Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (36)
- California State University, San Bernardino (19)
- Kansas State University Libraries (15)
- University of New Haven (10)
- Selected Works (8)
-
- Singapore Management University (5)
- Old Dominion University (3)
- University of Nebraska - Lincoln (3)
- Andrews University (2)
- San Jose State University (2)
- California Polytechnic State University, San Luis Obispo (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Johnson County Community College (1)
- Liberty University (1)
- Marquette University (1)
- Portland State University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- The University of Akron (1)
- The University of Southern Mississippi (1)
- University of Connecticut (1)
- University of Nevada, Las Vegas (1)
- University of New Hampshire (1)
- University of New Orleans (1)
- University of Pennsylvania Carey Law School (1)
- University of South Florida (1)
- University of Vermont (1)
- University of Windsor (1)
- Winthrop University (1)
- World Maritime University (1)
- Keyword
-
- Digital forensics (12)
- Digital preservation (6)
- Computer forensics (5)
- Privacy (5)
- Cyber forensics (4)
-
- Survey (4)
- Collaboration (3)
- Digital collections (3)
- Fuzzy hashing (3)
- Approximate matching (2)
- Assessment (2)
- Big data (2)
- Bytewise (2)
- Cloud Computing (2)
- Computer vision (2)
- Cyber-harassment (2)
- Cyberbullying (2)
- Data leakage (2)
- Data mining (2)
- Digital Forensics (2)
- Digital curation (2)
- Digital evidence (2)
- Digitization (2)
- Emotion (2)
- Forensic imaging (2)
- HRI (2)
- Human-Robot Interaction (2)
- Innovation (2)
- Metadata (2)
- Mrsh-v2 (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (31)
- Journal of International Technology and Information Management (19)
- Central Plains Network for Digital Asset Management (14)
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- Annual ADFSL Conference on Digital Forensics, Security and Law (5)
-
- Research Collection School Of Computing and Information Systems (5)
- Matt Schultz (4)
- Andrews Agenda: Campus News (2)
- Keith Reid MacArthur (2)
- All Faculty Scholarship (1)
- Claremont-UC Undergraduate Research Conference on the European Union (1)
- College of Education and Human Sciences: Dissertations, Theses, and Student Research (1)
- Dan Mellamphy (1)
- Department of Anthropology: Faculty Publications (1)
- Dissertations (1)
- Dissertations (1934 -) (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Engineering and Technology Management Faculty Publications and Presentations (1)
- Graduate College Dissertations and Theses (1)
- Harold Herzog, PhD (1)
- Honors Scholar Theses (1)
- Independent Study Project (ISP) Collection (1)
- Kansas Library Association College and University Libraries Section Proceedings (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- Master's Theses (1)
- Military Cyber Affairs (1)
- Mineta Transportation Institute (1)
- Nebraska Library Association: Conferences (1)
- OSSA Conference Archive (1)
- Proceedings from the Document Academy (1)
- Publication Type
Articles 1 - 30 of 123
Full-Text Articles in Social and Behavioral Sciences
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley
Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley
Military Cyber Affairs
Lexical Link Analysis (LLA) is a form of text mining in which word meanings represented in lexical terms (e.g., word pairs) are treated as if they are in a community of a word network. LLA can provide automated awareness for analyzing text data and reveal previously unknown, data-driven themed connections. We applied LLA to develop authentic archetypes and conversely determine potential imposters of that same archetype. We use publically available social media data to develop a cyber professional as an example. This paper reports the development of the algorithm, the collection and labeling of data, as well as the results …
Recent Semantic Changes For The Term "Digital", Tore Brattli
Recent Semantic Changes For The Term "Digital", Tore Brattli
Proceedings from the Document Academy
The term digital originates from the Latin word for finger/counting and has for many years been used to denote discrete signals and information, as opposed to analog. Discrete representation is an important principle, not only in computers, but also for (printed) text, music scores and even our genes. Recently however, the use of the term has increased and the meaning expanded to include almost everything related to information technology, e.g. digital natives and digital addiction. This study investigates the core principles of digital representation and compares this concept with the recent usage, with a focus on Norwegian media. The purpose …
Open Scholarly Publishing Plugin, Barry Bailey
Open Scholarly Publishing Plugin, Barry Bailey
Sabbatical Projects
Presentation reflecting author's sabbatical project, which reviewed the need for and developed a plugin to allow institutions to convert WordPress into an institutional repository.
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang
Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang
Research Collection School Of Computing and Information Systems
Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results show that …
From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan
From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan
Research Collection School Of Computing and Information Systems
With the booming popularity of online social networks like Twitter and Weibo, online user footprints are accumulating rapidly on the social web. Simultaneously, the question of how to leverage the large-scale user-generated social media data for personal credit scoring comes into the sight of both researchers and practitioners. It has also become a topic of great importance and growing interest in the P2P lending industry. However, compared with traditional financial data, heterogeneous social data presents both opportunities and challenges for personal credit scoring. In this article, we seek a deep understanding of how to learn users’ credit labels from social …
Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel
Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel
Matt Schultz
Cpn-Dam Business Meeting, Amanda Harlan
Cpn-Dam Business Meeting, Amanda Harlan
Central Plains Network for Digital Asset Management
CPN-DAM Business Meeting
Wednesday, November 16, 2016
3:55pm - 4:55pm CST
Agenda
3:55-4:05pm Introduction
4:05-4:10pm Announce Executive Committee members for 2017-2018
4:10-4:25pm Reports from the Planning and Design Committees
4:25-4:40pm Report from Ad Hoc Executive Committee
-
Summary of what was accomplished in 2016
-
Action Items for 2017
-
Become a nonprofit corporation
-
Finalize membership and fees
-
Set up standing committees
-
2017 conference and proceedings
-
Contacting vendor/sponsors/organizations for possible sponsorship
4:40-4:45pm Announcement on whether the CPN-DAM bylaws were approved or not approved
4:45-4:50pm Comments from audience
4:50-4:55pm Closing statements
Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau
Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau
Central Plains Network for Digital Asset Management
In the fall 2015 semester, a new course was offered at Virginia Wesleyan College (VWC) that involved a unique project collaboration between Professor Richard E. Bond and librarians, Patty Clark and Sophie Rondeau. The course, entitled Digital History 250, provided students with an introduction to how history is made and used in digital environments. Bond presented students with topics related to history and social media, spatial mapping, digital literacy, and the implications of crowd sourcing historical narratives, among others. The students were given a final project that involved creating digital exhibits using curated content from VWC yearbooks housed in the …
Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh
Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh
Central Plains Network for Digital Asset Management
The University of North Texas Scholarly Works collections functions as our institution’s open access repository. This summer, we conducted a preliminary analysis of the collection’s holdings to assess our progress in archiving UNT faculty research in support of our Open Access and Long-term Digital Stewardship policy as passed in 2012. As we do not subscribe to any current research information systems (CRIS), this analysis took the form of a census using current faculty senate data to understand who is and is not contributing to the repository. After looking at our contribution population, we also examined what resource types are contributed …
Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson
Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson
Central Plains Network for Digital Asset Management
Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.
This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its …
Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin
Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin
Central Plains Network for Digital Asset Management
So you’ve got nearly 2 million digital files from 8 collecting units with minimum, scattered or unknown metadata—how do you prepare to migrate those objects into a digital preservation repository that acts as a “light archive” providing access to your digital collections? This presentation will delve into data wrangling efforts, the creation of workflows, and the challenges encountered while preparing digital resources for migration from a limited access FTP server into a preservation environment created in FEDORA, layered with Hydra heads for access and other functional requirements. We will discuss project planning, the de-duplication efforts, development of a collection assessment …
Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez
Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez
Central Plains Network for Digital Asset Management
This presentation focuses on practical strategies and use of open-source tools in order to establish “good enough” preservation management practices for digital audio files. Using her experience at the Marr Sound Archives, University of Missouri—Kansas City, the presenter will discuss assessing current practices, identifying gaps, prioritizing, making recommendations, and selecting and implementing a suite of open-source tools to improve the preservation process. Tools demonstrated in the presentation are AVPreserve’s BWF MetaEdit, MDQC, and Fixity.
Digital Preservation Efforts At Usm, Elizabeth La Beaud
Digital Preservation Efforts At Usm, Elizabeth La Beaud
Central Plains Network for Digital Asset Management
The University of Southern Mississippi (USM) has steadily been working to improve its digital preservation infrastructure over the past four years. In 2013, with funding from a NEH Preservation Assistance Grant, consultants Tom Clareson and Liz Bishoff conducted a digital preservation readiness assessment and jump started USM’s education on the topic. Since then, USM has added geographically distributed backups, manual fixity checks, manual metadata logs, and manual file format migrations to its arsenal with varying degrees of success. The influx in needed manpower and technical infrastructure precipitated a financial commitment from the university and the purchase of a robust digital …
3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh
3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh
Central Plains Network for Digital Asset Management
3D printing and scanning is new digital horizon for digital asset managers. Many fields have a history of utilizing 3D scanning and printing such as medicine, dentistry, art, entertainment, architecture, and archaeology. Now, many cultural heritage institution are also beginning to explore the unique benefits 3D models and prints can provide to constituents interested in their collections. The University of North Texas Digital Libraries embarked on a case study to gain a better understanding of 3D scanning and to determine its capacity to host and provide access to 3D models. This presentation will explore the workflows, metadata, and preservation of …
Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr
Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr
Central Plains Network for Digital Asset Management
Presented from the perspective of someone responsible for creating the digital objects that will eventually be included in a digital preservation program, this poster session will identify common issues that make the management and preservation of digital objects more challenging. Digital preservation needs to be talked about within the digitization workflow, because it takes a lot of work to produce the best digital objects possible. We are often focused on the immediate use of the digital objects and less focused on their long-term use. Even with best practices in mind, there is often an immediate need (patron orders, for example) …
Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness
Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness
Central Plains Network for Digital Asset Management
After a digital project is completed and made available online, the work is not over: digital projects managers must quantify the value of these digital collections. There are a plethora of tools to measure usage, but inferring value from usage requires careful interpretation of the data. After interpretation, the results must be communicated effectively to administrators. This poster will identify sources of digital collection use data, identify pitfalls in these sources, explore ways to derive meaning from use data, and suggest strategies for communicating value measurements to library administrators.
This poster presentation is the first 15 minutes of video with …
Collaborating Across Workflows: Managing Creative Assets From Legacy Works, Patrice-Andre Prud'homme, Jennifer Hunt Johnson
Collaborating Across Workflows: Managing Creative Assets From Legacy Works, Patrice-Andre Prud'homme, Jennifer Hunt Johnson
Central Plains Network for Digital Asset Management
From the perspective of two distinct workflows, this presentation will illustrate how library departments, Digital Collections and Conservation collaborate on the production of digital assets. In essence, both digitization and analog preservation workflows aim to guarantee that collections are easily retrieved and usable. This case study will illustrate two examples. The first one is more linear yet regional; it aims to create digital assets to engage the community by means of crowdsourced transcription. The second one is hands-on, as it addresses the long-term research value of the physical material for use in classrooms by Special Collections. While these workflows may …
Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis
Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis
Central Plains Network for Digital Asset Management
Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.
This session …
The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion
The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion
Central Plains Network for Digital Asset Management
In 2015, The Council of Independent Colleges (CIC) offered small private academic member colleges an opportunity to compete by writing collection proposals, for a three year grant digitizing teaching and research collections, funded by the Andrew C. Mellon Foundation. Forty-two CIC member teams were selected to participate in the Consortium on Digital Resources for Teaching and Research. Teams consisted of a librarian, and a faculty member, who worked with CIC and Artstor staff, using Artstor Shared Shelf to digitize proposed collections. Teams made digital collections accessible and usable in the classroom, wrote yearly project reports for CIC and attended yearly …
The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor
The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor
Central Plains Network for Digital Asset Management
The James Merrill Papers, housed in Washington University Libraries Special Collections, contains manuscripts, drafts, and other materials from the renowned poet. In 2013, work began to digitize and deliver a selection of the Merrill Papers towards his epic poem, The Book of Ephraim. Because the Libraries’ already used Omeka digital exhibit software for a number of projects, the materials were delivered in an Omeka exhibit, The James Merrill Digital Archive. The process of transforming an archival collection into a digital exhibit required the expertise and input of many collaborators including library staff in Special Collections and Scholarly Publishing, and students …
Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon
Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon
Kansas Library Association College and University Libraries Section Proceedings
K-State Libraries have many complex digital workflows that involve multiple people and departments. One, in particular, had the ongoing issues of tracking different stages, individual responsibilities, information gathering, notifications, and uploads done manually. Due to the inefficiency that this caused, it led to the development of an open source workflow management system (WMS)