Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Education

The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman Apr 2023

The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman

Doctoral Dissertations and Master's Theses

This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …


Surveying The Safety Culture Of Academic Laboratories, Emily Faulconer, Zachary Dixon, John C. Griffith, Hayden Frank Nov 2020

Surveying The Safety Culture Of Academic Laboratories, Emily Faulconer, Zachary Dixon, John C. Griffith, Hayden Frank

Publications

The university traditionally has been the foundation for young adults’ professional development, yet the proclivity toward safety culture has garnered less focus in higher education than in the workforce. A survey of faculty at a medium-sized, research-active, private institution revealed specific areas of policy noncompliance as well as specific safety attitudes that can be targeted for interventions. Albeit a snapshot view, the survey implies that safety needs better representation in the classroom, teaching laboratories, and research facilities at universities. Safety is not abandoned by any means, and there is a strong presence of safety-oriented individuals, but the data show barriers …


Title Ix Effectiveness At American Universities, Corrine K. Girard Apr 2020

Title Ix Effectiveness At American Universities, Corrine K. Girard

Discovery Day - Prescott

The purpose of this research is to contribute to and improve existing university knowledge of the effectiveness of the University Title IX reporting process. After discussing experiences with Title IX with students at ERAU, it is apparent that there is a negative connotation among university students with this program. This research will build off of the research completed last year in which ERAU Title IX processes were compared to that of Occidental College and CalTech. This research aims to provide clarity to Title IX offices at the University to aid in successfully adapting their program to the needs of the …


Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through Apr 2020

Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through

Journal of Digital Forensics, Security and Law

Data carving is a technique used in data recovery to isolate and extract files based on file content without any file system guidance. It is an important part of data recovery and digital forensics, but it is also useful in teaching computer science students about file structure and binary encoding of information especially within a digital forensics program. This work demonstrates how the authors teach data carving using a real world problem they encounter in digital forensics evidence processing involving the extracting of text messages from unstructured small device binary extractions. The authors have used this problem for instruction in …


Global Outlook Of Aviation & Drones, Darshan Divakaran M.S. Mar 2020

Global Outlook Of Aviation & Drones, Darshan Divakaran M.S.

National Training Aircraft Symposium (NTAS)

This presentation will discuss the Global outlook in Aviation & Drones. It will cover both manned and unmanned aviation forecast.

Topics that will be covered -

  • The Future of Aviation
  • Aviation Forecast
  • Who is using Drones
  • Path forward for drones
  • Factors that influence UAS growth
  • Standards for training & certification
  • Current Global Drone Delivery
  • UAS Integration Pilot Program
  • Unique Drone Use cases
  • Drone Delivery forecast

and more


An Examination Of Computer Forensics And Related Certifications In The Accounting Curriculum, Michael A. Seda, Bonita Peterson Kramer, D. Larry Crumbley Jul 2019

An Examination Of Computer Forensics And Related Certifications In The Accounting Curriculum, Michael A. Seda, Bonita Peterson Kramer, D. Larry Crumbley

Journal of Digital Forensics, Security and Law

Forensic accounting has been a fast-growing niche area within the accounting field for many years. While there has been dramatic growth in the number of courses and degrees in forensic accounting offered by universities, certain relevant topics receive little coverage, such as computer forensics. The purpose of this paper is to examine the views of accounting academics and practitioners pertaining to integrating computer forensics in the accounting curriculum, as well as to determine which forensic accounting certifications the respondents hold. Differences in opinions between the two groups are discussed, along with recommendations on how to improve the forensic accounting curriculum …


Stem And Sustainability: Creating Aviation Professional Change Agents, P. Clark, Doreen Mcgunagle, L. Zizka Jan 2019

Stem And Sustainability: Creating Aviation Professional Change Agents, P. Clark, Doreen Mcgunagle, L. Zizka

Publications

With the evolution of the workforce and the growing needs of the aviation industry, a clear need for concrete sustainability initiatives and actions have emerged. Sustainability in this sense becomes a matter of survival. For this reason, in this chapter, we will attempt to close three gaps in current sustainability studies: Theory vs practice, intention vs behavior, and education vs workplace.

Our purpose is to develop a ‘simple’ strategy for integrating all three pillars of sustainability into STEM HE programs that create authentic engagement and real buy-in from the students that are then replicated in the workplace. Based on the …


Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell Dec 2017

Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell

Journal of Digital Forensics, Security and Law

Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an …


Sms - Reaching Beyond Low Hanging Fruit, Stewart Schreckengast Jan 2014

Sms - Reaching Beyond Low Hanging Fruit, Stewart Schreckengast

International Journal of Aviation, Aeronautics, and Aerospace

Human nature predisposes us to maximize our accomplishments while making a concerted effort to balance resource expenditures so we achieve an optimal return on our efforts. All too often what this really means is that we do the easy things that can be done with minimal effort; we grab the low hanging fruit. Traditional incident investigation methodology enables us to reach beyond the obvious reactive solutions. The incident investigation methodology is also an exceptional foundation for safety management system (SMS) development because it supports a holistic approach to reaching the fruit that is ripe for harvesting, the deficiencies that become …


Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay Jan 2013

Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay

Security Studies & International Affairs - Daytona Beach

Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …


Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay Jan 2013

Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay

Applied Aviation Sciences - Daytona Beach

Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …


A Guide For Homeland Security Instructors Preparing Physical Critical Infrastructure Protection Courses, Steven Hart, James D. Ramsay Jun 2011

A Guide For Homeland Security Instructors Preparing Physical Critical Infrastructure Protection Courses, Steven Hart, James D. Ramsay

Security Studies & International Affairs - Daytona Beach

Over 350 academic programs in the United States currently offer instruction in the field of homeland defense and security. In spite of this growth at the program level over the past ten years, there still exists a shortage of instructors and coursework in critical infrastructure protection (CIP). Traditional instructor preparation (which is accomplished through the attainment of an advanced degree coupled with research and professional experience) does not currently produce enough instructors qualified in CIP because of the extremely limited number of CIP-related educational opportunities. Therefore, an alternate venue for instructor preparation must be provided. This article addresses that need …


Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel A. Cutrer, Robert Raffel May 2010

Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel A. Cutrer, Robert Raffel

Security Studies & International Affairs - Daytona Beach

As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging. As such, there is an acknowledged need to develop academic homeland security programs to try and meet anticipated workforce needs. However, the lack of an accreditation system or a set of available published outcomes (or standards) have complicated efforts towards homeland security program development. At present, determining which courses to teach and which outcomes in each course to pursue must be left to anecdotal conversations, reviews of the …


Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel Cutrer, Robert Raffel May 2010

Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel Cutrer, Robert Raffel

Applied Aviation Sciences - Daytona Beach

As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging. As such, there is an acknowledged need to develop academic homeland security programs to try and meet anticipated workforce needs. However, the lack of an accreditation system or a set of available published outcomes (or standards) have complicated efforts towards homeland security program development. At present, determining which courses to teach and which outcomes in each course to pursue must be left to anecdotal conversations, reviews of the …


Trends. When Is A Psychological Profile Not A Psychological Profile? The Fbi And School Violence, Ibpp Editor Oct 2000

Trends. When Is A Psychological Profile Not A Psychological Profile? The Fbi And School Violence, Ibpp Editor

International Bulletin of Political Psychology

This article discusses the difficulties of predicting and preventing school violence. Though the FBI does have a list of "warning signs" by which to evaluate potential perpetrators of lethal school violence, they do not consider this list to be a profile. This is especially true given that no reliable predictors of lethal school violence have been found.


Ibpp Research Associates: Botswana, Ditso Anneleng Mar 2000

Ibpp Research Associates: Botswana, Ditso Anneleng

International Bulletin of Political Psychology

This article discusses educational and legal issues surrounding students from Botswana enrolled in an alleged fake educational institution - African Media University in South Africa.