Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

Journal

2016

Institution
Keyword
Publication

Articles 211 - 235 of 235

Full-Text Articles in Physical Sciences and Mathematics

The North Carolina Outward Bound School Course Impression Survey: A Psychometric Investigation, W. Brad Faircloth, Andrew J. Bobilya, Alan W. Ewert Jan 2016

The North Carolina Outward Bound School Course Impression Survey: A Psychometric Investigation, W. Brad Faircloth, Andrew J. Bobilya, Alan W. Ewert

Research in Outdoor Education

This study investigated the development and psychometric properties of the North Carolina Outward Bound School Course Impression Survey (NCOBSCIS). The NCOBSCIS measures character development, leadership, and environmental service, and was adapted from the previously established Outward Bound Outcomes Instrument (OBOI). The purpose of this study was to both conduct a psychometric evaluation of the NCOBSCIS and to also describe the processes that were used to develop and validate a series of outcome measures. These processes are applicable to other programs interested in measuring participant outcomes.


Outcomes From An Undergraduate Cadet Women's Backpacking Experience, Guy Ilagen, Jill Ilagen, Annie N. Simpson, Todd Shealy, Jennifer Bennett-Mintz, Kally Mccormick Jan 2016

Outcomes From An Undergraduate Cadet Women's Backpacking Experience, Guy Ilagen, Jill Ilagen, Annie N. Simpson, Todd Shealy, Jennifer Bennett-Mintz, Kally Mccormick

Research in Outdoor Education

Women undergraduates at military colleges are likely to experience challenges including heightened stress, isolation, and discrimination. Wilderness-based programs show promising outcomes in an array of areas including stress-coping, fitness motivation, self-efficacy, social support, and improved cognitive functioning. This mixed-methods exploratory study examined outcomes for 17 cadet women (N=17) who participated in a preparatory workshop series and backpacking event. Quantitative data indicated the backpacking workshop series was associated with decreases in perceived stress (p < .05). The backpacking trip was associated with increases in self-efficacy (p < .01). Cadets attributed decreases in perceived stress and increases in self-efficacy to interpersonal/intrapersonal factors and the wilderness/ backpacking experience. These results support the use of wilderness experience to bolster coping and wellness among cadet women.


Personal Meaning Mapping As A Tool To Uncover Learning From An Out-Of-Doors Free-Choice Learning Garden, Deborah L. Bailey, John H. Falk Jan 2016

Personal Meaning Mapping As A Tool To Uncover Learning From An Out-Of-Doors Free-Choice Learning Garden, Deborah L. Bailey, John H. Falk

Research in Outdoor Education

Garden-based learning (GBL), a form of outdoor education contextualized and framed within unpredictable and real-world learning environments, is ideally suited to the teaching of science. However, the vast majority of GBL educational research has utilized a cognitive and positivist research paradigm, one that artificially restricts the investigative lens. The goal of the larger project from which this paper was drawn was to develop a better understanding of how youth perceived a garden experience. This paper shares the affordances and constraints of the constructivist framework utilized and the primary measurement tool, Person Meaning Mapping (PMM). Despite some inherent limitations, the PMM …


The Function Of Field Study: Comparison Of Limited And Full Field Experience Courses, Lauren Fine, Telyn Peterson, Mat Duerden, Riley Nelson, John Bennion Jan 2016

The Function Of Field Study: Comparison Of Limited And Full Field Experience Courses, Lauren Fine, Telyn Peterson, Mat Duerden, Riley Nelson, John Bennion

Research in Outdoor Education

Fieldwork, an experiential and outdoor component of a traditional lecture class, has been effective in improving students' content knowledge and attitudes. However, most studies of these courses use a full lecture course as the comparison group rather than comparing amounts or types of fieldwork. This study compares two classes that incorporate fieldwork (n > = 18 and 12 participants, respectively) and uses both quantitative and qualitative methods to analyze changes in content knowledge, self-efficacy, and perceived value of the subject (entomology). Pre- and post-test scores suggest that information memorization is best taught in a traditional classroom environment. Qualitative data illustrate …


Identity Awareness Through Outdoor Activities For Adolescents With Serious Illnesses, Ann Gillard Jan 2016

Identity Awareness Through Outdoor Activities For Adolescents With Serious Illnesses, Ann Gillard

Research in Outdoor Education

The purpose of this study was to (1) identify which activities in a seven-day outdoor-based program most related to adolescents’ identity awareness and (2) investigate potential changes in participants’ identity awareness. Seventy-four adolescents aged 16 – 18 with serious illnesses (e.g., cancer, sickle cell disease) answered an open-ended question about a time during the program when they “discovered who they were,” and completed an 11-item identity awareness scale. Results showed that structured activities (e.g., night climb, fire council) and unstructured activities (e.g., personal reflection, talking with others) most related to participants’ identity awareness, and that identity awareness increased some or …


The Chautauqua Journal, Complete Volume 1: Nature's Humans Jan 2016

The Chautauqua Journal, Complete Volume 1: Nature's Humans

The Chautauqua Journal

No abstract provided.


Security Analysis Of Mvhash-B Similarity Hashing, Donghoon Chang, Somitra Sanadhya, Monika Singh Jan 2016

Security Analysis Of Mvhash-B Similarity Hashing, Donghoon Chang, Somitra Sanadhya, Monika Singh

Journal of Digital Forensics, Security and Law

In the era of big data, the volume of digital data is increasing rapidly, causing new challenges for investigators to examine the same in a reasonable amount of time. A major requirement of modern forensic investigation is the ability to perform automatic filtering of correlated data, and thereby reducing and focusing the manual effort of the investigator. Approximate matching is a technique to find “closeness” between two digital artifacts. mvHash-B is a well-known approximate matching scheme used for finding similarity between two digital objects and produces a ‘score of similarity’ on a scale of 0 to 100. However, no security …


Journal Of The Arkansas Academy Of Science - Volume 70 2016, Academy Editors Jan 2016

Journal Of The Arkansas Academy Of Science - Volume 70 2016, Academy Editors

Journal of the Arkansas Academy of Science

No abstract provided.


Cover Jan 2016

Cover

Journal of the Iowa Academy of Science: JIAS

No abstract provided.


The Tornado That Struck Embry-Riddle Aeronautical University On Christmas Day, 2006: Lessons Learned From A Near-Miss, John M. Lanicci Jan 2016

The Tornado That Struck Embry-Riddle Aeronautical University On Christmas Day, 2006: Lessons Learned From A Near-Miss, John M. Lanicci

Journal of Aviation/Aerospace Education & Research

An F2 tornado that touched down in Daytona Beach on Christmas Day afternoon caused over $50 million of damage to the Embry-Riddle Aeronautical University campus and nearby neighborhoods. The tornado was part of a severe-weather outbreak over Florida, Georgia, and South Carolina that began during the overnight hours of 25 December 2006. Examination of surface and upper-level meteorological charts and vertical soundings on the morning of 25 December showed stability and wind-shear conditions favorable for tornadic thunderstorms over this region. The evolution of the squall line that moved through east-central Florida, and the parent thunderstorm that produced the tornado was …


Evidential Reasoning For Forensic Readiness, Yi-Ching Liao, Hanno Langweg Jan 2016

Evidential Reasoning For Forensic Readiness, Yi-Ching Liao, Hanno Langweg

Journal of Digital Forensics, Security and Law

To learn from the past, we analyse 1,088 "computer as a target" judgements for evidential reasoning by extracting four case elements: decision, intent, fact, and evidence. Analysing the decision element is essential for studying the scale of sentence severity for cross-jurisdictional comparisons. Examining the intent element can facilitate future risk assessment. Analysing the fact element can enhance an organization's capability of analysing criminal activities for future offender profiling. Examining the evidence used against a defendant from previous judgements can facilitate the preparation of evidence for upcoming legal disclosure. Follow the concepts of argumentation diagrams, we develop an automatic judgement summarizing …


Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers, Eric Olson, Narasimha Shashidhar Jan 2016

Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers, Eric Olson, Narasimha Shashidhar

Journal of Digital Forensics, Security and Law

Traditional forensic analysis of hard disks and external media typically involves a powered down machine and “dead analysis” of these devices. Forensic acquisition of hard drives and external media has traditionally been by one of several means: standalone forensic duplicator; using a hardware write-blocker or dock attached to a laptop, computer, workstation, etc., forensic operating systems that live boot from a USB, CD/DVD or virtual machines with preinstalled operating systems. Standalone forensics acquisition and imaging devices generally cost thousands of dollars. In this paper, we propose the use of single board computers as forensic imaging devices. Single board computers can …


Digital Forensics In Law Enforcement: A Needs Based Analysis Of Indiana Agencies, Teri A. Cummins Flory Jan 2016

Digital Forensics In Law Enforcement: A Needs Based Analysis Of Indiana Agencies, Teri A. Cummins Flory

Journal of Digital Forensics, Security and Law

Cyber crime is a growing problem, with the impact to society increasing exponentially, but the ability of local law enforcement agencies to investigate and successfully prosecute criminals for these crimes is unclear. Many national needs assessments have previously been conducted, and all indicated that state and local law enforcement did not have the training, tools, or staff to effectively conduct digital investigations, but very few have been completed recently. This study provided a current and localized assessment of the ability of Indiana law enforcement agencies to effectively investigate crimes involving digital evidence, the availability of training for both law enforcement …


Table Of Contents Jan 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Exploring Deviant Hacker Networks (Dhm) On Social Media Platforms, Samer Al-Khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger Jan 2016

Exploring Deviant Hacker Networks (Dhm) On Social Media Platforms, Samer Al-Khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger

Journal of Digital Forensics, Security and Law

Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a significant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified …


Log Analysis Using Temporal Logic And Reconstruction Approach: Web Server Case, Murat Gunestas, Zeki Bilgin Jan 2016

Log Analysis Using Temporal Logic And Reconstruction Approach: Web Server Case, Murat Gunestas, Zeki Bilgin

Journal of Digital Forensics, Security and Law

We present a post-mortem log analysis method based on Temporal Logic (TL), Event Processing Language (EPL), and reconstruction approach. After showing that the proposed method could be adapted to any misuse event or attack, we specifically investigate the case of web server misuses. To this end, we examine 5 different misuses on Wordpress web servers, and generate corresponding log files of these attacks for forensic analysis. Then we establish attack patterns and formalize them by means of a special case of temporal logic, i.e. many sorted first order metric temporal logic (MSFOMTL). Later on, we implement these attack patterns in …


Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili Jan 2016

Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili

Journal of Digital Forensics, Security and Law

Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …


On Efficiency Of Distributed Password Recovery, Radek Hranický, Martin Holkovič, Petr Matoušek Jan 2016

On Efficiency Of Distributed Password Recovery, Radek Hranický, Martin Holkovič, Petr Matoušek

Journal of Digital Forensics, Security and Law

One of the major challenges in digital forensics today is data encryption. Due to the leaked information about unlawful sniffing, many users decided to protect their data by encryption. In case of criminal activities, forensic experts are challenged how to decipher suspect's data that are subject to investigation. A common method how to overcome password-based protection is a brute force password recovery using GPU-accelerated hardware. This approach seems to be expensive. This paper presents an alternative approach using task distribution based on BOINC platform. The cost, time and energy efficiency of this approach is discussed and compared to the GPU-based …


Towards Syntactic Approximate Matching - A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee Jan 2016

Towards Syntactic Approximate Matching - A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee

Journal of Digital Forensics, Security and Law

Over the past few years the popularity of approximate matching algorithms (a.k.a. fuzzy hashing) has increased. Especially within the area of bytewise approximate matching, several algorithms were published, tested and improved. It has been shown that these algorithms are powerful, however they are sometimes too precise for real world investigations. That is, even very small commonalities (e.g., in the header of a le) can cause a match. While this is a desired property, it may also lead to unwanted results. In this paper we show that by using simple pre-processing, we signicantly can in uence the outcome. Although our test …


Electronic Voting Service Using Block-Chain, Kibin Lee, Joshua I. James, Tekachew G. Ejeta, Hyoung J. Kim Jan 2016

Electronic Voting Service Using Block-Chain, Kibin Lee, Joshua I. James, Tekachew G. Ejeta, Hyoung J. Kim

Journal of Digital Forensics, Security and Law

Cryptocurrency, and its underlying technologies, has been gaining popularity for transaction management beyond financial transactions. Transaction information is maintained in the block-chain, which can be used to audit the integrity of the transaction. The focus on this paper is the potential availability of block-chain technology of other transactional uses. Block-chain is one of the most stable open ledgers that preserves transaction information, and is difficult to forge. Since the information stored in block-chain is not related to personally identify information, it has the characteristics of anonymity. Also, the block-chain allows for transparent transaction verification since all information in the block-chain …


Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot Jan 2016

Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot

Journal of Digital Forensics, Security and Law

Image splicing is a common and widespread type of manipulation, which is defined as pasting a portion of an image onto a second image. Several forensic methods have been developed to detect splicing, using various image properties. Some of these methods exploit the noise statistics of the image to try and find discrepancies. In this paper, we propose a new counter-forensic approach to eliminate the noise differences that can appear in a spliced image. This approach can also be used when creating computer graphics images, in order to endow them with a realistic noise. This is performed by changing the …


An Automated Approach For Digital Forensic Analysis Of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, Fudong Li Jan 2016

An Automated Approach For Digital Forensic Analysis Of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, Fudong Li

Journal of Digital Forensics, Security and Law

The major challenges with big data examination and analysis are volume, complex interdependence across content, and heterogeneity. The examination and analysis phases are considered essential to a digital forensics process. However, traditional techniques for the forensic investigation use one or more forensic tools to examine and analyse each resource. In addition, when multiple resources are included in one case, there is an inability to cross-correlate findings which often leads to inefficiencies in processing and identifying evidence. Furthermore, most current forensics tools cannot cope with large volumes of data. This paper develops a novel framework for digital forensic analysis of heterogeneous …


Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera Jan 2016

Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera

Journal of Digital Forensics, Security and Law

Drives found during investigations often have useful information in the form of email addresses which can be acquired by search in the raw drive data independent of the file system. Using this data we can build a picture of the social networks that a drive owner participated in, even perhaps better than investigating their online profiles maintained by social-networking services because drives contain much data that users have not approved for public display. However, many addresses found on drives are not forensically interesting, such as sales and support links. We developed a program to filter these out using a Naïve …


Verification Of Recovered Digital Evidence On The Amazon Kindle, Marcus Thompson, Raymond Hansen Jan 2016

Verification Of Recovered Digital Evidence On The Amazon Kindle, Marcus Thompson, Raymond Hansen

Journal of Digital Forensics, Security and Law

The Amazon Kindle is a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various types of files a typical user may introduce using one method, the USB interface. The Kindle was forensically imaged with AccessData’s Forensic Toolkit Imager before and after each Kindle was populated. Each file was deleted through …


Table Of Contents Jan 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.