Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

Embry-Riddle Aeronautical University

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 803

Full-Text Articles in Social and Behavioral Sciences

A Double Taboo? An Exploratory Study Of Mental Health Perceptions Amongst Black Aerospace Professionals, Theodore W. Johnson Ph.D., Arlean Timmons, Kenisha V. Ford, Harriet Sanya Feb 2024

A Double Taboo? An Exploratory Study Of Mental Health Perceptions Amongst Black Aerospace Professionals, Theodore W. Johnson Ph.D., Arlean Timmons, Kenisha V. Ford, Harriet Sanya

National Training Aircraft Symposium (NTAS)

This exploratory study delves into the often-overlooked realm of mental health perceptions among Black aerospace professionals, shedding light on a double taboo within a historically stigmatized industry and community. In response to the escalating mental health crisis in the U.S. and scarcity of research focusing exclusively on the mental health experiences of Black aerospace professionals, this research endeavors to uncover their unique perspectives.

The findings from the study indicate that Black aerospace professionals navigate not only the universal challenges of mental health but also complex socio-cultural and workplace factors, such as discrimination, underrepresentation, and the historic reluctance to discuss mental …


High Times, Higher Stakes: Mental Health Impacts In New Recreational Marijuana Legal Landscape, Jason T. Lorenzon J.D., Chris Pezalla, Diana Semilia Feb 2024

High Times, Higher Stakes: Mental Health Impacts In New Recreational Marijuana Legal Landscape, Jason T. Lorenzon J.D., Chris Pezalla, Diana Semilia

National Training Aircraft Symposium (NTAS)

This presentation delves into the societal and mental health consequences arising from the increasing trend of legalizing recreational marijuana. Specifically, we will examine the potential normalization of unconventional behavior among aviation college students, who may grapple with substance use challenges due to stress, sleep difficulties, and the demands of college life. Given the rigorous nature of flight training, prioritizing the mental well-being of pilots becomes imperative.

With the recent legalization of recreational marijuana in Ohio, this presentation integrates insights from Diana Semilia's 2022 study on Kent State Flight Students Ages 19-26. The study's objective was to extract practical recommendations applicable …


Assessing Past Airworthiness Directives And How Safety Management Systems May Benefit Aviation Product Design And Manufacturing, Damon Lercel Ph.D., Manoj Patankar Ph.D., Richard Steckel Ph.D. Jan 2024

Assessing Past Airworthiness Directives And How Safety Management Systems May Benefit Aviation Product Design And Manufacturing, Damon Lercel Ph.D., Manoj Patankar Ph.D., Richard Steckel Ph.D.

Journal of Aviation/Aerospace Education & Research

The European Union Aviation Safety Agency (EASA) continues to promulgate Safety Management Systems (SMS) across aviation organizations when it recently issued SMS requirements for EASA certificated Part 145 maintenance, repair and overhaul (MRO) organizations and Part 21 Design & Manufacturing (D&M) organizations. Currently, the Federal Aviation Administration (FAA) has no such rule in place for these U.S.-based organizations, which may challenge those doing business in countries where EASA policies apply. Given that a majority of the United States’ D&M and MRO population is made up of smaller organizations, it is likely a U.S. SMS regulation will require justification of the …


Rachel Carson's Silent Spring: Pioneering Environmental Policy Change, Katherine Hoffsetz Nov 2023

Rachel Carson's Silent Spring: Pioneering Environmental Policy Change, Katherine Hoffsetz

Sustainability Conference

Rachel Carson's groundbreaking book, Silent Spring, published in 1962, serves as a pivotal moment in the history of environmental advocacy. The book exposed the consequences of pesticide use on ecosystems and called for a reevaluation of human impact on the environment. This research project aims to comprehensively analyze the profound and enduring impact of Carson's work on environmental public policy. The research employs a literature review and analysis of legislation to trace the influence of Silent Spring on environmental advocacy in the government. A correlation is revealed between the release of Silent Spring and the enactment of key environmental …


A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown Apr 2023

A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown

Publications

The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …


Analysis Of The Emerging Pilot Workforce, James Birdsong, Kurt Reesman Jan 2023

Analysis Of The Emerging Pilot Workforce, James Birdsong, Kurt Reesman

National Training Aircraft Symposium (NTAS)

The pilot workforce grew by approximately 20,000 pilots between 2011 – 2019 before shedding almost 6,500 jobs in 2020 due to COVID-19. Long-term forecasts predict industry recovery and growth and the need for robust pilot hiring since approximately 50% of today’s pilot workforce will meet the mandatory retirement age within 15 years.

The current workforce consists of four generations, with the youngest (Generation Z) just beginning to join the airline ranks. The oldest generation (Baby Boomers) will be exiting the workforce within ten years, leaving three generations (Generations X, Y, and Z), two of which have spent their entire lives …


Armed And Unarmed Drone Perception In Conflict Zones, Nazish Chunara Jan 2023

Armed And Unarmed Drone Perception In Conflict Zones, Nazish Chunara

Student Works

Regions across the globe that are impacted by conflict are often the recipients of both armed and unarmed drones. These dual-use systems blur the boundary between military and civilian objectives. The goal of this literature review is to understand the scope of research conducted in conflict zones from the perspective of the civilian. Civilian includes resident, visitor, and worker. A gap in the available literature has been identified within the context of dual-use systems, conflict zones, and the civilian perspective.


Public Opinion Concerning The Siting Of Vertiports, David C. Ison Jan 2023

Public Opinion Concerning The Siting Of Vertiports, David C. Ison

International Journal of Aviation, Aeronautics, and Aerospace

This study sought a better understanding of public opinion about the siting of vertiports to support Advanced Air Mobility (AAM). An online survey was used to collect the necessary data. The survey was divided into seven sections: personal impacts, community impacts, acceptable proximity, benefits and concerns, flight operations, open-ended comments, and demographics. The findings for personal impacts suggested a slightly positive outlook. Community impacts were assessed, and data also indicated a marginally positive outlook. The survey revealed that a tolerable average distance between the home of the respondent and a vertiport was between one to two miles. Opinions about the …


Public Acceptance Of Medical Screening Recommendations, Safety Risks, And Implied Liabilities Requirements For Space Flight Participation, Cory J. Trunkhill Oct 2022

Public Acceptance Of Medical Screening Recommendations, Safety Risks, And Implied Liabilities Requirements For Space Flight Participation, Cory J. Trunkhill

Doctoral Dissertations and Master's Theses

The space tourism industry is preparing to send space flight participants on orbital and suborbital flights. Space flight participants are not professional astronauts and are not subject to the rules and guidelines covering space flight crewmembers. This research addresses public acceptance of current Federal Aviation Administration guidance and regulations as designated for civil participation in human space flight.

The research utilized an ordinal linear regression analysis of survey data to explore the public acceptance of the current medical screening recommended guidance and the regulations for safety risk and implied liability for space flight participation. Independent variables constituted participant demographic representations …


An Empirical Study Of The Evolution Of Homeland Security Definitions And The Public Perception Of Homeland Security, Alexander Siedschlag, Andrea Jerković Jul 2022

An Empirical Study Of The Evolution Of Homeland Security Definitions And The Public Perception Of Homeland Security, Alexander Siedschlag, Andrea Jerković

Publications

Objectives

• To introduce results from a currently conducted empirical study (quantitative systematic review) of the evolution of official homeland security definitions from related federal strategies, frameworks, guidelines, the QHSRs, enterprise agencies’ FY strategic plans, and related documents.

• To identify continuing and changing ingredients of the sprouting public policy and strategy definition of homeland security.

• To compare those findings to the development of the public perception of homeland security and how people would define the term, using the example of Pennsylvania, with our multi-year poll study of residents’ perception of homeland security.

Utility

• While valuable analyses of …


Predicting The Impact Of Covid-19 On Air Transportation Volumes, Dothang Truong Jun 2022

Predicting The Impact Of Covid-19 On Air Transportation Volumes, Dothang Truong

Publications

COVID-19 has significant impacts on air transportation. This paper aims to predict domestic and international transportation volumes during the pandemic. Daily trips by distance are novel variables in the prediction. Additionally, COVID-19 severity, vaccination, and economic index are other predictors. Artificial Neural Networks and Monte Carlo simulations were used to develop and validate the predictive models using data from various sources in 2021. The findings confirm the importance of daily trips by distance and vaccination as significant predictors. Airlines can use the models to predict air transportation volumes and formulate appropriate strategies to meet the air travel demand and improve …


Practicing Sustainability In Consumer Choices, Cynthia Pugh Apr 2022

Practicing Sustainability In Consumer Choices, Cynthia Pugh

Sustainability Conference

Practicing Sustainability in Consumer Choices

The issue of sustainability is a global one impacted daily by individual choices. The foundational principles of sustainability and the unified efforts of the global sustainability goals are presented to define the world we want. Sustainability is an intentional core of any product akin to safety by design. This presentation will describe the concept of sustainability by design, designing at all levels, with good intentions and with the goal of abundance.

Due to the availability of corporate sustainability information such as the Global Reporting Initiative or Corporate Social Responsibility, one can comparatively research the …


Rethink Your Commute: Good For The Planet & You, Courtney Reynolds Apr 2022

Rethink Your Commute: Good For The Planet & You, Courtney Reynolds

Sustainability Conference

Transportation choices have a big impact on the environment, as well as individual health and wellness. Many times, people may feel like they don't have any other choice than to drive to get to school, work, and other places. But exploring other options can lead to more sustainable choices and save individuals a lot of money.

At reThink Your Commute, we help people make informed decisions on how, when, and where they travel. We do this by promoting sustainable choices, connecting people to local resources, and supporting equitable access to transportation options. This 10-minute presentation will provide an overview of …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Community-Based Rehabilitation's Effectiveness In Reducing Singapore Juvenile Recidivism, Denzil Neo, June Hyuk Lee, Mervin Xin Hong Chew, Munisraj Sarfoji, Timothy Prakash Dec 2021

Community-Based Rehabilitation's Effectiveness In Reducing Singapore Juvenile Recidivism, Denzil Neo, June Hyuk Lee, Mervin Xin Hong Chew, Munisraj Sarfoji, Timothy Prakash

Introduction to Research Methods RSCH 202

Singapore's juvenile recidivism rate has climbed by around 5% since 2013, putting the country at risk of increased youth crime. With several mandatory rehabilitative programmes classified into two categories, Community-Based Rehabilitation (CBR) and Institutional-Based Rehabilitation (IBR), it is unclear whether the mandatory individual rehabilitative programmes for offenders were actually effective in achieving their corrective goals. This proposal would undertake a regression analysis to compare the effectiveness of CBR and IBR programmes utilizing secondary data gathered by the Ministry of Social and Family Development (MSF) and primary data from a survey. The survey will provide previously unstudied insights into the offender's …


Civic Homeland Security Culture: A Poll Study Approach And The Example Of Pennsylvania, Alexander Siedschlag Dec 2021

Civic Homeland Security Culture: A Poll Study Approach And The Example Of Pennsylvania, Alexander Siedschlag

Publications

COVID-19 response experience around the world has demonstrated that it is indispensable to understand the public understanding of, and needs during, risk, hazards, and crisis in public policy, in particular related to the security of society as a whole. The ultimate goal of homeland security and broader civil (or sometimes referred to as societal) security alike, as well as of related security science research, is to accomplish resilient societies through a culture of preparedness. Civic security culture is a necessary ingredient to such a culture of preparedness. The security culture perspective also helps understand how a resilient society and nation …


Motivation For Physical Training In Army Rotc Cadets, Christina Frederick, Stephen Rice, Grace Richards, Keith Ruskin, Kyle Gatrost Jun 2021

Motivation For Physical Training In Army Rotc Cadets, Christina Frederick, Stephen Rice, Grace Richards, Keith Ruskin, Kyle Gatrost

Publications

The present study used Self-Determination Theory to study motivation for physical training (PT) in ARMY ROTC cadets (n=139). Results found that length of participation in ROTC lowered cadets’ intrinsic motivation, which then resulted in lower levels of enjoyment for PT. Application of results for future training is discussed.


Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri May 2021

Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri

Publications

As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.


Whole-Community Response Planning For Pennsylvania’S Ongoing Opioid Emergency, Alexander Siedschlag Apr 2021

Whole-Community Response Planning For Pennsylvania’S Ongoing Opioid Emergency, Alexander Siedschlag

Publications

The Penn State Center for Security Research and Education (CSRE), in collaboration with Penn State Homeland Security Programs and the Pennsylvania Emergency Management Agency (PEMA), held a tabletop exercise that addressed first-responder and whole-community response and resilience to the ongoing opioid crisis. The exercise, which took place Sept. 24, 2019, at PEMA headquarters in Harrisburg, Pa., also was supported by the Governor’s Office for Homeland Security and the Pennsylvania Department of Health’s Bureau of Public Health Preparedness. The Dickinson School of Law and Immaculata University were academic contributors. This article summarizes the main outcome in the current COVID-19 context.


A Comparative Analysis Of Distribution And Allocation Of Covid-19 Vaccines Between Two Administrations, Leila Halawi, J. Mayanja, J. Chilipamushi, Y. Zhang, B Albury, Jude Edwards Apr 2021

A Comparative Analysis Of Distribution And Allocation Of Covid-19 Vaccines Between Two Administrations, Leila Halawi, J. Mayanja, J. Chilipamushi, Y. Zhang, B Albury, Jude Edwards

Publications

The pandemic of COVID-19 is a life-threatening disease that entailed all governments but especially the U.S government, to quickly prevent methods of spreading the virus while strategically putting in place a plan for biological testing for a vaccine for immunity. The purpose was to determine how effective the formulation of a COVID-19 vaccine and the distribution would impact the mortality with efficacy rates. Besides, this research paper underlines the principles for ethical and equitable distribution for mass immunization. A comparative analysis between the Trump Administration and the Biden Administration will be presented regarding the funding stream, distribution of vaccinations, and …


Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri Apr 2021

Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri

Publications

The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of …