Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

Journal

2015

Institution
Keyword
Publication

Articles 151 - 177 of 177

Full-Text Articles in Physical Sciences and Mathematics

How Do Personal Connections Play A Role In Risk Perception Of Climate Change And Sea Level Rise?, Katelyn Sheeley Jan 2015

How Do Personal Connections Play A Role In Risk Perception Of Climate Change And Sea Level Rise?, Katelyn Sheeley

OUR Journal: ODU Undergraduate Research Journal

The threat of sea level rise is unknown to many coastal residents living in the United States, including Virginians. Climate Central, a nonprofit research-based organization, has created the Risk Finder tool to help inform the public about the potential dangers posed by sea level rise. Risk Finder is an interactive, online mapping tool intended to inform residents of useful data concerning sea level rise. Dr. Daniel Richards and Mrs. Megan Mckittrick from Old Dominion University acted as primary investigators for a study of the Risk Finder tool, serving client Dan Rizza of Climate Central. Students of ENGL 231C served as …


Climate Change And Infrastructural Damage, Macey Vansavage Jan 2015

Climate Change And Infrastructural Damage, Macey Vansavage

OUR Journal: ODU Undergraduate Research Journal

With the assistance of ENGL 231C students at Old Dominion University, Dr. Daniel Richards and Mrs. Megan McKittrick led this study testing the usability of Climate Central’s Risk Finder tool. The study was conducted as a client-based, service learning project for a Technical and Scientific writing course, serving client Dan Rizza at Climate Central, a nonprofit research organization. The study serves as a way for local collegiate students to be able to gain knowledge about the execution of faculty-level research. The Risk Finder tool allows users to view the potential effects of sea level rise on their area. The tool …


Student Contributors -- Global Perspectives/Regional Solutions: A Public Journalism Project Curated, Peter Adams Jan 2015

Student Contributors -- Global Perspectives/Regional Solutions: A Public Journalism Project Curated, Peter Adams

OUR Journal: ODU Undergraduate Research Journal

[Editor note: This project is in the form of a Wordpress site containing interviews, articles and other materials by students in a public journalism course. The primary pages were saved as a pdf document for download. For the full text of student works, please see the full Wordpress site at: https://snaax123.wordpress.com/

from "About":
Welcome to a project of Public Journalism CRN 10745
Climate Change: Global Perspectives. Regional Solutions
Students have learned the fundamentals of journalism research and reporting. Students also examined issues surrounding climate change and sea-level rise globally and regionally in Hampton Roads.]


Earthworm Populations In A Wheat-Soybean Double-Crop System Under Seven Years Of Established Residue Management Practices, Jill Thomason, Mary Savin, Kristopher Brye, Donn T. Johnson Jan 2015

Earthworm Populations In A Wheat-Soybean Double-Crop System Under Seven Years Of Established Residue Management Practices, Jill Thomason, Mary Savin, Kristopher Brye, Donn T. Johnson

Discovery, The Student Journal of Dale Bumpers College of Agricultural, Food and Life Sciences

Earthworms improve soil structure, distribute litter and microbes, stimulate microbial activity, facilitate decomposition, and increase nitrogen (N) availability for plant growth. Earthworm density is often reduced in low organic matter soils that are intensively managed to grow row crops. This study was designed to relate earthworm density and community composition to residue management after seven years of established management practices in a wheat (Triticum aestivum L.)-soybean (Glycine max (L.) Merr.) double-crop system maintained in Marianna, Ark. Residue management practices included conventional tillage (CT) and no-tillage (NT), N fertilization to produce high and low wheat residue amounts left in the field, …


Habitat Assessment And Ecological Restoration Design For An Unnamed Tributary Of Stone Dam Creek, Conway, Arkansas, Paige E. Boyle, Mary C. Savin, James A. Mccarty, Marty D. Matlock Jan 2015

Habitat Assessment And Ecological Restoration Design For An Unnamed Tributary Of Stone Dam Creek, Conway, Arkansas, Paige E. Boyle, Mary C. Savin, James A. Mccarty, Marty D. Matlock

Discovery, The Student Journal of Dale Bumpers College of Agricultural, Food and Life Sciences

Urbanization can lead to increased sedimentation, erosion, pollution, and runoff into streams. The United States Environmental Protection Agency’s (USEPA) Rapid Bioassessment Protocols (RBPs) are sets of guidelines that can be used to assess a habitat’s sedimentology, hydrology, vegetation, and geomorphology to determine impairment. An unnamed tributary of Stone Dam Creek on the University of Central Arkansas (UCA) campus in Conway, Arkansas runs partially underground and through the urbanized UCA campus watershed. The stream was assessed using the USEPA’s RBPs to determine impairment of the stream, and received a RBP score of 71.2 out of 200 compared to 153.5 in a …


Cover Jan 2015

Cover

Journal of the Iowa Academy of Science: JIAS

No abstract provided.


Human Behavior During Spaceflight - Evidence From An Analog Environment, Kenny M. Arnaldi, Guy Smith, Jennifer E. Thropp Jan 2015

Human Behavior During Spaceflight - Evidence From An Analog Environment, Kenny M. Arnaldi, Guy Smith, Jennifer E. Thropp

Journal of Aviation/Aerospace Education & Research

Spaceflight offers a multitude of stressors to humans living and working in space, originating from the external space environment and the life-support system. Future space participants may be ordinary people with different medical and psychosocial backgrounds who may not receive the intense spaceflight preparation of astronauts. Consequently, during a mission, a space participant’s mood and behavior could differ from a trained astronaut. This study was an exploratory research project that used an artificial habitat to replicate an orbital environment and the activities performed by humans in space. The study evaluated whether the type of environment affects mood and temperament. Two …


A Survey Of Botnet Detection Techniques By Command And Control Infrastructure, Thomas S. Hyslip, Jason M. Pittman Jan 2015

A Survey Of Botnet Detection Techniques By Command And Control Infrastructure, Thomas S. Hyslip, Jason M. Pittman

Journal of Digital Forensics, Security and Law

Botnets have evolved to become one of the most serious threats to the Internet and there is substantial research on both botnets and botnet detection techniques. This survey reviewed the history of botnets and botnet detection techniques. The survey showed traditional botnet detection techniques rely on passive techniques, primarily honeypots, and that honeypots are not effective at detecting peer-to-peer and other decentralized botnets. Furthermore, the detection techniques aimed at decentralized and peer-to-peer botnets focus on detecting communications between the infected bots. Recent research has shown hierarchical clustering of flow data and machine learning are effective techniques for detecting botnet peer-to-peer …


To License Or Not To License Reexamined: An Updated Report On State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Alan Rea, Doug White Jan 2015

To License Or Not To License Reexamined: An Updated Report On State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Alan Rea, Doug White

Journal of Digital Forensics, Security and Law

In this update to the 2012 year's study, the authors examine statutes that regulate, license, and enforce investigative functions in each US state. As before, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. There is a small trend in which some states are changing definitions or moving to exempt DE from PI licensing requirements. However, we look at some additional information in terms of practicing attorney exemptions that may cloud the licensing waters.

As with the previous research studies (Lonardo et al., 2008, 2009, 2012) the authors contacted all state regulatory agencies …


Litigation Holds: Past, Present, And Future Directions, Milton Luoma, Vicki M. Luoma Jan 2015

Litigation Holds: Past, Present, And Future Directions, Milton Luoma, Vicki M. Luoma

Journal of Digital Forensics, Security and Law

Electronically Stored Information (ESI) first became a serious litigation issue in the late 1990s, and the first attempts to determine best practices did not occur until the early 2000s. As best practices developed, the litigation hold to prevent routine destruction of documents and to preserve documents relevant to litigation came into existence. The duty to preserve ESI is triggered when litigation is reasonably anticipated. All information that relates to potential litigation must be preserved from the time it becomes reasonably apparent that litigation is possible until the expiration of the statute of limitations. If steps are not taken to properly …


Table Of Contents Jan 2015

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


From The Editor-In-Chief, Ibrahim Baggili Jan 2015

From The Editor-In-Chief, Ibrahim Baggili

Journal of Digital Forensics, Security and Law

Welcome to JDFSL’s second issue for 2015! First, I would like to thank our editorial board, reviewers, and the JDFSL team for bringing this issue to life. In this issue, we continue our multidisciplinary tradition. The first paper, Two challenges of stealthy hypervisors detection: time cheating and data fluctuations, showcases an important contribution to the computing discipline. The use of virtualization has dramatically increased given our strong reliance on cloud services both private and public. Even though hypervisors enhance security, they can also be exploited by malware. Therefore, this paper is of importance given that it introduces a novel method …


Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin Jan 2015

Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin

Journal of Digital Forensics, Security and Law

Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into modern malware which is rather hard to detect. None of the existing methods is able to efficiently detect a hypervisor in the face of countermeasures such as time cheating, temporary self uninstalling, memory hiding etc. New hypervisor detection methods which will be described in this paper can detect a hypervisor under these countermeasures and even count several nested ones. These novel approaches rely on …


Rules Of Professional Responsibility In Digital Forensics: A Comparative Analysis, Filipo Sharevski Jan 2015

Rules Of Professional Responsibility In Digital Forensics: A Comparative Analysis, Filipo Sharevski

Journal of Digital Forensics, Security and Law

The consolidation of the rules of professional responsibility as recommended by the Committee on Identifying the Needs of Forensic Sciences Community (2009) accents the establishment of an uniform code of ethics emphasizing the importance of enforceability in strengthening the role the forensic science plays within the criminal justice system. Equally pertinent for the domain of digital forensics, this imperative entails a research commitment in comparing and contrasting the respective codes of ethics to illustrate their “variety, specificity and enforceability” in order to inform the discussion on the regulative aspects of the digital forensic discipline. Accordingly, this paper reviews the professional …


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Table Of Contents Jan 2015

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Computer Forensic Projects For Accountants, Grover S. Kearns Jan 2015

Computer Forensic Projects For Accountants, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …


Identification And Exploitation Of Inadvertent Spectral Artifacts In Digital Audio, N. C. Donnangelo, W. S. Kuklinski, R. Szabo, R. A. Coury, G. R. Hamshar Jan 2015

Identification And Exploitation Of Inadvertent Spectral Artifacts In Digital Audio, N. C. Donnangelo, W. S. Kuklinski, R. Szabo, R. A. Coury, G. R. Hamshar

Journal of Digital Forensics, Security and Law

We show that modulation products from local oscillators in a variety of commercial camcorders are coupled into the recorded audio track, creating narrow band time invariant spectral features. These spectral features, left largely intact by transcoding, compression and other forms of audiovisual post processing, can encode characteristics of specific camcorders used to capture the audio files, including the make and model. Using data sets both downloaded from YouTube and collected under controlled laboratory conditions we demonstrate an average probability of detection (Pd) approaching 0.95 for identification of a specific camcorder in a population of thousands of similar recordings, with a …


Table Of Contents Jan 2015

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Factors Influencing Digital Forensic Investigations: Empirical Evaluation Of 12 Years Of Dubai Police Cases, Ibtesam Alawadhi, Janet C. Read, Andrew Marrington, Virginia N. L. Franqueira Jan 2015

Factors Influencing Digital Forensic Investigations: Empirical Evaluation Of 12 Years Of Dubai Police Cases, Ibtesam Alawadhi, Janet C. Read, Andrew Marrington, Virginia N. L. Franqueira

Journal of Digital Forensics, Security and Law

In Digital Forensics, the number of person-hours spent on investigation is a key factor which needs to be kept to a minimum whilst also paying close attention to the authenticity of the evidence. The literature describes challenges behind increasing person-hours and identifies several factors which contribute to this phenomenon. This paper reviews these factors and demonstrates that they do not wholly account for increases in investigation time. Using real case records from the Dubai Police, an extensive study explains the contribution of other factors to the increase in person-hours. We conclude this work by emphasizing on several factors affecting the …


Tracking And Taxonomy Of Cyberlocker Link Sharers Based On Behavior Analysis, Xiao-Xi Fan, Kam-Pui Chow Jan 2015

Tracking And Taxonomy Of Cyberlocker Link Sharers Based On Behavior Analysis, Xiao-Xi Fan, Kam-Pui Chow

Journal of Digital Forensics, Security and Law

The growing popularity of cyberlocker service has led to significant impact on the Internet that it is considered as one of the biggest contributors to the global Internet traffic estimated to be illegally traded content. Due to the anonymity property of cyberlocker, it is difficult for investigators to track user identity directly on cyberlocker site. In order to find the potential relationships between cyberlocker users, we propose a framework to collect cyberlocker related data from public forums where cyberlocker users usually distribute cyberlocker links for others to download and identity information can be gathered easily. Different kinds of sharing behaviors …


Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova Jan 2015

Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova

Journal of Digital Forensics, Security and Law

With ubiquitous computing and the growth of the Internet of Things, there is vast expansion in the deployment and use of event data recording systems in a variety of environments. From the ships’ logs of antiquity through the evolution of personal devices for recording personal and environmental activities, these devices offer rich forensic and evidentiary opportunities that smash against rights of privacy and personality. The technical configurations of these devices provide for greater scope of sensing, interconnection options for local, near, and cloud storage of data, and the possibility of powerful analytics. This creates the unique situation of near-total data …


Plc Forensics Based On Control Program Logic Change Detection, Ken Yau, Kam-Pui Chow Jan 2015

Plc Forensics Based On Control Program Logic Change Detection, Ken Yau, Kam-Pui Chow

Journal of Digital Forensics, Security and Law

Supervisory Control and Data Acquisition (SCADA) system is an industrial control automated system. It is built with multiple Programmable Logic Controllers (PLCs). PLC is a special form of microprocessor-based controller with proprietary operating system. Due to the unique architecture of PLC, traditional digital forensic tools are difficult to be applied. In this paper, we propose a program called Control Program Logic Change Detector (CPLCD), it works with a set of Detection Rules (DRs) to detect and record undesired incidents on interfering normal operations of PLC. In order to prove the feasibility of our solution, we set up two experiments for …


Forensic Acquisition Of Imvu: A Case Study, Robert Van Voorst, M-Tahar Kechadi, Nhien-An Le-Khac Jan 2015

Forensic Acquisition Of Imvu: A Case Study, Robert Van Voorst, M-Tahar Kechadi, Nhien-An Le-Khac

Journal of Digital Forensics, Security and Law

There are many applications available for personal computers and mobile devices that facilitate users in meeting potential partners. There is, however, a risk associated with the level of anonymity on using instant message applications, because there exists the potential for predators to attract and lure vulnerable users. Today Instant Messaging within a Virtual Universe (IMVU) combines custom avatars, chat or instant message (IM), community, content creation, commerce, and anonymity. IMVU is also being exploited by criminals to commit a wide variety of offenses. However, there are very few researches on digital forensic acquisition of IMVU applications. In this paper, we …


Exploring The Use Of Plc Debugging Tools For Digital Forensic Investigations On Scada Systems, Tina Wu, Jason R.C. Nurse Jan 2015

Exploring The Use Of Plc Debugging Tools For Digital Forensic Investigations On Scada Systems, Tina Wu, Jason R.C. Nurse

Journal of Digital Forensics, Security and Law

The Stuxnet malware attack has provided strong evidence for the development of a forensic capability to aid in thorough post-incident investigations. Current live forensic tools are typically used to acquire and examine memory from computers running either Windows or Unix. This makes them incompatible with embedded devices found on SCADA systems that have their own bespoke operating system. Currently, only a limited number of forensics tools have been developed for SCADA systems, with no development of tools to acquire the program code from PLCs. In this paper, we explore this problem with two main hypotheses in mind. Our first hypothesis …


The Use Of Ontologies In Forensic Analysis Of Smartphone Content, Mohammed Alzaabi, Thomas A. Martin, Kamal Taha, Andy Jones Jan 2015

The Use Of Ontologies In Forensic Analysis Of Smartphone Content, Mohammed Alzaabi, Thomas A. Martin, Kamal Taha, Andy Jones

Journal of Digital Forensics, Security and Law

Digital forensics investigators face a constant challenge in keeping track with evolving technologies such as smartphones. Analyzing the contents of these devices to infer useful information is becoming more time consuming as the volume and complexity of data are increasing. Typically, such analysis is undertaken by a human, which makes it dependent on the experience of the investigator. To overcome such impediments, an automated technique can be utilized in order to aid the investigator to quickly and eciently analyze the data.In this paper, we propose F-DOS; a set of ontologies that models the smartphone content for the purpose of forensic …


Project Maelstrom: Forensic Analysis Of The Bittorrent-Powered Browser, Jason Farina, M-Tahar Kechadi, Mark Scanlon Jan 2015

Project Maelstrom: Forensic Analysis Of The Bittorrent-Powered Browser, Jason Farina, M-Tahar Kechadi, Mark Scanlon

Journal of Digital Forensics, Security and Law

In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken offline by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, security and privacy considerations are raised. This paper explores …