Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 20371 - 20400 of 23314

Full-Text Articles in Social and Behavioral Sciences

Review Of Who We Are Hispanics, 2nd Edition. Ed. By The New Strategist Editors, Rebecca Tolley Jan 2012

Review Of Who We Are Hispanics, 2nd Edition. Ed. By The New Strategist Editors, Rebecca Tolley

ETSU Faculty Works

Review of Review of Who We Are Hispanics. New Strategist. 2011. 3v, 9781935775331, 9781935773317, 9781935775355, $120.00


The Neuroanatomical Functions Of Tourette Syndrome And A Treatment Analysis, Kacie L. Curd Jan 2012

The Neuroanatomical Functions Of Tourette Syndrome And A Treatment Analysis, Kacie L. Curd

CMC Senior Theses

The etiology of Tourette syndrome has been elusive for researchers ever since its discovery, making treatment especially difficult. After proving the disorder was organic in the second half of the 20th century, researchers have been creating theories of the underlying neural basis for Tourette’s symptomatology. These theories include abnormalities in brain structure, dysregulation of the dopamine system, dysregulation of the serotonin system and overall neurotransmitter system interactions. The etiology is likely a complex combination of all of these. Treatments for this disorder include pharmacological, behavioral and surgical. I believe the best approach for treatment is behavioral first, followed by …


What Must We Hide: The Ethics Of Privacy And The Ethos Of Disclosure, Anita L. Allen Jan 2012

What Must We Hide: The Ethics Of Privacy And The Ethos Of Disclosure, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Facebook Fallacies, Geoffrey C. Hazard Jr. Jan 2012

Facebook Fallacies, Geoffrey C. Hazard Jr.

All Faculty Scholarship

No abstract provided.


International Civil Litigation In U.S. Courts: Becoming A Paper Tiger?, Stephen B. Burbank Jan 2012

International Civil Litigation In U.S. Courts: Becoming A Paper Tiger?, Stephen B. Burbank

All Faculty Scholarship

No abstract provided.


Triaging Appointed-Counsel Funding And Pro Se Access To Justice, Benjamin H. Barton, Stephanos Bibas Jan 2012

Triaging Appointed-Counsel Funding And Pro Se Access To Justice, Benjamin H. Barton, Stephanos Bibas

All Faculty Scholarship

For decades, scholars and advocates have lauded Gideon’s guarantee of appointed counsel in criminal cases and sought to extend it into a civil-Gideon right in a range of civil cases. This past Term, the Supreme Court disappointed the civil-Gideon movement in Turner v. Rogers, unanimously rejecting an across-the-board right to counsel while encouraging reforms to make courts more accessible to pro se litigants. Turner is mostly right, we argue, because funding limitations require reserving counsel mostly for criminal cases, where they are needed most. For the first time, the Court recognized that lawyers can make cases not only slower and …


The Machinery Of Criminal Justice, Stephanos Bibas Jan 2012

The Machinery Of Criminal Justice, Stephanos Bibas

All Faculty Scholarship

Two centuries ago, the American criminal justice was run primarily by laymen. Jury trials passed moral judgment on crimes, vindicated victims and innocent defendants, and denounced the guilty. But over the last two centuries, lawyers have taken over the process, silencing victims and defendants and, in many cases, substituting a plea-bargaining system for the voice of the jury. The public sees little of how this assembly-line justice works, and victims and defendants have largely lost their day in court. As a result, victims rarely hear defendants express remorse and apologize, and defendants rarely receive forgiveness. This lawyerized machinery has purchased …


Danger: The Ethics Of Preemptive Action, Larry Alexander, Kimberly Kessler Ferzan Jan 2012

Danger: The Ethics Of Preemptive Action, Larry Alexander, Kimberly Kessler Ferzan

All Faculty Scholarship

The law has developed principles for dealing with morally and legally responsible actors who act in ways that endanger others, the principles governing crime and punishment. And it has developed principles for dealing with the morally and legally nonresponsible but dangerous actors, the principles governing civil commitments. It has failed, however, to develop a cogent and justifiable set of principles for dealing with responsible actors who have not yet acted in ways that endanger, others but who are likely to do so in the future, those whom we label "responsible but dangerous" actors (RBDs). Indeed, as we argue, the criminal …


Notice-And-Comment Sentencing, Stephanos Bibas, Richard A. Bierschbach Jan 2012

Notice-And-Comment Sentencing, Stephanos Bibas, Richard A. Bierschbach

All Faculty Scholarship

No abstract provided.


Welfare And Rights Before The Movement: Rights As A Language Of The State, Karen M. Tani Jan 2012

Welfare And Rights Before The Movement: Rights As A Language Of The State, Karen M. Tani

All Faculty Scholarship

In conversations about government assistance, rights language often emerges as a danger: when benefits become “rights,” policymakers lose flexibility, taxpayers suffer, and the poor lose their incentive to work. Absent from the discussion is an understanding of how, when, and why Americans began to talk about public benefits in rights terms. This Article addresses that lacuna by examining the rise of a vibrant language of rights within the federal social welfare bureaucracy during the 1930s and 1940s. This language is barely visible in judicial and legislative records, the traditional source base for legal-historical inquiry, but amply evidenced by previously unmined …


United States Sovereign Debt: A Thought Experiment On Default And Restructuring, Charles W. Mooney Jr. Jan 2012

United States Sovereign Debt: A Thought Experiment On Default And Restructuring, Charles W. Mooney Jr.

All Faculty Scholarship

This chapter adopts the working assumption that it is conceivable that at some time in the future it would be in the interest of the United States to restructure its sovereign debt (i.e., to reduce the principal amount). It addresses in particular U.S. Treasury Securities. The chapter first provides an overview of the intermediated, tiered holding system for book-entry Treasuries. For the first time the chapter then explores whether and how—logistically and legally—such a restructuring could be effected. It posits the sort of dire scenario that might make such a restructuring advantageous. It then outlines a novel scheme …


When "Boys Will Not Be Boys": Variations Of Wartime Sexual Violence By Armed Opposition Groups In Sri Lanka, Sierra Leone, And Nepal, Matthew Bolyn Conaway Jan 2012

When "Boys Will Not Be Boys": Variations Of Wartime Sexual Violence By Armed Opposition Groups In Sri Lanka, Sierra Leone, And Nepal, Matthew Bolyn Conaway

Browse all Theses and Dissertations

Wartime sexual violence is often assumed to be inevitable during conflict yet empirical evidence indicates that sexual violence varies in type and frequency within and across conflicts as well as among armed groups. A solid understanding of what variable(s) and causal pathway(s) permit the variation of systematic sexual violence in intrastate conflict situations by specific groups has yet to be developed. What factors explain the variation of sexual violence by certain armed opposition groups during conflict situations? This comparative study employs process-tracing and the congruence method to consider the utility of hypotheses drawn from the work of Elisabeth J. Wood …


Executive Dysfunction In Autism And Asperger's Disorder: A Meta-Analytic Review Of Cognitive Planning, Ashley Jones Reno Jan 2012

Executive Dysfunction In Autism And Asperger's Disorder: A Meta-Analytic Review Of Cognitive Planning, Ashley Jones Reno

Browse all Theses and Dissertations

One of the most prominent theories of autism and Asperger's Disorder suggests that their symptoms arise from a primary deficit in executive functions (EF). While many researchers have argued that the executive dysfunction profile may be used as diagnostic support, there have been studies to suggest that autism and Asperger's Disorder may not be clearly differentiated from other clinical disorders on the basis of their executive functioning profiles (e.g., Booth, et al., 2003). Therefore, it is important to examine specific aspects of executive functioning (e.g., cognitive planning, etc.) among children diagnosed with autism and Asperger's Disorder in order to determine …


Suicide As An Escape From Pain: An Analysis Of Suicide Notes And Case Files, Dustin R. Hamilton Jan 2012

Suicide As An Escape From Pain: An Analysis Of Suicide Notes And Case Files, Dustin R. Hamilton

Browse all Theses and Dissertations

Schneidman (1957) wrote that acts of suicide were attempts to escape from unbearable and intense psychological pain, or "psychache." In this study, we analyzed suicides wherein we determined that the primary motivation for the suicidal act was escape from physical or psychological pain. The analysis incorporated information regarding the content of suicide notes, investigators' reports, and databases from an urban Midwestern metropolitan area coroner's office. The analysis contained demographics, expressed life problems of the decedents, characteristics of the suicide, suicide note contents and suicide note themes. We found that the samples in which escape was determined as the primary motivation …


The Impact Of Film On The Construction And Deconstruction Of Mental Illness Stigmatization In Young Adults, Michael Perciful Jan 2012

The Impact Of Film On The Construction And Deconstruction Of Mental Illness Stigmatization In Young Adults, Michael Perciful

Browse all Theses and Dissertations

The current study examined the impact of film on participants' knowledge, attitudes, and behaviors towards people with schizophrenia. Films viewed in the current study included a fear-based inaccurate, likeable-inaccurate, and an educational-accurate depiction of schizophrenia. A control group was included. A total of 106 participants were recruited. Participants completed pre and post questionnaires separated by a 45-minute excerpt of a film. A 2 x 4 mixed design ANOVA was implemented to determine the effects of the films on measures of knowledge and attitudes. A Chi-square analysis was used to determine whether or not the films would impact potential behavior. Manipulation …


The Compromise Effect In Market Settings, Jeremy Wong Jan 2012

The Compromise Effect In Market Settings, Jeremy Wong

Psychology Honors Papers

The attraction effect and compromise effect are common factors when making choices in one’s daily life or in market settings. The problem under investigation was if the compromise effect with more realistic settings would still produce the same results as previous literature suggests (Huber et al., 1982; Huber & Puto, 1983; Sheng, et al., 2005; Simonson, 1989; Simonson & Tversky, 1992) and if the implementation of a “sold out” condition would be an important condition that would influence participant’s choices of products. 36 participants were divided into three groups in study 1 (set 1, set 2, set 3 of products). …


The Influence Of Adhd And Bipolar Disorder Symptoms And Labels On Private High School Teachers’ Accommodations And Attitudes, Sara Kerney Jan 2012

The Influence Of Adhd And Bipolar Disorder Symptoms And Labels On Private High School Teachers’ Accommodations And Attitudes, Sara Kerney

Psychology Honors Papers

The present study examined the effects of symptoms and diagnostic labeling on teachers’ accommodations for and opinions of a student presented in a vignette containing a behavioral description of ADHD or Bipolar Disorder in an adolescent girl. Participants were 85 teachers from five New England private high schools who read a vignette and then answered subsequent questions in an online survey to measure opinions of that student and hypothetical accommodations. Additionally, questions measured participants’ familiarity with mental illness, opinions on mental illness, and beliefs in the causes of the disorders so that the relationship of these variables to accommodations and …


Attitudes Toward Male Vegetarians: Challenging Gender Norms Through Food Choices, Brooke Browarnik Jan 2012

Attitudes Toward Male Vegetarians: Challenging Gender Norms Through Food Choices, Brooke Browarnik

Psychology Honors Papers

Research suggests that individuals learn to “do gender” and adhere to traditional gender norms from an early age. Those who do not do gender on a daily basis often experience adverse consequences (e.g., ridicule from others). The present study was designed to expand upon the literature regarding perceptions of a particular group of men who do not conform to gender norms – male vegetarians. Participants read one of four brief scenarios about a vegetarian or omnivore, male or female student who is vying for a student government position. After reading the scenario, participants 1) answered a series of questions about …


Attitudes Toward Suicide In Peers Affected By A Point Cluster Of Suicides As Adolescents, Caroline Abbott Jan 2012

Attitudes Toward Suicide In Peers Affected By A Point Cluster Of Suicides As Adolescents, Caroline Abbott

Psychology Honors Papers

This thesis aimed to study how exposure to peer suicide may relate to current adjustment and attitudes towards suicide. Eight-five young adult graduates of the same public high school in the northeast who were exposed to multiple peer suicides as adolescents filled out an Attitudes Towards Suicide Scale, Scale of Perceived Social Support, reported their level of agreement with Thomas Joiner’s suicide myths, and completed the Texas Revised Inventories of Grief for each peer lost to suicide. Grief was relatively low in this sample, but related to number of peers lost to suicide and closeness to those peers. Exposure to …


Impression Management Across Applicant And Incumbent Contexts: The Effect On Job Performance, Jenna Noelle Filipkowski Jan 2012

Impression Management Across Applicant And Incumbent Contexts: The Effect On Job Performance, Jenna Noelle Filipkowski

Browse all Theses and Dissertations

Social desirability (impression management) scales often accompany personality measures in selection to detect those who might be engaging in response distortion. Applicants' personality scores may be corrected or eliminated based on scores from the impression management scale. My studies test the effectiveness and usefulness of having social desirability measures in personnel selection. Study One examined whether social desirability (impression management) scales are able to detect faking behavior. The hypotheses were tested on an archival dataset of participants who took personality measures on two separate occasions as incumbents or applicants. Those identified by the faking indicator, who raised their scores beyond …


Recognizing The Implicit And Explicit Aspects Of Ethical Decision-Making: Schemas, Work Climates, And Counterproductive Work Behaviors, Zachary Thomas Kalinoski Jan 2012

Recognizing The Implicit And Explicit Aspects Of Ethical Decision-Making: Schemas, Work Climates, And Counterproductive Work Behaviors, Zachary Thomas Kalinoski

Browse all Theses and Dissertations

There were four purposes for this study. One purpose was to develop a direct assessment of individuals' ethical schemas for how to operate within work settings. I proposed structural assessment using Pathfinder as a means of measuring the structural network of ethical knowledge. I expected structural assessment to be a better means of assessing moral development within organizations than the Defining Issues Test (Rest, 1979). A second purpose was to examine the extent to which implicit aspects of the ethical decision-making process have differential effects on behavioral criteria than explicit aspects of ethical decision-making. A third purpose of this study …


Effects Of Visualization On Academic Performance, Brian Michael Jan 2012

Effects Of Visualization On Academic Performance, Brian Michael

Browse all Theses and Dissertations

The purpose of my study was to investigate the possible utility of visualization, an intervention that has proven useful in both sports and clinical psychology, in an academic setting. However, knowing that there are other powerful performance oriented interventions, such as goal setting and planning, visualization would have to account for unique variance above these to be of value. Specifically, visualization was proposed to help college level students improve exam scores and account for unique variance above that accounted for by goal setting and planning in an intro level psychology course. It was concurrently hypothesized that this relationship would be …


Assessing Urban Environmental Management Practice With A Scalar Approach: The Case Of Shanghai, Wei Tu Jan 2012

Assessing Urban Environmental Management Practice With A Scalar Approach: The Case Of Shanghai, Wei Tu

School of Earth, Environment, and Sustainability Faculty Publications

Shanghai’s urban environmental management in the past three decades has been focused primarily on the environmental problems at the intra-urban level. While this ‘end of pipe’ approach greatly mitigated domestic and industrial pollution, progresses were much slower in dealing with environmental impacts both at a smaller (i.e., those related to people’s daily activities) scale and at a larger (i.e., those related to inter-urban/regional or global issues) scale. Urban environmental management policies in Shanghai and China should prioritize and address urban environmental impacts at continuous geographic scales to achieve long-term ‘triple bottom line’ sustainability.


Column: The Physics Of Digital Information-Part 2, Fred Cohen Jan 2012

Column: The Physics Of Digital Information-Part 2, Fred Cohen

Journal of Digital Forensics, Security and Law

In part 1 of this series (Cohen, 2011a), we discussed some of the basics of building a physics of digital information. Assuming, as we have, that science is about causality and that a scientific theory should require that cause(C) produces effect (E) via mechanism M (written C→ME), we explore that general theory of digital systems from the perspective of attributing effects (i.e., traces of activities in digital systems) to their causes. Full details of the current version of this physics are available online2 , and in this article, we explore a few more of them.


An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains Jan 2012

An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains

Journal of Digital Forensics, Security and Law

The introduction of Jumplists in Windows 7 was an important feature from a forensic examiners viewpoint. Jumplist configuration files can provide the examiner with a wealth of information relating to file access and in particular: dates/times, Volume GUIDs and unique file object IDs relating to those files. Some of the information in the Jumplist could be used to build a more precise timeline relating to system and file usage. In this article, we analyse the structure of a Jumplist configuration file and in particular a record from a Jumplist configuration file and highlight some of the important entries therein.


Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman Jan 2012

Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman

Journal of Digital Forensics, Security and Law

The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s …


Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott Jan 2012

Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott

Journal of Digital Forensics, Security and Law

The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO (Association of Chief Police Officers) or similar guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations. This study investigates the impact of cloud computing on ACPO’s core principles and asks whether these principles can still be applied in a cloud investigation and the challenges presented …


Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel Jan 2012

Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel

Journal of Digital Forensics, Security and Law

In nuclear physics, the phrase decay rate is used to denote the rate that atoms and other particles spontaneously decompose. Uranium-235 famously decays into a variety of daughter isotopes including Thorium and Neptunium, which themselves decay to others. Decay rates are widely observed and wildly different depending on many factors, both internal and external. U-235 has a half-life of 703,800,000 years, for example, while free neutrons have a half-life of 611 seconds and neutrons in an atomic nucleus are stable.


Dns In Computer Forensics, Neil F. Wright Jan 2012

Dns In Computer Forensics, Neil F. Wright

Journal of Digital Forensics, Security and Law

The Domain Name Service (DNS) is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP) based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data structure, from the Global and Country Code Top Level Domains (gTLD/ccTLD) down to the individual site and system leaf nodes, it is highly resilient although vulnerable to various attacks, exploits and systematic failures.


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser Jan 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Journal of Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …