Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Forensic Science and Technology (41)
- Legal Studies (41)
- Engineering (40)
- Computer Engineering (39)
- Computer Law (39)
-
- Computer Sciences (39)
- Electrical and Computer Engineering (39)
- Information Security (39)
- Law (39)
- Physical Sciences and Mathematics (39)
- Political Science (3)
- Psychology (3)
- Arts and Humanities (2)
- International and Area Studies (2)
- Religion (2)
- African Studies (1)
- American Politics (1)
- Asian Studies (1)
- Aviation (1)
- Business (1)
- Business and Corporate Communications (1)
- Cognitive Psychology (1)
- Communication (1)
- Geographic Information Sciences (1)
- Geography (1)
- Human Resources Management (1)
- Infrastructure (1)
- International Relations (1)
- Leadership Studies (1)
- Keyword
-
- Information security (4)
- Globalization (3)
- Diplomatic offensive (2)
- International Muslim community (2)
- Islamic globalization (2)
-
- Marxism (2)
- Nation building (2)
- Neo-Salafian (2)
- Organization of Islamic conference (2)
- Parti Democratique de Guinee (2)
- Religious activism (2)
- Research relevance (2)
- Triple heritage (2)
- Wahhabi (2)
- Academic research (1)
- Acquisition (1)
- Action research (1)
- Attitudes (1)
- CD-R media (1)
- California Security Breach Information Act (CSBIA) (1)
- Campus information security (1)
- Cognitive moral development (1)
- Common body of knowledge (1)
- Compliance Toolkit (1)
- Computer Crime Act 1997 (1)
- Computer Memory (1)
- Computer crime (1)
- Computer forensics (1)
- Computer hacking (1)
- Computer security (1)
- Publication
- Publication Type
Articles 1 - 30 of 51
Full-Text Articles in Social and Behavioral Sciences
The Effects Of Domain Knowledge And Scene Content On Change Detection Using A Change Blindness Paradigm, Marianne T. Baskin
The Effects Of Domain Knowledge And Scene Content On Change Detection Using A Change Blindness Paradigm, Marianne T. Baskin
Master's Theses - Daytona Beach
This thesis was designed to determine how domain knowledge or scene content affects change detection. Twenty-four participants of medical professionals and non-medical professionals performed a change detection task using a flicker paradigm intended to be similar to saccadic movements or blinks. Each participant viewed 24 pictures on a computer screen, each picture flickering with a blank gray screen alternating between the original and modified version of the picture, and was asked to indicate when a change was detected by depressing a key. Twelve of the pictures were medical X-rays while the other 12 were everyday scenes. Reaction time, number of …
Practical Application Of Five Leadership Theories On A U.S. Naval Vessel, Matthew P. Earnhardt
Practical Application Of Five Leadership Theories On A U.S. Naval Vessel, Matthew P. Earnhardt
Publications
On a United States naval vessel, task accomplishment and leadership decisions are vital to personnel survival and mission success (Phillips, 2007). The United States Navy relies on leadership decisions made from admiral to seaman, and as a result, invests heavily in leadership development.
Quantifying The Cognitive, Symptomatic And Neuroendocrine Impact Of The Coriolis Illusion; A Countermeasure For Motion Sickness, Catherine Grandizio
Quantifying The Cognitive, Symptomatic And Neuroendocrine Impact Of The Coriolis Illusion; A Countermeasure For Motion Sickness, Catherine Grandizio
Master's Theses - Daytona Beach
When pilots are unable to accurately perceive the position and motion of their bodies, they are spatially disoriented. Spatial disorientation is often induced by aviation illusions, and its consequences include dizziness, confusion, nausea and fatigue. The present research evaluated the severity of cognitive, neuroendocrine and subjective symptoms of the Coriolis illusion, induced by a spatial disorientation flight training device. Also, the research examined the effectiveness of a mild, ground-based countermeasure, similar to the Coriolis illusion, in reducing the occurrence and severity of symptoms. In the early stages of data analysis, there appeared to be a significant impact of the Coriolis …
Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian
Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian
Annual ADFSL Conference on Digital Forensics, Security and Law
As computer forensics develops into one of the fastest-growing areas in the computer related fields, many universities and colleges are offering or are planning to offer a course in computer forensics. When instructors begin to develop a new course in the area, one of critical questions they would ask is what textbook should be used. To better answer the question, we conducted a study in which we tried to find which textbooks are being used in computer forensic courses. We believe that the results and analysis of our study will help instructors in choosing adequate textbooks for their new course …
Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli
Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This research in progress aims to evaluate the effectiveness of commercial programs to erase traces of the use of BitTorrent software. The erasure programs MaxErase, P2PDoctor, Privacy Suite, Window Washer and R-Clean and Wipe were used on a machine that had used the BitTorrent client Azureus to download two torrent files. The drive was imaged and then searched for torrent files. The registry was also examined on the source machine. The program R-Clean and Wipe left evidence in both the registry and the image of the name and type of files that had been downloaded with this software. Of greater …
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song
Annual ADFSL Conference on Digital Forensics, Security and Law
Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
Annual ADFSL Conference on Digital Forensics, Security and Law
Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies.
Keywords: computer forensics education, network forensics, protocol analysis
Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb
Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb
Annual ADFSL Conference on Digital Forensics, Security and Law
The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse …
Computer Geolocation Using Extracted Features, Chad M.S. Steel
Computer Geolocation Using Extracted Features, Chad M.S. Steel
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper compares the extracted feature data from a sample set of hard drive images in an effort to relate the features to the physical location of the drive. A list of probable zip codes, phone numbers, place names, and IP addresses are extracted from raw drive images and compared to manually identified geolocation data. The results of the individual extractions are then analyzed to determine the feasibility in using automated extraction and analysis techniques for geolocating hard drives.
Keywords: hard disk forensics, geocoding, geolocation
Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale
Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale
Annual ADFSL Conference on Digital Forensics, Security and Law
In the discovery portion of court proceedings, it is necessary to produce information to opposing counsel. Traditionally, this information is in paper form with all privileged information removed. Increasingly, the information requested during discovery exists in digital form and savvy counsel is requesting direct access to the original digital source: a broad spectrum of additional digital information can be often be extracted using digital forensics. This paper describes the major problems which must be solved to redact digital information from electronic devices. The primary hurdle facing digital redaction is the lack of a rational process for systematically handling encoded, encrypted, …
Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes
Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital forensics and cyber crime investigations are continually growing, rapidly changing fields requiring law enforcement agencies to meet very rigorous training requirements. New opportunities for committing criminal activity against persons, organization or property are presented every day with the proliferation of personal digital devices, computers, the internet, computer networks, and automated data systems. Whether the crime involves attacks against computer systems, electronic information, or more traditional crimes such as murder, money laundering or fraud, electronic evidence is becoming more prevalent. It is no surprise that law enforcement and criminal justice officials are being overwhelmed by the volume of investigations and …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Annual ADFSL Conference on Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley
New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley
Annual ADFSL Conference on Digital Forensics, Security and Law
The newly revised Federal Rules of Civil Procedure and developments under the Federal Rules of Evidence have a significant impact on the use, collection, and treatment of digital evidence for legal proceedings. The Rules now formally grant electronic documents and digital evidence the same status as paper and other forms of tangible evidence. As a result, the availability and proper preservation of potentially relevant electronic evidence must be considered, at the very latest, in the preliminary stages of litigation and, at the earliest, as soon as litigation is reasonably anticipated. It is important for professionals to be familiar with the …
The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack
The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital forensics is a young field that is being defined by the reactive nature of its development – in terms of both research and practice. As technology develops, digital forensics is forced to react and adapt. The rapid development of technology and the lack of an established theoretical foundation has led to a disconnect between the theory and practice of digital forensics. While the base theoretical issues are being worked on by researchers, practitioners are dealing with entirely new sets of issues. The complexity of investigations is increasing, and anti-forensics techniques are advancing as well. The disconnect will be resolved …
Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem
Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper presents a detailed digital forensics process model and the responsible teams to perform it. The discussed model presents three teams and a forensic leader who coordinate between the three teams; these teams are physical crime scene team, laboratory examination team and courtroom team. These teams are responsible of achieving the digital forensic model by applying five main phases which are preparation phase, physical forensics and investigation phase, digital forensics phase, reporting and presentation phase and closure phase.
Most of the existing models in this field are either theoretical that deals with data processing or based on a legal …
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Annual ADFSL Conference on Digital Forensics, Security and Law
When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
Annual ADFSL Conference on Digital Forensics, Security and Law
The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …
The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers
The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers
Annual ADFSL Conference on Digital Forensics, Security and Law
The lack of a graphical representation of all of the principles, processes, and phases necessary to carry out an digital forensic investigation is a key inhibitor to effective education in this newly emerging field of study. Many digital forensic models have been suggested for this purpose but they lack explanatory power as they are merely a collection of lists or one-dimensional figures. This paper presents a new multi-dimensional model, the General Digital Forensics Model (GDFM), that shows the relationships and inter-connectedness of the principles and processes needed within the domain of digital forensics.
Keywords: process model, computer forensics, expert learning, …
Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem
Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper proposes a detailed guideline model for digital forensics; the proposed model consists of five main phases, Preparation phase, Physical Forensics and Investigation Phase, Digital Forensics Phase, Reporting and Presentation Phase, and Closure Phase.
Most of the existing models in this field do not cover all aspects of digital forensic investigations, as they focus mainly on the processing of digital evidence or on the legal points. Although they gave good information to base on it a guide, but they are not detailed enough to describe fully the investigative process in a way that can be used by investigators during …
A Macroscopic Validation Of The Evacuation Simulation Prediction Tool On Highway Travel Times, Kay Fortinberry Borglum
A Macroscopic Validation Of The Evacuation Simulation Prediction Tool On Highway Travel Times, Kay Fortinberry Borglum
Master's Theses - Daytona Beach
The purpose of this applied research study was to test the sensitivity of the Evacuation Simulation Prediction (ESP) tool in predicting travel time during high volume traffic periods. The discrete event-based simulation tool was designed to aid local evacuation planning contingencies. Research of the Florida Department of Transportation traffic count data demonstrated parallel trends in rush hour volume versus hurricane evacuation volume. A model validation was designed to test if the model closely predicted high volume travel on a major interstate. For this macroscopic sensitivity test, volume, travel time and speed were collected to examine the baseline predictability under crash …
Gender Differences In Auditory Perception Of Pure Tone Frequencies And Speech Intelligibility Via Bone Conduction Transducers, Meghan Leigh Hodges
Gender Differences In Auditory Perception Of Pure Tone Frequencies And Speech Intelligibility Via Bone Conduction Transducers, Meghan Leigh Hodges
Master's Theses - Daytona Beach
Two experiments were conducted to see if gender differences exist in bone conduction hearing processes. The first experiment was a pure tone study where hearing thresholds for six pure tone frequencies and four bone conduction skull locations were measured in 15 male and 15 female participants to determine if gender differences exist in auditory signal detection. As frequency of the pure tone signal increased the difference between genders’ hearing thresholds and mean ranks of threshold overall; however, when Kruskal-Wallis statistical tests were performed, significant differences between genders for bone conduction were only found for the mastoid location at 6000-Hz and …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Journal of Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer
The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer
Journal of Digital Forensics, Security and Law
This study proposes using an established common body of knowledge (CBK) as one means of organizing information security literature. Consistent with calls for more relevant information systems (IS) research, this industrydeveloped framework can motivate future research towards topics that are important to the security practitioner. In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK. Further, we distinguish articles as empirical research, frameworks, or tutorials. Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal …
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
Journal of Digital Forensics, Security and Law
The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Journal of Digital Forensics, Security and Law
Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …
Nation Building And The Politics Of Islamic Internationalism In Guinea: Toward An Understanding Of Muslims’ Experience Of Globalization In Africa, Mohamed S. Camara
Nation Building And The Politics Of Islamic Internationalism In Guinea: Toward An Understanding Of Muslims’ Experience Of Globalization In Africa, Mohamed S. Camara
Humanities & Communication - Daytona Beach
This article discusses the historical role of Islam in the political evolution of Guinea in the broader context of Muslims’ experience of nation/state building and globalization in Africa. This role is examined on the premise that Islam is one of the major globalizing forces (more in the body of the paper on this idea of Islam as a globalizing force) responsible for the formation of what experts have conceptualized as Africa’s “triple heritage” or the juncture of African traditional values, Islamic influence, and the legacy of Western colonialism. The article examines Islam’s role in the creation of cultural identities, territorial …
Individual Moral Development And Ethical Climate: The Influence Of Person-Organization Fit On Job Attitudes, Maureen L. Ambrose, Anke Arnaud, Marshall Schminke
Individual Moral Development And Ethical Climate: The Influence Of Person-Organization Fit On Job Attitudes, Maureen L. Ambrose, Anke Arnaud, Marshall Schminke
Management, Marketing and Operations - Daytona Beach
This research examines how the fit between employees’ moral development and the ethical work climate of their organization affects employee attitudes. Person–organization fit was assessed by matching individuals’ level of cognitive moral development with the ethical climate of their organization. The influence of P–O fit on employee attitudes was assessed using a sample of 304 individuals from 73 organizations. In general, the findings support our predictions that fit between personal and organizational ethics is related to higher levels of commitment and job satisfaction and lower levels of turnover intent. Ethical P–O fit was related to higher levels of affective commitment …
Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler
Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the third Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
Globalization And The Deepening Indian-U.S. Partnership In An Age Of Entrenched Anti-Americanism, Geoffrey Kain
Globalization And The Deepening Indian-U.S. Partnership In An Age Of Entrenched Anti-Americanism, Geoffrey Kain
Publications
“One of the topics often debated in the larger context of globalization is whether or not globalization is fundamentally a new-colonialist/neo-imperialist force (this view might be regarded as the Noam Chomsky school), or whether it is better represented as more of an open-access, competitive landscape on a truly global scale (this view might be regarded as the Thomas Friedman school)…”
Lightning Signature Assessment To Forecast Tornado Formation, Mary Snow, Richard Snow, Nicole Kufa
Lightning Signature Assessment To Forecast Tornado Formation, Mary Snow, Richard Snow, Nicole Kufa
Publications
Recent research suggests that a maximum rate of lightning strikes occurs at least 15 to 20 minutes prior to tornado formation within a supercell storm. These maxima are associated with strengthening updrafts as they appear in radar measurements. An increase in lightning rates correlates with an increase of shear in the lower part of the storm. In combination with a strong updraft or downdraft, this shear can provide the ingredients for rotation and possibly a tornado. Polarity reversal of lightning around the time of tornado touchdown also has been examined. Thus, increasing lightning flash rates and reversal of lightning strike …