Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

2011

Conference

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 43

Full-Text Articles in Physical Sciences and Mathematics

The Chernobyl Disaster : Reflection After 25 Years = 切爾諾貝爾核災難25年後的反思, Valentin Yakushik Dec 2011

The Chernobyl Disaster : Reflection After 25 Years = 切爾諾貝爾核災難25年後的反思, Valentin Yakushik

South South Forum 南南論壇

The adverse technogenic impact of industrial accidents that have gripped the world in recent decades definitely testifies to the problem-ridden character of contemporary economic and technological development. This is especially evident on the example of nuclear industry, which proved to be a source of dangerous pollution in case of potential (and real) catastrophes, as recently borne out by the Fukushima disaster. In this regard, the issues of Chernobyl disaster once again become the part of the discourse centered on the analysis of global nuclear industry problems. Likewise, current situation in Ukraine demands deeper investigation of the problems of technological development, …


Undergraduate Research Opportunities Program 2011, Nicholle Booker, University Of Nevada, Las Vegas Aug 2011

Undergraduate Research Opportunities Program 2011, Nicholle Booker, University Of Nevada, Las Vegas

Undergraduate Research Opportunities Program (UROP)

Undergraduate Research Opportunities Program

On August 9, 2011 the UNLV College of Sciences will celebrate the accomplishments of undergraduate students participating in the Summer 2011 Undergraduate Research Opportunities Program (UROP) and the Research Experience For Undergraduates (REU) Program.

The public is invited to attend, beginning at 10:00 a.m.

Please join us to view student research posters. Student research topics include: biomedicine and human health, Nevada's fragile environment and ecosystems, climate change, stem cell research, microbiology, astrophysics, and many others.

Over 25 UNLV undergraduates and a cohort of 25 undergraduates selected from colleges and universities across the nation will mark the …


On The Ethical Possibility Of Sustainability: A Challenge For Higher Education, Eric Bain-Selbo Jul 2011

On The Ethical Possibility Of Sustainability: A Challenge For Higher Education, Eric Bain-Selbo

Education for Sustainability Summer Institute

At the heart of the sustainability movement are two questions central to its viability: Are human beings capable of treating the Earth ethically? Are human beings capable of acting morally responsibly for the benefit of distant future generations? Answers to both questions are unclear. This paper draws upon the work of 20th century critical theorists to identify the ethical core of these questions. In the process, the paper will show what would be necessary for us to answer these questions affirmatively. The paper concludes with reflections about how higher education, and interdisciplinary inquiry in particular, can be critical to …


Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld May 2011

Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to recover forensic artifacts from mobile devices is proving to be an ever-increasing challenge for investigators. Coupling this with the ubiquity of mobile devices and the increasing complexity and processing power they contain results in a reliance on them by suspects. In investigating Apple’s iOS devices -- namely the iPhone and iPad -- an investigator’s challenges are increased due to the closed nature of the platforms. What is left is an extremely powerful and complex mobile tool that is inexpensive, small, and can be used in suspect activities. Little is known about the internal data structures of the …


Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt May 2011

Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to the ubiquitous use of smartphones, these devices become an increasingly important source of digital evidence in forensic investigations. Thus, the recovery of digital traces from smartphones often plays an essential role for the examination and clarification of the facts in a case. Although some tools already exist regarding the examination of smartphone data, there is still a strong demand to develop further methods and tools for forensic extraction and analysis of data that is stored on smartphones. In this paper we describe specifications of smartphones running Android. We further introduce a newly developed tool – called ADEL – …


Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi May 2011

Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we present the current results and analysis of the survey “Cloud forensics and critical criteria for cloud forensic capability” carried out towards digital forensic experts and practitioners. This survey was created in order to gain a better understanding on some of the key questions of the new field - cloud forensics - before further research and development. We aim to understand concepts such as its definition, the most challenging issues, most valuable research directions, and the critical criteria for cloud forensic capability.

Keywords: Cloud Forensics, Cloud Computing, Digital Forensics, Survey, Cloud Forensic Capability


Kindle Forensics: Acquisition & Analysis, Peter Hannay May 2011

Kindle Forensics: Acquisition & Analysis, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

Keywords: forensics, digital forensics, kindle, mobile, embedded, ebook, ereader


Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis May 2011

Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis

Annual ADFSL Conference on Digital Forensics, Security and Law

The need to professionally and successfully conduct computer forensic investigations of incidents has never been greater. This has launched an increasing demand for a skilled computer security workforce (Locasto, et al., 2011). This paper examines the extent to which AACSB-accredited universities located in Virginia, Maryland and Washington, D.C. are working towards providing courses that will meet this demand. The authors conduct an online research of the information security courses and programs offered by the 27 AACSB-accredited business schools in the selected area.

The preliminary investigation revealed that eight of the 27 participating universities did not offer any courses in cybersecurity, …


Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston May 2011

Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston

Annual ADFSL Conference on Digital Forensics, Security and Law

Creating, building, managing a cost effective digital forensics lab including a team of qualified examiners can be a challenge for colleges [1] with multiple campuses in multiple towns, counties and states. Leaving such examination responsibilities to each of the campuses results in not only disparity in the results but more than likely excessive duplication of efforts as well as the potential for compromise of evidence. Centralizing the forensic efforts results in a team that is not subject to the political pressures of a campus and virtually eliminates the possibility of examiner favoritism. Learn what it takes to create a cost …


Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay May 2011

Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The authors were involved in extensive vulnerability assessment and penetration testing of over 15 large organisations across various industry sectors in the Perth CBD. The actual live testing involved a team of five people for approximately a four week period, and was black box testing. The scanning consisted of running network and web vulnerability tools, and in a few cases, exploiting vulnerability to establish validity of the tools. The tools were run in aggressive mode with no attempt made to deceive or avoid detection by IDS/IPS or firewalls. The aim of the testing was to determine firstly whether these organisations …


Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton May 2011

Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton

Annual ADFSL Conference on Digital Forensics, Security and Law

We present work on the design, implementation, distribution, and use of realistic forensic datasets to support digital forensics and security education. We describe in particular the “M57-Patents” scenario, a multi-modal corpus consisting of hard drive images, RAM images, network captures, and images from other devices typically found in forensics investigations such as USB drives and cellphones. Corpus creation has been performed as part of a scripted scenario; subsequently it is less “noisy” than real-world data but retains the complexity necessary to support a wide variety of forensic education activities. Realistic forensic corpora allow direct comparison of approaches and tools across …


Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker May 2011

Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker

Annual ADFSL Conference on Digital Forensics, Security and Law

Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as …


Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara May 2011

Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara

Annual ADFSL Conference on Digital Forensics, Security and Law

If information leakage occurs, an investigator is instructed to specify what documents were leaked and who leaked them. In the present work, a distributed print-out monitoring system—which consists of a virtual printer driver and print-out policy/log management servers—was developed. For easily matching the discovered (i.e., leaked) paper document with the print-out log, the virtual printer driver acquires full-text of printed-out documents by DDI hooking technique to check the content, transforms a spool file to a picture file and creates both a thumbnail and text log for forensic investigation afterwards. The log size is as only about 0.04 times bigger than …


Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman May 2011

Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman

Annual ADFSL Conference on Digital Forensics, Security and Law

OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an investigator discovers in an OS X environment has the potential for use in discovering other such passwords, and any discovered passwords may also be useful in other aspects of an investigation, not directly related to the OS X environment. This research advises the use of multiple attack vectors in approaching the password problem in an OS X system, including the more generally applicable non-OS X-specific techniques such as social engineering or well-known password cracking techniques …


Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo May 2011

Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo

Annual ADFSL Conference on Digital Forensics, Security and Law

Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so …


Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman May 2011

Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman

Annual ADFSL Conference on Digital Forensics, Security and Law

The inevitable vulnerabilities and criminal targeting of cloud environments demand an understanding of how digital forensic investigations of the cloud can be accomplished. We present two hypothetical case studies of cloud crimes; child pornography being hosted in the cloud, and a compromised cloudbased website. Our cases highlight shortcomings of current forensic practices and laws. We describe significant challenges with cloud forensics, including forensic acquisition, evidence preservation and chain of custody, and open problems for continued research.

Keywords: Cloud computing, cloud forensics, digital forensics, case studies


A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey May 2011

A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Given the ubiquitous nature of computing, individuals now have nearly 24-7 access to the internet. People are not just going online through traditional means with a PC anymore, they are now frequently using nontraditional devices such as cell phones, smart phones, and gaming consoles. Given the increased use of gaming consoles for online access, there is also an increased use of gaming consoles to commit criminal activity. The digital forensic community has been tasked with creating new approaches for forensically analyzing gaming consoles. In this research paper the authors demonstrate different tools, both commercial and open source, available to forensically …


Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma May 2011

Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

With the huge volumes of electronic data subject to discovery in virtually every instance of litigation, time and costs of conducting discovery have become exceedingly important when litigants plan their discovery strategies. Rather than incurring the costs of having lawyers review every document produced in response to a discovery request in search of relevant evidence, a cost effective strategy for document review planning is to use statistical sampling of the database of documents to determine the likelihood of finding relevant evidence by reviewing additional documents. This paper reviews and discusses how sampling can be used to make document review more …


Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier May 2011

Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier

Annual ADFSL Conference on Digital Forensics, Security and Law

As computers and digital devices become more entrenched in our way of life, they become tools for both good and nefarious purposes. When the digital world collides with the legal world, a vast chasm is created. This paper will reflect how the legal community is failing to meet its obligation to provide adequate representation due to a lack of education about digital (computer) forensics. Whether in a civil litigation setting or a criminal setting, attorneys, prosecutors and judges have inadequate knowledge when it comes to the important questions they need to ask regarding digital evidence. Reliance on expert witnesses is …


Risk Auto Theft: Predicting Spatial Distributions Of Crime Events, Tana J. Gurule, Tamara D. Madensen Apr 2011

Risk Auto Theft: Predicting Spatial Distributions Of Crime Events, Tana J. Gurule, Tamara D. Madensen

Graduate Research Symposium (GCUA) (2010 - 2017)

Police typically rely on retrospective hotspot maps to informe prevention strategies aimed at reducing future crime. The current study reviews environmental crime theories that help to identify casual factors associated with rish of auto theft. Map layers are created from data that operationalize these risk factors. These layers are combined using spatial analysis techniques to produce a "risk density" map. Analysis of crime data are used to determing wheter our "risk density" map better predicts subsequetnt theft events than a traditional retrospective hotspot map.


Relationship Between Perceived And Actual Quality Of Data Checking, Hunter Speich, Sophia Karas, Dan Erosa, Kelly Grob, Kimberly A. Barchard Apr 2011

Relationship Between Perceived And Actual Quality Of Data Checking, Hunter Speich, Sophia Karas, Dan Erosa, Kelly Grob, Kimberly A. Barchard

Festival of Communities: UG Symposium (Posters)

Data quality is critical to reaching correct research conclusions. Researchers attempt to ensure that they have accurate data by checking the data after it has been entered. Previous research has demonstrated that some methods of data checking are better than others, but not all researchers use the best methods. Perhaps researchers continue to use less optimal data checking methods because they mistakenly believe that they are highly accurate. The purpose of this study was to examine the relationship between perceived data quality and actual data quality. A total of 29 participants completed this study. Participants checked that letters and numbers …


Analysis Of Morris Water Maze Data With Bayesian Statistical Methods, Maxym V. Myroshnychenko, Anton Westveld, Jefferson Kinney Apr 2011

Analysis Of Morris Water Maze Data With Bayesian Statistical Methods, Maxym V. Myroshnychenko, Anton Westveld, Jefferson Kinney

Festival of Communities: UG Symposium (Posters)

Neuroscientists commonly use a Morris Water Maze to assess learning in rodents. In his kind of a maze, the subjects learn to swim toward a platform hidden in opaque water as they orient themselves according to the cues on the walls. This protocol presents a challenge to statistical analysis, because an artificial cut-off must be set for those experimental subjects that do not reach the platform so as they do not drown from exhaustion. This fact leads to the data being right censored. In our experimental data, which compares learning in rodents that have chemically induced symptoms of schizophrenia to …


Keynote Address: Community Health In Las Vegas, Camila H. Alvarez Apr 2011

Keynote Address: Community Health In Las Vegas, Camila H. Alvarez

Festival of Communities: UG Symposium (Posters)

New Urbanists present both a theory for strong community development and an architectural planning program for moving towards sustainable urban environments. They argue neighborhoods should be compact, pedestrian-friendly, with mixed-usage of housing and activities, and available public spaces. These design elements foster and encourage social interaction among residents which creates and enforces neighborhood community. I tested New Urbanism Theory by performing ethnographic fieldwork to assess the quality of neighborhoods in Las Vegas. Then I compared neighborhood qualities to residents’ responses to their neighborhood, neighbors, and quality of life from the Las Vegas Metropolitan Area Social Survey. My results confirmed New …


Global Warming: At What Point Does Atmospheric Greenhouse Gas Release Become Unethical?, Luke Good, Gladys Lopez Apr 2011

Global Warming: At What Point Does Atmospheric Greenhouse Gas Release Become Unethical?, Luke Good, Gladys Lopez

Festival of Communities: UG Symposium (Posters)

In recent decades, the concept of global warming has developed increasing concern among the scientific community and general public alike. What was initially dismissed as little more than unlikely has now become a severe warning for global climate crisis threatening not only our way of life but ultimate future existence on this planet? Global warming is defined as the steady mean increase in atmospheric temperature, the primary asserted cause thereof being increased emissions and inherent atmospheric concentrations of “greenhouse gases” – carbon dioxide in particular. These gases contribute to the greenhouse effect by trapping radiation (from the sun) in the …


Adaptation Of The Nevada Climate Change Data Portal Web Interface To Small-Screen Mobile Devices, Tsvetan Komarov Apr 2011

Adaptation Of The Nevada Climate Change Data Portal Web Interface To Small-Screen Mobile Devices, Tsvetan Komarov

Festival of Communities: UG Symposium (Posters)

Robust and convenient access to the Nevada Climate Change Data Portal is vital for the project’s success, because of the researchers’ need to gather and analyze large volumes of data with minimal effort. However, the current version of the data portal web interface is not optimized for small-screen mobile devices such as mobile phones, PDAs, iPads, NetBooks, and others. The proposed research will address this issue by exploring the current methods for creating a client-aware web interface adaptable to the variety of small-screen devices, designing and implementing the most appropriate solution, and finally, user testing of the implemented solution.


Event Program, Carl Reiber, Nicholle Booker Apr 2011

Event Program, Carl Reiber, Nicholle Booker

Festival of Communities: UG Symposium (Posters)

UNLV Undergraduates from all departments, programs and colleges participated in a campus-wide symposium on April 16, 2011. Undergraduate posters from all disciplines and also oral presentations of research activities, readings and other creative endeavors were exhibited throughout the festival.


Complete 2011 Program, John Wesley Powell Conference Apr 2011

Complete 2011 Program, John Wesley Powell Conference

John Wesley Powell Student Research Conference

No abstract provided.


Keynote 2: The Alberta Oil Sands — Wrestling Bitumen Out Of The Wild North, David Rudolph Apr 2011

Keynote 2: The Alberta Oil Sands — Wrestling Bitumen Out Of The Wild North, David Rudolph

North American Energy Water Nexus Roundtable

Athabasca Oil Sand Reserve:

- Oil sands are contained within the Cretaceous McMurray Formation. (149,000 km2)

- 2.5 trillion barrels of extractable oil (~ 25 % of Canada Crude Oil Production)

- Surface mineable deposits cover 2,800 km2

- 450 billion L of process water used annually

- Currently over 130 km2 of tailings ponds (largest man-made structures in the world)


Panel Discussion Presentation: Everything Is Connected — Why Mexico’S Problems Are Everyone’S Problems On The Colorado River, And The Other Way Around, Bret C. Birdsong Apr 2011

Panel Discussion Presentation: Everything Is Connected — Why Mexico’S Problems Are Everyone’S Problems On The Colorado River, And The Other Way Around, Bret C. Birdsong

North American Energy Water Nexus Roundtable

Panel Discussion: U.S.-Mexico Transboundary Perspectives

Colorado River Compact:

Allocates water among Upper Basin and Lower Basin
- 7.5 maf for each basin
- Extra 1 maf for lower basin

Supplies Mexico first from surplus above total apportionment to upper an lower basins
- If surplus insufficient to supply Mexico, then Mexico’s share supplied equally by upper and lower basins

Upper division states “shall not cause” flow to lower basin to be less than 75 maf in 10 years


Panel Discussion Presentation: The Colorado River — Operation And Current Conditions, Lorri Gray-Lee Apr 2011

Panel Discussion Presentation: The Colorado River — Operation And Current Conditions, Lorri Gray-Lee

North American Energy Water Nexus Roundtable

Panel Discussion: U.S.-Mexico Transboundary Perspectives

The Colorado River: Operation and Current Conditions

- Overview of Basin
- Overview of the Interim Guidelines
- Current and Projected System Conditions