Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 9211 - 9240 of 10745

Full-Text Articles in Social and Behavioral Sciences

The Socioeconomic Landscape Of Northern Delaware’S Taverns And Innkeepers: The Blue Ball Tavern And Vicinity, Heather A. Wholey Jan 2006

The Socioeconomic Landscape Of Northern Delaware’S Taverns And Innkeepers: The Blue Ball Tavern And Vicinity, Heather A. Wholey

Anthropology & Sociology Faculty Publications

No abstract provided.


Recent Advances In The Study Of Development, Social And Personal Experience, And Psychopathology, William M. Bukowski, Ryan E. Adams, Jonathan Bruce Santo Jan 2006

Recent Advances In The Study Of Development, Social And Personal Experience, And Psychopathology, William M. Bukowski, Ryan E. Adams, Jonathan Bruce Santo

Psychology Faculty Publications

The field of developmental psychopathology has been challenged by various issues in understanding the link between social experiences and psychopathology. These challenges involve conceptual, methodological and statistical concerns that are often interrelated. This article examines four advances in resolving these concerns. First, co-rumination and deviancy training are discussed as specific interpersonal processes that are examples of important social experiences for predicting psychopathology. Second, dynamic properties of dyadic interaction are discussed as one of the recent advances in methodology for this area. Third, the Actor-Partner Interdependence Model is outlined as one of the recent statistical advances in the study of individuals …


Parent-Adolescent Involvement: The Relative Influence Of Parent Gender And Residence, Daniel Hawkins, Paul R. Amato, Valarie King Jan 2006

Parent-Adolescent Involvement: The Relative Influence Of Parent Gender And Residence, Daniel Hawkins, Paul R. Amato, Valarie King

Sociology and Anthropology Faculty Publications

The 1995 wave of the Add Health study is used to investigate the relative influence of parent gender and residence on patterns of parental involvement with adolescents. Adolescent reports (N = 17,330) of shared activities, shared communication, and relationship quality with both biological parents are utilized. A multidimensional scaling analysis reveals that parent gender explains most of the variance in parent-adolescent involvement, with residential status playing a secondary yet fundamental role in accounting for these patterns. Resident mothers who do not live with adolescents’ biological fathers engage in the broadest range of activities with their children. Unpartnered resident fathers display …


Final Report Of The Maldivian Penal Law & Sentencing Codification Project: Text Of Draft Code (Volume 1) And Official Commentary (Volume 2), Paul H. Robinson, Criminal Law Research Group -- University Of Pennsylvania Jan 2006

Final Report Of The Maldivian Penal Law & Sentencing Codification Project: Text Of Draft Code (Volume 1) And Official Commentary (Volume 2), Paul H. Robinson, Criminal Law Research Group -- University Of Pennsylvania

All Faculty Scholarship

The United Nations Development Programme and the Government of the Maldives commissioned the drafting of a penal code based upon existing Maldivian law, which meant primarily a codification of Shari'a. This is the Final Report of that codification project. A description of the process that produced this Report and the drafting principles behind it, as well as a discussion of the special challenges of codifying Islamic criminal law, are contained in an article at http://ssrn.com/abstract=941443.


Network Neutrality And The Economics Of Congestion, Christopher S. Yoo Jan 2006

Network Neutrality And The Economics Of Congestion, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Meta-Blackmail And The Evidentiary Theory: Still Taking Motives Seriously, Mitchell N. Berman Jan 2006

Meta-Blackmail And The Evidentiary Theory: Still Taking Motives Seriously, Mitchell N. Berman

All Faculty Scholarship

For generations, criminal law theorists, moral and political philosophers, and economists have struggled to resolve one of the law's great puzzles: whether, why, and under what circumstances the law should criminalize the conditional threat to do what is lawful. This is the so-called paradox of blackmail. Although libertarians have insisted that blackmail should be lawful, most commentators agree that at least some forms of blackmail are properly criminalized, disagreeing over the proper rationale. In his provocative article, Meta-blackmail, Russell Christopher presents a wholly novel argument in support of the libertarian conclusion. Christopher's argument relies upon the imaginary device of a …


Interactive Effects Of Feedback Type And Feedback Propensities On Task Performance, Kristin M. Delgado Jan 2006

Interactive Effects Of Feedback Type And Feedback Propensities On Task Performance, Kristin M. Delgado

Browse all Theses and Dissertations

The purpose of the present study was to examine the effects of feedback types (i.e., outcome, process, and task feedback), feedback propensities, and their interactions on task performance in an attempt to determine, first, which types of feedback produced better task performance and, second, how feedback propensities influenced relationships between feedback type and performance. Process feedback and task feedback were expected to interact in their effects on task performance. In addition, I predicted that external feedback propensity would moderate the effects of process feedback on performance and initial task performance would moderate the effects of internal feedback propensity on task …


'Science Of Trivalency', Kwaku L. Carlisle Woods Rn Md Metd1, Dr. Kwaku L Carlisle Woods Rn Md Metd1 Jan 2006

'Science Of Trivalency', Kwaku L. Carlisle Woods Rn Md Metd1, Dr. Kwaku L Carlisle Woods Rn Md Metd1

Walden Faculty and Staff Publications

Due to mine cross cultural living, (I was born in the U.S. but grew in Southeast Asia), I became very interested in the Anthological, Social and Scientific difference between cultures. This led to a historical meta evaluation of humanity in general. Using the principals of Noetic Science, this evaluation reviled the ignorance and down right absence of any educational opportunities to learn the true functional abilities of mankind.


Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka Jan 2006

Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka

Journal of Digital Forensics, Security and Law

Most organizations and government agencies regularly become engaged in litigation with suppliers, customers, clients, employees, competitors, shareholders, prosecutors or regulatory agencies that nearly assures the need to organize, retain, find and produce business records and correspondence, emails, accounting records or other data relevant to disputed issues. This article discusses some high visibility cases that constrain how metadata and content is routinely made available to opposing parties in civil litigation, to prosecutors in criminal prosecutions and to agency staff in regulatory enforcement litigation. Public policy, as implemented in the rules of evidence and pretrial discovery, restrict electronic data discovery (EDD) as …


Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz Jan 2006

Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz

Journal of Digital Forensics, Security and Law

This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept.


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier Jan 2006

Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier

Journal of Digital Forensics, Security and Law

Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.

The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …


Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota Jan 2006

Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota

Journal of Digital Forensics, Security and Law

With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …


Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers Jan 2006

Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers

Journal of Digital Forensics, Security and Law

Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous. Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper …


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen Jan 2006

Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen

Journal of Digital Forensics, Security and Law

One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …


The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas Jan 2006

The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas

Journal of Digital Forensics, Security and Law

All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers. A large proportion of families and individuals in their homes now also use personal computers and, both intentionally and inadvertently, often store on those computers personal information. It is clear that most organisations and individuals continue to be unaware of the information that may be stored on the hard disks that the computers contain, and have not considered what may happen to the information after the disposal of the equipment.

In …


A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli Jan 2006

A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli

Journal of Digital Forensics, Security and Law

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to …


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns Jan 2006

A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation of financial reporting and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, internal and external auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs and instruction in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity – is limited. Only a few university-level …


The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox Jan 2006

The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox

Journal of Digital Forensics, Security and Law

The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …


Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl Jan 2006

Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl

Journal of Digital Forensics, Security and Law

Forensic Computing is a new and quickly developing field. It is in the process of becoming an academic discipline or sub-discipline with all the features from full undergraduate and postgraduate course provision to conferences and journals. An important question in this process of turning into an established discipline is whether it will coincide with the recognition of the graduates as professionals. This paper hopes to stimulate the debate as to whether forensic computing is or should be a discipline. In order to approach this question, the paper will discuss the concept of forensic computing including the most salient topics of …


Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler Jan 2006

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the first Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Table Of Contents Jan 2006

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Talking To Scholars = Scholarly Communication, James A. Van Fleet, K Mcquiston, D Thompson, J Zebrowski Jan 2006

Talking To Scholars = Scholarly Communication, James A. Van Fleet, K Mcquiston, D Thompson, J Zebrowski

Faculty Conference Papers and Presentations

No abstract provided.


Iowa Academy Of Science: The New Bulletin, V02n1, Winter 2006, Iowa Academy Of Science Jan 2006

Iowa Academy Of Science: The New Bulletin, V02n1, Winter 2006, Iowa Academy Of Science

New Bulletin

Inside This Issue:

--Message from the Executive Director

--Pare Lorentz Award for Iowa Documentary

--118th Iowa Academy of Science Annual Meeting

--Iowa Summit on Mathematics, Science, and Technology Education

--Iowa Science Teachers Journal

--Considering Reorganizing the IAS Sections

--GLOBE ONE

--Grants & Award Program Announcements

--IAS Honors New Fellows

--Now Accepting 2006 Fellows Nominations


Cisg Article 31: When Substantive Law Rules Affect Jurisdictional Results, Ronald A. Brand Jan 2006

Cisg Article 31: When Substantive Law Rules Affect Jurisdictional Results, Ronald A. Brand

Articles

No abstract provided.


Social Software, Groups, And Governance, Michael J. Madison Jan 2006

Social Software, Groups, And Governance, Michael J. Madison

Articles

Formal groups play an important role in the law. Informal groups largely lie outside it. Should the law be more attentive to informal groups? The paper argues that this and related questions are appearing more frequently as a number of computer technologies, which I collect under the heading social software, increase the salience of groups. In turn, that salience raises important questions about both the significance and the benefits of informal groups. The paper suggests that there may be important social benefits associated with informal groups, and that the law should move towards a framework for encouraging and recognizing them. …


The Idea Of The Law Review: Scholarship, Prestige, And Open Access, Michael J. Madison Jan 2006

The Idea Of The Law Review: Scholarship, Prestige, And Open Access, Michael J. Madison

Articles

This Essay was written as part of a Symposium on open access publishing for legal scholarship. It makes the claim that open access publishing models will succeed, or not, to the extent that they account for the existing economy of prestige that drives law reviews and legal scholarship. What may seem like a lot of uncharitable commentary is intended instead as an expression of guarded optimism: Imaginative reuse of some existing tools of scholarly publishing (even by some marginalized members of the prestige economy - or perhaps especially by them) may facilitate the emergence of a viable open access norm.


Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison Jan 2006

Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison

Articles

This Article is a contribution to a Symposium that focuses on the ideas of Margaret Jane Radin as a point of departure, and particularly on her analyses of propertization and commodification. While Radin focuses on the harms associated with commodification of the person, relying on Hegel's idea of alienation, we argue that objectification, and in particular objectification of various features of the digital environment, may have important system benefits. We present an extended critique of Radin's analysis, basing the critique in part on Gadamer's argument that meaning and application are interrelated and that meaning changes with application. Central to this …