Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (29)
- Physical Sciences and Mathematics (28)
- Computer Engineering (27)
- Computer Law (27)
- Computer Sciences (27)
-
- Electrical and Computer Engineering (27)
- Forensic Science and Technology (27)
- Information Security (27)
- Law (27)
- Legal Studies (27)
- Psychology (4)
- Education (3)
- Other Social and Behavioral Sciences (3)
- Applied Behavior Analysis (2)
- Aviation (2)
- Aviation Safety and Security (2)
- Business (2)
- Business Administration, Management, and Operations (2)
- Communication (2)
- Economics (2)
- Industrial and Organizational Psychology (2)
- Other Education (2)
- Public Affairs, Public Policy and Public Administration (2)
- Aerospace Engineering (1)
- Astrophysics and Astronomy (1)
- Bilingual, Multilingual, and Multicultural Education (1)
- Econometrics (1)
- Economic Policy (1)
- Emergency and Disaster Management (1)
- Keyword
-
- Digital Forensics (5)
- Aviation (2)
- Computer Forensics (2)
- Data (2)
- Digital forensics (2)
-
- ANOVA (1)
- Actor-network theory (1)
- Aerospace (1)
- Airline Quality Rating (1)
- Alternative Web (1)
- Android forensics (1)
- Attackers (1)
- Audio forensics (1)
- BYOD (1)
- Bayesian inference (1)
- Behavior (1)
- Behavior analysis (1)
- BitTorrent (1)
- BlackBag (1)
- Blamism (1)
- Blue Pill (1)
- Botnet (1)
- Botnet detection (1)
- Browser Forensics (1)
- Camcorder identification (1)
- Collegiate Aviation (1)
- Collegiate aviation (1)
- Computer vision syndrome (1)
- Crew resource management (1)
- Cultural dimensions (1)
Articles 1 - 30 of 39
Full-Text Articles in Social and Behavioral Sciences
Framing The Mh17 Disaster – More Heat Than Light?, Simon A. Bennett
Framing The Mh17 Disaster – More Heat Than Light?, Simon A. Bennett
International Journal of Aviation, Aeronautics, and Aerospace
Despite the reductionist analyses produced by politicians and the Fourth Estate, the loss of Malaysia Airlines Flight MH17 was a systems accident – a product of the interactions between the actants that compose the commercial aviation system network-space. As an antidote to reductionism’s ‘fundamental attribution error’, this paper presents a systems-thinking-informed analysis of the MH17 disaster. To this end it draws on Actor-Network Theory and the work of Reason, Toft, Dekker, Hollnagel and other systems-thinking advocates. Whether intentional or not, politicians’ reductionist analyses generated political capital. European Union and American finger-pointing distracted from aviation authorities’ and airlines’ ill-advised routing policies. …
Cross-Sectional Assessment Of Safety Culture Perceptions And Safety Behavior In Collegiate Aviation Programs In The United States, Daniel Kwasi Adjekum, Julius Keller, Micah Walala, John P. Young, Cody Christensen, Randal J. Demik, Gary J. Northam Ph.D.
Cross-Sectional Assessment Of Safety Culture Perceptions And Safety Behavior In Collegiate Aviation Programs In The United States, Daniel Kwasi Adjekum, Julius Keller, Micah Walala, John P. Young, Cody Christensen, Randal J. Demik, Gary J. Northam Ph.D.
International Journal of Aviation, Aeronautics, and Aerospace
A cross-sectional quasi- mixed-method approach was used to determine the relationships between safety culture perceptions and safety reporting behavior among flight students with and without certified flight instructor (CFI) ratings. Respondents (n=259) were recruited from five collegiate aviation programs in the US and took part in the study. Survey Items adopted from the Collegiate Aviation Perception of Safety Culture Assessment Survey (CAPSCAS) were validated using factor analysis analyzed for reliability before use in the study. Researchers sought to find out if the safety reporting behavior (reporting frequency) of respondents could be predicted from their safety culture perceptions. Pearson’s …
Economic Interrelationships And Impacts Of The Aviation/Aerospace Industry In The State Of Florida Using Input-Output Analysis, Kelly A. Whealan-George, Tim Brady, Ian Mcandrew, Irwin Price, Robert T. Clair
Economic Interrelationships And Impacts Of The Aviation/Aerospace Industry In The State Of Florida Using Input-Output Analysis, Kelly A. Whealan-George, Tim Brady, Ian Mcandrew, Irwin Price, Robert T. Clair
International Journal of Aviation, Aeronautics, and Aerospace
The study provided a detailed description of the interrelatedness of the aviation and aerospace industry with principal industries in Florida and Volusia County (VC) using Input-Output (IO) analysis. The economic impact measures included not only direct economic output and industry employment descriptions but also described the multiplier effects in the form of indirect and induced impacts using data for 2012.
This research concluded the average labor income of the aviation and aerospace industry was higher than average labor income in Florida and VC. A substantive difference between the Florida and VC average labor income for the aviation and aerospace industry …
An Analysis Of Airline Quality Rating Components Using Bayesian Methods, John H. Mott, Branden K. Avery
An Analysis Of Airline Quality Rating Components Using Bayesian Methods, John H. Mott, Branden K. Avery
International Journal of Aviation, Aeronautics, and Aerospace
The Airline Quality Rating, a unique metric that is of interval scale and is comparable across carriers and time periods, is a quantitative evaluation of the quality of U.S. domestic air carriers based on data that is collected and published by the U.S. Bureau of Transportation Statistics. One may gain insight into the relationship of the AQR metric to the carriers to which it is applied by grouping those carriers and examining the effects of the resulting groupings on the four individual factors that comprise the AQR. This study used Bayesian hierarchical modeling techniques to examine the differences between three …
Cultural Dimensions: A Comparative Analysis Of Aviation Students In China And The U.S., Julius Keller, Yu Wang, Jacqueline Cooney, Anthony Erstad, Chientsung Lu
Cultural Dimensions: A Comparative Analysis Of Aviation Students In China And The U.S., Julius Keller, Yu Wang, Jacqueline Cooney, Anthony Erstad, Chientsung Lu
International Journal of Aviation, Aeronautics, and Aerospace
Research has shown cultural dimensions can provide insight into effective management within diverse work and school environments. (Sandal & Manzey, 2009). In this study, researchers distributed a research questionnaire based on Hofstede’s original four cultural dimensions: power distance, masculinity vs femininity, uncertainty avoidance and individualism vs collectivism. Participants were recruited from two collegiate aviation programs, one in China and the other in the United States.
Independent t-tests were used to compare mean cultural dimensions scores for the groups. Study findings suggested significant differences between the two groups for the cultural dimensions: power distance, masculinity vs femininity and individualism vs …
Examining How Breakdowns In Pilot Monitoring Of The Aircraft Flight Path, Robert Sumwalt, David Cross, Dennis Lessard
Examining How Breakdowns In Pilot Monitoring Of The Aircraft Flight Path, Robert Sumwalt, David Cross, Dennis Lessard
International Journal of Aviation, Aeronautics, and Aerospace
Aircraft accident and incident data reveal that serious safety consequences can arise when flight crewmembers fail to properly monitor the aircraft flight path. This research study reviewed human factors literature to better understand why pilots fail to properly monitor, and analyzed accident and incident data. Recommendations for improving monitoring performance were formulated, which may be useful to air carriers in implementing a new Federal Aviation Administration requirement that calls for specific training in monitoring.
The Effect Of Regional Airline Attendance Policies On Pilot Self-Removal From Duty For Illness Or Fatigue, David R. Freiwald Ph.D., Csp, Michael F. O'Toole Ph.D.
The Effect Of Regional Airline Attendance Policies On Pilot Self-Removal From Duty For Illness Or Fatigue, David R. Freiwald Ph.D., Csp, Michael F. O'Toole Ph.D.
International Journal of Aviation, Aeronautics, and Aerospace
The purpose of this paper was to study the effect of current regional airline attendance policies on the willingness of crewmembers to remove themselves from duty when ill or fatigued. This study sought to determine if the current punitive attendance policies are encouraging crewmembers to operate contrary to federal regulation. A survey was given to current pilots of four regional airlines with similar attendance policies. The responses were correlated with supplied demographic and experiential data. The goal of the paper was to examine the major areas of concern and suggested solutions. The overwhelming majority of respondents felt that their companies’ …
Risk Perception In Aviation Students: Weather Matters, Ric Ferraro Phd, Darci Vandyke, Mary Zander, Krista Anderson, Bethany Kuehlen
Risk Perception In Aviation Students: Weather Matters, Ric Ferraro Phd, Darci Vandyke, Mary Zander, Krista Anderson, Bethany Kuehlen
International Journal of Aviation, Aeronautics, and Aerospace
Sixty-three aviation major students and 71 non-aviation major students participated in an experiment concerning aviation experience and risk perception (Risk Perception Scale, RPS; Hunter, 2002). Non-aviation students rated three of the RPS risk scenarios (P2Fly, P2Life, P2 Base) as having higher perceived risk than aviation students with the exception of the weather risk scenarios (P2WX). Aviation students perceived the P2WX scenarios to be significantly more risky. These results have implications for how future pilots perceive risk.
From The Editor-In-Chief, Ibrahim Baggili
From The Editor-In-Chief, Ibrahim Baggili
Journal of Digital Forensics, Security and Law
Welcome to JDFSL’s first issue for 2015! First, I would like to thank our editorial board, reviewers, and the JDFSL team for bringing this issue to life. It has been a big year for JDFSL as the journal continues to progress. We are continuing our indexing efforts for the journal and we are getting closer with some of the major databases.
A Survey Of Botnet Detection Techniques By Command And Control Infrastructure, Thomas S. Hyslip, Jason M. Pittman
A Survey Of Botnet Detection Techniques By Command And Control Infrastructure, Thomas S. Hyslip, Jason M. Pittman
Journal of Digital Forensics, Security and Law
Botnets have evolved to become one of the most serious threats to the Internet and there is substantial research on both botnets and botnet detection techniques. This survey reviewed the history of botnets and botnet detection techniques. The survey showed traditional botnet detection techniques rely on passive techniques, primarily honeypots, and that honeypots are not effective at detecting peer-to-peer and other decentralized botnets. Furthermore, the detection techniques aimed at decentralized and peer-to-peer botnets focus on detecting communications between the infected bots. Recent research has shown hierarchical clustering of flow data and machine learning are effective techniques for detecting botnet peer-to-peer …
From The Editor-In-Chief, Ibrahim Baggili
From The Editor-In-Chief, Ibrahim Baggili
Journal of Digital Forensics, Security and Law
Welcome to JDFSL’s second issue for 2015! First, I would like to thank our editorial board, reviewers, and the JDFSL team for bringing this issue to life. In this issue, we continue our multidisciplinary tradition. The first paper, Two challenges of stealthy hypervisors detection: time cheating and data fluctuations, showcases an important contribution to the computing discipline. The use of virtualization has dramatically increased given our strong reliance on cloud services both private and public. Even though hypervisors enhance security, they can also be exploited by malware. Therefore, this paper is of importance given that it introduces a novel method …
To License Or Not To License Reexamined: An Updated Report On State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Alan Rea, Doug White
To License Or Not To License Reexamined: An Updated Report On State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Alan Rea, Doug White
Journal of Digital Forensics, Security and Law
In this update to the 2012 year's study, the authors examine statutes that regulate, license, and enforce investigative functions in each US state. As before, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. There is a small trend in which some states are changing definitions or moving to exempt DE from PI licensing requirements. However, we look at some additional information in terms of practicing attorney exemptions that may cloud the licensing waters.
As with the previous research studies (Lonardo et al., 2008, 2009, 2012) the authors contacted all state regulatory agencies …
Data Loss Prevention Management And Control: Inside Activity Incident Monitoring, Identification, And Tracking In Healthcare Enterprise Environments, Manghui Tu, Kimberly Spoa-Harty, Liangliang Xiao
Data Loss Prevention Management And Control: Inside Activity Incident Monitoring, Identification, And Tracking In Healthcare Enterprise Environments, Manghui Tu, Kimberly Spoa-Harty, Liangliang Xiao
Journal of Digital Forensics, Security and Law
As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent data breach. Among various threats, insider threats have been identified to be a major threat on data loss. Thus, effective mechanisms to control insider threats on data loss are urgently needed. The objective of this research is to address data loss prevention challenges in healthcare enterprise environment. First, a novel approach is provided to model internal threat, specifically inside activities. With inside activities modeling, data …
Litigation Holds: Past, Present, And Future Directions, Milton Luoma, Vicki M. Luoma
Litigation Holds: Past, Present, And Future Directions, Milton Luoma, Vicki M. Luoma
Journal of Digital Forensics, Security and Law
Electronically Stored Information (ESI) first became a serious litigation issue in the late 1990s, and the first attempts to determine best practices did not occur until the early 2000s. As best practices developed, the litigation hold to prevent routine destruction of documents and to preserve documents relevant to litigation came into existence. The duty to preserve ESI is triggered when litigation is reasonably anticipated. All information that relates to potential litigation must be preserved from the time it becomes reasonably apparent that litigation is possible until the expiration of the statute of limitations. If steps are not taken to properly …
Computer Forensic Projects For Accountants, Grover S. Kearns
Computer Forensic Projects For Accountants, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …
On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis
On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis
Journal of Digital Forensics, Security and Law
While cybercrime proliferates – becoming more complex and surreptitious on the Internet – the tools and techniques used in performing digital investigations are still largely lagging behind, effectively slowing down law enforcement agencies at large. Real-time remote acquisition of digital evidence over the Internet is still an elusive ideal in the combat against cybercrime. In this paper we briefly describe the architecture of a comprehensive proactive digital investigation system that is termed as the Live Evidence Information Aggregator (LEIA). This system aims at collecting digital evidence from potentially any device in real time over the Internet. Particular focus is made …
Identification And Exploitation Of Inadvertent Spectral Artifacts In Digital Audio, N. C. Donnangelo, W. S. Kuklinski, R. Szabo, R. A. Coury, G. R. Hamshar
Identification And Exploitation Of Inadvertent Spectral Artifacts In Digital Audio, N. C. Donnangelo, W. S. Kuklinski, R. Szabo, R. A. Coury, G. R. Hamshar
Journal of Digital Forensics, Security and Law
We show that modulation products from local oscillators in a variety of commercial camcorders are coupled into the recorded audio track, creating narrow band time invariant spectral features. These spectral features, left largely intact by transcoding, compression and other forms of audiovisual post processing, can encode characteristics of specific camcorders used to capture the audio files, including the make and model. Using data sets both downloaded from YouTube and collected under controlled laboratory conditions we demonstrate an average probability of detection (Pd) approaching 0.95 for identification of a specific camcorder in a population of thousands of similar recordings, with a …
The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea
The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea
Journal of Digital Forensics, Security and Law
In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …
Factors Influencing Digital Forensic Investigations: Empirical Evaluation Of 12 Years Of Dubai Police Cases, Ibtesam Alawadhi, Janet C. Read, Andrew Marrington, Virginia N. L. Franqueira
Factors Influencing Digital Forensic Investigations: Empirical Evaluation Of 12 Years Of Dubai Police Cases, Ibtesam Alawadhi, Janet C. Read, Andrew Marrington, Virginia N. L. Franqueira
Journal of Digital Forensics, Security and Law
In Digital Forensics, the number of person-hours spent on investigation is a key factor which needs to be kept to a minimum whilst also paying close attention to the authenticity of the evidence. The literature describes challenges behind increasing person-hours and identifies several factors which contribute to this phenomenon. This paper reviews these factors and demonstrates that they do not wholly account for increases in investigation time. Using real case records from the Dubai Police, an extensive study explains the contribution of other factors to the increase in person-hours. We conclude this work by emphasizing on several factors affecting the …
Tracking And Taxonomy Of Cyberlocker Link Sharers Based On Behavior Analysis, Xiao-Xi Fan, Kam-Pui Chow
Tracking And Taxonomy Of Cyberlocker Link Sharers Based On Behavior Analysis, Xiao-Xi Fan, Kam-Pui Chow
Journal of Digital Forensics, Security and Law
The growing popularity of cyberlocker service has led to significant impact on the Internet that it is considered as one of the biggest contributors to the global Internet traffic estimated to be illegally traded content. Due to the anonymity property of cyberlocker, it is difficult for investigators to track user identity directly on cyberlocker site. In order to find the potential relationships between cyberlocker users, we propose a framework to collect cyberlocker related data from public forums where cyberlocker users usually distribute cyberlocker links for others to download and identity information can be gathered easily. Different kinds of sharing behaviors …
Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova
Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova
Journal of Digital Forensics, Security and Law
With ubiquitous computing and the growth of the Internet of Things, there is vast expansion in the deployment and use of event data recording systems in a variety of environments. From the ships’ logs of antiquity through the evolution of personal devices for recording personal and environmental activities, these devices offer rich forensic and evidentiary opportunities that smash against rights of privacy and personality. The technical configurations of these devices provide for greater scope of sensing, interconnection options for local, near, and cloud storage of data, and the possibility of powerful analytics. This creates the unique situation of near-total data …
A 3-D Stability Analysis Of Lee Harvey Oswald In The Backyard Photo, Srivamshi Pittala, Emily Whiting, Hany Farid
A 3-D Stability Analysis Of Lee Harvey Oswald In The Backyard Photo, Srivamshi Pittala, Emily Whiting, Hany Farid
Journal of Digital Forensics, Security and Law
Fifty years have passed since the assassination of U.S. President Kennedy. Despite the long passage of time, it is still argued that the famous backyard photo of Oswald, holding the same type of rifle used to assassinate the President, is a fake. These claims include, among others, that Oswald’s pose in the photo is physically implausible. We describe a detailed 3-D stability analysis to determine if this claim is warranted.
Plc Forensics Based On Control Program Logic Change Detection, Ken Yau, Kam-Pui Chow
Plc Forensics Based On Control Program Logic Change Detection, Ken Yau, Kam-Pui Chow
Journal of Digital Forensics, Security and Law
Supervisory Control and Data Acquisition (SCADA) system is an industrial control automated system. It is built with multiple Programmable Logic Controllers (PLCs). PLC is a special form of microprocessor-based controller with proprietary operating system. Due to the unique architecture of PLC, traditional digital forensic tools are difficult to be applied. In this paper, we propose a program called Control Program Logic Change Detector (CPLCD), it works with a set of Detection Rules (DRs) to detect and record undesired incidents on interfering normal operations of PLC. In order to prove the feasibility of our solution, we set up two experiments for …
Forensic Acquisition Of Imvu: A Case Study, Robert Van Voorst, M-Tahar Kechadi, Nhien-An Le-Khac
Forensic Acquisition Of Imvu: A Case Study, Robert Van Voorst, M-Tahar Kechadi, Nhien-An Le-Khac
Journal of Digital Forensics, Security and Law
There are many applications available for personal computers and mobile devices that facilitate users in meeting potential partners. There is, however, a risk associated with the level of anonymity on using instant message applications, because there exists the potential for predators to attract and lure vulnerable users. Today Instant Messaging within a Virtual Universe (IMVU) combines custom avatars, chat or instant message (IM), community, content creation, commerce, and anonymity. IMVU is also being exploited by criminals to commit a wide variety of offenses. However, there are very few researches on digital forensic acquisition of IMVU applications. In this paper, we …
Open Forensic Devices, Lee Tobin, Pavel Gladyshev
Open Forensic Devices, Lee Tobin, Pavel Gladyshev
Journal of Digital Forensics, Security and Law
Cybercrime has been a growing concern for the past two decades. What used to be the responsibility of specialist national police has become routine work for regional and district police. Unfortunately, funding for law enforcement agencies is not growing as fast as the amount of digital evidence. In this paper, we present a forensic platform that is tailored for cost effectiveness, extensibility, and ease of use. The software for this platform is open source and can be deployed on practically all commercially available hardware devices such as standard desktop motherboards or embedded systems such as Raspberry Pi and Gizmosphere’s Gizmo …
Exploring The Use Of Plc Debugging Tools For Digital Forensic Investigations On Scada Systems, Tina Wu, Jason R.C. Nurse
Exploring The Use Of Plc Debugging Tools For Digital Forensic Investigations On Scada Systems, Tina Wu, Jason R.C. Nurse
Journal of Digital Forensics, Security and Law
The Stuxnet malware attack has provided strong evidence for the development of a forensic capability to aid in thorough post-incident investigations. Current live forensic tools are typically used to acquire and examine memory from computers running either Windows or Unix. This makes them incompatible with embedded devices found on SCADA systems that have their own bespoke operating system. Currently, only a limited number of forensics tools have been developed for SCADA systems, with no development of tools to acquire the program code from PLCs. In this paper, we explore this problem with two main hypotheses in mind. Our first hypothesis …
Project Maelstrom: Forensic Analysis Of The Bittorrent-Powered Browser, Jason Farina, M-Tahar Kechadi, Mark Scanlon
Project Maelstrom: Forensic Analysis Of The Bittorrent-Powered Browser, Jason Farina, M-Tahar Kechadi, Mark Scanlon
Journal of Digital Forensics, Security and Law
In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken offline by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, security and privacy considerations are raised. This paper explores …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.