Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

2013

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 71

Full-Text Articles in Social and Behavioral Sciences

Indian Aviation Leadership Engagement: Case Study In Leadership Development Using The Cynevin Framework, Daryl Watkins, Kees Rietsema Dec 2013

Indian Aviation Leadership Engagement: Case Study In Leadership Development Using The Cynevin Framework, Daryl Watkins, Kees Rietsema

Publications

The paper presents a case study of a leadership development workshop facilitated by two American educators for a group of Indian aviation executives. The Indian aviation environment is quite complex and at times chaotic. The leadership development workshop was conducted as a sense-making exercise using Snowden’s Cynevin Framework. Pre-seminar and post-seminar survey comparisons indicated that the executives experienced significant shifts in attitude during the three-day workshop. Pre-seminar attitudes demonstrated little differentiation between sense-making and leadership action within complex and chaotic contexts. Post-seminar attitudes demonstrated a broader contextual understanding of sense-making and leadership in complex and chaotic environments. The executives left …


Comparison Of Three Angle Of Attack (Aoa) Indicators: A Usability Study, Camilo Jimenez Nov 2013

Comparison Of Three Angle Of Attack (Aoa) Indicators: A Usability Study, Camilo Jimenez

Doctoral Dissertations and Master's Theses

Angle of Attack (AOA) is an important aeronautical concept used to understand the performance status of an aircraft during different flight stages. The Federal Aviation Administration (FAA) has indicated the importance of developing and encouraging the use of affordable AOA based systems to increase inflight safety. Embry-Riddle Aeronautical University's flight department decided to install AOA indicators in its fleet of Cessna 172S, to increase safety and to help student pilots better understand this important concept. This paper presents a review of AOA, visual display design principles, and usability. This experimental study examined three different AOA indicators provided by the …


Onboard From The Beginning: A Successful Library Partnership With A Distance Learning Phd Program, Anne Marie Casey Oct 2013

Onboard From The Beginning: A Successful Library Partnership With A Distance Learning Phd Program, Anne Marie Casey

Staff Works - Hunt Library

This presentation described the development of a distance education PhD program that included a librarian in the planning from the start. Beginning its fifth year, the PhD in Aviation Science at Embry-Riddle Aeronautical University (ERAU) considers the library an integral part of its success. The presentation covered funding, ongoing library participation, and tips for involvement in planning.


Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz Sep 2013

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Journal of Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …


Patient Safety In The Cardiac Operating Room: Human Factors And Teamwork: A Scientific Study From The American Heart Association, Joyce A. Wahr, Richard L. Prager, J. H. Abernathy Iii, Elizabeth A. Martinez, Eduardo Salas, Patricia C. Seifert, Robert C. Groom, Bruce D. Spiess, Bruce E. Searles, Thoralf M. Sundt Iii, Juan A. Sanchez, Scott A. Shappell, Michael H. Culig, Elizabeth H. Lazzara, David C. Fitzgerald, Vinod H. Thourani, Pirooz Eghtesady, John S. Ikonomidis, Michael R. England, Frank W. Selke, Nancy A. Nussmeier Sep 2013

Patient Safety In The Cardiac Operating Room: Human Factors And Teamwork: A Scientific Study From The American Heart Association, Joyce A. Wahr, Richard L. Prager, J. H. Abernathy Iii, Elizabeth A. Martinez, Eduardo Salas, Patricia C. Seifert, Robert C. Groom, Bruce D. Spiess, Bruce E. Searles, Thoralf M. Sundt Iii, Juan A. Sanchez, Scott A. Shappell, Michael H. Culig, Elizabeth H. Lazzara, David C. Fitzgerald, Vinod H. Thourani, Pirooz Eghtesady, John S. Ikonomidis, Michael R. England, Frank W. Selke, Nancy A. Nussmeier

Publications

The cardiac surgical operating room (OR) is a complex environment in which highly trained subspecialists interact with each other using sophisticated equipment to care for patients with severe cardiac disease and significant comorbidities. Thousands of patient lives have been saved or significantly improved with the advent of modern cardiac surgery. Indeed, both mortality and morbidity for coronary artery bypass surgery have decreased during the past decade. Nonetheless, the highly skilled and dedicated personnel in cardiac ORs are human and will make errors. Refined techniques, advanced technologies, and enhanced coordination of care have led to significant improvements in cardiac surgery outcomes.


The Effects Of Ethical Leadership And Organizational Safety Culture On Safety Outcomes, David Ronald Freiwald Sep 2013

The Effects Of Ethical Leadership And Organizational Safety Culture On Safety Outcomes, David Ronald Freiwald

Doctoral Dissertations and Master's Theses

This dissertation investigated the relationship among ethical leadership, an ethical workplace climate, safety culture, safety behaviors, and measured safety outcomes of workers in the high reliability organizations of aviation and healthcare. The primary objective was to develop a model linking these factors and assess their fit within the model. A secondary objective was to examine differences between the two populations. In this study, a 101-item instrument was used to collect and analyze employee responses on ten factors comprising the model. Structural equation modeling – path analysis was used for testing and evaluating relations using a combination of statistical analysis and …


Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi Jul 2013

Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi

Andrei Ludu

This study used a logistic regression model to investigate the relationship between several predicting factors and burglary occurrence probability with regard to the epicenter. These factors include day of the week, time of the day, repeated victimization, connectors and barriers. Data was collected from a local police report on 2010 burglary incidents. Results showed the model has various degrees of significance in terms of predicting the occurrence within difference ranges from the epicenter. Follow-up refined multiple comparisons of different sizes were observed to further discover the pattern of prediction strength of these factors. Results are discussed and further research directions …


Aviation Weather And Decision Making: A Human Factors Perspective, Beth Blickensderfer, Jessica Cruit, Michael Vincent Jul 2013

Aviation Weather And Decision Making: A Human Factors Perspective, Beth Blickensderfer, Jessica Cruit, Michael Vincent

Aviation Weather Training Research

  • A History of Decision Making Research
  • Pilot Decision Making
  • Future Research Directions


Investigation Of Videogame Flow: Effects Of Expertise And Challenge, Jolie G. Gascon Jul 2013

Investigation Of Videogame Flow: Effects Of Expertise And Challenge, Jolie G. Gascon

Doctoral Dissertations and Master's Theses

The number of participants in this expertise and videogame flow test totaled 80 from multiple target locations. Participants engaged in various levels of the videogame SuperMario Bros. Twenty experts and twenty novices experienced the easier level of World 1-2 while the other twenty experts and novices were exposed to the more difficult level World 6-1. After gameplay, participants completed a modified survey measuring flow. This survey, along with overall percentage game score, was analyzed. A significant interaction was found between game level (challenge level) and skill levels in perceived immersion, with significant main effects for expertise in perceived skill, for …


The Effects Of Sensor Performance As Modeled By Signal Detection Theory On The Performance Of Reinforcement Learning In A Target Acquisition Task, Nate Quirion Jul 2013

The Effects Of Sensor Performance As Modeled By Signal Detection Theory On The Performance Of Reinforcement Learning In A Target Acquisition Task, Nate Quirion

Doctoral Dissertations and Master's Theses

Unmanned Aerial Systems (UASs) today are fulfilling more roles than ever before. There is a general push to have these systems feature more advanced autonomous capabilities in the near future. To achieve autonomous behavior requires some unique approaches to control and decision making. More advanced versions of these approaches are able to adapt their own behavior and examine their past experiences to increase their future mission performance. To achieve adaptive behavior and decision making capabilities this study used Reinforcement Learning algorithms. In this research the effects of sensor performance, as modeled through Signal Detection Theory (SDT), on the ability of …


The Effects Of Acute Psychosocial Stress On Cognitive Performance, Anne I.S. Gray Jul 2013

The Effects Of Acute Psychosocial Stress On Cognitive Performance, Anne I.S. Gray

Doctoral Dissertations and Master's Theses

The purpose of this study was to examine the effects of acute psychosocial stress on cognitive performance. Psychosocial stress evolves from the perceived presence of a social evaluative threat and results in the activation of the home hypothalamic-pituitary-adrenal axis. As part of this reaction the stress hormone cortisol is secreted into the blood stream, ultimately crossing the blood-brain barrier, where it can have profound effects on various aspects of cognition. A review of the literature reveals that that attention, working memory, spatial judgment and cognitive processing efficiency are particularly susceptible to stress induced changes in performance level. A test battery …


The Identification And Classification Of Flow Disruptions In The Operating Room During Laparoscopic Cholecystectomy And Open Hernia Repair Procedures, Sacha N. Duff Jul 2013

The Identification And Classification Of Flow Disruptions In The Operating Room During Laparoscopic Cholecystectomy And Open Hernia Repair Procedures, Sacha N. Duff

Doctoral Dissertations and Master's Theses

The operating room is one of the most complex work environments in healthcare; it is estimated that at least 7% of adverse events due to medical error occur in the operating room. Flow disruptions are events that cause a "break" in the primary surgical task, or the loss of any team member's situational awareness. An empirical link between flow disruptions and surgical errors in the OR has been established; therefore, identifying and classifying the specific flow disruptions present during different types of procedures should facilitate the development of evidence-based interventions. The goal of this study was to identify and classify …


Moral Development In The Military: The Efficacy Of Rotc Morality Training At The Sophomore Level, Paul A. Gillett Jul 2013

Moral Development In The Military: The Efficacy Of Rotc Morality Training At The Sophomore Level, Paul A. Gillett

Doctoral Dissertations and Master's Theses

The Reserve Officers Training Corps (ROTC) is an accessions program designed to produce quality commissioned Officers for operational units, in support of strategic Department of Defense (DoD) objectives. The traditional program length of 4 years coincides with the average number of years required to obtain a baccalaureates degree in the United States, in part because a degree is required for program completion. The program goals are to develop candidates physically, mentally, and morally in order to ensure they can be entrusted with the highest levels of leadership required of a US citizen.

This study aimed at assessing the moral development …


A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl Jun 2013

A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl

Annual ADFSL Conference on Digital Forensics, Security and Law

For Microsoft Windows Operating Systems, both anti-virus products and kernel rootkits often hook the System Service Dispatch Table (SSDT). This research paper investigates the interaction between these two in terms of the SSDT. To investigate these matters, we extracted digital evidence from volatile memory, and studied that evidence using the Volatility framework. Due to the diversity in detection techniques used by the anti-virus products, and the diversity of infection techniques used by rootkits, our investigation produced diverse results, results that helped us to understand several SSDT hooking strategies, and the interaction between the selected anti-virus products and the rootkit samples. …


An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin Jun 2013

An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin

Annual ADFSL Conference on Digital Forensics, Security and Law

The analysis of forensic investigation results has generally been identified as the most complex phase of a digital forensic investigation. This phase becomes more complicated and time consuming as the storage capacity of digital devices is increasing, while at the same time the prices of those devices are decreasing. Although there are some tools and techniques that assist the investigator in the analysis of digital evidence, they do not adequately address some of the serious challenges, particularly with the time and effort required to conduct such tasks. In this paper, we consider the use of semantic web technologies and in …


First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen Jun 2013

First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

The Tor network is a low-latency overlay network for TCP flows that is designed to provide privacy and anonymity to its users. It is currently in use by many as a means to avoid censorship of both information to be shared and information to be retrieved. This paper details the architecture of the Tor network as a platform for evaluating the current state of forensic analysis of the Tor network. Specific attempts to block access to the Tor network are examined to identify (a) the processes utilized to identify Tor nodes, and (b) the resulting exposure of potentially inculpatory evidence. …


A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia Jun 2013

A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia

Annual ADFSL Conference on Digital Forensics, Security and Law

The adoption of computer and internet technology has greatly improved the way businesses operate. However the risk to the confidentiality, integrity and availability of organizational data and systems has greatly increased too. Information security is an ever present concern for all organizations. Financial estimates of the impact of security breaches to information and technology resources range from hundreds of billions to over one trillion dollars each year worldwide (D'Arcy et al., 2011b). Organizations have therefore developed a combination of technical, administrative, and physical controls to reduce this risk (D'Arcy et al., 2011a). Administrative measures include the development of information security …


Journey Into Windows 8 Recovery Artifacts, W. K. Johnson Jun 2013

Journey Into Windows 8 Recovery Artifacts, W. K. Johnson

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most difficult processes of digital forensics is to understand how new technology interacts with current technology and how digital forensic analysts can utilize current Digital Forensics technologies and processes to recover and find information hidden. Microsoft has released their new operating system Windows 8, with this new release Microsoft has added some features to the operating system that will present some interesting complications to digital forensics. Since the initial release of the Windows 8 Release Candidates there have been some research released that focus primarily on the new user created artifacts and a few artifacts that have …


An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok Jun 2013

An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper proposes an image forensic scheme with both robust and fragile watermarking techniques for business documents. Through a dual watermarking approach, the proposed scheme can achieve image forensics objectives of (a) identification of source; (b) authentication of documents; and (c) locating the tempered areas of documents due to attacks. An example is presented to prove the concepts of the proposed scheme.

Keywords: Image Forensics, Fragile and Robust Watermarking, Business Document.


Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter Jun 2013

Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics (DF) is a growing field that is gaining popularity among many computer professionals, law enforcement agencies and other stakeholders who must always cooperate in this profession. Unfortunately, this has created an environment replete with semantic disparities within the domain that needs to be resolved and/or eliminated. For the purpose of this study, semantic disparity refers to disagreements about the meaning, interpretation, descriptions and the intended use of the same or related data and terminologies. If semantic disparity is not detected and resolved, it may lead to misunderstandings. Even worse, since the people involved may not be from the …


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter Jun 2013

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz Jun 2013

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Annual ADFSL Conference on Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …


Identifying Peer-To-Peer Traffic On Shared Wireless Networks, Simon Piel, Ej Jung Jun 2013

Identifying Peer-To-Peer Traffic On Shared Wireless Networks, Simon Piel, Ej Jung

Annual ADFSL Conference on Digital Forensics, Security and Law

Tracing contraband downloads leads investigators to an IP address, and in turn Internet Service Providers (ISP) can provide a physical location using this IP address. However, most homes and offices share this IP address among many computers using wireless networks. In other words, there needs to be another investigation to find out which computer was responsible for contraband downloads. To make matters worse, these shared wireless networks often have vulnerabilities in access control such as using WEP or using weak passwords. In such cases, any computer in range, not necessarily at the given physical address, could be responsible. We use …


On Resolving The Cloud Forensics Conundrum, John Bagby Jun 2013

On Resolving The Cloud Forensics Conundrum, John Bagby

Annual ADFSL Conference on Digital Forensics, Security and Law

The “cloud” is idiom for an ill-defined set of online services. The cloud simultaneously offers IT savings and promises advances in functionality (e.g., ubiquity). However, the cloud also imposes poorly understood burdens on security and it may provoke injustice. Thus, the cloud presents a durable and seemingly irreconcilable conundrum for the digital forensics communit(ies). First, cloud proponents make efficiency promises for cloud services (SaaS, IaaS, PaaS). These translate well into the digital forensics domain. Indeed, the cloud may enable crowd sourcing of investigatory data vastly lowering costs of dispute resolution. For example, cloud-based litigation war rooms may reduce electronic discovery …


Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha Jun 2013

Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha

Annual ADFSL Conference on Digital Forensics, Security and Law

This conceptual piece analyzes the role of criminal punishment and the nature of cyber crime to investigate whether the current punishment schemes are appropriate given the deontological and utilitarian goals of punishment: retribution, deterrence, incapacitation, and rehabilitation. The research has implications for policymaking in cybercriminal law.

Keywords: cybercrime, criminal law, punishment, retribution, deterrence, information economics


The Development Of Computer Forensic Legal System In China, Yonghao Mai, K. P. Chow, Rongsheng Xu, Gang Zhou, Fei Xu, Jun Zhang Jun 2013

The Development Of Computer Forensic Legal System In China, Yonghao Mai, K. P. Chow, Rongsheng Xu, Gang Zhou, Fei Xu, Jun Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

The computer forensic discipline was established around 2000 in China, which was further developed along with Chinese judicial appraisal system in 2005. The new criminal and civil procedure laws of the People’s Republic of China was enacted on 1 Jan 2013. The new laws specified electronic data is legal evidence and has great impact on the current practice on handling electronic evidence. This paper introduces the electronic data and electronic evidence examination procedure in mainland China, the general concept of computer forensic legal system, the management of computer judicial experts, the management of computer judicial expertise institutions.

Keywords: China legal …


Analysis Of Low-Cost Carriers In The Post-Soviet States, Tamilla Curtis, Dawna L. Rhoades Jun 2013

Analysis Of Low-Cost Carriers In The Post-Soviet States, Tamilla Curtis, Dawna L. Rhoades

Publications

The research paper provides an overview of low-cost carrier (LCC) development in the post- Soviet states with the analysis of the largest aviation market in Russia. The LCC model seeks to achieve a competitive advantage through the reduction of operating costs below the traditional airline model. Since the post-Soviet states are emerging economies, airlines face a high level of uncertainty and experience a number of unique problems. While the global community enjoys the benefits offered by LCCs, the question remains why this model has not been successful in the 15 newly formed countries, with the exception of the Hungarian low-cost …


Ancillary Revenue And Price Fairness: An Exploratory Study Pre & Post Flight, Blaise P. Waguespack, Tamilla Curtis Jun 2013

Ancillary Revenue And Price Fairness: An Exploratory Study Pre & Post Flight, Blaise P. Waguespack, Tamilla Curtis

Publications

The growing impact of Ancillary Revenue on consumer choice and shopping behavior continues to be a highly debated issue. In the US, the Department of Transportation (DOT) has stepped into the debate and is investigating the possibility of new rules on how airlines must report and display such ancillary offerings. While the DOT collects data, reports on the amount of ancillary revenue earned by the airlines continue to rise. Examining past research on price fairness from the marketing literature and the impact of revenue management on price fairness from the aviation literature, this article joins new research appearing on the …


Product Review: Goodreader Or Pdf Reader Pro: Which Is Better For Reading And Annotating?, Laura Pope Robbins May 2013

Product Review: Goodreader Or Pdf Reader Pro: Which Is Better For Reading And Annotating?, Laura Pope Robbins

Publications

Laura Pope Robbins is an advisor for The Charleston Advisor, and the comparative review below is included in Scholarly Commons with the permission of the publisher.

Today’s researchers are extremely mobile and are looking for ways to read and annotate documents when not in their offices. GoodReader and PDF Reader Pro are two apps that provide that capability for iPad users. Both apps can read multiple file formats and provide file management tools like rename, move, and delete. As well, they can both be linked to multiple cloud services to upload and download files. Neither app is integrated with an …


Personal Protective Clothing: Law Enforcement Officers’ Attitudes And Safety Behavior Assessments Toward High-Visibility Safety Apparel, So Young Song May 2013

Personal Protective Clothing: Law Enforcement Officers’ Attitudes And Safety Behavior Assessments Toward High-Visibility Safety Apparel, So Young Song

Doctoral Dissertations and Master's Theses

Traffic related fatalities are one of the most common workplace hazards in the law enforcement community. They accounted for approximately 44% of all fatalities within the law enforcement occupational field between 2002 and 2011. Although many law enforcement officers’ deaths are due to being struck by vehicles, these could be prevented with the use of High-Visibility Safety Apparel (HVSA). The importance of raising traffic protective behavior compliance is largely overlooked by misperceptions in the workplace. Relatively few studies have examined HVSA wearing behaviors associated with social psychological human elements. It has still remained unclear as subjective or objective experiences. Proper …