Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Social and Behavioral Sciences

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy Oct 2018

A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy

Journal of Digital Forensics, Security and Law

As technology improves and economies become more globalized, the concept of currency has evolved. Bitcoin, a cryptographic digital currency, has been embraced as a secure and convenient type of money. Due to its security and privacy for the user, Bitcoin is a good tool for conducting criminal trades. The Financial Crimes Enforcement Network (FinCEN) has regulations in place to make identification information of Bitcoin purchasers accessible to law enforcement, but enforcing these rules with cash-for-Bitcoin traders is difficult. This study surveyed cash-for-Bitcoin vendors in Oklahoma, Texas, Arkansas, Missouri, Kansas, Colorado, and New Mexico to determine personal demographic information, knowledge of …


Book Review: Fundamentals Of International Aviation, Alan Bender Jun 2018

Book Review: Fundamentals Of International Aviation, Alan Bender

International Journal of Aviation, Aeronautics, and Aerospace

Not applicable.


Improving Airplane Boarding Time: A Review, A Field Study And An Experiment With A New Way Of Hand Luggage Stowing, Jessica Coppens, Sagar Dangal, Mirte Vendel, Shabila Anjani, Stefan Akkerman, Suzanne Hiemstra-Van Mastrigt, Peter Vink Apr 2018

Improving Airplane Boarding Time: A Review, A Field Study And An Experiment With A New Way Of Hand Luggage Stowing, Jessica Coppens, Sagar Dangal, Mirte Vendel, Shabila Anjani, Stefan Akkerman, Suzanne Hiemstra-Van Mastrigt, Peter Vink

International Journal of Aviation, Aeronautics, and Aerospace

The airplane (de)boarding process is not organized optimally. The goal of this paper is to search for improvement possibilities. In this paper literature is reviewed, boarding characteristics are studied in a field study and a pilot study with a new way of hand luggage stowing is performed. Computer simulations indicate that there are more efficient boarding methods than those currently in use, like the reverse pyramid method which starts window seat columns in the back and ends with aisle seat columns in the front. The literature also shows that hand luggage stowing in the overhead lockers can block other passengers …


Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý Mar 2018

Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý

Journal of Digital Forensics, Security and Law

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated …


Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The First Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang Jan 2018

Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The First Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang

International Journal of Aviation, Aeronautics, and Aerospace

The objective of this study is to develop and evaluate novel display formats to support RTA operations for near to midterm NextGen. Traditional cockpit displays separate space and time information in distant display sources in heterogeneous formats (graphics vs. text). This design composition may cause potential pilot errors when required time of arrival (RTA) obligations are imposed at every waypoint in NextGen. Pilots were randomly assigned to four different display conditions in a simulator – one traditional display with distant space and time cues, and three novel displays with close spatial proximity between the two cues. In the first phase …


Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The Second Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang Jan 2018

Design Of Revising Proximity Between Space And Time Cues On Flight Deck Displays To Support Nextgen – The Second Phase, Chang-Geun Oh, Jennie J. Gallimore, Pamela S. Tsang

International Journal of Aviation, Aeronautics, and Aerospace

The prior first phase of this study investigated the effectiveness of new design of flight deck display for required time of arrival operation of NextGen by collecting objective query response data during autopilot flights and subjective data about the perception between display condition and situation awareness level. To evaluate pilots’ mental workload during the operations when they interacted with novel flight deck display design, this second phase provided pilots with simulation flight tasks arriving at four successive waypoints on time in the same display conditions as the first phase and asked them to rate their mental workload ratings. The workload …