Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Arts and Humanities (2175)
- Library and Information Science (1964)
- Anthropology (1845)
- Public Affairs, Public Policy and Public Administration (1636)
- Sociology (1619)
-
- Education (1585)
- Communication (1462)
- Archaeological Anthropology (1403)
- Economics (1396)
- Psychology (1360)
- Political Science (1259)
- International and Area Studies (866)
- History (862)
- Law (832)
- Business (822)
- Higher Education (674)
- Medicine and Health Sciences (673)
- Sports Studies (625)
- Physical Sciences and Mathematics (622)
- Life Sciences (570)
- International Relations (500)
- Mass Communication (465)
- Journalism Studies (448)
- Social Work (398)
- Asian Studies (390)
- Public Policy (339)
- Peace and Conflict Studies (333)
- Religion (311)
- East Asian Languages and Societies (298)
- Institution
-
- Selected Works (1385)
- Kenyon College (1257)
- University of Nebraska - Lincoln (897)
- SelectedWorks (720)
- University of Wollongong (575)
-
- Cedarville University (549)
- Western Kentucky University (449)
- Purdue University (341)
- James Madison University (244)
- University of Central Florida (237)
- San Jose State University (214)
- University of Tennessee, Knoxville (200)
- College of the Holy Cross (198)
- Brigham Young University (185)
- Western Michigan University (184)
- Singapore Management University (173)
- Portland State University (159)
- Grand Valley State University (158)
- University of Northern Iowa (149)
- University of Texas at El Paso (147)
- Georgia State University (146)
- Kennesaw State University (145)
- Wright State University (141)
- Population Council (138)
- University of Nevada, Las Vegas (124)
- City University of New York (CUNY) (122)
- Louisiana State University (119)
- Georgia Southern University (115)
- University of Denver (112)
- Wayne State University (112)
- Keyword
-
- Cedarville (528)
- Athletics (520)
- 2008 (215)
- Hearing impaired (161)
- Church work with the deaf -- Catholic Church (160)
-
- Deaf -- Periodicals (160)
- Deaf culture (160)
- Pastoral care of people with disabilities (160)
- Newspaper (139)
- Student newspapers (139)
- Journal (137)
- English (124)
- Future (117)
- Mine Action (115)
- 2008(Vol.40) (111)
- Central Florida Future (111)
- Spartan Daily (111)
- CISR (109)
- Human rights (103)
- Oral History (103)
- Bracero (102)
- Labor History (102)
- University of Texas at El Paso. Institute of Oral History--interviews (102)
- JMU (97)
- Baseball (90)
- ERW (89)
- Newsletter (82)
- Education (80)
- Kentucky (78)
- Student newspaper (76)
- Publication
-
- Four Valleys Archive (1257)
- China Beat Blog: Archive 2008-2012 (287)
- Against the Grain (258)
- Theses and Dissertations (175)
- Electronic Theses and Dissertations (164)
-
- The Journal of Conventional Weapons Destruction (135)
- Faculty Publications (134)
- Masters Theses (125)
- Faculty of Science - Papers (Archive) (122)
- Folklife Archives Finding Aids (121)
- Student Government Association (120)
- Faculty of Commerce - Papers (Archive) (117)
- Central Florida Future (111)
- Spartan Daily (School of Journalism and Mass Communications) (111)
- Global CWD Repository (106)
- Great Plains Quarterly (104)
- Independent Study Project (ISP) Collection (103)
- Theses Digitization Project (103)
- Combined Interviews (102)
- Human Rights & Human Welfare (92)
- Dissertations (90)
- Faculty of Health and Behavioural Sciences - Papers (Archive) (88)
- Georgia Library Quarterly (88)
- Theses, Dissertations, and Projects (88)
- Postville Project Documents (87)
- The Journal of Sociology & Social Welfare (85)
- Reproductive Health (81)
- Faculty of Arts - Papers (Archive) (76)
- Cowles Foundation Discussion Papers (69)
- All Faculty Scholarship (67)
- Publication Type
Articles 13231 - 13260 of 15255
Full-Text Articles in Social and Behavioral Sciences
Multi-Uav Control: An Envisioned World Design Problem, Mona T. Stilson
Multi-Uav Control: An Envisioned World Design Problem, Mona T. Stilson
Browse all Theses and Dissertations
Predator Unmanned Aerial Vehicle assets are in high demand in the theater of operations for supporting the Global War on Terror and this demand is expected to increase. This work involved exploratory case study research into the envisioned world design problem of networked Predator multi-UAV control, as a candidate for meeting higher Predator sortie requirements without the need for a one for one increase in pilots. The concept involves the development of a potential new position for controlling multiple UAVs, called the Multi-Aircraft Manager (MAM). The goal was to analyze work requirements and develop representational models of the structure of …
Women And The Democracy Project: A Feminist Take On Women's Political Participation In The Philippines, Ma. Lourdes Veneracion-Rallonza
Women And The Democracy Project: A Feminist Take On Women's Political Participation In The Philippines, Ma. Lourdes Veneracion-Rallonza
Political Science Department Faculty Publications
No abstract provided.
Spotlight On Construction: Expansion And Renovation Of Georgia Southern University’S Henderson Library Spurred By Quintupling Of Student Body, Ann Hamilton, Mark Holland
Spotlight On Construction: Expansion And Renovation Of Georgia Southern University’S Henderson Library Spurred By Quintupling Of Student Body, Ann Hamilton, Mark Holland
Library Faculty Publications
The article reports on the expansion and renovation of Georgia Southern University's Henderson Library. The Zach S. Henderson Library has been the hub of academic life at Georgia Southern University for more than 30 years. The library has been the focus of an extensive expansion and renovation to help meet the needs of the university's growing student body. The first phase of the $22.75 million project opened on October 1, 2006. The original building included 109,515 square feet of space. The additional building will feature seating on the first, second and third floors and a balcony on the fourth floor …
Who Is Reading The Data On Your Old Computer?, Vivienne Mee
Who Is Reading The Data On Your Old Computer?, Vivienne Mee
Journal of Digital Forensics, Security and Law
Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers. How would you dispose of your old computer, or how would the company you work for dispose of their old computers?
The majority of Irish homeowners, would bring their old computers to local civic amenity centres, give it away to a relative or sell it on to another party.
Some organisations would give their old equipment to a staff member, as a gift gesture, others may simply discard in the local civic amenity site.
What is wrong with the methods currently being …
Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull
Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull
Journal of Digital Forensics, Security and Law
Desktop search applications can contain cached copies of files that were deleted from the file system. Forensic investigators see this as a potential source of evidence, as documents deleted by suspects may still exist in the cache. Whilst there have been attempts at recovering data collected by desktop search applications, there is no methodology governing the process, nor discussion on the most appropriate means to do so. This article seeks to address this issue by developing a process model that can be applied when developing an information extraction application for desktop search applications, discussing preferred methods and the limitations of …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Trends In Virtualized User Environments, Diane Barrett
Trends In Virtualized User Environments, Diane Barrett
Journal of Digital Forensics, Security and Law
Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will explain how …
Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt
Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt
Journal of Digital Forensics, Security and Law
Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.
Data Mining Techniques In Fraud Detection, Rekha Bhowmik
Data Mining Techniques In Fraud Detection, Rekha Bhowmik
Journal of Digital Forensics, Security and Law
The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision treebased algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.
Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland
Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland
Journal of Digital Forensics, Security and Law
The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Remote Forensics May Bring The Next Sea Change In E-Discovery: Are All Networked Computers Now Readily Accessible Under The Revised Federal Rules Of Civil Procedure?, Joseph J. Schwerha, Scott Inch
Remote Forensics May Bring The Next Sea Change In E-Discovery: Are All Networked Computers Now Readily Accessible Under The Revised Federal Rules Of Civil Procedure?, Joseph J. Schwerha, Scott Inch
Journal of Digital Forensics, Security and Law
The recent amendments to Rule 26 of the Federal Rules of Civil Procedure created a two-tiered approach to discovery of electronically stored information (“ESI”). Responding parties must produce ESI that is relevant, not subject to privilege, and reasonably accessible. However, because some methods of storing ESI, such as on magnetic backup tapes and within enormous databases, require substantial cost to access and search their contents, the rules permit parties to designate those repositories as “not reasonably accessible” because of undue burden or cost. But even despite the difficulty in searching for ESI, the party’s duty to preserve potentially responsive evidence …
The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes
The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes
Journal of Digital Forensics, Security and Law
The proper generation and preservation of digital data from Event Data Recorders (EDRs) can provide invaluable evidence to automobile crash reconstruction investigations. However, data collected from the EDR can be difficult to use and authenticate, complicating the presentation of such information as evidence in legal proceedings. Indeed, current techniques for removing and preserving such data do not meet the court’s standards for electronic evidence. Experimentation with an EDR unit from a 2001 GMC Sierra pickup truck highlighted particular issues with repeatability of results. Fortunately, advances in the digital forensics field and memory technology can be applied to EDR analysis in …
An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton
An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton
Journal of Digital Forensics, Security and Law
The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two …
To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea
To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea
Journal of Digital Forensics, Security and Law
In this paper the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. After contacting all state agencies the authors present a distinct grouping organizing state approaches to professional Digital Examiner licensing. The authors conclude that states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.
Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan
Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan
Journal of Digital Forensics, Security and Law
No abstract provided.
Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala
Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala
Journal of Digital Forensics, Security and Law
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …
Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi
Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi
Journal of Digital Forensics, Security and Law
The extraction of the user activity is one of the main goals in the analysis of digital evidence. In this paper we present a methodology for extracting this activity by comparing multiple Restore Points found in the Windows XP operating system. The registry copies represent a snapshot of the state of the system at a certain point in time. Differences between them can reveal user activity from one instant to another. The algorithms for comparing the hives and interpreting the results are of high complexity. We develop an approach that takes into account the nature of the investigation and the …
Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran
Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran
Journal of Digital Forensics, Security and Law
Both SMS and MMS data analysis is an important factor in mobile forensic analysis. Author did not find any mobile forensic tool that is capable of extracting short messages (SMS) and multimedia messages (MMS) from Palm Treo 750. SMS file of Palm Treo 750 is called PalmMgeV001 and it is a proprietary file system. A research work done to find a method to recover SMS data from PalmMsgV001 file. This paper is going to describe the research work and its findings. This paper also discusses a methodology that will help recover SMS data from PalmMsgV001. The PalmMsgV001 file is analysed …
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Journal of Digital Forensics, Security and Law
Apple's hold on the personal computer marketplace started dwindling on August 12, 1981, the day that the IBM PC was introduced. As an Apple ][+ bigot myself, I refused to touch a PC for some years. But I was also a command line bigot, so when the first Macintosh was introduced in 1983 and hermetically sealed the operating system from users, I did not go out and buy one. In fact, like many of my era, I did eventually end up on the PC side which, ironically, let me do many of the things that my trusty Apple ][+ had …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Debate '08 Programming Schedule, Belmont University
Debate '08 Programming Schedule, Belmont University
Debate '08
Schedule for the extensive amount of programming Belmont University put together as part of their "Art Of Being Free" campus theme. The initiative dovetailed with the Town Hall Presidential Debate hosted by Belmont University on October 7, 2008.
Latino Representation In U.S. Legislatures: Interests, Behavior, And Influence, Stella M. Rouse
Latino Representation In U.S. Legislatures: Interests, Behavior, And Influence, Stella M. Rouse
LSU Doctoral Dissertations
Despite the growth of Latinos in the general population and in legislatures, their impact on the political process has received little scholarly attention. In this project, I present a theoretical framework of Latino legislative behavior that draws upon two important concepts of representation- descriptive and substantive- to better understand how ethnicity influences legislative activity and whether it is dependent on such factors as institutional context, legislative composition, and constituency characteristics. The project is unique in its comprehensive analysis of the legislative process and in its mixed methodological approach which includes both quantitative and qualitative elements. The analysis involves five parts: …
Love-Variant: The Wakin-Vo I. D. R. Model Of Limerence, Albert H. Wakin, Duyen B. Vo
Love-Variant: The Wakin-Vo I. D. R. Model Of Limerence, Albert H. Wakin, Duyen B. Vo
Psychology Faculty Publications
The purpose of the current paper is to 1) propose the Wakin-Vo I.D.R model of limerence and 2) establish grounds for the scientific query of limerence. Limerence is an involuntary interpersonal state that involves intrusive, obsessive, and compulsive thoughts, feelings, and behaviors that are contingent on perceived emotional reciprocation from the object of interest. The model that the authors propose holds that although limerence resembles normative love, it is a state that is necessarily negative, problematic, and impairing, with clinical implications. The model frames limerence as consisting of three functional components: initiating force, driving forces, and resultant forces. Parallels between …
Iowa Academy Of Science: The New Bulletin, V04n4, Winter 2008, Iowa Academy Of Science
Iowa Academy Of Science: The New Bulletin, V04n4, Winter 2008, Iowa Academy Of Science
New Bulletin
Inside This Issue:
--Message from the Executive Director
--IAS NWR Website
--Science: Our Past and Future
--Iowa Academy of Science Fellows
--IAS Board Retreat
--Announcements, Events & Deadlines
--Spotlight on Des Moines University
--Iowa Academy of Science Membership Overview
--ISTJ—Practical Science Education Applications from Iowans to the World
Understanding Gender Stereotypes And Their Impact On Clients, Stacey Hurt
Understanding Gender Stereotypes And Their Impact On Clients, Stacey Hurt
Graduate Research Papers
Gender stereotyping has a complex and enduring history in our society, and it is an underlying factor in many issues – clients bring to counseling, including – among other things-women's and men's experience of depression (Nugent & Jones, 2005). A complicating aspect of gender stereotyping is that both males and females in our culture have been socially conditioned to fulfill many of the stereotypes imposed on them, and following stereotypical gender roles excessively can be harmful to their mental health, self-image, and interpersonal relationships (Nugent & Jones).
Counselors can use gender-role analysis and other interventions to help clients gain insight …
Ua95/1 Glasgow Normal School Publications, Wku Archives
Ua95/1 Glasgow Normal School Publications, Wku Archives
WKU Archives Collection Inventories
Publications created by and about the Glasgow Normal School. The series includes the first catalog, a pamphlet and James Cornette's history of the school.
Crisis Rhetoric : A Theory Of Communication In Times Of Crisis, Eric D. Loepp
Crisis Rhetoric : A Theory Of Communication In Times Of Crisis, Eric D. Loepp
Honors Theses
We conducted an experiment to assess the effect of presidential rhetoric in a time of crisis. Our study was based in part on terror management theory, which posits that subtle reminders of death (mortality salience) lead to increased support of leaders an authority figures. Subjects were randomly placed in either a mortality salient condition or control condition. We also composed two speeches - one charismatic and one non-charismatic - and subjects were randomly assigned to hear one of the two. Based on elements of terror management theory, we hypothesized that in a time of crisis the charismatic speech would be …
The Interaction Of Nuclear Fiction And Leadership Studies, Kathryn Elberson
The Interaction Of Nuclear Fiction And Leadership Studies, Kathryn Elberson
Honors Theses
This project is not solely a commentary on leadership studies, nor is its significance exclusive to the field of English. Rather, it is an effort to unite the two fields in a way that offers valuable contributions to both areas of study while pointing out the necessity of further interaction between the topics of leadership and literature. The few works which are traditionally regarded as having something to contribute to leadership studies are those which are either included in the canon of English literature, or those which directly demonstrate a leader-follower relationship and have a particular lesson to teach about …
The Impact Of The Common Agricultural Policy On Agricultural Productivity, Flemming Schneider Rhode
The Impact Of The Common Agricultural Policy On Agricultural Productivity, Flemming Schneider Rhode
Honors Theses
In 2004 10 new countries, primarily Eastern European countries, joined the European Union (EU) with much media speculation concerning how this would affect their economies. This paper will look at how the Common Agricultural Program (CAP) affects agricultural productivity by measuring four independent variables and by using the 2004 entry as a natural experiment. The paper will estimate how the CAP affects the average farm size, fallow land area, proportion of farming dedicated to organic farming, and GOP growth. This is expected to impact agricultural productivity through increasing returns to scale, input availability, efficiency of land use and the Environmental …