Jun 2009

The Innovation Challenge: Transformational Leadership In Technological University Libraries, Charles Townley

Proceedings of the IATUL Conferences

No abstract provided.


From Biomedical Library To E-Only Learning Centre Supported By A Co-Operative Depot Service, Mel Collier Jun 2009

From Biomedical Library To E-Only Learning Centre Supported By A Co-Operative Depot Service, Mel Collier

Proceedings of the IATUL Conferences

No abstract provided.


Bibliometric Analysis Of The Output Of German Technological Universities By Means Of The J Factor, Bernhard Mittermaier Jun 2009

Bibliometric Analysis Of The Output Of German Technological Universities By Means Of The J Factor, Bernhard Mittermaier

Proceedings of the IATUL Conferences

No abstract provided.


Innovation In Libraries, Stephen Abram Jun 2009

Innovation In Libraries, Stephen Abram

Proceedings of the IATUL Conferences

No abstract provided.


The Green And Gold Roads To Open Access, Stevan Harnad, Ainslie Dewe May 2009

The Green And Gold Roads To Open Access, Stevan Harnad, Ainslie Dewe

Proceedings of the IATUL Conferences

No abstract provided.


Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill May 2009

Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill

Annual ADFSL Conference on Digital Forensics, Security and Law

The London 2012 Olympics is just three years away and the clock is ticking to put in place plans get it right. The potential for cybercrime to cause harm during this event is very great; harm to national reputation, harm to the reputation to the Olympic movement, and harm to individuals competing, watching or officiating. This paper considers the need to address these risks by taking a look at what has happened in the past at sporting events and the rising wave of electronic security threats and fraud facilitated by computers at recent Olympics. The problems for law enforcement are …


Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski May 2009

Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski

Annual ADFSL Conference on Digital Forensics, Security and Law

When investigators from either the private or public sector review digital data surrounding a case for evidentiary value, they typically conduct a systematic categorization process to identify the relevant digital devices. Armed with the proper methodology to accomplish this task, investigators can quickly recognize the appropriate digital devices for forensic processing and review. This paper purposes a methodology for investigating an individual’s online social networking persona.

Keywords: Social Networking, Web 2.0, Internet Investigations, Online Social Networking Community


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler May 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking


Concerning File Slack, Stephen P. Larson May 2009

Concerning File Slack, Stephen P. Larson

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we discuss the phenomena known as file slack. File slack is created each time a file is created on a hard disk, and can contain private or confidential data. Unfortunately, the methods used by Microsoft Windows operating systems to organize and save files require file slack, and users have no control over what data is saved in file slack. This document will help create awareness about the security issue of file slack and discuss research results concerning file slack.

Keywords : Computer Forensics, File Slack, Ram Slack, Disk Slack


The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma May 2009

The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most unanticipated results of the Computer Fraud and Abuse Act arose from the law of unintended consequences. The CFAA was originally enacted in 1984 to protect federal government computers from intrusions and damage caused by hackers, identity thieves, and other cyber criminals. The law was later amended to extend the scope of its application to financial institutions’, business’s and consumers’ computers. To aid in the pursuit of cyber criminals, one of the subsequent revisions to the law included provision “G” that gave the right to private parties to seek compensation for damages in a civil action for …


Why Are We Not Getting Better At Data Disposal?, Andy Jones May 2009

Why Are We Not Getting Better At Data Disposal?, Andy Jones

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes two sets of research, the first of which has been carried out over a period of four years into the levels and types of information that can be found on computer hard disks that are offered for sale on the second hand market. The second research project examined a number of second-hand hand held devices including PDAs, mobile (cell) phones and RIM Blackberry devices. The primary purpose of this research was to gain an understanding of the reasons for the failure to effectively remove potentially sensitive information from the disks and handheld devices. Other objectives included determining …


Don’T Touch That! And Other E-Discovery Issues, Linda Volonino May 2009

Don’T Touch That! And Other E-Discovery Issues, Linda Volonino

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to preserve and access electronically stored information (ESI) took on greater urgency when amendments to the Federal Rules of Civil Procedure went into effect in December 2006. These amendments, referred to as the electronic discovery (e-discovery) amendments, focus on the discovery phase of civil litigation, audits, or investigations. Discovery is the investigative phase of a legal case when opponents learn what evidence is available and how accessible it is. When ESI is the subject of discovery, it is called e-discovery. Recognizing that most business and personal records and communications are electronic, Judge Shira A. Scheindlin stated, "We used …


Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi May 2009

Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

The Windows Registry stores a wide variety of data representing a host of different user properties, settings and program information. The data structures used by the registry are designed to be adaptable to store these differences in a simple format. In this paper we will highlight the existence of a rare data structure that is used to store a large amount of data within the registry hives. We analyse the manner in which this data structure stores its data and the implications that it may have on evidence retrieval and digital investigation. In particular, we reveal that the three of …


Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi May 2009

Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …


Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns May 2009

Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 …


Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli May 2009

Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.

Keywords: honeypot, network forensics, visualization, Graphviz, Afterglow


Migrant Domestic Workers In Asia: The Case Of Singapore, Kayoko Ueno May 2009

Migrant Domestic Workers In Asia: The Case Of Singapore, Kayoko Ueno

Migration and Ethnic Relations Colloquium Series

No abstract provided.


Meeting Minutes, Wku Staff Council May 2009

Meeting Minutes, Wku Staff Council

Staff Council

Minutes of May 6, 2009 meeting.


Nelig Meeting - April 27, 2009, New England Library Instruction Group Apr 2009

Nelig Meeting - April 27, 2009, New England Library Instruction Group

New England Library Instruction Group

NELIG quarterly meeting, co-sponsored by ITIG, Focus on Online Education.


Keynote Speaker: Dr. Andrew Postlewaite, University Of Pennsylvania: "Where Do People's Preferences Come From?" Apr 2009

Keynote Speaker: Dr. Andrew Postlewaite, University Of Pennsylvania: "Where Do People's Preferences Come From?"

John Wesley Powell Student Research Conference

No abstract provided.


Meeting Minutes, Wku Staff Council Apr 2009

Meeting Minutes, Wku Staff Council

Staff Council

Minutes of April 1, 2009 meeting.


Religion As The Cause Of Temperance And Abstinence: How The Second Great Awakening Took The Fun Out Of Nineteenth Century America, Savannah L. Williamson Mar 2009

Religion As The Cause Of Temperance And Abstinence: How The Second Great Awakening Took The Fun Out Of Nineteenth Century America, Savannah L. Williamson

Undergraduate Research Conference

Pre-Marital sex and consumption of alcohol are a continuous presence in America. While many may think this statement would describe a modern day college campus, it is actually an accurate portrayal of the 19th century in the United States. These trends continued until one reform movement resulted in a sudden decrease in pre-marital sexual activity and constant intoxication. This reform came in the shape of religion. The Second Great Awakening brought about several changes in society that altered the way Americans lived their lives. After the mid-19th century, sex and alcohol would never be the same. Ultimately, the Second Great …


Elder Abuse: A Policy Analysis, Cortni Davis Mar 2009

Elder Abuse: A Policy Analysis, Cortni Davis

Undergraduate Research Conference

Elder abuse is a growing social problem in the United States. It takes on many forms, and is prevalent throughout various cultures. Elder Abuse Reporting Laws have been enacted throughout various states to prevent and intervene in elder abuse cases. California’s Financial Abuse Reporting Act of 2005 is one among many laws in the United States which was formed to help ensure social justice for the elderly citizens of America.


Gender,Social Facilitation, And Task Influences On Leadership Selection, Paul Harwell Mar 2009

Gender,Social Facilitation, And Task Influences On Leadership Selection, Paul Harwell

Undergraduate Research Conference

The opportunities for women to be placed in leadership positions are steadily increasing. With the rise in these positions and the fact that in many cases women are competing with men for the same leadership position, it is very important to understand how gender or other variables may affect who is chosen for such roles. Past research has shown that men are chosen much more frequently than women for leadership roles (Porter, Geis, & Jennings, 1983). The current study examined how additional variables may affect or interact with the selection of leaders of different genders.

Hebl(1995) found that characteristics of …


What Makes Stephen F. Austin State University Students Happy?, Tyler Bishop, Nicole Kurr, Jennifer Mcfarland, Brandon Rogers Mar 2009

What Makes Stephen F. Austin State University Students Happy?, Tyler Bishop, Nicole Kurr, Jennifer Mcfarland, Brandon Rogers

Undergraduate Research Conference

When we began our research we believed most people would be happier owning a pet, attending church, or exercising. However, we determined this was not the case, instead concluded students have different things that make them happy. In addition, after reviewing our results we were surprised that holding all else constant, having a hobby, owning a pet, attending church, and exercising will increase a student’s level of happiness.


When Old-Order Amish Meet New Order Science: Genetic Maladies And The Amish Dilemma, Kelley Downey Mar 2009

When Old-Order Amish Meet New Order Science: Genetic Maladies And The Amish Dilemma, Kelley Downey

Undergraduate Research Conference

The Old World Amish, an Anabaptist Christian domination in the United States and Canada are know for their plain dress, avoidance of modern technology, and separation from the mainstream society.

A traditional agricultural religious group, the Old World Amish maintains isolation from the rest of the community. Financially well-off, they are homogeneous on education, occupation by gender, age at marriage, religion/ethnicity, and health care.

Although the Amish strongly discourage marriage between close cousins, the Lancaster Amish genealogy is described as mutational - inbreeding from multiple, remote connections rather than close consanguinity (first-cousin marriages).

Amish settlements have been identified with certain …


Communication Across Random Landings, Kerron Joseph, Jay Walbran Mar 2009

Communication Across Random Landings, Kerron Joseph, Jay Walbran

Undergraduate Research Conference

The idea to do this project began with a simple question: Suppose that people carrying communication radios parachute out of a plane, if each device has a certain range, what is the probability that once everyone lands they will be able to communicate. To study this problem I assumed that the spot where each individual lands is normally distributed.

We discuss the different ways the communication radios can work. In particular we examine the situation where all the radios have to be within a certain radius r to operate correctly and the situation where the radios work on a relay …


To Be An Immigrant: Generation, Location And Negotiation, Kay Deaux Mar 2009

To Be An Immigrant: Generation, Location And Negotiation, Kay Deaux

Migration and Ethnic Relations Colloquium Series

No abstract provided.


Morning Concurrent Track 2: Creation And Correction Of Myths About Global Warming, Matthew S. Lachniet, Gale Sinatra, Carolanne Kardash, Gita Taasoobshirazi, Doug Lombardi, E. Michael Nussbaum Mar 2009

Morning Concurrent Track 2: Creation And Correction Of Myths About Global Warming, Matthew S. Lachniet, Gale Sinatra, Carolanne Kardash, Gita Taasoobshirazi, Doug Lombardi, E. Michael Nussbaum

Education for a Global Future: 21st Century Challenges in Sustainability & Climate Change Education

MORNING CONCURRENT TRACK 2: CREATION AND CORRECTION OF MYTHS ABOUT GLOBAL WARMING Moderator Robert Futrell Student Union Room 211 Matthew Lachniet – Global Warming Misconceptions and Myths: Barriers and Opportunities for Communicating Climate Change Science to a Non-scientific Audience Abstract: Opinions on an anthropogenic influence in global warming abound. Within the non-scientific public, the strength of one’s opinion commonly seems to be in inverse proportion to their knowledge of climate science. One reason for this disconnect between reality and opinion is the persistence of many climate change myths in popular knowledge of global warming. These myths are regularly propagated in …


Meeting Minutes, Wku Staff Council Mar 2009

Meeting Minutes, Wku Staff Council

Staff Council

Minutes of March 4, 2009 meeting.