Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1493)
- Environmental Sciences (1305)
- Physics (905)
- Engineering (809)
- Chemistry (762)
-
- Life Sciences (712)
- Social and Behavioral Sciences (672)
- Earth Sciences (632)
- Mathematics (595)
- Oceanography and Atmospheric Sciences and Meteorology (358)
- Statistics and Probability (354)
- Computer Engineering (337)
- Astrophysics and Astronomy (234)
- Education (234)
- Geology (227)
- Natural Resources and Conservation (217)
- Arts and Humanities (201)
- Natural Resources Management and Policy (195)
- Databases and Information Systems (188)
- Electrical and Computer Engineering (185)
- Applied Mathematics (177)
- Environmental Indicators and Impact Assessment (175)
- Environmental Health and Protection (154)
- Business (152)
- Science and Mathematics Education (152)
- Law (137)
- Sustainability (137)
- Water Resource Management (123)
- Information Security (121)
- Institution
-
- University of Nebraska - Lincoln (947)
- University of Wollongong (359)
- Wright State University (302)
- TÜBİTAK (220)
- Selected Works (185)
-
- Missouri University of Science and Technology (158)
- Singapore Management University (158)
- University of Nevada, Las Vegas (157)
- Brigham Young University (139)
- Louisiana State University (135)
- SelectedWorks (116)
- Old Dominion University (112)
- University of Kentucky (108)
- Utah State University (107)
- Embry-Riddle Aeronautical University (97)
- Edith Cowan University (92)
- Chinese Chemical Society | Xiamen University (86)
- Wayne State University (84)
- COBRA (83)
- Clemson University (81)
- Air Force Institute of Technology (76)
- William & Mary (76)
- Georgia State University (75)
- Portland State University (71)
- University of Central Florida (70)
- University of Massachusetts Amherst (70)
- University of Tennessee, Knoxville (69)
- Technological University Dublin (68)
- University of Northern Iowa (63)
- University of Texas at Arlington (62)
- Keyword
-
- Invasive species (66)
- Environmental science--Experiments; Ecology--Experiments; Atmospheric physics--Experiments; (37)
- CMMB (36)
- Human–wildlife conflicts (28)
- Water (28)
-
- Climate change (27)
- GeoQUEST (27)
- Groundwater (26)
- Mathematics (26)
- [RSTDPub] (26)
- Natural resources (25)
- Conservation (24)
- Coyote (24)
- Management (24)
- Data (23)
- Geology (23)
- 2007 (21)
- Natural resource management (21)
- Physics (21)
- College for Professional Studies (20)
- History (20)
- California (19)
- Chemistry (19)
- Computer science (19)
- Landslides (19)
- Research and Technical Reports (19)
- School of Computer & Information Science (19)
- United States (19)
- Environment (18)
- Machine learning (18)
- Publication
-
- Faculty of Informatics - Papers (Archive) (209)
- Theses and Dissertations (198)
- Computer Science & Engineering Syllabi (160)
- Research Collection School Of Computing and Information Systems (153)
- Faculty Publications (142)
-
- Faculty of Science - Papers (Archive) (120)
- United States Department of Agriculture Wildlife Services: Staff Publications (114)
- Electronic Theses and Dissertations (104)
- Journal of Electrochemistry (86)
- Turkish Journal of Chemistry (83)
- Nebraska Tractor Tests (75)
- Journal of Modern Applied Statistical Methods (64)
- Masters Theses (61)
- Kno.e.sis Publications (57)
- Managing Vertebrate Invasive Species (56)
- Physics Faculty Publications (56)
- Sci-Tech News (55)
- Human–Wildlife Interactions (54)
- LSU Master's Theses (52)
- Publications (52)
- United States Geological Survey: Staff Publications (50)
- Doctoral Dissertations (49)
- Turkish Journal of Mathematics (48)
- All Computer Science and Engineering Research (47)
- LSU Doctoral Dissertations (47)
- Physics Faculty Research & Creative Works (47)
- Browse all Theses and Dissertations (43)
- Dissertations (43)
- Thai Environment (43)
- Open Educational Resources (42)
- Publication Type
Articles 2911 - 2940 of 6758
Full-Text Articles in Physical Sciences and Mathematics
Dna-Templated Nanomaterials, Hector Alejandro Becerril-Garcia
Dna-Templated Nanomaterials, Hector Alejandro Becerril-Garcia
Theses and Dissertations
Nanomaterials display interesting physical and chemical properties depending on their shape, size and composition. Self assembly is an intriguing route to producing nanomaterials with controllable compositions and morphologies. DNA has been used to guide the self assembly of materials, resulting in: (1) metal nanowires; (2) metal or semiconductor nanorods; (3) carbon nanotubes; and (4) semiconductor, metal or biological nanoparticles. My work expands the range of DNA templated nanomaterials and develops novel ways of using DNA to pattern nanostructures on surfaces. I have performed the first synthesis of silver nanorods on single stranded DNA, an attractive material for localizing DNA coupled …
The Successful Eradication Of Introduced Roof Rats (Rattus Rattus) From Buck Island Using Diphacinone, Followed By An Irruption Of House Mice (Mus Musculus), Gary W. Witmer, Frank Boyd, Zandy Hillis-Starr
The Successful Eradication Of Introduced Roof Rats (Rattus Rattus) From Buck Island Using Diphacinone, Followed By An Irruption Of House Mice (Mus Musculus), Gary W. Witmer, Frank Boyd, Zandy Hillis-Starr
United States Department of Agriculture Wildlife Services: Staff Publications
The United States National Park Service and the United States Wildlife Services made a planned and sustained effort to eradicate the introduced roof rats (Rattus rattus) from Buck Island Reef National Monument in the Caribbean Sea during 1998–2000. The rats were causing substantial damage to a variety of the 80-ha island’s floral and faunal resources. An island-wide grid of elevated bait stations containing anticoagulant (0.005% diphacinone; 50 ppm) rodenticide bait blocks were used to eradicate the rats. The bait stations were modified several times to assure ready access by rats while minimizing access by non-target animals, especially crabs …
Long-Range Coupling And Scalable Architecture For Superconducting Flux Qubits, Britton Plourde, Austin G. Fowler
Long-Range Coupling And Scalable Architecture For Superconducting Flux Qubits, Britton Plourde, Austin G. Fowler
Physics - All Scholarship
Constructing a fault-tolerant quantum computer is a daunting task. Given any design, it is possible to determine the maximum error rate of each type of component that can be tolerated while still permitting arbitrarily large-scale quantum computation. It is an underappreciated fact that including an appropriately designed mechanism enabling long-range qubit coupling or transport substantially increases the maximum tolerable error rates of all components. With this thought in mind, we take the superconducting flux qubit coupling mechanism described in PRB 70, 140501 (2004) and extend it to allow approximately 500 MHz coupling of square flux qubits, 50 um a side, …
Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian
Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian
Annual ADFSL Conference on Digital Forensics, Security and Law
As computer forensics develops into one of the fastest-growing areas in the computer related fields, many universities and colleges are offering or are planning to offer a course in computer forensics. When instructors begin to develop a new course in the area, one of critical questions they would ask is what textbook should be used. To better answer the question, we conducted a study in which we tried to find which textbooks are being used in computer forensic courses. We believe that the results and analysis of our study will help instructors in choosing adequate textbooks for their new course …
Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli
Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This research in progress aims to evaluate the effectiveness of commercial programs to erase traces of the use of BitTorrent software. The erasure programs MaxErase, P2PDoctor, Privacy Suite, Window Washer and R-Clean and Wipe were used on a machine that had used the BitTorrent client Azureus to download two torrent files. The drive was imaged and then searched for torrent files. The registry was also examined on the source machine. The program R-Clean and Wipe left evidence in both the registry and the image of the name and type of files that had been downloaded with this software. Of greater …
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo
Annual ADFSL Conference on Digital Forensics, Security and Law
Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies.
Keywords: computer forensics education, network forensics, protocol analysis
Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb
Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb
Annual ADFSL Conference on Digital Forensics, Security and Law
The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse …
Computer Geolocation Using Extracted Features, Chad M.S. Steel
Computer Geolocation Using Extracted Features, Chad M.S. Steel
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper compares the extracted feature data from a sample set of hard drive images in an effort to relate the features to the physical location of the drive. A list of probable zip codes, phone numbers, place names, and IP addresses are extracted from raw drive images and compared to manually identified geolocation data. The results of the individual extractions are then analyzed to determine the feasibility in using automated extraction and analysis techniques for geolocating hard drives.
Keywords: hard disk forensics, geocoding, geolocation
Ice Core Paleovolcanic Records From The St. Elias Mountains, Yukon, Canada, Kaplan Yalcin, Cameron P. Wake, Karl J. Kreutz, Mark S. Germani, Sallie I. Whitlow
Ice Core Paleovolcanic Records From The St. Elias Mountains, Yukon, Canada, Kaplan Yalcin, Cameron P. Wake, Karl J. Kreutz, Mark S. Germani, Sallie I. Whitlow
Earth Science Faculty Scholarship
We previously reported a record of regionally significant volcanic eruptions in the North Pacific using an ice core from Eclipse Icefield (St. Elias Mountains, Yukon, Canada). The acquisition of two new ice cores from Eclipse Icefield, along with the previously available Eclipse Icefield and Mount Logan Northwest Col ice cores, allows us to extend our record of North Pacific volcanism to 550 years before present using a suite of four ice cores spanning an elevation range of 3 - 5 km. Comparison of volcanic sulfate flux records demonstrates that the results are highly reproducible, especially for the largest eruptions such …
2007 Sonia Kovalevsky Math For Girls Day Featured Workshop: Knot Theory, Association For Women In Mathematics, Lincoln University Of Missouri
2007 Sonia Kovalevsky Math For Girls Day Featured Workshop: Knot Theory, Association For Women In Mathematics, Lincoln University Of Missouri
Math for Girls Day Documents
2nd Annual Lincoln University Sonia Kovalevsky Math for Girls Day featured workshop by Mrs. Bernadette Turner on the topic of knot theory.
Anisotropic Diffusion Techniques On Synthetic Aperture Radar Data, Josef Vaughn De Allen, Emile Ganthier, Gnana Bhaskar Tenali
Anisotropic Diffusion Techniques On Synthetic Aperture Radar Data, Josef Vaughn De Allen, Emile Ganthier, Gnana Bhaskar Tenali
Mathematics and System Engineering Faculty Publications
Speckle in SAR imagery is a by-product of constructive and destructive interference between scatterers within a resolution cell. This speckle phenomenon gives SAR imagery a "noise-like" appearance and is often exploited in near angle and/or coherent stereo pairs. However, in many cases, this speckle is unwanted and can be considered noise or interference. We use partial differential equation (PDE) methods for speckle mitigation in detected imagery and the collected complex image data. In particular, we study the effects of non-linear anisotropic diffusion filters on collected SAR image data. In the past, anisotropic diffusion (AD) techniques have been successfully used in …
Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes
Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital forensics and cyber crime investigations are continually growing, rapidly changing fields requiring law enforcement agencies to meet very rigorous training requirements. New opportunities for committing criminal activity against persons, organization or property are presented every day with the proliferation of personal digital devices, computers, the internet, computer networks, and automated data systems. Whether the crime involves attacks against computer systems, electronic information, or more traditional crimes such as murder, money laundering or fraud, electronic evidence is becoming more prevalent. It is no surprise that law enforcement and criminal justice officials are being overwhelmed by the volume of investigations and …
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song
Annual ADFSL Conference on Digital Forensics, Security and Law
Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …
Electric Field Induced Hopping Conductivity And Polarization In Hytrel, Steve Hart
Electric Field Induced Hopping Conductivity And Polarization In Hytrel, Steve Hart
Senior Theses and Projects
The focus of my 4900 research project is centered on the conductivity of Hytrel, a complex, newly developed block co-polymer. I first began to study Hytrel during the summer of 2006, as part of the USU College of Science Mini-Grant program1. My general objective was to study the relationship between the resistivity of Hytrel and hopping conductivity. Hopping conductivity is a theory of electron transport for nonconducting solids, originally developed for amorphous semiconductors2,3. The theory will be examined in greater detail later in this document. While studying this relationship last summer, I noticed an unusual phenomenon …
Cattail Distribution End Abundance In North Dakota, Scott T. Ralston, G. M. Linz, W. J. Bleier, H. J. Homan
Cattail Distribution End Abundance In North Dakota, Scott T. Ralston, G. M. Linz, W. J. Bleier, H. J. Homan
United States Department of Agriculture Wildlife Services: Staff Publications
Wetlands in the Prairie Pothole Region (PPR) of North Dalcota provide important habitats for a plethora of invertebrate and vertebrate animals. Since 1991, glyphosate-based (N-phosphonomethyl-glycine) herbicides have been used to manage dense cattail (Typha spp. L.) stands on 29,522 ha of wetlands in the PPR to disperse blackbird roosts. Limited information exists on the abundance and distribution of this important habitat. We took aerial photographs and used geospatial analysis tools to identify wetland basins and cattail coverage on randomly selected sample sites within the PPR. We found that average wetland density and size were 13 wetlands/ km2 and …
Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale
Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale
Annual ADFSL Conference on Digital Forensics, Security and Law
In the discovery portion of court proceedings, it is necessary to produce information to opposing counsel. Traditionally, this information is in paper form with all privileged information removed. Increasingly, the information requested during discovery exists in digital form and savvy counsel is requesting direct access to the original digital source: a broad spectrum of additional digital information can be often be extracted using digital forensics. This paper describes the major problems which must be solved to redact digital information from electronic devices. The primary hurdle facing digital redaction is the lack of a rational process for systematically handling encoded, encrypted, …
Searching For A Stochastic Background Of Gravitational Waves With The Laser Interferometer Gravitational-Wave Observatory, B. Abbott, R. Abbott, R. Adhikari, J. Agresti, P. Ajith, B. Allen, R. Amin, S. B. Anderson, W. G. Anderson, M. Araya, H. Armandula, M. Ashley, S. Aston, C. Aulbert, S. Babak, S. Ballmer, B. C. Barish, C. Barker, D. Barker, B. Barr, P. Barriga, M. A. Barton, K. Bayer, K. Belczynski, J. Betzwieser, P. Beyersdorf, B. Bhawal, I. A. Bilenko, G. Billingsley, E. Black
Searching For A Stochastic Background Of Gravitational Waves With The Laser Interferometer Gravitational-Wave Observatory, B. Abbott, R. Abbott, R. Adhikari, J. Agresti, P. Ajith, B. Allen, R. Amin, S. B. Anderson, W. G. Anderson, M. Araya, H. Armandula, M. Ashley, S. Aston, C. Aulbert, S. Babak, S. Ballmer, B. C. Barish, C. Barker, D. Barker, B. Barr, P. Barriga, M. A. Barton, K. Bayer, K. Belczynski, J. Betzwieser, P. Beyersdorf, B. Bhawal, I. A. Bilenko, G. Billingsley, E. Black
Physics and Astronomy Faculty Publications and Presentations
The Laser Interferometer Gravitational-Wave Observatory (LIGO) has performed the fourth science run, S4, with significantly improved interferometer sensitivities with respect to previous runs. Using data acquired during this science run, we place a limit on the amplitude of a stochastic background of gravitational waves. For a frequency independent spectrum, the new Bayesian 90% upper limit is ΩGW × [H0/(12 km s-1 Mpc-1)]2 < 6.5 × 10-5. This is currently the most sensitive result in the frequency range 51-150 Hz, with a factor of 13 improvement over the previous LIGO result. We discuss the complementarity of the new result with other constraints on a stochastic background of gravitational waves, and we investigate implications of the new result for different models of this background. © 2007. The American Astronumical Society. All rights reserved.
A Simple Organic Solar Cell, Gordon Patrick Whyburn
A Simple Organic Solar Cell, Gordon Patrick Whyburn
Pomona Senior Theses
Finding renewable sources of energy is becoming an increasingly important component of scientific research. Greater competition for existing sources of energy has strained the world’s supply and demand balance and has increased the prices of traditional sources of energy such as oil, coal, and natural gas. The experiment discussed in this paper is designed to identify and build an inexpensive and simple method for creating an effective organic solar cell.
Solar Energy Research And Development In California, Brett T. Close
Solar Energy Research And Development In California, Brett T. Close
Pomona Senior Theses
The energy crisis of 2001, high prices for gas and electricity and worries of climate change have caused a growing awareness about energy issues in California. The problems are clear. This paper looks at the next step of finding and implementing solutions. In this case the contribution that solar photovoltaic and solar thermal generation could make toward solving the problem. This paper looks at technological change, the current state of solar energy research, current government policies on solar energy, and finally makes policy recommendations to meet the stated problem.
Anticipating Semilinear Spdes (International Conference Stochastic Analysis And Stochastic Geometry), Salah-Eldin A. Mohammed
Anticipating Semilinear Spdes (International Conference Stochastic Analysis And Stochastic Geometry), Salah-Eldin A. Mohammed
Miscellaneous (presentations, translations, interviews, etc)
No abstract provided.
The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack
The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital forensics is a young field that is being defined by the reactive nature of its development – in terms of both research and practice. As technology develops, digital forensics is forced to react and adapt. The rapid development of technology and the lack of an established theoretical foundation has led to a disconnect between the theory and practice of digital forensics. While the base theoretical issues are being worked on by researchers, practitioners are dealing with entirely new sets of issues. The complexity of investigations is increasing, and anti-forensics techniques are advancing as well. The disconnect will be resolved …
Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem
Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper presents a detailed digital forensics process model and the responsible teams to perform it. The discussed model presents three teams and a forensic leader who coordinate between the three teams; these teams are physical crime scene team, laboratory examination team and courtroom team. These teams are responsible of achieving the digital forensic model by applying five main phases which are preparation phase, physical forensics and investigation phase, digital forensics phase, reporting and presentation phase and closure phase.
Most of the existing models in this field are either theoretical that deals with data processing or based on a legal …
Understanding Atomic (Hydrogenic) Orbitals, Part 2, D-Orbitals, Carl W. David
Understanding Atomic (Hydrogenic) Orbitals, Part 2, D-Orbitals, Carl W. David
Chemistry Education Materials
This material extends earlier discussions to the d-orbitals.
Adaptation And Mitigation Strategies In Agriculture: An Analysis Of Potential Synergies, Cynthia Rosenzweig, Francesco Nicola Tubiello
Adaptation And Mitigation Strategies In Agriculture: An Analysis Of Potential Synergies, Cynthia Rosenzweig, Francesco Nicola Tubiello
United States National Aeronautics and Space Administration: Publications
As climate changes due to rising concentrations of greenhouse gases in the atmosphere, agriculture will be one of the key human activities affected. Projections show that while overall global food production in the coming decades may keep pace with the food requirements of a growing world population, climate change might worsen existing regional disparities because it will reduce crop yields mostly in lands located at lower latitudes where many developing countries are situated. Strategies to enhance local adaptation capacity are therefore needed to minimize climatic impacts and to maintain regional stability of food production. At the same time, agriculture as …
Longitudinal Curves For Behaviors Of Children Diagnosed With A Brain Tumor, Huayan Chai
Longitudinal Curves For Behaviors Of Children Diagnosed With A Brain Tumor, Huayan Chai
Mathematics Theses
Change in adaptive outcomes of children who are treated for brain tumors is examined using longitudinal data. The children received different types of treatment from none to any combinations of three treatments, which are surgery, radiation and chemotherapy. In this thesis, we use mixed model to find the significant variables that predict change in outcomes of communication skill, daily living skills and socialization skill. Fractional polynomial transformation method and Gompertz method are applied to build non-linear longitudinal curves. We use PRESS as the criterion to compare these two methods. Comparison analysis shows the effect of each significant variable on adaptive …
New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley
New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley
Annual ADFSL Conference on Digital Forensics, Security and Law
The newly revised Federal Rules of Civil Procedure and developments under the Federal Rules of Evidence have a significant impact on the use, collection, and treatment of digital evidence for legal proceedings. The Rules now formally grant electronic documents and digital evidence the same status as paper and other forms of tangible evidence. As a result, the availability and proper preservation of potentially relevant electronic evidence must be considered, at the very latest, in the preliminary stages of litigation and, at the earliest, as soon as litigation is reasonably anticipated. It is important for professionals to be familiar with the …
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Annual ADFSL Conference on Digital Forensics, Security and Law
When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
Annual ADFSL Conference on Digital Forensics, Security and Law
The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …
The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers
The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers
Annual ADFSL Conference on Digital Forensics, Security and Law
The lack of a graphical representation of all of the principles, processes, and phases necessary to carry out an digital forensic investigation is a key inhibitor to effective education in this newly emerging field of study. Many digital forensic models have been suggested for this purpose but they lack explanatory power as they are merely a collection of lists or one-dimensional figures. This paper presents a new multi-dimensional model, the General Digital Forensics Model (GDFM), that shows the relationships and inter-connectedness of the principles and processes needed within the domain of digital forensics.
Keywords: process model, computer forensics, expert learning, …
Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem
Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper proposes a detailed guideline model for digital forensics; the proposed model consists of five main phases, Preparation phase, Physical Forensics and Investigation Phase, Digital Forensics Phase, Reporting and Presentation Phase, and Closure Phase.
Most of the existing models in this field do not cover all aspects of digital forensic investigations, as they focus mainly on the processing of digital evidence or on the legal points. Although they gave good information to base on it a guide, but they are not detailed enough to describe fully the investigative process in a way that can be used by investigators during …