Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Social and Behavioral Sciences

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Challenges For Flight Instructors Teaching Weather Information, Robert Thomas, Thomas A. Guinn Oct 2018

Challenges For Flight Instructors Teaching Weather Information, Robert Thomas, Thomas A. Guinn

Aviation Weather Training Research

  • Flight Instructors face a challenge when teaching/learning weather information
  • Multiple overlapping resources for aviation weather
  • AC takes longer timeframe to update –problem for quick updates of information


Assessing Ga Pilots' Preflight Weather Planning Mental Models, Yolanda Ortiz, Beth Blickensderfer, Thomas A. Guinn Oct 2018

Assessing Ga Pilots' Preflight Weather Planning Mental Models, Yolanda Ortiz, Beth Blickensderfer, Thomas A. Guinn

General Aviation Weather Display Interpretation

Purpose, To assess GA Pilots' ability to:

  • Obtain the Appropriate Weather Information
  • Interpret the Data
  • Apply the Information to a Given Flight Route


Interpreting Aviation Weather Products: Follow-Up Study With Aopa Members, Beth Blickensderfer, Thomas A. Guinn, Thomas Bob, Jayde King, Yolanda Ortiz, Nick Defilippis, Quirijn Berendschot, Jacqueline Mcsorley Oct 2018

Interpreting Aviation Weather Products: Follow-Up Study With Aopa Members, Beth Blickensderfer, Thomas A. Guinn, Thomas Bob, Jayde King, Yolanda Ortiz, Nick Defilippis, Quirijn Berendschot, Jacqueline Mcsorley

General Aviation Weather Display Interpretation

Purpose

  • Use the questions we developed in Phase I
  • Include pilots that are more representative of GA (age, flight hours/experience); Collaborate with AOPA
  • Examine: Knowledge about aviation weather products; Differences between levels of flight certificate and/or ratings


Aviation Weather Education: Challenges Using Current Faa Guidance, Thomas A. Guinn, Robert Thomas Oct 2018

Aviation Weather Education: Challenges Using Current Faa Guidance, Thomas A. Guinn, Robert Thomas

Aviation Weather Training Research

Observed Challenges

  • Incorrect product information
  • Guidance not keeping pace with new products
  • Multiple formats of same product
  • Potentially unnecessary information
  • Missing product information
  • Limited focus on interpretation


A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy Oct 2018

A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy

Journal of Digital Forensics, Security and Law

As technology improves and economies become more globalized, the concept of currency has evolved. Bitcoin, a cryptographic digital currency, has been embraced as a secure and convenient type of money. Due to its security and privacy for the user, Bitcoin is a good tool for conducting criminal trades. The Financial Crimes Enforcement Network (FinCEN) has regulations in place to make identification information of Bitcoin purchasers accessible to law enforcement, but enforcing these rules with cash-for-Bitcoin traders is difficult. This study surveyed cash-for-Bitcoin vendors in Oklahoma, Texas, Arkansas, Missouri, Kansas, Colorado, and New Mexico to determine personal demographic information, knowledge of …


Database Review: Sao/Nasa Astrophysics Data System, Laura Pope Robbins Sep 2018

Database Review: Sao/Nasa Astrophysics Data System, Laura Pope Robbins

Publications

Laura Pope Robbins is an advisor for The Charleston Advisor, and the review below is included in Scholarly Commons with the permission of the publisher.

The Astrophysics Data System (ADS) is the premier Open Access research database for astronomy and astrophysics containing over 13 million bibliographic records. These records include journal articles, books, conference proceedings, historical observatory bulletins, and other gray literature. An exceptional feature of ADS is the visualizations it creates, showing author networks, overlapping citations, and frequently occurring terminology giving researchers new ways to explore the literature. It is a unique resource that is as easy for a …


Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward Aug 2018

Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward

National Training Aircraft Symposium (NTAS)

Modern aircraft utilize digital display screens to provide critical flight and system status information to pilots. As computing power has increased, the number of data sources and information presented has also increased, with the goal of increasing situational awareness. However, the display can become cluttered with extraneous or irrelevant information, to the detriment of pilot cognitive workload. Pilot perceptions of clutter vary with flight experience, introducing unique considerations in the flight training environment, given the experience difference between instructors and students. Researchers have studied the problem, identifying both the number of visual objects and information density as predictors of perception …


Effects Of Volcanicity In Iceland, Lilian Njoki Ng'ang'a Aug 2018

Effects Of Volcanicity In Iceland, Lilian Njoki Ng'ang'a

Student Works

Iceland is greatly known for its volcanicity as there are several eruptions that have occurred over the years. The country’s volcanology is due to its location on the Mid-Atlantic Ridge, which is a divergent tectonic boundary (Promote Iceland, n.d.). Due to this, the country is known to be responsible for a third of all the fresh lava on earth (Marteinn, 2018).

This research provides a deep dive into the effects of volcanicity and how the Icelandic people have adapted to it. The methods used to collect data for this research were secondary sources and interviews. It was evident that the …


Book Review: Fundamentals Of International Aviation, Alan Bender Jun 2018

Book Review: Fundamentals Of International Aviation, Alan Bender

International Journal of Aviation, Aeronautics, and Aerospace

Not applicable.


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta May 2018

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D May 2018

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …


Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy May 2018

Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy

Annual ADFSL Conference on Digital Forensics, Security and Law

Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is …


Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang May 2018

Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik May 2018

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …


Improving Airplane Boarding Time: A Review, A Field Study And An Experiment With A New Way Of Hand Luggage Stowing, Jessica Coppens, Sagar Dangal, Mirte Vendel, Shabila Anjani, Stefan Akkerman, Suzanne Hiemstra-Van Mastrigt, Peter Vink Apr 2018

Improving Airplane Boarding Time: A Review, A Field Study And An Experiment With A New Way Of Hand Luggage Stowing, Jessica Coppens, Sagar Dangal, Mirte Vendel, Shabila Anjani, Stefan Akkerman, Suzanne Hiemstra-Van Mastrigt, Peter Vink

International Journal of Aviation, Aeronautics, and Aerospace

The airplane (de)boarding process is not organized optimally. The goal of this paper is to search for improvement possibilities. In this paper literature is reviewed, boarding characteristics are studied in a field study and a pilot study with a new way of hand luggage stowing is performed. Computer simulations indicate that there are more efficient boarding methods than those currently in use, like the reverse pyramid method which starts window seat columns in the back and ends with aisle seat columns in the front. The literature also shows that hand luggage stowing in the overhead lockers can block other passengers …


Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý Mar 2018

Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý

Journal of Digital Forensics, Security and Law

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated …


Back Matter, Adfsl Feb 2018

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl Feb 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, Adfsl Feb 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


The General Aviation Pilot Preflight Weather Planning: Weather Products Usability & Limitations, Jayde King, Yolanda Ortiz, Nicholas Defilippis, Thomas A. Guinn, Beth Blickensderfer, Thomas Robert Jan 2018

The General Aviation Pilot Preflight Weather Planning: Weather Products Usability & Limitations, Jayde King, Yolanda Ortiz, Nicholas Defilippis, Thomas A. Guinn, Beth Blickensderfer, Thomas Robert

General Aviation Weather Display Interpretation

Over the last 30 years, a large percentage of weather-related aviation accidents have occurred under General Aviation (GA) operations (FAA, 2010; Fultz & Ashley, 2016; AOPA, 2008).

  • Novice Private Pilots VFR into IMC
  • High Risk For Incurring Fatality

Aviation Weather Challenges

  1. Difficult to interpret Aviation Weather Products
  2. Pilot's Decision Making Biases and Errors
  3. GA Pilots' Lack of Aviation Weather Experience


Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The First Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang Jan 2018

Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The First Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang

International Journal of Aviation, Aeronautics, and Aerospace

The objective of this study is to develop and evaluate novel display formats to support RTA operations for near to midterm NextGen. Traditional cockpit displays separate space and time information in distant display sources in heterogeneous formats (graphics vs. text). This design composition may cause potential pilot errors when required time of arrival (RTA) obligations are imposed at every waypoint in NextGen. Pilots were randomly assigned to four different display conditions in a simulator – one traditional display with distant space and time cues, and three novel displays with close spatial proximity between the two cues. In the first phase …


Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The Second Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang Jan 2018

Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The Second Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang

International Journal of Aviation, Aeronautics, and Aerospace

The prior first phase of this study investigated the effectiveness of new design of flight deck display for required time of arrival operation of NextGen by collecting objective query response data during autopilot flights and subjective data about the perception between display condition and situation awareness level. To evaluate pilots’ mental workload during the operations when they interacted with novel flight deck display design, this second phase provided pilots with simulation flight tasks arriving at four successive waypoints on time in the same display conditions as the first phase and asked them to rate their mental workload ratings. The workload …