Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- NextGen (2)
- Accessing secured wireless networks (1)
- Astronomy (1)
- Astrophysics (1)
- Bitcoin (1)
-
- Boarding experience (1)
- Boarding time (1)
- Book Review; International Aviation (1)
- Clutter (1)
- Cyber Policy (1)
- Cyber-diplomacy (1)
- Dictionary personalization (1)
- Digital currency (1)
- E-governance (1)
- Elections (1)
- Flight deck display (1)
- Flight deck displays (1)
- Geophysics (1)
- Gestalt (1)
- Glass cockpit (1)
- Hand luggage (1)
- Iceland (1)
- Illegal transaction (1)
- Impersonation (1)
- Investigation technique (1)
- Law enforcement (1)
- Man-in-the-Middle attack (1)
- Navigation with space-time obligation (1)
- Observations (1)
- PFD (1)
- Publication
- Publication Type
Articles 1 - 30 of 30
Full-Text Articles in Social and Behavioral Sciences
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Journal of Digital Forensics, Security and Law
This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …
Aviation Weather Education: Challenges Using Current Faa Guidance, Thomas A. Guinn, Robert Thomas
Aviation Weather Education: Challenges Using Current Faa Guidance, Thomas A. Guinn, Robert Thomas
Aviation Weather Training Research
Observed Challenges
- Incorrect product information
- Guidance not keeping pace with new products
- Multiple formats of same product
- Potentially unnecessary information
- Missing product information
- Limited focus on interpretation
Challenges For Flight Instructors Teaching Weather Information, Robert Thomas, Thomas A. Guinn
Challenges For Flight Instructors Teaching Weather Information, Robert Thomas, Thomas A. Guinn
Aviation Weather Training Research
- Flight Instructors face a challenge when teaching/learning weather information
- Multiple overlapping resources for aviation weather
- AC takes longer timeframe to update –problem for quick updates of information
Interpreting Aviation Weather Products: Follow-Up Study With Aopa Members, Beth Blickensderfer, Thomas A. Guinn, Thomas Bob, Jayde King, Yolanda Ortiz, Nick Defilippis, Quirijn Berendschot, Jacqueline Mcsorley
Interpreting Aviation Weather Products: Follow-Up Study With Aopa Members, Beth Blickensderfer, Thomas A. Guinn, Thomas Bob, Jayde King, Yolanda Ortiz, Nick Defilippis, Quirijn Berendschot, Jacqueline Mcsorley
General Aviation Weather Display Interpretation
Purpose
- Use the questions we developed in Phase I
- Include pilots that are more representative of GA (age, flight hours/experience); Collaborate with AOPA
- Examine: Knowledge about aviation weather products; Differences between levels of flight certificate and/or ratings
Assessing Ga Pilots' Preflight Weather Planning Mental Models, Yolanda Ortiz, Beth Blickensderfer, Thomas A. Guinn
Assessing Ga Pilots' Preflight Weather Planning Mental Models, Yolanda Ortiz, Beth Blickensderfer, Thomas A. Guinn
General Aviation Weather Display Interpretation
Purpose, To assess GA Pilots' ability to:
- Obtain the Appropriate Weather Information
- Interpret the Data
- Apply the Information to a Given Flight Route
A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy
A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy
Journal of Digital Forensics, Security and Law
As technology improves and economies become more globalized, the concept of currency has evolved. Bitcoin, a cryptographic digital currency, has been embraced as a secure and convenient type of money. Due to its security and privacy for the user, Bitcoin is a good tool for conducting criminal trades. The Financial Crimes Enforcement Network (FinCEN) has regulations in place to make identification information of Bitcoin purchasers accessible to law enforcement, but enforcing these rules with cash-for-Bitcoin traders is difficult. This study surveyed cash-for-Bitcoin vendors in Oklahoma, Texas, Arkansas, Missouri, Kansas, Colorado, and New Mexico to determine personal demographic information, knowledge of …
Database Review: Sao/Nasa Astrophysics Data System, Laura Pope Robbins
Database Review: Sao/Nasa Astrophysics Data System, Laura Pope Robbins
Publications
Laura Pope Robbins is an advisor for The Charleston Advisor, and the review below is included in Scholarly Commons with the permission of the publisher.
The Astrophysics Data System (ADS) is the premier Open Access research database for astronomy and astrophysics containing over 13 million bibliographic records. These records include journal articles, books, conference proceedings, historical observatory bulletins, and other gray literature. An exceptional feature of ADS is the visualizations it creates, showing author networks, overlapping citations, and frequently occurring terminology giving researchers new ways to explore the literature. It is a unique resource that is as easy for a …
Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward
Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward
National Training Aircraft Symposium (NTAS)
Modern aircraft utilize digital display screens to provide critical flight and system status information to pilots. As computing power has increased, the number of data sources and information presented has also increased, with the goal of increasing situational awareness. However, the display can become cluttered with extraneous or irrelevant information, to the detriment of pilot cognitive workload. Pilot perceptions of clutter vary with flight experience, introducing unique considerations in the flight training environment, given the experience difference between instructors and students. Researchers have studied the problem, identifying both the number of visual objects and information density as predictors of perception …
Effects Of Volcanicity In Iceland, Lilian Njoki Ng'ang'a
Effects Of Volcanicity In Iceland, Lilian Njoki Ng'ang'a
Student Works
Iceland is greatly known for its volcanicity as there are several eruptions that have occurred over the years. The country’s volcanology is due to its location on the Mid-Atlantic Ridge, which is a divergent tectonic boundary (Promote Iceland, n.d.). Due to this, the country is known to be responsible for a third of all the fresh lava on earth (Marteinn, 2018).
This research provides a deep dive into the effects of volcanicity and how the Icelandic people have adapted to it. The methods used to collect data for this research were secondary sources and interviews. It was evident that the …
Book Review: Fundamentals Of International Aviation, Alan Bender
Book Review: Fundamentals Of International Aviation, Alan Bender
International Journal of Aviation, Aeronautics, and Aerospace
Not applicable.
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Annual ADFSL Conference on Digital Forensics, Security and Law
Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Annual ADFSL Conference on Digital Forensics, Security and Law
Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Annual ADFSL Conference on Digital Forensics, Security and Law
Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Annual ADFSL Conference on Digital Forensics, Security and Law
Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …
Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy
Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy
Annual ADFSL Conference on Digital Forensics, Security and Law
Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is …
Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang
Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Annual ADFSL Conference on Digital Forensics, Security and Law
Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …
Improving Airplane Boarding Time: A Review, A Field Study And An Experiment With A New Way Of Hand Luggage Stowing, Jessica Coppens, Sagar Dangal, Mirte Vendel, Shabila Anjani, Stefan Akkerman, Suzanne Hiemstra-Van Mastrigt, Peter Vink
Improving Airplane Boarding Time: A Review, A Field Study And An Experiment With A New Way Of Hand Luggage Stowing, Jessica Coppens, Sagar Dangal, Mirte Vendel, Shabila Anjani, Stefan Akkerman, Suzanne Hiemstra-Van Mastrigt, Peter Vink
International Journal of Aviation, Aeronautics, and Aerospace
The airplane (de)boarding process is not organized optimally. The goal of this paper is to search for improvement possibilities. In this paper literature is reviewed, boarding characteristics are studied in a field study and a pilot study with a new way of hand luggage stowing is performed. Computer simulations indicate that there are more efficient boarding methods than those currently in use, like the reverse pyramid method which starts window seat columns in the back and ends with aisle seat columns in the front. The literature also shows that hand luggage stowing in the overhead lockers can block other passengers …
Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý
Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý
Journal of Digital Forensics, Security and Law
Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated …
Back Matter, Adfsl
Back Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
The General Aviation Pilot Preflight Weather Planning: Weather Products Usability & Limitations, Jayde King, Yolanda Ortiz, Nicholas Defilippis, Thomas A. Guinn, Beth Blickensderfer, Thomas Robert
The General Aviation Pilot Preflight Weather Planning: Weather Products Usability & Limitations, Jayde King, Yolanda Ortiz, Nicholas Defilippis, Thomas A. Guinn, Beth Blickensderfer, Thomas Robert
General Aviation Weather Display Interpretation
Over the last 30 years, a large percentage of weather-related aviation accidents have occurred under General Aviation (GA) operations (FAA, 2010; Fultz & Ashley, 2016; AOPA, 2008).
- Novice Private Pilots VFR into IMC
- High Risk For Incurring Fatality
Aviation Weather Challenges
- Difficult to interpret Aviation Weather Products
- Pilot's Decision Making Biases and Errors
- GA Pilots' Lack of Aviation Weather Experience
Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The First Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang
Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The First Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang
International Journal of Aviation, Aeronautics, and Aerospace
The objective of this study is to develop and evaluate novel display formats to support RTA operations for near to midterm NextGen. Traditional cockpit displays separate space and time information in distant display sources in heterogeneous formats (graphics vs. text). This design composition may cause potential pilot errors when required time of arrival (RTA) obligations are imposed at every waypoint in NextGen. Pilots were randomly assigned to four different display conditions in a simulator – one traditional display with distant space and time cues, and three novel displays with close spatial proximity between the two cues. In the first phase …
Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The Second Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang
Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The Second Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang
International Journal of Aviation, Aeronautics, and Aerospace
The prior first phase of this study investigated the effectiveness of new design of flight deck display for required time of arrival operation of NextGen by collecting objective query response data during autopilot flights and subjective data about the perception between display condition and situation awareness level. To evaluate pilots’ mental workload during the operations when they interacted with novel flight deck display design, this second phase provided pilots with simulation flight tasks arriving at four successive waypoints on time in the same display conditions as the first phase and asked them to rate their mental workload ratings. The workload …