Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Embry-Riddle Aeronautical University

2007

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 51

Full-Text Articles in Social and Behavioral Sciences

The Effects Of Domain Knowledge And Scene Content On Change Detection Using A Change Blindness Paradigm, Marianne T. Baskin Dec 2007

The Effects Of Domain Knowledge And Scene Content On Change Detection Using A Change Blindness Paradigm, Marianne T. Baskin

Master's Theses - Daytona Beach

This thesis was designed to determine how domain knowledge or scene content affects change detection. Twenty-four participants of medical professionals and non-medical professionals performed a change detection task using a flicker paradigm intended to be similar to saccadic movements or blinks. Each participant viewed 24 pictures on a computer screen, each picture flickering with a blank gray screen alternating between the original and modified version of the picture, and was asked to indicate when a change was detected by depressing a key. Twelve of the pictures were medical X-rays while the other 12 were everyday scenes. Reaction time, number of …


Practical Application Of Five Leadership Theories On A U.S. Naval Vessel, Matthew P. Earnhardt Oct 2007

Practical Application Of Five Leadership Theories On A U.S. Naval Vessel, Matthew P. Earnhardt

Publications

On a United States naval vessel, task accomplishment and leadership decisions are vital to personnel survival and mission success (Phillips, 2007). The United States Navy relies on leadership decisions made from admiral to seaman, and as a result, invests heavily in leadership development.


Quantifying The Cognitive, Symptomatic And Neuroendocrine Impact Of The Coriolis Illusion; A Countermeasure For Motion Sickness, Catherine Grandizio Jul 2007

Quantifying The Cognitive, Symptomatic And Neuroendocrine Impact Of The Coriolis Illusion; A Countermeasure For Motion Sickness, Catherine Grandizio

Master's Theses - Daytona Beach

When pilots are unable to accurately perceive the position and motion of their bodies, they are spatially disoriented. Spatial disorientation is often induced by aviation illusions, and its consequences include dizziness, confusion, nausea and fatigue. The present research evaluated the severity of cognitive, neuroendocrine and subjective symptoms of the Coriolis illusion, induced by a spatial disorientation flight training device. Also, the research examined the effectiveness of a mild, ground-based countermeasure, similar to the Coriolis illusion, in reducing the occurrence and severity of symptoms. In the early stages of data analysis, there appeared to be a significant impact of the Coriolis …


Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian Apr 2007

Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian

Annual ADFSL Conference on Digital Forensics, Security and Law

As computer forensics develops into one of the fastest-growing areas in the computer related fields, many universities and colleges are offering or are planning to offer a course in computer forensics. When instructors begin to develop a new course in the area, one of critical questions they would ask is what textbook should be used. To better answer the question, we conducted a study in which we tried to find which textbooks are being used in computer forensic courses. We believe that the results and analysis of our study will help instructors in choosing adequate textbooks for their new course …


Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli Apr 2007

Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

This research in progress aims to evaluate the effectiveness of commercial programs to erase traces of the use of BitTorrent software. The erasure programs MaxErase, P2PDoctor, Privacy Suite, Window Washer and R-Clean and Wipe were used on a machine that had used the BitTorrent client Azureus to download two torrent files. The drive was imaged and then searched for torrent files. The registry was also examined on the source machine. The program R-Clean and Wipe left evidence in both the registry and the image of the name and type of files that had been downloaded with this software. Of greater …


Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song Apr 2007

Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song

Annual ADFSL Conference on Digital Forensics, Security and Law

Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …


The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo Apr 2007

The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo

Annual ADFSL Conference on Digital Forensics, Security and Law

Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies.

Keywords: computer forensics education, network forensics, protocol analysis


Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb Apr 2007

Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb

Annual ADFSL Conference on Digital Forensics, Security and Law

The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse …


Computer Geolocation Using Extracted Features, Chad M.S. Steel Apr 2007

Computer Geolocation Using Extracted Features, Chad M.S. Steel

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper compares the extracted feature data from a sample set of hard drive images in an effort to relate the features to the physical location of the drive. A list of probable zip codes, phone numbers, place names, and IP addresses are extracted from raw drive images and compared to manually identified geolocation data. The results of the individual extractions are then analyzed to determine the feasibility in using automated extraction and analysis techniques for geolocating hard drives.

Keywords: hard disk forensics, geocoding, geolocation


Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale Apr 2007

Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale

Annual ADFSL Conference on Digital Forensics, Security and Law

In the discovery portion of court proceedings, it is necessary to produce information to opposing counsel. Traditionally, this information is in paper form with all privileged information removed. Increasingly, the information requested during discovery exists in digital form and savvy counsel is requesting direct access to the original digital source: a broad spectrum of additional digital information can be often be extracted using digital forensics. This paper describes the major problems which must be solved to redact digital information from electronic devices. The primary hurdle facing digital redaction is the lack of a rational process for systematically handling encoded, encrypted, …


Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes Apr 2007

Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics and cyber crime investigations are continually growing, rapidly changing fields requiring law enforcement agencies to meet very rigorous training requirements. New opportunities for committing criminal activity against persons, organization or property are presented every day with the proliferation of personal digital devices, computers, the internet, computer networks, and automated data systems. Whether the crime involves attacks against computer systems, electronic information, or more traditional crimes such as murder, money laundering or fraud, electronic evidence is becoming more prevalent. It is no surprise that law enforcement and criminal justice officials are being overwhelmed by the volume of investigations and …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Apr 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Annual ADFSL Conference on Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley Apr 2007

New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley

Annual ADFSL Conference on Digital Forensics, Security and Law

The newly revised Federal Rules of Civil Procedure and developments under the Federal Rules of Evidence have a significant impact on the use, collection, and treatment of digital evidence for legal proceedings. The Rules now formally grant electronic documents and digital evidence the same status as paper and other forms of tangible evidence. As a result, the availability and proper preservation of potentially relevant electronic evidence must be considered, at the very latest, in the preliminary stages of litigation and, at the earliest, as soon as litigation is reasonably anticipated. It is important for professionals to be familiar with the …


The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack Apr 2007

The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics is a young field that is being defined by the reactive nature of its development – in terms of both research and practice. As technology develops, digital forensics is forced to react and adapt. The rapid development of technology and the lack of an established theoretical foundation has led to a disconnect between the theory and practice of digital forensics. While the base theoretical issues are being worked on by researchers, practitioners are dealing with entirely new sets of issues. The complexity of investigations is increasing, and anti-forensics techniques are advancing as well. The disconnect will be resolved …


Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem Apr 2007

Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a detailed digital forensics process model and the responsible teams to perform it. The discussed model presents three teams and a forensic leader who coordinate between the three teams; these teams are physical crime scene team, laboratory examination team and courtroom team. These teams are responsible of achieving the digital forensic model by applying five main phases which are preparation phase, physical forensics and investigation phase, digital forensics phase, reporting and presentation phase and closure phase.

Most of the existing models in this field are either theoretical that deals with data processing or based on a legal …


Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth Apr 2007

Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth

Annual ADFSL Conference on Digital Forensics, Security and Law

When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …


An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros Apr 2007

An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros

Annual ADFSL Conference on Digital Forensics, Security and Law

The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …


The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers Apr 2007

The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

The lack of a graphical representation of all of the principles, processes, and phases necessary to carry out an digital forensic investigation is a key inhibitor to effective education in this newly emerging field of study. Many digital forensic models have been suggested for this purpose but they lack explanatory power as they are merely a collection of lists or one-dimensional figures. This paper presents a new multi-dimensional model, the General Digital Forensics Model (GDFM), that shows the relationships and inter-connectedness of the principles and processes needed within the domain of digital forensics.

Keywords: process model, computer forensics, expert learning, …


Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem Apr 2007

Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper proposes a detailed guideline model for digital forensics; the proposed model consists of five main phases, Preparation phase, Physical Forensics and Investigation Phase, Digital Forensics Phase, Reporting and Presentation Phase, and Closure Phase.

Most of the existing models in this field do not cover all aspects of digital forensic investigations, as they focus mainly on the processing of digital evidence or on the legal points. Although they gave good information to base on it a guide, but they are not detailed enough to describe fully the investigative process in a way that can be used by investigators during …


A Macroscopic Validation Of The Evacuation Simulation Prediction Tool On Highway Travel Times, Kay Fortinberry Borglum Apr 2007

A Macroscopic Validation Of The Evacuation Simulation Prediction Tool On Highway Travel Times, Kay Fortinberry Borglum

Master's Theses - Daytona Beach

The purpose of this applied research study was to test the sensitivity of the Evacuation Simulation Prediction (ESP) tool in predicting travel time during high volume traffic periods. The discrete event-based simulation tool was designed to aid local evacuation planning contingencies. Research of the Florida Department of Transportation traffic count data demonstrated parallel trends in rush hour volume versus hurricane evacuation volume. A model validation was designed to test if the model closely predicted high volume travel on a major interstate. For this macroscopic sensitivity test, volume, travel time and speed were collected to examine the baseline predictability under crash …


Gender Differences In Auditory Perception Of Pure Tone Frequencies And Speech Intelligibility Via Bone Conduction Transducers, Meghan Leigh Hodges Apr 2007

Gender Differences In Auditory Perception Of Pure Tone Frequencies And Speech Intelligibility Via Bone Conduction Transducers, Meghan Leigh Hodges

Master's Theses - Daytona Beach

Two experiments were conducted to see if gender differences exist in bone conduction hearing processes. The first experiment was a pure tone study where hearing thresholds for six pure tone frequencies and four bone conduction skull locations were measured in 15 male and 15 female participants to determine if gender differences exist in auditory signal detection. As frequency of the pure tone signal increased the difference between genders’ hearing thresholds and mean ranks of threshold overall; however, when Kruskal-Wallis statistical tests were performed, significant differences between genders for bone conduction were only found for the mastoid location at 6000-Hz and …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Jan 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Journal of Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer Jan 2007

The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer

Journal of Digital Forensics, Security and Law

This study proposes using an established common body of knowledge (CBK) as one means of organizing information security literature. Consistent with calls for more relevant information systems (IS) research, this industrydeveloped framework can motivate future research towards topics that are important to the security practitioner. In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK. Further, we distinguish articles as empirical research, frameworks, or tutorials. Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal …


An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros Jan 2007

An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros

Journal of Digital Forensics, Security and Law

The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …


Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam Jan 2007

Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam

Journal of Digital Forensics, Security and Law

Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …


Nation Building And The Politics Of Islamic Internationalism In Guinea: Toward An Understanding Of Muslims’ Experience Of Globalization In Africa, Mohamed S. Camara Jan 2007

Nation Building And The Politics Of Islamic Internationalism In Guinea: Toward An Understanding Of Muslims’ Experience Of Globalization In Africa, Mohamed S. Camara

Humanities & Communication - Daytona Beach

This article discusses the historical role of Islam in the political evolution of Guinea in the broader context of Muslims’ experience of nation/state building and globalization in Africa. This role is examined on the premise that Islam is one of the major globalizing forces (more in the body of the paper on this idea of Islam as a globalizing force) responsible for the formation of what experts have conceptualized as Africa’s “triple heritage” or the juncture of African traditional values, Islamic influence, and the legacy of Western colonialism. The article examines Islam’s role in the creation of cultural identities, territorial …


Individual Moral Development And Ethical Climate: The Influence Of Person-Organization Fit On Job Attitudes, Maureen L. Ambrose, Anke Arnaud, Marshall Schminke Jan 2007

Individual Moral Development And Ethical Climate: The Influence Of Person-Organization Fit On Job Attitudes, Maureen L. Ambrose, Anke Arnaud, Marshall Schminke

Management, Marketing and Operations - Daytona Beach

This research examines how the fit between employees’ moral development and the ethical work climate of their organization affects employee attitudes. Person–organization fit was assessed by matching individuals’ level of cognitive moral development with the ethical climate of their organization. The influence of P–O fit on employee attitudes was assessed using a sample of 304 individuals from 73 organizations. In general, the findings support our predictions that fit between personal and organizational ethics is related to higher levels of commitment and job satisfaction and lower levels of turnover intent. Ethical P–O fit was related to higher levels of affective commitment …


Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler Jan 2007

Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the third Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Globalization And The Deepening Indian-U.S. Partnership In An Age Of Entrenched Anti-Americanism, Geoffrey Kain Jan 2007

Globalization And The Deepening Indian-U.S. Partnership In An Age Of Entrenched Anti-Americanism, Geoffrey Kain

Publications

“One of the topics often debated in the larger context of globalization is whether or not globalization is fundamentally a new-colonialist/neo-imperialist force (this view might be regarded as the Noam Chomsky school), or whether it is better represented as more of an open-access, competitive landscape on a truly global scale (this view might be regarded as the Thomas Friedman school)…”


Lightning Signature Assessment To Forecast Tornado Formation, Mary Snow, Richard Snow, Nicole Kufa Jan 2007

Lightning Signature Assessment To Forecast Tornado Formation, Mary Snow, Richard Snow, Nicole Kufa

Publications

Recent research suggests that a maximum rate of lightning strikes occurs at least 15 to 20 minutes prior to tornado formation within a supercell storm. These maxima are associated with strengthening updrafts as they appear in radar measurements. An increase in lightning rates correlates with an increase of shear in the lower part of the storm. In combination with a strong updraft or downdraft, this shear can provide the ingredients for rotation and possibly a tornado. Polarity reversal of lightning around the time of tornado touchdown also has been examined. Thus, increasing lightning flash rates and reversal of lightning strike …