Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 43

Full-Text Articles in Social and Behavioral Sciences

Minerva 2013, The Honors College Dec 2013

Minerva 2013, The Honors College

Minerva

This issue of Minerva includes an article on the opening of Charlie's Terrace in honor of former Honors Dean, Charlie Slavin; a discussion on community engagement in the Honors curriculum and community; an article on the student recipients of the Rezendes Travel Scholarship; and several articles catching up with Honors alumni.


An Analysis Of Safety Culture & Safety Training: Comparing The Impact Of Union, Non-Union, And Right To Work Construction Venues, Harry Miller Csp, Tara Hill, Kris Mason, John S. Gaal Edd Oct 2013

An Analysis Of Safety Culture & Safety Training: Comparing The Impact Of Union, Non-Union, And Right To Work Construction Venues, Harry Miller Csp, Tara Hill, Kris Mason, John S. Gaal Edd

Online Journal for Workforce Education and Development

The construction industry is one of the most dangerous sectors of the US economy. As such, the safety attitudes and climate within small (residential) contracting firms may play a role in providing a safe culture and working environment. The intent of this practitioner-based research study is to compare and determine if there is a difference in safety practices—based on documented field inspections and their related original number of violations observed by OSHA—between union residential carpentry contractors in the St. Louis area and:

1) non-union residential carpentry contractors in the St. Louis area;

2) non-union residential carpentry contractors across Missouri; and …


Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz Sep 2013

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Journal of Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …


Factors Leading To Decentralization Of Ict Companies: The Case Of Multimedia Super Corridor, Malaysia, Muhammad Asim Tufail, Abu Hassan Abu Bakar, Wiwied Virgiyanti, Faisal Manzoor Arain Jul 2013

Factors Leading To Decentralization Of Ict Companies: The Case Of Multimedia Super Corridor, Malaysia, Muhammad Asim Tufail, Abu Hassan Abu Bakar, Wiwied Virgiyanti, Faisal Manzoor Arain

Business Review

Technological development in the information and communication technologies (ICT) sector is essential to attain sustainability in today’s era. Cities have developed satellite towns at the periphery with hi-fidelity digital and physical infrastructure which converts a single cantered city into a multi cantered one. In case of Kuala Lumpur Metropolitan Area (KLMA) the shift of civic services to Putrajaya and development of Multimedia Super Corridor (MSC) which offers incentives to local and foreign companies to develop a super block of research and development based economic sector. This development spearheaded the Malaysian Vision 2020 of knowledge based economy and society and has …


Measuring Walkability: Development Of An Automated Sidewalk Quality Assessment Tool, Alexandra Frackelton, Alice Grossman, Evangelos Palinginis, Felipe Castrillon, Vetri Elango, Randall Guensler Jun 2013

Measuring Walkability: Development Of An Automated Sidewalk Quality Assessment Tool, Alexandra Frackelton, Alice Grossman, Evangelos Palinginis, Felipe Castrillon, Vetri Elango, Randall Guensler

Suburban Sustainability

Sidewalks are a critical part of sustainable transportation systems, supporting pedestrian travel and healthy physical activity. Presence and quality of sidewalks is a significant predictor of perceived safety and quality of the pedestrian environment. Lack of adequate pedestrian infrastructure data has been identified as a major barrier to large-scale pedestrian planning. Sidewalk presence, width, and surface condition are identified as important indicators of facility quality and accessibility. Georgia Tech is deploying an Android tablet application to automatically generate spatial sidewalk inventories, automatically assess sidewalk quality, and prioritize sidewalk repairs. The research team has collected field data on sidewalk segments across …


Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker Apr 2013

Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker

Journal of International Technology and Information Management

This paper presented the S&C Racing system that uses Support Vector Regression (SVR) to predict harness race finishes and analyzed it on fifteen months of data from Northfield Park. We found that our system outperforms the most common betting strategies of wagering on the favorites and the mathematical arbitrage Dr. Z system in five of the seven wager types tested. This work would suggest that an informational inequality exists within the harness racing market that is not apparent to domain experts.


Instrumental Music Ensemble At Tennessee State University: The Early Years (1912-1946), Reginald A. Mcdonald Apr 2013

Instrumental Music Ensemble At Tennessee State University: The Early Years (1912-1946), Reginald A. Mcdonald

The Journal of Tennessee State University

No abstract provided.


The Resilience Of One Tennessee State University Professor In Providing A Path To Excellence For Youths, Sean Daniels Apr 2013

The Resilience Of One Tennessee State University Professor In Providing A Path To Excellence For Youths, Sean Daniels

The Journal of Tennessee State University

No abstract provided.


News - Georgia State University - Gsu Library Receives $210,000 Neh Grant, Christian J. Steinmetz Apr 2013

News - Georgia State University - Gsu Library Receives $210,000 Neh Grant, Christian J. Steinmetz

Georgia Library Quarterly

Georgia State University Library recently received a $210,000 grant from the National Endowment for the Humanities for “Planning Atlanta: A New City in the Making, 1930s – 1990s”, submitted by librarian Joe Hurley (Principal Investigator) and history professor Kate Wilson (co-PI).


90° To 360°, Holly Paronelli Mar 2013

90° To 360°, Holly Paronelli

The STEAM Journal

When I hear STEM (Science, Technology, Engineering and Mathematics) and Art I think of Math and value. Even though there is value in STEAM (Science, Technology, Engineering, Art and Mathematics) the value as a whole cannot be fully calculated. Art is too indefinite, to vast, too infinite to be calculated, but aspects of STEM can be. Yet even then what we think we know comes down to interpretation, fact is fact for only a while.


The Wiseman, James William Sobieski Mar 2013

The Wiseman, James William Sobieski

The STEAM Journal

I created this artwork for a gallery show of masks. I have always been an auto-didact. I turned my love of books and learning into a sculpture that is a self-portrait. It is an icon of the power knowledge brings. A mask is a protective barrier between the wearer and the world. The paper word-filled book pages create a fierce and intimidating grill. I love working with a variety of materials and constructing objects that demand the viewer to think.


Migration Grid #26, Stanton Hunter Mar 2013

Migration Grid #26, Stanton Hunter

The STEAM Journal

This work is inspired by invisible sky grids formed by Ultra Violet (UV) light researchers discovered that guide Monarch butterflies on their migration from the mid-western United States to the Sierra Madre Mountains in Mexico. I use terrestrial material, clay, to make something celestial. Earth, associated with mass and permanence, is translated into these shifting, ephemeral, and ethereal sky-forms. The work encompasses void more than object and the complex shadows they cast are immaterial. Together, the objects and shadows point to what can’t be seen, at least by the human eye.


Towards A “Cloud Curriculum” In Art And Science?, Roger Malina Mar 2013

Towards A “Cloud Curriculum” In Art And Science?, Roger Malina

The STEAM Journal

Recently an email hit my desk from Paul Thomas in Australia with a proposal to work together on a “Cloud Curriculum for Art and Science”. I immediately agreed to collaborate. I don’t yet have a clue of what a cloud curriculum is, but what I do know is that we are ‘backing into the future’ in educational institutions and we desperately need a ‘cloud curriculum.’ We need to look over the ten year horizon. And in the emerging art-science field I doubt that the usual approach to curriculum development will work.


Steam...Now!, John Eger Mar 2013

Steam...Now!, John Eger

The STEAM Journal

With America slowly awakening to the need to turn out creative and innovative workers who can join the 21st century (its already 2012) workplace -- because they have the new thinking skills --we have to change the current emphasis on STEM, for Science, Technology, Engineering and Math to STEAM, by insuring that the whole brain is nurtured through the arts: thus STEAM.


On Cultural Polymathy: How Visual Thinking, Culture, And Community Create A Platform For Progress, Whitney Dail Mar 2013

On Cultural Polymathy: How Visual Thinking, Culture, And Community Create A Platform For Progress, Whitney Dail

The STEAM Journal

Within the last decade, the commingling of art and science has reached a critical mass. Science has long infused the arts with curiosity for natural phenomena and human behavior. New models for producing knowledge have given rise to interaction and collaboration across the globe, along with a renewed Renaissance.


Getting Real About The E In Steam, James Catterall Mar 2013

Getting Real About The E In Steam, James Catterall

The STEAM Journal

STEM and STEAM are in the news. Researchers and educators in my field (cognition, art, and creativity) argue reasons for adding the A to STEM. While I visit this below, my focus is elsewhere. In this brief essay, I want to explore the meaning and importance of the E appearing in both STEM and STEAM. What’s engineering doing in this mix? And what are some reasons for affirming the arts when the role of engineering is clarified?


A Letter To The Steam Journal Readers, Deborah Freund Mar 2013

A Letter To The Steam Journal Readers, Deborah Freund

The STEAM Journal

A letter to the readers from the President of Claremont Graduate University, President Deborah Freund, welcoming the inaugural issue of 'The STEAM Journal'.


A Framework For Oil Price Benchmark Determination: Lessons For Nigeria, Taiwo H. Sanni, Bassey D. Akpan Mar 2013

A Framework For Oil Price Benchmark Determination: Lessons For Nigeria, Taiwo H. Sanni, Bassey D. Akpan

Bullion

The main thrust of this paper is to draw lessons of experience from other selected oil producing countries. the outcome of the study is expected to help in strengthening Nigeria's oil price framework in line with international best practice. Section 2 dwells on the theoretical and literature review on oil based fiscal rule, while section 3 presents the framework for oil price benchmark determination and section 4 examines those factors capable of stimulating determination of oil price benchmark, lastly section 5 discusses some lessons of experience from Nigeria and then the conclusion.


Fuel Subsidy And Other Unproductive Public Expenditures Removal: A Pragmatic Approach To Restructure And Transform The Nigerian Economy, Lawrence O. Akinboyo Mar 2013

Fuel Subsidy And Other Unproductive Public Expenditures Removal: A Pragmatic Approach To Restructure And Transform The Nigerian Economy, Lawrence O. Akinboyo

Bullion

While the short term measures to reduce recurrent expenditure are necessary conditions for fiscal sustainability, the long term imperative is to increase revenue. Thus, efforts should be made by the fiscal authorities in Nigeria to pursue the policy of balancing of expenditure with revenue improvements. The issues of the underperformance of the capital budget should be reversed before savings from cuts in recurrent expenditure can be diverted to the financing of capital expenditure. From the analysis, we say that removal of fuel subsidy would no doubt have some social and economic hardship on the people in the short run, However, …


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter Jan 2013

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Journal of Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel Jan 2013

Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel

Journal of Digital Forensics, Security and Law

In April 2011 news outlets around the world revealed shocking news about Apple’s iPhone: for reasons that were not apparently clear, every iPhone contained a small SQLite database that logged where and when the user had been whenever the phone was turned on, and those records went back for pretty much as long as the user had owned their phone. Apple eventually declared that the data cache was the result of a bug and issued a software update to prune the database (it had previously grown without limit). Privacy activists rejoiced that their beloved iPhones were once again trustworthy. But …


The Journal Of Undergraduate Research: Volume 11 Jan 2013

The Journal Of Undergraduate Research: Volume 11

The Journal of Undergraduate Research

This is the complete issue of the South Dakota State University Journal of Undergraduate Research, Volume 11.


Book Review: Professional Penetration Testing: Creating And Learning In A Hacking Lab 2e, Joshua Bartolomie Jan 2013

Book Review: Professional Penetration Testing: Creating And Learning In A Hacking Lab 2e, Joshua Bartolomie

Journal of Digital Forensics, Security and Law

Organizations often strive for proactive information security programs in an effort to limit occurrence and impact of security breaches. However, traditional security programs run the risk of being unable to provide adequate insight and proactive awareness into real attack vectors that may exist within their organizations. With attack methods and efforts becoming increasingly aggressive, and effective, organizations must take equally assertive measures to protect their critical information and assets. Penetration testing is one of those tools that is often misunderstood, overlooked, and undervalued. A true adversary would not hesitate to exploit every potential to gain entry or cause a disruption …


Maine’S Three Ring Binder, Fletcher Kittredge Jan 2013

Maine’S Three Ring Binder, Fletcher Kittredge

Maine Policy Review

Although Maine is a rural state, it has had success in keeping pace with technological changes since the rise of the Internet 20 years ago. In this section, authors describe some of these successes and the challenges faced by both consumers and libraries in the new digital environment. Fletcher Kittredge presents the history and promise of Maine’s “Three Ring Binder,” a new and important fiber optic network that will bring high-speed broadband connectivity to rural parts of the state. The Three Ring Binder is expected both to improve economic opportunities for businesses and to increase high-speed Internet access for underserved …


Measuring Inconsistency Methods For Evidentiary Value, Fred Cohen Jan 2013

Measuring Inconsistency Methods For Evidentiary Value, Fred Cohen

Journal of Digital Forensics, Security and Law

Many inconsistency analysis methods may be used to detect altered records or statements. But for admission as evidence, the reliability of the method has to be determined and measured. For example, in China, for evidence to be admitted, it has to have 95% certainty of being correct,1 and that certainty must be shown to the court, while in the US, evidence is admitted if it is more probative than prejudicial (a >50% standard).2 In either case, it is necessary to provide a measurement of some sort in order to pass muster under challenges from the other side. And in most …


A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton Jan 2013

A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using …


How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw Jan 2013

How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw

Journal of Digital Forensics, Security and Law

This research introduced two new scales for the identification and measurement of negative sentiment and insider risk in communications in order to examine the unexplored relationship between these two constructs. The inter-rater reliability and criterion validity of the Scale of Negativity in Texts (SNIT) and the Scale of Insider Risk in Digital Communications (SIRDC) were established with a random sample of email from the Enron archive and criterion measures from established insiders, disgruntled employees, suicidal, depressed, angry, anxious, and other sampled groups. In addition, the sensitivity of the scales to changes over time as the risk of digital attack increased …


Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle Jan 2013

Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Table Of Contents Jan 2013

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula Jan 2013

Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula

Journal of Digital Forensics, Security and Law

Fraud is a multi-billion dollar industry that continues to grow annually. Many organizations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper, we adopt a DesignScience methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated by developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of …