Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Oil (9)
- Politics (6)
- Economy (4)
- Government (4)
- Information security (4)
-
- Maine North Woods (3)
- Monte Carlo simulation (3)
- Bootstrap (2)
- China (2)
- Crisis (2)
- Geopolitics (2)
- Hazard function (2)
- Heteroscedasticity (2)
- Kurtosis (2)
- Monte Carlo Simulation (2)
- Natural gas (2)
- Nonparametric (2)
- Permutation test (2)
- Policy (2)
- Reliability (2)
- Research relevance (2)
- Robustness (2)
- Sample size (2)
- War (2)
- control chart (1)
- ANCOVA (1)
- ARIMA (1)
- Absolute and squared deviations (1)
- Absolute value (1)
- Academic research (1)
Articles 91 - 118 of 118
Full-Text Articles in Social and Behavioral Sciences
Editorial Board & Iowa Academy Of Science Officers And Directors
Editorial Board & Iowa Academy Of Science Officers And Directors
Journal of the Iowa Academy of Science: JIAS
No abstract provided.
Cover - Table Of Contents
Journal of the Iowa Academy of Science: JIAS
No abstract provided.
An Inventory Of The Vascular Flora Of Hamilton County, Iowa (2001-2004), Jimmie D. Thompson
An Inventory Of The Vascular Flora Of Hamilton County, Iowa (2001-2004), Jimmie D. Thompson
Journal of the Iowa Academy of Science: JIAS
A botanical survey of the vascular flora of Hamilton County, Iowa was conducted from 2001 to 2004. During this survey 973 taxa (761 native) were encountered. A search of the literature and a survey of Iowa State University's Ada Hayden Herbarium for additional documented specimens added 28 taxa to the flora. This total of 1001 taxa places Hamilton County fourth in vascular plant richness among inventories conducted in Iowa since 1950. A checklist including common names of most taxa, habitat and abundance data for all taxa encountered during the current survey is presented. Information on earlier collections includes source and …
Narrow Sense Heritability And Additive Genetic Correlations In Alfalfa Subsp. Falcata, Heathcliffe Riday, E. Charles Brummer
Narrow Sense Heritability And Additive Genetic Correlations In Alfalfa Subsp. Falcata, Heathcliffe Riday, E. Charles Brummer
Journal of the Iowa Academy of Science: JIAS
The complex genetics of autotetraploid alfalfa (Medicago sativa L.) make additive genetic variance component estimation difficult. Halfsib family variances often are used to estimate additive genetic variances and, by extension, narrow sense heritabilities and additive genetic correlations. These estimates contain a portion of the dominance variance. Using such calculations, in conjunction with parent-offspring covariance estimates, the dominance component can be separated from the additive genetic component. This is rarely done. This study reports average estimates across 30 populations, of both additive and dominance variance component estimates based on between halfsib family variance and parent-offspring covariance for biomass yield, plant height, …
Fall And Winter Food Habits Of Bobcats (Lynx Rufus) In Iowa, Kelcey J. Brockmeyer, William R. Clark
Fall And Winter Food Habits Of Bobcats (Lynx Rufus) In Iowa, Kelcey J. Brockmeyer, William R. Clark
Journal of the Iowa Academy of Science: JIAS
The bobcat (Lynx rufus) is a widely distributed native felid of North America but nearly disappeared from Iowa due to habitat loss and unregulated harvest that occurred during the century after European settlement. Bobcats are repopulating the state and are now relatively common in southern Iowa. This study was part of a research project to understand the ecology of the species in Iowa's landscape so that conservation plans could be established. We determined food habits by the examination of stomach contents from 100 bobcat carcasses that were accidentally killed in traps, killed by automobiles, or radio-marked individuals found dead during …
Are The Economics Of A Sustainable Maine Forest Sustainable?, Mike Levert, Charles S. Colgan, Charles Lawton
Are The Economics Of A Sustainable Maine Forest Sustainable?, Mike Levert, Charles S. Colgan, Charles Lawton
Maine Policy Review
Mike LeVert, Charles Colgan and Charles Lawton discuss the transformation of the economic environment of Maine’s forests over the past two decades. Paper companies have sold most of their holdings; residential and conservation demand for land has increased; forestland prices have skyrocketed; and new classes of landowners have different strategies, objectives, and time horizons than the old industrial landowners. The authors believe that management of Maine’s forests must now address changes in the economic environment with the same intensity as threats such as the spruce budworm were addressed if we are to keep Maine’s forests as forests.
Laboratory Abrasion Of Crinoid Columnals And The Provenance Of The Chariton Conglomerate, South-Central Iowa, Justin C. Kraber, Steven H. Emerman, Matt R. Bennett, Lyndon R. Hawkins, Jewell E. Moore, Rebekah Ellenwood, Kristine L. Robson, Adam Finken
Laboratory Abrasion Of Crinoid Columnals And The Provenance Of The Chariton Conglomerate, South-Central Iowa, Justin C. Kraber, Steven H. Emerman, Matt R. Bennett, Lyndon R. Hawkins, Jewell E. Moore, Rebekah Ellenwood, Kristine L. Robson, Adam Finken
Journal of the Iowa Academy of Science: JIAS
The Chariton Conglomerate is a quartz limestone conglomerate of Pennsylvanian age found in six exposures in southern Iowa and three exposures in northern Missouri. Distinctive features of the exposures in Iowa include quartz granules and rounded crinoid columnals. The objective of this study was to determine whether the quartz clasts could have originated in the crystalline rocks of Minnesota or Wisconsin. The average paleocurrent direction measured in interbedded sandstones was 178° (S.D. = 35 °). The average roundness of 75 crinoid columnals extracted from four exposures in Iowa was 30% (S.D. = 14%), defined as
roundness(%) = (D-d)/D x 100, …
A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton
A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton
Journal of Digital Forensics, Security and Law
As a relatively new field of study, little empirical research has been conducted pertaining to computer forensics. This lack of empirical research contributes to problems for practitioners and academics alike.
For the community of practitioners, problems arise from the dilemma of applying scientific methods to legal matters based on anecdotal training methods, and the academic community is hampered by a lack of theory in this evolving field. A research study utilizing a multi-method approach to identify and measure tasks practitioners perform during forensic data acquisitions and lay a foundation for academic theory development was conducted in 2006 in conjunction with …
Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay
Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay
Journal of Digital Forensics, Security and Law
The research reported in this paper introduces new techniques to aid in the identification of recovered notebook computers so they may be returned to the rightful owner. We identify non-volatile data storage areas as a means of facilitating the safe storing of computer identification information. A forensic proof of concept tool has been designed to test the feasibility of several storage locations identified within this work to hold the data needed to uniquely identify a computer. The tool was used to perform the creation and extraction of created information in order to allow the analysis of the non-volatile storage locations …
Book Review: No Place To Hide, Gary C. Kessler
Book Review: No Place To Hide, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the second Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Information Governance: A Model For Security In Medical Practice, Patricia A. Williams
Information Governance: A Model For Security In Medical Practice, Patricia A. Williams
Journal of Digital Forensics, Security and Law
Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security. In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing …
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Journal of Digital Forensics, Security and Law
When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …
Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade
Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade
Journal of Digital Forensics, Security and Law
The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially for electronic commerce and electronic governance. Electronic commerce”, which involve the use of alternatives to paper based methods of communication and storage information. To do electronic commerce there should be authentication of particular document. The working of internet is the documents are traveling in terms of bits from one destination to other destination, through various media like …
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This is the Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song
Journal of Digital Forensics, Security and Law
Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …
Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas
Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas
Journal of Digital Forensics, Security and Law
Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate.
Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell
Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell
Journal of Digital Forensics, Security and Law
A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel. These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability. This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study …
Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani
Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani
Journal of Digital Forensics, Security and Law
Many education organizations have adopted for security the enterprise best practices for implementation on their campuses, while others focus on ISO Standard (or/and) the National Institution of Standards and Technology.
All these adoptions are dependent on IT personal and their experiences or knowledge of the standard. On top of this is the size of the education organizations. The larger the population in an education organization, the more the problem of information and security become very clear. Thus, they have been obliged to comply with information security issues and adopt the national or international standard. The case is quite different when …
Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor
Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor
Journal of Digital Forensics, Security and Law
Security research published in academic journals rarely finds its way to the business community or into the classroom. Even though the research is of high quality, it is written in a manner that is difficult to read and to understand. This paper argues that one way to get this academic research into the business community is to incorporate it into security classrooms. To do so, however, academic articles need to be adapted into a classroom-friendly format. This paper suggests ways to do this and provides an example of an academic article that was adapted for use in a security management …
The Design And Implementation Of An Automated Security Compliance Toolkit: A Pedagogical Exercise, Guillermo Francia, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins
The Design And Implementation Of An Automated Security Compliance Toolkit: A Pedagogical Exercise, Guillermo Francia, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins
Journal of Digital Forensics, Security and Law
The demand, through government regulations, for the preservation of the security, integrity, and privacy of corporate and customer information is increasing at an unprecedented pace. Government and private entities struggle to comply with these regulations through various means—both automated and manual controls. This paper presents an automated security compliance toolkit that is designed and developed using mostly open source tools to demonstrate that 1) meeting regulatory compliance does not need to be a very expensive proposition and 2) an undertaking of this magnitude could be served as a pedagogical exercise for students in the areas of collaboration, project management, software …
Network And Database Security: Regulatory Compliance, Network, And Database Security - A Unified Process And Goal, Errol A. Blake
Network And Database Security: Regulatory Compliance, Network, And Database Security - A Unified Process And Goal, Errol A. Blake
Journal of Digital Forensics, Security and Law
Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Las Vegas: A Sustainable Urban Environment For Health?, Nancy Menzel
Las Vegas: A Sustainable Urban Environment For Health?, Nancy Menzel
Nevada Journal of Public Health
The rapid growth of Las Vegas has resulted in negative consequences for the health of its residents to a level that threatens the area’s sustainability. This article reviews key indicators of population health in Las Vegas through the framework of the US Centers for Disease Control and Prevention’s Healthy People in Healthy Places and concludes that public health professionals, citizens, businesses, and political leaders must act now to protect and improve population health.