Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Higher education (4)
- Homeland security (4)
- Teaching (3)
- Aviation (2)
- Cybersecurity (2)
-
- Outcomes (2)
- Small device forensics (2)
- Academic laboratories (1)
- Accounting curriculum (1)
- Accounting practitioners (1)
- Aviation industry (1)
- Binary files (1)
- Botswana (1)
- Certifications (1)
- Chip-off extraction (1)
- Computer forensics (1)
- Customs of War (1)
- Cyber Combat (1)
- Cyber-Warfare (1)
- Cyber–Ordnance (1)
- Cyber–Space (1)
- Data carving (1)
- Data recovery (1)
- Digital forensics (1)
- Digital forensics education (1)
- Digital triage (1)
- Drones (1)
- Education (1)
- Experiential learning (1)
- FBI (1)
- Publication
- Publication Type
Articles 1 - 16 of 16
Full-Text Articles in Education
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
Doctoral Dissertations and Master's Theses
This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …
Surveying The Safety Culture Of Academic Laboratories, Emily Faulconer, Zachary Dixon, John C. Griffith, Hayden Frank
Surveying The Safety Culture Of Academic Laboratories, Emily Faulconer, Zachary Dixon, John C. Griffith, Hayden Frank
Publications
The university traditionally has been the foundation for young adults’ professional development, yet the proclivity toward safety culture has garnered less focus in higher education than in the workforce. A survey of faculty at a medium-sized, research-active, private institution revealed specific areas of policy noncompliance as well as specific safety attitudes that can be targeted for interventions. Albeit a snapshot view, the survey implies that safety needs better representation in the classroom, teaching laboratories, and research facilities at universities. Safety is not abandoned by any means, and there is a strong presence of safety-oriented individuals, but the data show barriers …
Title Ix Effectiveness At American Universities, Corrine K. Girard
Title Ix Effectiveness At American Universities, Corrine K. Girard
Discovery Day - Prescott
The purpose of this research is to contribute to and improve existing university knowledge of the effectiveness of the University Title IX reporting process. After discussing experiences with Title IX with students at ERAU, it is apparent that there is a negative connotation among university students with this program. This research will build off of the research completed last year in which ERAU Title IX processes were compared to that of Occidental College and CalTech. This research aims to provide clarity to Title IX offices at the University to aid in successfully adapting their program to the needs of the …
Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through
Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through
Journal of Digital Forensics, Security and Law
Data carving is a technique used in data recovery to isolate and extract files based on file content without any file system guidance. It is an important part of data recovery and digital forensics, but it is also useful in teaching computer science students about file structure and binary encoding of information especially within a digital forensics program. This work demonstrates how the authors teach data carving using a real world problem they encounter in digital forensics evidence processing involving the extracting of text messages from unstructured small device binary extractions. The authors have used this problem for instruction in …
Global Outlook Of Aviation & Drones, Darshan Divakaran M.S.
Global Outlook Of Aviation & Drones, Darshan Divakaran M.S.
National Training Aircraft Symposium (NTAS)
This presentation will discuss the Global outlook in Aviation & Drones. It will cover both manned and unmanned aviation forecast.
Topics that will be covered -
- The Future of Aviation
- Aviation Forecast
- Who is using Drones
- Path forward for drones
- Factors that influence UAS growth
- Standards for training & certification
- Current Global Drone Delivery
- UAS Integration Pilot Program
- Unique Drone Use cases
- Drone Delivery forecast
and more
An Examination Of Computer Forensics And Related Certifications In The Accounting Curriculum, Michael A. Seda, Bonita Peterson Kramer, D. Larry Crumbley
An Examination Of Computer Forensics And Related Certifications In The Accounting Curriculum, Michael A. Seda, Bonita Peterson Kramer, D. Larry Crumbley
Journal of Digital Forensics, Security and Law
Forensic accounting has been a fast-growing niche area within the accounting field for many years. While there has been dramatic growth in the number of courses and degrees in forensic accounting offered by universities, certain relevant topics receive little coverage, such as computer forensics. The purpose of this paper is to examine the views of accounting academics and practitioners pertaining to integrating computer forensics in the accounting curriculum, as well as to determine which forensic accounting certifications the respondents hold. Differences in opinions between the two groups are discussed, along with recommendations on how to improve the forensic accounting curriculum …
Stem And Sustainability: Creating Aviation Professional Change Agents, P. Clark, Doreen Mcgunagle, L. Zizka
Stem And Sustainability: Creating Aviation Professional Change Agents, P. Clark, Doreen Mcgunagle, L. Zizka
Publications
With the evolution of the workforce and the growing needs of the aviation industry, a clear need for concrete sustainability initiatives and actions have emerged. Sustainability in this sense becomes a matter of survival. For this reason, in this chapter, we will attempt to close three gaps in current sustainability studies: Theory vs practice, intention vs behavior, and education vs workplace.
Our purpose is to develop a ‘simple’ strategy for integrating all three pillars of sustainability into STEM HE programs that create authentic engagement and real buy-in from the students that are then replicated in the workplace. Based on the …
Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell
Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell
Journal of Digital Forensics, Security and Law
Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an …
Sms - Reaching Beyond Low Hanging Fruit, Stewart Schreckengast
Sms - Reaching Beyond Low Hanging Fruit, Stewart Schreckengast
International Journal of Aviation, Aeronautics, and Aerospace
Human nature predisposes us to maximize our accomplishments while making a concerted effort to balance resource expenditures so we achieve an optimal return on our efforts. All too often what this really means is that we do the easy things that can be done with minimal effort; we grab the low hanging fruit. Traditional incident investigation methodology enables us to reach beyond the obvious reactive solutions. The incident investigation methodology is also an exceptional foundation for safety management system (SMS) development because it supports a holistic approach to reaching the fruit that is ripe for harvesting, the deficiencies that become …
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Security Studies & International Affairs - Daytona Beach
Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Applied Aviation Sciences - Daytona Beach
Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …
A Guide For Homeland Security Instructors Preparing Physical Critical Infrastructure Protection Courses, Steven Hart, James D. Ramsay
A Guide For Homeland Security Instructors Preparing Physical Critical Infrastructure Protection Courses, Steven Hart, James D. Ramsay
Security Studies & International Affairs - Daytona Beach
Over 350 academic programs in the United States currently offer instruction in the field of homeland defense and security. In spite of this growth at the program level over the past ten years, there still exists a shortage of instructors and coursework in critical infrastructure protection (CIP). Traditional instructor preparation (which is accomplished through the attainment of an advanced degree coupled with research and professional experience) does not currently produce enough instructors qualified in CIP because of the extremely limited number of CIP-related educational opportunities. Therefore, an alternate venue for instructor preparation must be provided. This article addresses that need …
Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel A. Cutrer, Robert Raffel
Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel A. Cutrer, Robert Raffel
Security Studies & International Affairs - Daytona Beach
As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging. As such, there is an acknowledged need to develop academic homeland security programs to try and meet anticipated workforce needs. However, the lack of an accreditation system or a set of available published outcomes (or standards) have complicated efforts towards homeland security program development. At present, determining which courses to teach and which outcomes in each course to pursue must be left to anecdotal conversations, reviews of the …
Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel Cutrer, Robert Raffel
Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel Cutrer, Robert Raffel
Applied Aviation Sciences - Daytona Beach
As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging. As such, there is an acknowledged need to develop academic homeland security programs to try and meet anticipated workforce needs. However, the lack of an accreditation system or a set of available published outcomes (or standards) have complicated efforts towards homeland security program development. At present, determining which courses to teach and which outcomes in each course to pursue must be left to anecdotal conversations, reviews of the …
Trends. When Is A Psychological Profile Not A Psychological Profile? The Fbi And School Violence, Ibpp Editor
Trends. When Is A Psychological Profile Not A Psychological Profile? The Fbi And School Violence, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the difficulties of predicting and preventing school violence. Though the FBI does have a list of "warning signs" by which to evaluate potential perpetrators of lethal school violence, they do not consider this list to be a profile. This is especially true given that no reliable predictors of lethal school violence have been found.
Ibpp Research Associates: Botswana, Ditso Anneleng
Ibpp Research Associates: Botswana, Ditso Anneleng
International Bulletin of Political Psychology
This article discusses educational and legal issues surrounding students from Botswana enrolled in an alleged fake educational institution - African Media University in South Africa.