Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Embry-Riddle Aeronautical University

2006

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 39

Full-Text Articles in Social and Behavioral Sciences

Developing A Methodology For Assessing Safety Programs Targeting Human Error In Aviation, Scott Shappell, Douglas Wiegmann Nov 2006

Developing A Methodology For Assessing Safety Programs Targeting Human Error In Aviation, Scott Shappell, Douglas Wiegmann

Publications

There is a need to develop an effective methodology for generating comprehensive intervention strategies that map current and proposed safety programs onto well-established types of human error. Two separate studies were conducted using recommendations from NTSB accident investigations and several joint FAA and industry working groups. The goal of the studies was to validate a proposed framework for developing and examining safety initiatives that target human error in aviation. The results suggest five approaches to reducing human factors associated with aviation accidents. When combined with the Human Factors Analysis and Classification System, the resulting Human Factors Intervention Matrix will provide …


The Effect Of Auditory And Visual Distracters On The Useful Field Of View: Implications For The Driving Task, Joanne Wood, Alex Chaparro, Louise Hickson, Nick Thyer, Philippa Carter, Julie Hancock, Adrene Hoe, Ivy Le, Louisa Sahetapy, Floravel Ybarzabal Oct 2006

The Effect Of Auditory And Visual Distracters On The Useful Field Of View: Implications For The Driving Task, Joanne Wood, Alex Chaparro, Louise Hickson, Nick Thyer, Philippa Carter, Julie Hancock, Adrene Hoe, Ivy Le, Louisa Sahetapy, Floravel Ybarzabal

Publications

PURPOSE. The driving environment is becoming increasingly complex, including both visual and auditory distractions within the in-vehicle and external driving environments. This study was designed to investigate the effect of visual and auditory distractions on a performance measure that has been shown to be related to driving safety, the useful field of view.

METHODS. A laboratory study recorded the useful field of view in 28 young visually normal adults (mean 22.6 +- 2.2 years). The useful field of view was measured in the presence and absence of visual distracters (of the same angular subtense as the target) and with three …


Efficacy Of Virtual Models In A Production Systems Course, Lawrence Whitman, Barbara Chaparro Sep 2006

Efficacy Of Virtual Models In A Production Systems Course, Lawrence Whitman, Barbara Chaparro

Publications

Wichita State University has developed an integrated set of virtual reality models of an aircraft assembly line. These models are intended to provide students an ‘artifact’ of industrial and manufacturing engineering by providing a realistic environment for initial learning and application. By utilizing a virtual model of the line, students are able to view the process and interrogate the process details, make changes and observe the effects, and gain a better understanding of the concepts and their interrelationships. This paper presents the method used to assess if virtual models (computer models of a real factory) lead to: improved perception of …


Human Error And Commercial Aviation Accidents: A Comprehensive, Fine-Grained Analysis Using Hfacs, Scott Shappell, Cristy Detwiler, Kali Holcomb, Carla Hackworth, Albert Boquet, Douglas Wiegmann Jul 2006

Human Error And Commercial Aviation Accidents: A Comprehensive, Fine-Grained Analysis Using Hfacs, Scott Shappell, Cristy Detwiler, Kali Holcomb, Carla Hackworth, Albert Boquet, Douglas Wiegmann

Publications

The Human Factors Analysis and Classification System (HFACS) is a theoretically based tool for investigating and analyzing human error associated with accidents and incidents. Previous research has shown that HFACS can be reliably used to identify general trends in the human factors associated with military and general aviation accidents. The aim of this study was to extend previous examinations of aviation accidents to include specific aircrew, environmental, supervisory, and organizational factors associated with 14 CFR Part 121 (Air Carrier) and 14 CFR Part 135 (Commuter) accidents using HFACS. The majority of causal factors were attributed to the aircrew and the …


Assessing Reliability Of Expert Ratings Among Judges Responding To A Survey Instrument Developed To Study The Long Term Efficacy Of The Abet Engineering Criteria, Ec2000, Tracy L. Litzinger May 2006

Assessing Reliability Of Expert Ratings Among Judges Responding To A Survey Instrument Developed To Study The Long Term Efficacy Of The Abet Engineering Criteria, Ec2000, Tracy L. Litzinger

Master's Theses - Daytona Beach

In today’s assessment processes, especially those evaluations that rely on humans to make subjective judgements, it is necessary to analyze the quality of their ratings. The psychometric issues associated with assessment provide the lens through which researchers interpret results and important decisions are made. Therefore, inter-rater agreement (IRA) and inter-rater reliability (IRR) are pre-requisites for rater-dependent data analysis. A survey instrument cannot provide “good” information if it is not reliable; in other words, reliability is central to the validation of an instrument. When judges cannot be shown to reliably rate a performance, item, or target, the question becomes why the …


Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers Apr 2006

Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers

Annual ADFSL Conference on Digital Forensics, Security and Law

Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper gives …


Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka Apr 2006

Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …


Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron Apr 2006

Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron

Annual ADFSL Conference on Digital Forensics, Security and Law

This research paper presents research in process which attempts to define the common body of knowledge (CBK) of digital forensics. Digital forensics is not well defined not does it have a generally accepted CBK. The first three phases of completed research, in a four-phase research process are discussed. The early results have created a preliminary CBK, and final validation is underway.


Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers Apr 2006

Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

In ancient times, users communicated using steganography, “…derived from the Greek words steganos, meaning ‘covered’, and graphein, meaning ‘to write.’” (Singh, 1999, p.5) Steganography facilitates secret, undetected communication. In modern times, in the context of the Global War on Terror, national intelligence and law enforcement agencies need tools to detect hidden information (steganography) in various types of media, most specifically to uncover the placement of hidden information in images. This paper will look at steganography in general terms, presenting the theory of some common steganographic techniques and touching on some theoretical work in steganography. Then a discussion of how to …


Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig Apr 2006

Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig

Annual ADFSL Conference on Digital Forensics, Security and Law

Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs. Furthermore, many students are not instructed in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity. Only a limited number of university-level accounting classes provide …


Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili Apr 2006

Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper outlines a framework for integrating forensic scene documentation with mobile technology. Currently there are no set standards for documenting a forensic scene. Nonetheless, there is a conceptual framework that forensic scientists and engineers use that includes note taking, scene sketches, photographs, video, and voice interview recordings. This conceptual framework will be the basis that a mobile forensic scene documentation software system is built on. A mobile software system for documenting a forensic scene may help in standardizing forensic scene documentation by regulating the data collection and documentation processes for various forensic disciplines.


The Effect Of Gender Schematicity On The Assessment Of Male And Female Pilots’ Competence Given Identical Scenarios, Jan D. Laplante Apr 2006

The Effect Of Gender Schematicity On The Assessment Of Male And Female Pilots’ Competence Given Identical Scenarios, Jan D. Laplante

Master's Theses - Daytona Beach

Gender has been identified as one of the top three categories, along with race, and age that are subject to stereotyping, prejudice and discrimination (Fiske, 1998). With the emergence of women in stereotypical male domains, gender research has never been more important. The aviation community is a prime example of one such domain.

This study examined the presence of an existing perception that male pilots are more competent then female pilots. It suggested that there does not appear to be evidence that would explain why there should be a difference in this perception of competence. It also discussed social theories …


The Future Of Intelligence Analysis, Volume 2: Annotated Bibliography: Publications On Intelligence Analysis And Reform, William J. Lahneman Mar 2006

The Future Of Intelligence Analysis, Volume 2: Annotated Bibliography: Publications On Intelligence Analysis And Reform, William J. Lahneman

Security Studies & International Affairs - Daytona Beach

“This study contains the findings and recommendations of the Future of Intelligence Analysis Project, an eighteen-month effort that explored what must be done to provide the US government with an effective intelligence analysis capability in the future.”—Executive Summary in Vol. 1.


Beneath The Tip Of The Iceberg: A Human Factors Analysis Of General Aviation Accidents In Alaska Versus The Rest Of The United States, Cristy Detwiler, Carla Hackworth, Kali Holcomb, Albert Boquet, Elaine Pfleiderer, Douglas Wiegmann, Scott Shappell Mar 2006

Beneath The Tip Of The Iceberg: A Human Factors Analysis Of General Aviation Accidents In Alaska Versus The Rest Of The United States, Cristy Detwiler, Carla Hackworth, Kali Holcomb, Albert Boquet, Elaine Pfleiderer, Douglas Wiegmann, Scott Shappell

Publications

Historically, general aviation (GA) accidents have been overlooked and their impact under-appreciated when compared with those in the commercial or military sector. Recently however, the Federal Aviation Administration and other governmental and civilian organizations have focused their attention on one piece of this proverbial “iceberg,” that being GA accidents occurring in Alaska. This study examines more than 17,000 GA accidents using the Human Factors Analysis and Classification System. Comparisons of Alaska to the rest of the U.S. (RoUS) included traditional demographic and environmental variables, as well as the human errors committed by aircrews. Overall, categorical differences among unsafe acts (decision …


Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan Jan 2006

Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan

Journal of Digital Forensics, Security and Law

Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …


Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka Jan 2006

Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka

Journal of Digital Forensics, Security and Law

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …


Intra-Industry Specialization And Trade Expansion In U.S. Trade With The Free Trade Areas Of The Americas (Ftaa), John R. Ledgerwood, E. M. Ekanayake, Mihalis Halkides Jan 2006

Intra-Industry Specialization And Trade Expansion In U.S. Trade With The Free Trade Areas Of The Americas (Ftaa), John R. Ledgerwood, E. M. Ekanayake, Mihalis Halkides

Publications

This paper aims to explain the extent of vertical and horizontal intra-industry trade (IIT) in United State's foreign trade with the other 33 members of the Free Trade Areas of the Americas (FTAA). It also attempts to identify the country- and industry-specific determinants of vertical and horizontal IIT. This study uses detailed trade data at the 10-digit Harmonized System (HS) industry level and covers a longer and more recent period, 1990 through 2005. The Grubel-Lloyd intra-industry trade index is used to calculate the intensity of these two types of intra-industry trade. One of the main findings is that, with the …


Keeping Your Eye On The Prize: Remaining Focused On The End User When Everything Around You Appears Chaotic, Edward W. Murphy Jan 2006

Keeping Your Eye On The Prize: Remaining Focused On The End User When Everything Around You Appears Chaotic, Edward W. Murphy

Staff Works - Hunt Library

Digital library services have become integral components of 21st century educational institutions. Librarians have been quick to adopt new technologies to serve their new remotely located patrons. This eagerness to adopt new technology, along with a willingness to adapt to new working environments and a continuing emphasis on the end users of our services have enabled success with regards to serving the distance education patron. This paper will review and discuss the evolution of Embry Riddle Aeronautical University’s (ERAU) Extended Campus Library Services (ECLS), and how a conscious effort to focus on the end users of Embry-Riddle’s ECLS has helped …


The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling Jan 2006

The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling

Journal of Digital Forensics, Security and Law

Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and oncampus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and …


Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka Jan 2006

Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka

Journal of Digital Forensics, Security and Law

Most organizations and government agencies regularly become engaged in litigation with suppliers, customers, clients, employees, competitors, shareholders, prosecutors or regulatory agencies that nearly assures the need to organize, retain, find and produce business records and correspondence, emails, accounting records or other data relevant to disputed issues. This article discusses some high visibility cases that constrain how metadata and content is routinely made available to opposing parties in civil litigation, to prosecutors in criminal prosecutions and to agency staff in regulatory enforcement litigation. Public policy, as implemented in the rules of evidence and pretrial discovery, restrict electronic data discovery (EDD) as …


Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz Jan 2006

Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz

Journal of Digital Forensics, Security and Law

This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept.


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier Jan 2006

Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier

Journal of Digital Forensics, Security and Law

Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.

The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …


Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota Jan 2006

Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota

Journal of Digital Forensics, Security and Law

With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …


Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers Jan 2006

Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers

Journal of Digital Forensics, Security and Law

Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous. Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper …


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen Jan 2006

Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen

Journal of Digital Forensics, Security and Law

One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …


The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas Jan 2006

The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas

Journal of Digital Forensics, Security and Law

All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers. A large proportion of families and individuals in their homes now also use personal computers and, both intentionally and inadvertently, often store on those computers personal information. It is clear that most organisations and individuals continue to be unaware of the information that may be stored on the hard disks that the computers contain, and have not considered what may happen to the information after the disposal of the equipment.

In …


A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli Jan 2006

A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli

Journal of Digital Forensics, Security and Law

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to …


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.