Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- STEAM (6)
- STEM (5)
- Design (3)
- Digital forensics (3)
- Education (3)
-
- Art (2)
- Automated Psychological assessment (2)
- Computer Graphics (2)
- Content Analysis (2)
- Culture (2)
- Detecting (2)
- Digital Communication (2)
- Digital Forensics (2)
- Disgruntlement (2)
- Employee Anger (2)
- Engineering (2)
- Evidence (2)
- Forensic Animation (2)
- Guidelines. (2)
- Industry (2)
- Insider Risk (2)
- Internet (2)
- Negative Sentiment (2)
- Nigeria (2)
- Reconstruction (2)
- Threat (2)
- Visualisation (2)
- Visualization (2)
- Workplace Violence (2)
- 1912-1946 (1)
Articles 1 - 30 of 43
Full-Text Articles in Social and Behavioral Sciences
Minerva 2013, The Honors College
Minerva 2013, The Honors College
Minerva
This issue of Minerva includes an article on the opening of Charlie's Terrace in honor of former Honors Dean, Charlie Slavin; a discussion on community engagement in the Honors curriculum and community; an article on the student recipients of the Rezendes Travel Scholarship; and several articles catching up with Honors alumni.
An Analysis Of Safety Culture & Safety Training: Comparing The Impact Of Union, Non-Union, And Right To Work Construction Venues, Harry Miller Csp, Tara Hill, Kris Mason, John S. Gaal Edd
An Analysis Of Safety Culture & Safety Training: Comparing The Impact Of Union, Non-Union, And Right To Work Construction Venues, Harry Miller Csp, Tara Hill, Kris Mason, John S. Gaal Edd
Online Journal for Workforce Education and Development
The construction industry is one of the most dangerous sectors of the US economy. As such, the safety attitudes and climate within small (residential) contracting firms may play a role in providing a safe culture and working environment. The intent of this practitioner-based research study is to compare and determine if there is a difference in safety practices—based on documented field inspections and their related original number of violations observed by OSHA—between union residential carpentry contractors in the St. Louis area and:
1) non-union residential carpentry contractors in the St. Louis area;
2) non-union residential carpentry contractors across Missouri; and …
Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz
Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz
Journal of Digital Forensics, Security and Law
Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …
Factors Leading To Decentralization Of Ict Companies: The Case Of Multimedia Super Corridor, Malaysia, Muhammad Asim Tufail, Abu Hassan Abu Bakar, Wiwied Virgiyanti, Faisal Manzoor Arain
Factors Leading To Decentralization Of Ict Companies: The Case Of Multimedia Super Corridor, Malaysia, Muhammad Asim Tufail, Abu Hassan Abu Bakar, Wiwied Virgiyanti, Faisal Manzoor Arain
Business Review
Technological development in the information and communication technologies (ICT) sector is essential to attain sustainability in today’s era. Cities have developed satellite towns at the periphery with hi-fidelity digital and physical infrastructure which converts a single cantered city into a multi cantered one. In case of Kuala Lumpur Metropolitan Area (KLMA) the shift of civic services to Putrajaya and development of Multimedia Super Corridor (MSC) which offers incentives to local and foreign companies to develop a super block of research and development based economic sector. This development spearheaded the Malaysian Vision 2020 of knowledge based economy and society and has …
Measuring Walkability: Development Of An Automated Sidewalk Quality Assessment Tool, Alexandra Frackelton, Alice Grossman, Evangelos Palinginis, Felipe Castrillon, Vetri Elango, Randall Guensler
Measuring Walkability: Development Of An Automated Sidewalk Quality Assessment Tool, Alexandra Frackelton, Alice Grossman, Evangelos Palinginis, Felipe Castrillon, Vetri Elango, Randall Guensler
Suburban Sustainability
Sidewalks are a critical part of sustainable transportation systems, supporting pedestrian travel and healthy physical activity. Presence and quality of sidewalks is a significant predictor of perceived safety and quality of the pedestrian environment. Lack of adequate pedestrian infrastructure data has been identified as a major barrier to large-scale pedestrian planning. Sidewalk presence, width, and surface condition are identified as important indicators of facility quality and accessibility. Georgia Tech is deploying an Android tablet application to automatically generate spatial sidewalk inventories, automatically assess sidewalk quality, and prioritize sidewalk repairs. The research team has collected field data on sidewalk segments across …
Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker
Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker
Journal of International Technology and Information Management
This paper presented the S&C Racing system that uses Support Vector Regression (SVR) to predict harness race finishes and analyzed it on fifteen months of data from Northfield Park. We found that our system outperforms the most common betting strategies of wagering on the favorites and the mathematical arbitrage Dr. Z system in five of the seven wager types tested. This work would suggest that an informational inequality exists within the harness racing market that is not apparent to domain experts.
Instrumental Music Ensemble At Tennessee State University: The Early Years (1912-1946), Reginald A. Mcdonald
Instrumental Music Ensemble At Tennessee State University: The Early Years (1912-1946), Reginald A. Mcdonald
The Journal of Tennessee State University
No abstract provided.
The Resilience Of One Tennessee State University Professor In Providing A Path To Excellence For Youths, Sean Daniels
The Resilience Of One Tennessee State University Professor In Providing A Path To Excellence For Youths, Sean Daniels
The Journal of Tennessee State University
No abstract provided.
News - Georgia State University - Gsu Library Receives $210,000 Neh Grant, Christian J. Steinmetz
News - Georgia State University - Gsu Library Receives $210,000 Neh Grant, Christian J. Steinmetz
Georgia Library Quarterly
Georgia State University Library recently received a $210,000 grant from the National Endowment for the Humanities for “Planning Atlanta: A New City in the Making, 1930s – 1990s”, submitted by librarian Joe Hurley (Principal Investigator) and history professor Kate Wilson (co-PI).
90° To 360°, Holly Paronelli
90° To 360°, Holly Paronelli
The STEAM Journal
When I hear STEM (Science, Technology, Engineering and Mathematics) and Art I think of Math and value. Even though there is value in STEAM (Science, Technology, Engineering, Art and Mathematics) the value as a whole cannot be fully calculated. Art is too indefinite, to vast, too infinite to be calculated, but aspects of STEM can be. Yet even then what we think we know comes down to interpretation, fact is fact for only a while.
The Wiseman, James William Sobieski
The Wiseman, James William Sobieski
The STEAM Journal
I created this artwork for a gallery show of masks. I have always been an auto-didact. I turned my love of books and learning into a sculpture that is a self-portrait. It is an icon of the power knowledge brings. A mask is a protective barrier between the wearer and the world. The paper word-filled book pages create a fierce and intimidating grill. I love working with a variety of materials and constructing objects that demand the viewer to think.
Migration Grid #26, Stanton Hunter
Migration Grid #26, Stanton Hunter
The STEAM Journal
This work is inspired by invisible sky grids formed by Ultra Violet (UV) light researchers discovered that guide Monarch butterflies on their migration from the mid-western United States to the Sierra Madre Mountains in Mexico. I use terrestrial material, clay, to make something celestial. Earth, associated with mass and permanence, is translated into these shifting, ephemeral, and ethereal sky-forms. The work encompasses void more than object and the complex shadows they cast are immaterial. Together, the objects and shadows point to what can’t be seen, at least by the human eye.
Towards A “Cloud Curriculum” In Art And Science?, Roger Malina
Towards A “Cloud Curriculum” In Art And Science?, Roger Malina
The STEAM Journal
Recently an email hit my desk from Paul Thomas in Australia with a proposal to work together on a “Cloud Curriculum for Art and Science”. I immediately agreed to collaborate. I don’t yet have a clue of what a cloud curriculum is, but what I do know is that we are ‘backing into the future’ in educational institutions and we desperately need a ‘cloud curriculum.’ We need to look over the ten year horizon. And in the emerging art-science field I doubt that the usual approach to curriculum development will work.
Steam...Now!, John Eger
Steam...Now!, John Eger
The STEAM Journal
With America slowly awakening to the need to turn out creative and innovative workers who can join the 21st century (its already 2012) workplace -- because they have the new thinking skills --we have to change the current emphasis on STEM, for Science, Technology, Engineering and Math to STEAM, by insuring that the whole brain is nurtured through the arts: thus STEAM.
On Cultural Polymathy: How Visual Thinking, Culture, And Community Create A Platform For Progress, Whitney Dail
On Cultural Polymathy: How Visual Thinking, Culture, And Community Create A Platform For Progress, Whitney Dail
The STEAM Journal
Within the last decade, the commingling of art and science has reached a critical mass. Science has long infused the arts with curiosity for natural phenomena and human behavior. New models for producing knowledge have given rise to interaction and collaboration across the globe, along with a renewed Renaissance.
Getting Real About The E In Steam, James Catterall
Getting Real About The E In Steam, James Catterall
The STEAM Journal
STEM and STEAM are in the news. Researchers and educators in my field (cognition, art, and creativity) argue reasons for adding the A to STEM. While I visit this below, my focus is elsewhere. In this brief essay, I want to explore the meaning and importance of the E appearing in both STEM and STEAM. What’s engineering doing in this mix? And what are some reasons for affirming the arts when the role of engineering is clarified?
A Letter To The Steam Journal Readers, Deborah Freund
A Letter To The Steam Journal Readers, Deborah Freund
The STEAM Journal
A letter to the readers from the President of Claremont Graduate University, President Deborah Freund, welcoming the inaugural issue of 'The STEAM Journal'.
A Framework For Oil Price Benchmark Determination: Lessons For Nigeria, Taiwo H. Sanni, Bassey D. Akpan
A Framework For Oil Price Benchmark Determination: Lessons For Nigeria, Taiwo H. Sanni, Bassey D. Akpan
Bullion
The main thrust of this paper is to draw lessons of experience from other selected oil producing countries. the outcome of the study is expected to help in strengthening Nigeria's oil price framework in line with international best practice. Section 2 dwells on the theoretical and literature review on oil based fiscal rule, while section 3 presents the framework for oil price benchmark determination and section 4 examines those factors capable of stimulating determination of oil price benchmark, lastly section 5 discusses some lessons of experience from Nigeria and then the conclusion.
Fuel Subsidy And Other Unproductive Public Expenditures Removal: A Pragmatic Approach To Restructure And Transform The Nigerian Economy, Lawrence O. Akinboyo
Fuel Subsidy And Other Unproductive Public Expenditures Removal: A Pragmatic Approach To Restructure And Transform The Nigerian Economy, Lawrence O. Akinboyo
Bullion
While the short term measures to reduce recurrent expenditure are necessary conditions for fiscal sustainability, the long term imperative is to increase revenue. Thus, efforts should be made by the fiscal authorities in Nigeria to pursue the policy of balancing of expenditure with revenue improvements. The issues of the underperformance of the capital budget should be reversed before savings from cuts in recurrent expenditure can be diverted to the financing of capital expenditure. From the analysis, we say that removal of fuel subsidy would no doubt have some social and economic hardship on the people in the short run, However, …
System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter
System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter
Journal of Digital Forensics, Security and Law
Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …
Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel
Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel
Journal of Digital Forensics, Security and Law
In April 2011 news outlets around the world revealed shocking news about Apple’s iPhone: for reasons that were not apparently clear, every iPhone contained a small SQLite database that logged where and when the user had been whenever the phone was turned on, and those records went back for pretty much as long as the user had owned their phone. Apple eventually declared that the data cache was the result of a bug and issued a software update to prune the database (it had previously grown without limit). Privacy activists rejoiced that their beloved iPhones were once again trustworthy. But …
The Journal Of Undergraduate Research: Volume 11
The Journal Of Undergraduate Research: Volume 11
The Journal of Undergraduate Research
This is the complete issue of the South Dakota State University Journal of Undergraduate Research, Volume 11.
Book Review: Professional Penetration Testing: Creating And Learning In A Hacking Lab 2e, Joshua Bartolomie
Book Review: Professional Penetration Testing: Creating And Learning In A Hacking Lab 2e, Joshua Bartolomie
Journal of Digital Forensics, Security and Law
Organizations often strive for proactive information security programs in an effort to limit occurrence and impact of security breaches. However, traditional security programs run the risk of being unable to provide adequate insight and proactive awareness into real attack vectors that may exist within their organizations. With attack methods and efforts becoming increasingly aggressive, and effective, organizations must take equally assertive measures to protect their critical information and assets. Penetration testing is one of those tools that is often misunderstood, overlooked, and undervalued. A true adversary would not hesitate to exploit every potential to gain entry or cause a disruption …
Maine’S Three Ring Binder, Fletcher Kittredge
Maine’S Three Ring Binder, Fletcher Kittredge
Maine Policy Review
Although Maine is a rural state, it has had success in keeping pace with technological changes since the rise of the Internet 20 years ago. In this section, authors describe some of these successes and the challenges faced by both consumers and libraries in the new digital environment. Fletcher Kittredge presents the history and promise of Maine’s “Three Ring Binder,” a new and important fiber optic network that will bring high-speed broadband connectivity to rural parts of the state. The Three Ring Binder is expected both to improve economic opportunities for businesses and to increase high-speed Internet access for underserved …
Measuring Inconsistency Methods For Evidentiary Value, Fred Cohen
Measuring Inconsistency Methods For Evidentiary Value, Fred Cohen
Journal of Digital Forensics, Security and Law
Many inconsistency analysis methods may be used to detect altered records or statements. But for admission as evidence, the reliability of the method has to be determined and measured. For example, in China, for evidence to be admitted, it has to have 95% certainty of being correct,1 and that certainty must be shown to the court, while in the US, evidence is admitted if it is more probative than prejudicial (a >50% standard).2 In either case, it is necessary to provide a measurement of some sort in order to pass muster under challenges from the other side. And in most …
A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton
A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton
Journal of Digital Forensics, Security and Law
Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using …
How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw
How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw
Journal of Digital Forensics, Security and Law
This research introduced two new scales for the identification and measurement of negative sentiment and insider risk in communications in order to examine the unexplored relationship between these two constructs. The inter-rater reliability and criterion validity of the Scale of Negativity in Texts (SNIT) and the Scale of Insider Risk in Digital Communications (SIRDC) were established with a random sample of email from the Enron archive and criterion measures from established insiders, disgruntled employees, suicidal, depressed, angry, anxious, and other sampled groups. In addition, the sensitivity of the scales to changes over time as the risk of digital attack increased …
Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle
Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle
Journal of Digital Forensics, Security and Law
Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula
Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula
Journal of Digital Forensics, Security and Law
Fraud is a multi-billion dollar industry that continues to grow annually. Many organizations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper, we adopt a DesignScience methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated by developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of …