Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

Conference

2022

Institution
Keyword
Publication

Articles 61 - 80 of 80

Full-Text Articles in Social and Behavioral Sciences

New Professional Doctorate Program Offers New Opportunities For Embedded Librarianship With Policy Practitioners, Susie Skarl Mar 2022

New Professional Doctorate Program Offers New Opportunities For Embedded Librarianship With Policy Practitioners, Susie Skarl

Transforming Libraries for Graduate Students

As doctoral programs frequently evolve in large urban universities, how can liaison librarians best position themselves for outreach activities, teaching faculty/librarian partnerships, student engagement, information literacy instruction, and more?

At the University of Nevada, Las Vegas (UNLV), the School of Public Policy and Leadership has developed a professional doctorate degree, Doctor of Public Policy (DPP), which is designed for individuals interested in developing skills in policymaking and policy implementation at all levels of government. “Completion of this degree will prepare students to conduct policy analysis, advocate for public policies and community-based solutions, or serve in decision-making positions.” (UNLV DPP Program, …


Streamlining Project Development Through Planning & Environmental Linkages, Karen Hadley, Brett Lackey Mar 2022

Streamlining Project Development Through Planning & Environmental Linkages, Karen Hadley, Brett Lackey

Purdue Road School

As transportation agencies continue to explore ways to be more efficient in the project development process, they are embracing integrated methodologies like planning and environmental linkages. This tool is practical, yet highly effective and inclusive, and teams across the country are experiencing its value. This presentation will highlight a variety of use cases, discuss lessons learned and best practices, and specifically address how planning and environmental linkages can be applied in Indiana and the Midwest.


Big Data Applications: Public Involvement Tools For Public Involvement, Amy L. Livingston, Houssam Ghandour Mar 2022

Big Data Applications: Public Involvement Tools For Public Involvement, Amy L. Livingston, Houssam Ghandour

Purdue Road School

Using big data to better understand origin-destination and regional travel patterns is critical to project development. Tools such as passive geographically based data lead to improved definitions for traffic analysis zones (TAZs), which, in turn, help inform public involvement plans for a more targeted approach and improved equity. This presentation will highlight future planning applications in Indiana and other case examples where we have used big data to aid the plan development of public and stakeholder engagement.


The Gender Bias Burden On Business: Women’S Access To Credit In Bahrain [Poster], Sandra Thiman Feb 2022

The Gender Bias Burden On Business: Women’S Access To Credit In Bahrain [Poster], Sandra Thiman

Research in the Capitol

Entrepreneurship is essential to virtually every economy; however, Bahraini women face many challenges accessing business development. In particular, a major constraint for these women is their access to capital support. In 2020, the government signed a law prohibiting gender-based discrimination in access to credit to help the issue; nonetheless, its effectiveness has yet to be systematically examined. Using data from several sources, I test whether the law significantly affected the gender gap in borrowing for business purposes while controlling for other variables. Importantly, I find that women’s labor force participation is a significant factor in reducing the borrowing gap between …


Oral Presentations: Social Sciences I, Olivia Maurer, Kaden Grace, Ryan Wallace Feb 2022

Oral Presentations: Social Sciences I, Olivia Maurer, Kaden Grace, Ryan Wallace

Mississippi Undergraduate Honors Conference

Video provided above is of Olivia Maurer's presentation.

Video of Kaden Grace's presentation is available here.

Video of Ryan Wallace's presentation is available here.


2022 Mlk Keynote Address: Eddie Glaude Jr. Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr. Jan 2022

2022 Mlk Keynote Address: Eddie Glaude Jr. Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr.

Martin Luther King, Jr. Series

One of the nation’s most prominent scholars, Eddie Glaude, Jr. is an author, political commentator, public intellectual and passionate educator who examines the complex dynamics of the American experience. His writings, including his most recent—the New York Times bestseller Begin Again: James Baldwin’s America and Its Urgent Lessons for our Own—take a wide look at Black communities, the difficulties of race in the United States and the challenges we face as a democracy.

In his writing and speaking, Glaude is an American critic in the tradition of James Baldwin and Ralph Waldo Emerson, confronting history and bringing our nation’s …


2022 Mlk Keynote Address: Eddie Glaude Jr. Pre-Event Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr. Jan 2022

2022 Mlk Keynote Address: Eddie Glaude Jr. Pre-Event Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr.

Martin Luther King, Jr. Series

One of the nation’s most prominent scholars, Eddie Glaude, Jr. is an author, political commentator, public intellectual and passionate educator who examines the complex dynamics of the American experience. His writings, including his most recent—the New York Times bestseller Begin Again: James Baldwin’s America and Its Urgent Lessons for our Own—take a wide look at Black communities, the difficulties of race in the United States and the challenges we face as a democracy.

In his writing and speaking, Glaude is an American critic in the tradition of James Baldwin and Ralph Waldo Emerson, confronting history and bringing our nation’s …


A Culture Of Institutional Racism: Housing Policies During The New Deal, Breyonna J. Bowen Jan 2022

A Culture Of Institutional Racism: Housing Policies During The New Deal, Breyonna J. Bowen

Capstone Showcase

There currently exists a distressed relationship between African Americans and housing due to previously enacted policies. In looking at this issue, I aim to use the theory of institutional racism to explain how past housing policies that enforce and perpetuate discrimination have impacted this current relationship. Through the method of policy analysis, I attempt to pinpoint where past housing policies have failed to provide housing to many African Americans. I find that there are several policies that were enacted during 1930s and 40s, specifically the New Deal Era, that inflicted discriminatory housing policies on African Americans. The findings indicate that …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Bodily Autonomy And Anti-Vaccine Discourse During The Covid-19 Pandemic, Haley Sherman Jan 2022

Bodily Autonomy And Anti-Vaccine Discourse During The Covid-19 Pandemic, Haley Sherman

Capstone Showcase

This paper explores the relationship between anti-vaccine discourse and ideas about bodily autonomy. I analyze the cyclical nature of vaccine hesitancy and show that it can lead to misinformation and harmful narratives. This paper uses theories of bodily autonomy that identify a concept called moral obligation. This concept, as explored by Alberto Giubilini, is a utilitarian approach in which citizens have a responsibility to their governments to get vaccinated so that, in turn, their governments can fulfill their obligation of protecting other individuals’ health (Giubilini 2020, 54). A discourse analysis of four key players in the anti-vax movement shows that …


The Program To Reduce Implicit Bias In Carroll Hospital Center Using The Implicit Association Test, Katherine E. Traynor Jan 2022

The Program To Reduce Implicit Bias In Carroll Hospital Center Using The Implicit Association Test, Katherine E. Traynor

Capstone Showcase

Natural brain processes make all individuals susceptible to unconscious bias; however, stressful, fearful, or anger-evoking situations as well as the negative influence of media and social surroundings increase the risk of holding obstructive bias, and there is a greater risk of being negatively impacted by this phenomenon when belonging to a minority population (Rose & Flores, 2020). As a result, high rates of infant mortality (10.2 deaths per 1,000 live births for the Non-Hispanic Black population compared to 4.1 in the White population) and cardiovascular related diseases (190.0 cases per 1,000 in the Non-Hispanic Black population compared to 161.3 in …