Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Arts and Humanities (2903)
- Library and Information Science (2849)
- Sociology (2763)
- Public Affairs, Public Policy and Public Administration (2474)
- Psychology (2411)
-
- Communication (2236)
- Education (2183)
- Economics (2173)
- Political Science (1492)
- Business (1353)
- Medicine and Health Sciences (1284)
- Law (1177)
- Physical Sciences and Mathematics (918)
- International and Area Studies (916)
- Anthropology (890)
- History (801)
- Life Sciences (767)
- Higher Education (741)
- Journalism Studies (684)
- Sports Studies (637)
- Social Work (533)
- International Relations (529)
- Urban Studies and Planning (514)
- Mass Communication (485)
- Public Policy (454)
- Family, Life Course, and Society (452)
- Public Health (436)
- Religion (419)
- Geography (404)
- Institution
-
- Selected Works (2794)
- SelectedWorks (1073)
- University of Nebraska - Lincoln (775)
- University of Wollongong (642)
- Cedarville University (528)
-
- Purdue University (484)
- University of South Florida (321)
- Singapore Management University (310)
- Western Kentucky University (282)
- University of Tennessee, Knoxville (279)
- University of Nevada, Las Vegas (276)
- San Jose State University (257)
- SIT Graduate Institute/SIT Study Abroad (232)
- Brigham Young University (227)
- Grand Valley State University (208)
- University of Central Florida (203)
- College of the Holy Cross (198)
- Portland State University (197)
- University of Denver (197)
- Georgia State University (192)
- Wayne State University (192)
- Western University (186)
- University of Kentucky (185)
- City University of New York (CUNY) (181)
- James Madison University (176)
- Wright State University (174)
- Western Michigan University (172)
- Syracuse University (169)
- California Polytechnic State University, San Luis Obispo (163)
- Nova Southeastern University (153)
- Keyword
-
- Cedarville (511)
- Athletics (507)
- Church work with the deaf -- Catholic Church (167)
- Deaf -- Periodicals (167)
- Deaf culture (167)
-
- Hearing impaired (167)
- Pastoral care of people with disabilities (167)
- Education (155)
- 2011 (153)
- Psychology (145)
- Gender (137)
- Student newspaper (135)
- Newspaper (126)
- Development (114)
- English (114)
- Spartan Daily (109)
- Leadership (107)
- Baseball (105)
- Journal (102)
- Syllabus, syllabi, journalism, communication, media, strategic media (102)
- Western Kentucky University (98)
- Georgia Southern University (93)
- Culture (92)
- Mine Action (92)
- Communication (91)
- Women (90)
- CISR (89)
- Human rights (89)
- Softball (88)
- Economics (86)
- Publication
-
- Against the Grain (297)
- Electronic Theses and Dissertations (266)
- Theses and Dissertations (226)
- Library Philosophy and Practice (e-journal) (199)
- Independent Study Project (ISP) Collection (185)
-
- Faculty Publications (162)
- Dissertations (156)
- USF Tampa Graduate Theses and Dissertations (139)
- Honors Theses (120)
- Faculty of Science - Papers (Archive) (118)
- Walden Dissertations and Doctoral Studies (117)
- The Qualitative Report (114)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (113)
- Spartan Daily (School of Journalism and Mass Communications) (109)
- Faculty of Health and Behavioural Sciences - Papers (Archive) (107)
- Theses, Dissertations, and Projects (105)
- Journalism and Strategic Media Syllabi (102)
- Masters Theses (100)
- Publications and Research (100)
- The Journal of Conventional Weapons Destruction (100)
- Theses Digitization Project (96)
- Master's Theses (94)
- University Libraries News Online (2008-2023) (92)
- China Beat Blog: Archive 2008-2012 (91)
- Faculty of Social Sciences - Papers (Archive) (90)
- Faculty of Engineering and Information Sciences - Papers: Part A (86)
- Poverty, Gender, and Youth (86)
- CLCWeb: Comparative Literature and Culture (85)
- Cowles Foundation Discussion Papers (85)
- Psychology Faculty Publications (83)
- Publication Type
Articles 16591 - 16620 of 19543
Full-Text Articles in Social and Behavioral Sciences
A Case Study In Forensic Analysis Of Control, Fred Cohen
A Case Study In Forensic Analysis Of Control, Fred Cohen
Journal of Digital Forensics, Security and Law
This paper describes a case study in which a method for forensic analysis of control was applied to resolve probative technical issues in a legal action. It describes one instance in which the analysis was successfully applied without challenge, addresses the details of most of the different facets of the analysis method, and demonstrates how such analysis provides a systematic approach to using technical methods to address legal issues as a case study.
Judges’ Awareness, Understanding, And Application Of Digital Evidence, Gary C. Kessler
Judges’ Awareness, Understanding, And Application Of Digital Evidence, Gary C. Kessler
Journal of Digital Forensics, Security and Law
As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges’ relationship with digital evidence. This paper describes a recent study, using grounded theory methods, into judges’ awareness, knowledge, and perceptions of digital evidence. This study is the …
Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte
Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte
Journal of Digital Forensics, Security and Law
As Digital Forensics practitioners, we know that our discipline is constantly evolving. Keeping abreast means we need to continually refine and broaden our knowledge pools through experience, education, research, peer exchange, and more. Mobile device forensics can be especially dynamic and challenging. With multiple standards in place at the hardware, operating system, and user interface levels, it can be daunting to preserve, analyze, search and report on these tiny yet ubiquitous hand-held computers. Apple Computer’s line of mobile products (iOS devices - iPhone, iPad, iPod Touch) is no exception to this rule.
Technology Corner: Internet Packet Sniffers, Nick V. Flor, Kenneth Guillory
Technology Corner: Internet Packet Sniffers, Nick V. Flor, Kenneth Guillory
Journal of Digital Forensics, Security and Law
The best way to understand an internet packet sniffer, hereafter “packet sniffer”, is by analogy with a wiretap. A wiretap is a piece of hardware that allows a person to eavesdrop on phone conversations over a telephone network. Similarly, a packet sniffer is a piece of software that allows a person to eavesdrop on computer communications over the internet. A packet sniffer can be used as a diagnostic tool by network administrators or as a spying tool by hackers who can use it to steal passwords and other private information from computer users. Whether you are a network administrator or …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Column: Every Last Byte, Simson Garfinkel
Column: Every Last Byte, Simson Garfinkel
Journal of Digital Forensics, Security and Law
Inheritance powder is the name that was given to poisons, especially arsenic, that were commonly used in the 17th and early 18th centuries to hasten the death of the elderly. For most of the 17th century, arsenic was deadly but undetectable, making it nearly impossible to prove that someone had been poisoned. The first arsenic test produced a gas—hardly something that a scientist could show to a judge. Faced with a growing epidemic of poisonings, doctors and chemists spent decades searching for something better
Kindle Forensics: Acquisition & Analysis, Peter Hannay
Kindle Forensics: Acquisition & Analysis, Peter Hannay
Journal of Digital Forensics, Security and Law
The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.
Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker, Stephen P. Danese
Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker, Stephen P. Danese
Journal of Digital Forensics, Security and Law
Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as …
Technology Corner: Analysing E-Mail Headers For Forensic Investigation, M. T. Banday
Technology Corner: Analysing E-Mail Headers For Forensic Investigation, M. T. Banday
Journal of Digital Forensics, Security and Law
Electronic Mail (E-Mail), which is one of the most widely used applications of Internet, has become a global communication infrastructure service. However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions. A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Column: The Consortium Of Digital Forensics Specialists (Cdfs), Christopher Kelly
Column: The Consortium Of Digital Forensics Specialists (Cdfs), Christopher Kelly
Journal of Digital Forensics, Security and Law
Digital forensic practitioners are faced with an extraordinary opportunity. In fact, we may never again be faced with such an opportunity, and this opportunity will challenge us in ways we may never again be challenged. At this point in the history of the Digital Forensics profession, digital forensic specialists have the unique opportunity to help this profession emerge from its infancy. But for this profession to mature -- and to flourish -- individuals and organizations integral to the practice must assemble and shape its future. This is our opportunity. In fact, this is our mandate.
Column: The Physics Of Digital Information, Fred Cohen
Column: The Physics Of Digital Information, Fred Cohen
Journal of Digital Forensics, Security and Law
No abstract provided.
Analysis Of Data Remaining On Second Hand Adsl Routers, Patryk Szewczyk
Analysis Of Data Remaining On Second Hand Adsl Routers, Patryk Szewczyk
Journal of Digital Forensics, Security and Law
In theory, an ADSL router can provide an additional layer of security to a wired and wireless network through; access control, wireless encryption, firewall rule sets, and network event logging. An ADSL router may also contain the users’ usage habits and broadband account credentials. However, end-users may be unaware of the intricacies of the security measures available and the potentially confidential information stored on their device. As a result a second hand ADSL router may contain a wealth of user-specific information if not wiped and disposed of in a secure manner. This paper shows the data that was acquired from …
Exploring The Iphone Backup Made By Itunes, Mario Piccinelli, Paolo Gubian
Exploring The Iphone Backup Made By Itunes, Mario Piccinelli, Paolo Gubian
Journal of Digital Forensics, Security and Law
Apple’s™ iPhone™ is one of the widest selling mobile on the market, thanks to its simple and user-friendly interface and ever growing pool of available high quality applications for both personal and business use. The increasing use of the iPhone leads forensics practitioners towards the need for tools to access and analyze the information stored in the device. This research aims at describing the process to forensically analyze a logical backup of an iPhone made by the Apple iTunes™ utility, understanding the backup’s structure, and creating a simple tool to automate the process of decoding and analyzing the data. In …
A Survey Of Contemporary Enterprise Storage Technologies From A Digital Forensics Perspective, Gregory H. Carlton, Joseph Matsumoto
A Survey Of Contemporary Enterprise Storage Technologies From A Digital Forensics Perspective, Gregory H. Carlton, Joseph Matsumoto
Journal of Digital Forensics, Security and Law
As the proliferation of digital computational systems continue to expand, increasingly complex technologies emerge, including those regarding large, enterprise-wide, information storage and retrieval systems. Within this study, we examine four contemporary enterprise storage technologies. Our examination of these technologies is presented with an overview of the technological features of each offering and then followed with a discussion of the impact of these technologies on digital forensics methods, particularly regarding forensic data acquisition. We offer a general opinion concerning a recommended data acquisition method when faced with the task of obtaining a forensic image of data contained within these technologies, we …
Technology Corner: Brute Force Password Generation -- Basic Iterative And Recursive Algorithms, Nick V. Flor, Haile Shannon
Technology Corner: Brute Force Password Generation -- Basic Iterative And Recursive Algorithms, Nick V. Flor, Haile Shannon
Journal of Digital Forensics, Security and Law
Most information systems are secured at minimum by some form of password protection. For various reasons a password may be unavailable, requiring some form of password recovery procedure. One such procedure is software-based automated password recovery, where a program attempts to log into a system by repeatedly trying different password combinations. At the core of such software is a password generator. This article describes the basic iterative and recursive algorithms for generating all possible passwords of a given length, which is commonly referred to as brute-force password generation. The paper ends with a discussion of alternative password recovery procedures one …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Column: File Cabinet Forensics, Simson Garfinkel
Column: File Cabinet Forensics, Simson Garfinkel
Journal of Digital Forensics, Security and Law
Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face. Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and phones) to the commercial market. These artifacts are bought and used by billions. Some have evil intent, and (if society is lucky), the computers end up in the hands of law enforcement. Unfortunately the …
Legal Issues Regarding Digital Forensic Examiners Third Party Consent To Search, Thomas Lonardo, Doug White, Tricia P. Martland, Alan Rea
Legal Issues Regarding Digital Forensic Examiners Third Party Consent To Search, Thomas Lonardo, Doug White, Tricia P. Martland, Alan Rea
Journal of Digital Forensics, Security and Law
This paper focuses on Federal law as it relates to consent to search relating to Fourth Amendment privacy in the practice of Digital Forensics. In particular, Digital Examiners should be aware of how decisions in Federal Court may impact their ability to acquire evidence in both civil and criminal settings. Digital Forensics, being a relatively new field, is particularly subject to change as cases and appeals are decided. This paper provides an overview of relevant case law relating to issues in Digital Forensics. More importantly, our research provides Digital Forensic Examiners (DFE), as defined by Lonardo, White, and Rea (2008, …
Book Review: Iphone And Ios Forensics: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Christopher Schulte
Book Review: Iphone And Ios Forensics: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Christopher Schulte
Journal of Digital Forensics, Security and Law
These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV) space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate …
Technology Corner: Virtual Crime Scene Reconstruction: The Basics Of 3d Modeling, Nick V. Flor
Technology Corner: Virtual Crime Scene Reconstruction: The Basics Of 3d Modeling, Nick V. Flor
Journal of Digital Forensics, Security and Law
Digital crime scenes take place in the context of physical crime scenes. Virtual crime scene reconstruction is an activity where investigators create a 3- dimensional (3-D) model of an actual crime scene for the purpose of determining the events that lead to the crime. While virtual crime scene reconstruction is currently used for analyzing physical scenes, it can also help investigators visualize and explore ways digital media could have been used to perpetrate a crime. In this technology corner we explore one of the technologies underlying virtual crime scene reconstruction: 3-D modeling.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Mobile Goes Global: The Effect Of Cell Phones On Economic Growth And Development, Tracy Lum
Mobile Goes Global: The Effect Of Cell Phones On Economic Growth And Development, Tracy Lum
Honors Theses
This study investigates the effect of cell phones on economic development and growth by performing an econometric analysis using data from the International Telecommunications Union and the Penn World Table. It discusses the various ways cell phones can make markets more efficient and how the diffusion of information andknowledge plays into development. Several approaches (OLS, Fixed Effects, 2SLS) were used to test over 20 econometric models. Overall, the mobile cellular subscriptions rate was found to have a positive and significant impact on countries’ level of real per capitaGDP and GDP growth rate. Furthermore, the study provides policy implications for the …
A Vegetation Reconstruction Of Union County, Pennsylvania During The Early Historical Period (1755-1855), Nick Gonsalves
A Vegetation Reconstruction Of Union County, Pennsylvania During The Early Historical Period (1755-1855), Nick Gonsalves
Honors Theses
This thesis assesses relationships between vegetation and topography and the impact of human tree-cutting on the vegetation of Union County during the early historical era (1755-1855). I use early warrant maps and forestry maps from the Pennsylvania historical archives and a warrantee map from the Union County courthouse depicting the distribution of witness trees and non-tree surveyed markers (posts and stones) in early European settlement land surveys to reconstruct the vegetation and compare vegetation by broad scale (mountains and valleys) and local scale (topographic classes with mountains and valleys) topography. I calculated marker density based on 2 km x 2 …
Gender Differences In Emotional Responses To Hooking Up, Kelsey Malone
Gender Differences In Emotional Responses To Hooking Up, Kelsey Malone
Honors Theses
The present research looked to explore the relationship between the emotional responses of college students to different hooking up behaviors. Seven hundred and nine undergraduates participated in a web-based survey that included a demographic questionnaire, SDS, PANAS, AUDIT, and a measure of hooking up. This measure examined the frequency with which they participated in eight different types of hooking up varying by degree of familiarity to their hook partner and whether or not the hook up was coital or non-coital, as well as their emotional responses to the behavior and their perception of the emotional responses of their partner. Results …
Identifying The Negative Stigma Associated With Having A Learning Disability, Kelsey Lisle
Identifying The Negative Stigma Associated With Having A Learning Disability, Kelsey Lisle
Honors Theses
Those with learning disabilities (LDs) can be characterized as a minority group, and like most groups of minorities they face a distinct stigma by the larger population. While there iscurrently a lack of research in understanding LD stigma, it has become increasingly important given the push for inclusive classrooms settings. In this study it was hypothesized that regardlessof a participants’ gender, when participants were given a hypothetical description of a person that included information indicating that the individual has a LD, the participants would rate that individual less favorably. Results were consistent with the hypothesis. Participants perceived the hypothetical LD …
The Tea Party And Social Movements, David Palmer
The Tea Party And Social Movements, David Palmer
Honors Theses
The recent rise of the Tea Party movement has added a new dimension to our discussion of domestic politics. The main question is: what effect will the Tea Party have on the political landscape? The best way to answer this question is to place the Tea Party in historical and theoretical context, in order to discuss what type of social movement the Tea Party is and what impact it might have. To this end, I will define and discuss the two major literatures in socialmovement theory: Issue Evolution and Political Process theory. This theoretical framework will provide the basis for …
Lexical Development In Adult Beginning Second Language Learners, Angela Chouinard
Lexical Development In Adult Beginning Second Language Learners, Angela Chouinard
Honors Theses
This research tests the hypothesis that knowledge of derivational morphology facilitates vocabulary acquisition in beginning adult second language learners. Participants were mono-lingual English-speaking college students aged 18 years and older enrolled inintroductory Spanish courses. Knowledge of Spanish derivational morphology was tested through the use of a forced-choice translation task. Spanish lexical knowledge was measured by a translation task using direct translation (English word) primes and conceptual (picture) primes. A 2x2x2 mixed factor ANOVA examined the relationships between morphological knowledge (strong, moderate), error type (form-based, conceptual), and prime type (direct translation, picture). The results are consistent with the existence of a …
Do College Women Facilitate The Sexual Assault Of Their Same-Gender Peers?, Allyson Hopper
Do College Women Facilitate The Sexual Assault Of Their Same-Gender Peers?, Allyson Hopper
Honors Theses
National studies indicate that approximately 25 percent of women have been sexually assaulted by the time they finish college. Although male peers are often the perpetrators, women also engage in behaviors with their female peers that may increase the risk of sexualassault. In the present study, we sought to determine how often college women engaged in these behaviors (i.e. “female facilitation”). Participants were 373 female students (sophomorethrough senior; Greek and independent) who completed an online survey containing measures of sexual assault, alcohol consumption, and female facilitation. The female facilitation measure indexed both “facilitator” behaviors (those directed toward others thatlikely increase …
Levels-Of-Processing Effects On "Remember" Responses In Recognition For Familiar And Unfamiliar Tunes, Esra Mungan, Zehra F. Peynircioğlu, Andrea R. Halpern
Levels-Of-Processing Effects On "Remember" Responses In Recognition For Familiar And Unfamiliar Tunes, Esra Mungan, Zehra F. Peynircioğlu, Andrea R. Halpern
Faculty Journal Articles
We investigated the effect of level-of-processing manipulations on "remember" and "know" responses in episodic melody recognition (Experiments 1 and 2) and how this effect is modulated by item familiarity (Experiment 2). In Experiment 1, participants performed 2 conceptual and 2 perceptual orienting tasks while listening to familiar melodies: judging the mood, continuing the tune, tracing the pitch contour, and counting long notes. The conceptual mood task led to higher d' rates for "remember" but not "know" responses. In Experiment 2, participants either judged the mood or counted long notes of tunes with high and low familiarity. A level-of-processing effect emerged …