Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Arts and Humanities (3779)
- Sociology (3354)
- Library and Information Science (3301)
- Psychology (2805)
- Public Affairs, Public Policy and Public Administration (2596)
-
- Economics (2517)
- Education (2397)
- Communication (2384)
- Medicine and Health Sciences (1977)
- Business (1802)
- Political Science (1592)
- Life Sciences (1497)
- Law (1293)
- Physical Sciences and Mathematics (1273)
- Anthropology (1088)
- International and Area Studies (978)
- History (969)
- Geography (794)
- Journalism Studies (708)
- Engineering (611)
- Higher Education (610)
- Public Health (598)
- Sports Studies (516)
- Mass Communication (515)
- Legal Studies (501)
- Social Work (501)
- Urban Studies and Planning (501)
- Family, Life Course, and Society (482)
- International Relations (469)
- Institution
-
- Selected Works (4406)
- SelectedWorks (1048)
- University of Wollongong (958)
- University of Nebraska - Lincoln (666)
- Purdue University (657)
-
- University of Nevada, Las Vegas (432)
- Western Kentucky University (358)
- Singapore Management University (351)
- Cedarville University (341)
- University of Tennessee, Knoxville (311)
- University of Northern Iowa (297)
- Western Michigan University (293)
- Portland State University (283)
- San Jose State University (283)
- University of South Florida (264)
- Syracuse University (255)
- Western University (242)
- University of Central Florida (240)
- Brigham Young University (229)
- University of Kentucky (224)
- College of the Holy Cross (216)
- SIT Graduate Institute/SIT Study Abroad (212)
- Wayne State University (205)
- Claremont Colleges (203)
- City University of New York (CUNY) (193)
- Wright State University (189)
- Grand Valley State University (182)
- Nova Southeastern University (178)
- James Madison University (176)
- Old Dominion University (167)
- Keyword
-
- Cedarville (328)
- Athletics (320)
- Education (226)
- Deaf culture (203)
- Church work with the deaf -- Catholic Church (202)
-
- Deaf -- Periodicals (202)
- Hearing impaired (202)
- Pastoral care of people with disabilities (202)
- Journal Articles (191)
- Gender (178)
- Psychology (147)
- 2012 (146)
- Health (138)
- Communication (136)
- Student newspaper (135)
- Archaeology (129)
- Leadership (129)
- Higher education (128)
- Culture (126)
- Politics (126)
- Western Kentucky University (126)
- Women (126)
- Development (123)
- Newspaper (122)
- Syllabus, syllabi, journalism, communication, media, strategic media (119)
- Kentucky (111)
- Australia (109)
- Information literacy (108)
- Spartan Daily (106)
- Race (102)
- Publication
-
- Against the Grain (274)
- Electronic Theses and Dissertations (261)
- Theses and Dissertations (257)
- Faculty of Engineering and Information Sciences - Papers: Part A (236)
- Open Educational Resources (234)
-
- Proceedings of the IATUL Conferences (230)
- Library Philosophy and Practice (e-journal) (189)
- Masters Theses (172)
- Faculty Publications (160)
- Faculty of Science, Medicine and Health - Papers: part A (159)
- Dissertations (155)
- Faculty of Social Sciences - Papers (Archive) (150)
- Independent Study Project (ISP) Collection (149)
- USF Tampa Graduate Theses and Dissertations (146)
- Honors Theses (139)
- Faculty of Science - Papers (Archive) (136)
- The Qualitative Report (134)
- Publications and Research (122)
- Journalism and Strategic Media Syllabi (119)
- Electronic Thesis and Dissertation Repository (117)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (111)
- Don C. Iverson (108)
- Spartan Daily (School of Journalism and Mass Communications) (106)
- Journal of Health Disparities Research and Practice (102)
- Gleanings: Department of English Blog Archive (100)
- Faculty of Health and Behavioural Sciences - Papers (Archive) (98)
- Graduate Theses and Dissertations (98)
- Master's Theses (97)
- Legacy Theses & Dissertations (2009 - 2024) (96)
- Psychology Faculty Publications (93)
- Publication Type
Articles 20401 - 20430 of 23314
Full-Text Articles in Social and Behavioral Sciences
Assessing Urban Environmental Management Practice With A Scalar Approach: The Case Of Shanghai, Wei Tu
Assessing Urban Environmental Management Practice With A Scalar Approach: The Case Of Shanghai, Wei Tu
School of Earth, Environment, and Sustainability Faculty Publications
Shanghai’s urban environmental management in the past three decades has been focused primarily on the environmental problems at the intra-urban level. While this ‘end of pipe’ approach greatly mitigated domestic and industrial pollution, progresses were much slower in dealing with environmental impacts both at a smaller (i.e., those related to people’s daily activities) scale and at a larger (i.e., those related to inter-urban/regional or global issues) scale. Urban environmental management policies in Shanghai and China should prioritize and address urban environmental impacts at continuous geographic scales to achieve long-term ‘triple bottom line’ sustainability.
Column: The Physics Of Digital Information-Part 2, Fred Cohen
Column: The Physics Of Digital Information-Part 2, Fred Cohen
Journal of Digital Forensics, Security and Law
In part 1 of this series (Cohen, 2011a), we discussed some of the basics of building a physics of digital information. Assuming, as we have, that science is about causality and that a scientific theory should require that cause(C) produces effect (E) via mechanism M (written C→ME), we explore that general theory of digital systems from the perspective of attributing effects (i.e., traces of activities in digital systems) to their causes. Full details of the current version of this physics are available online2 , and in this article, we explore a few more of them.
An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains
An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains
Journal of Digital Forensics, Security and Law
The introduction of Jumplists in Windows 7 was an important feature from a forensic examiners viewpoint. Jumplist configuration files can provide the examiner with a wealth of information relating to file access and in particular: dates/times, Volume GUIDs and unique file object IDs relating to those files. Some of the information in the Jumplist could be used to build a more precise timeline relating to system and file usage. In this article, we analyse the structure of a Jumplist configuration file and in particular a record from a Jumplist configuration file and highlight some of the important entries therein.
Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman
Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman
Journal of Digital Forensics, Security and Law
The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s …
Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott
Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott
Journal of Digital Forensics, Security and Law
The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO (Association of Chief Police Officers) or similar guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations. This study investigates the impact of cloud computing on ACPO’s core principles and asks whether these principles can still be applied in a cloud investigation and the challenges presented …
Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel
Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel
Journal of Digital Forensics, Security and Law
In nuclear physics, the phrase decay rate is used to denote the rate that atoms and other particles spontaneously decompose. Uranium-235 famously decays into a variety of daughter isotopes including Thorium and Neptunium, which themselves decay to others. Decay rates are widely observed and wildly different depending on many factors, both internal and external. U-235 has a half-life of 703,800,000 years, for example, while free neutrons have a half-life of 611 seconds and neutrons in an atomic nucleus are stable.
Dns In Computer Forensics, Neil F. Wright
Dns In Computer Forensics, Neil F. Wright
Journal of Digital Forensics, Security and Law
The Domain Name Service (DNS) is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP) based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data structure, from the Global and Country Code Top Level Domains (gTLD/ccTLD) down to the individual site and system leaf nodes, it is highly resilient although vulnerable to various attacks, exploits and systematic failures.
Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser
Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser
Journal of Digital Forensics, Security and Law
The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …
Book Review: System Forensics, Investigation, And Response, Nate Keith
Book Review: System Forensics, Investigation, And Response, Nate Keith
Journal of Digital Forensics, Security and Law
I recently expressed an interest to a respected colleague in finding a way to “give back” to the forensic community. He suggested writing a review for a text he recently received and provide feedback to the community. It is my intent to present an objective analysis of System Forensics, Investigation, and Response.
Column: Analysis Of Digital Traces, Fred Cohen
Column: Analysis Of Digital Traces, Fred Cohen
Journal of Digital Forensics, Security and Law
In part 1 of this series (Cohen, 2011a), Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces.
On The Development Of A Digital Forensics Curriculum, Manghui Tu, Dianxiang Xu, Samsuddin Wira, Cristian Balan, Kyle Cronin
On The Development Of A Digital Forensics Curriculum, Manghui Tu, Dianxiang Xu, Samsuddin Wira, Cristian Balan, Kyle Cronin
Journal of Digital Forensics, Security and Law
Computer Crime and computer related incidents continue their prevalence and frequency, resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce that can effectively investigate computer crimes and incidents. There is presently no standard to guide the design of digital forensics curriculum for an academic program. In this research, previous work on digital forensics curriculum design and existing education programs are thoroughly investigated. Both digital forensics educators and practitioners were surveyed and results were analyzed to determine the industry and law enforcement …
Book Review: Dispute Resolution And E-Discovery, Milton Luoma
Book Review: Dispute Resolution And E-Discovery, Milton Luoma
Journal of Digital Forensics, Security and Law
As is apparent from its title, this book tackles two very current and difficult legal issues – electronic discovery and dispute resolution. The authors tie the two legal concepts together in an effort to provide litigants and practitioners a less expensive and less time consuming alternative than is typically the case with traditional litigation and court proceedings. By including electronic discovery in the discussions, the authors recognize the importance and significance of electronic discovery in mediation and arbitration as it is in traditional litigation.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
The Science Of Digital Forensics: Recovery Of Data From Overwritten Areas Of Magnetic Media, Fred Cohen
The Science Of Digital Forensics: Recovery Of Data From Overwritten Areas Of Magnetic Media, Fred Cohen
Journal of Digital Forensics, Security and Law
The first time I encountered data loss and recovery effects of magnetic memory was as a night and weekend computer operator for the computer science department of Carnegie-Mellon University in the 1973-1974 time frame. Part of my job involved dealing directly with outages and failures associated with magnetic memory components used in what, at the time, were large computer systems. On occasions, portions of magnetic core memory or disk drives would encounter various failure modes and the systems using these devices would have to be reconfigured to operate without the failed components until repair personnel could come in to repair …
“Preemptive Suppression” – Judges Claim The Right To Find Digital Evidence Inadmissible Before It Is Even Discovered, Bob Simpson
“Preemptive Suppression” – Judges Claim The Right To Find Digital Evidence Inadmissible Before It Is Even Discovered, Bob Simpson
Journal of Digital Forensics, Security and Law
Vermont state prosecutors have asked the Vermont Supreme Court to end a state trial judge’s practice of attaching conditions to computer warrants. The Vermont judge’s conditions are drawn from five conditions established in the 2009 decision of the 9th Circuit Court of Appeals in the Comprehensive Drug Testing, Inc. case (CDT II). This is the first time the validity of the “CDT conditions” will be decided by a state court of final jurisdiction in the United States
An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk
An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk
Journal of Digital Forensics, Security and Law
It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.
Forensic Evidence Identification And Modeling For Attacks Against A Simulated Online Business Information System, Manghui Tu, Dianxiang Xu, Eugene Butler, Amanda Schwartz
Forensic Evidence Identification And Modeling For Attacks Against A Simulated Online Business Information System, Manghui Tu, Dianxiang Xu, Eugene Butler, Amanda Schwartz
Journal of Digital Forensics, Security and Law
Forensic readiness of business information systems can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business fraud. To establish forensics readiness, it is essential for an organization to identify which fingerprints are relevant and where they can be located, to determine whether they are logged in a forensically sound way and whether all the needed fingerprints are available to reconstruct the events successfully. Also, a fingerprint identification and locating mechanism should be provided to guide potential forensics investigation in the future. Furthermore, mechanisms should be established to automate the security incident tracking and reconstruction …
Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model, Gary Cantrell, David A. Dampier
Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model, Gary Cantrell, David A. Dampier
Journal of Digital Forensics, Security and Law
Digital triage is a pre-digital-forensic phase that sometimes takes place as a way of gathering quick intelligence. Although effort has been undertaken to model the digital forensics process, little has been done to-date to model digital triage. This work discusses the further development of a model that attempts to address digital triage, the Partially-automated Crime Specific Digital Triage Process model. The model itself will be presented along with a description of how its automated functionality was implemented to facilitate model testing.
Technology Corner: A Regular Expression Training App, Nick V. Flor
Technology Corner: A Regular Expression Training App, Nick V. Flor
Journal of Digital Forensics, Security and Law
Regular expressions enable digital forensic analysts to find information in files. The best way for an analyst to become proficient in writing regular expressions is to practice. This paper presents the code for an app that allows an analyst to practice writing regular expressions.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Transnationalism And Identity: The Concept Of Community In Ghanaian Literature And Contemporary Ghanaian Culture, Devin M. Geary
Transnationalism And Identity: The Concept Of Community In Ghanaian Literature And Contemporary Ghanaian Culture, Devin M. Geary
Honors Theses
In my thesis, I use anthropology, literature, and adinkra, an indigenous art, to study Ghanaian concepts of community from an interactive standpoint. While each of these disciplines has individually been used to study the concept of community, the three have not previously been discussed in relation to one another. I explore the major findings of each field—mainly that in anthropology, transnational informants find communities upheld; in literature, transnational characters find the opposite; and in adinkra, there are elements of both continuity and dissolution—to discuss Ghanaian constructs of community in the transnational world. Throughout time, there have always been transnational individuals …
Academic Freedom, Intellectual Diversity, And The Place Of Politics In Geography, Reecia Orzeck
Academic Freedom, Intellectual Diversity, And The Place Of Politics In Geography, Reecia Orzeck
Faculty Publications-- Geography, Geology, and the Environment
This paper examines the conservative critique of higher education in the USA. I argue, first, that the right's call for greater “intellectual diversity” in American higher education should be understood as an attack on the professional self-regulation and disciplinary autonomy that are central to academic freedom in this country. Second, I suggest that the right's politicization of politics in the academy brings to light the importance of our developing a vision of the university that accounts for rather than disavows the political nature of the work we do.
Semantic Priming Of Familiar Songs, Sarah K. Johnson, Andrea R. Halpern
Semantic Priming Of Familiar Songs, Sarah K. Johnson, Andrea R. Halpern
Faculty Journal Articles
We explored the functional organization of semantic memory for music by comparing priming across familiar songs both within modalities (Experiment 1, tune to tune; Experiment 3, category label to lyrics) and across modalities (Experiment 2, category label to tune; Experiment 4, tune to lyrics). Participants judged whether or not the target tune or lyrics were real (akin to lexical decision tasks). We found significant priming, analogous to linguistic associative-priming effects, in reaction times for related primes as compared to unrelated primes, but primarily for within-modality comparisons. Reaction times to tunes (e.g., "Silent Night") were faster following related tunes ("Deck the …
Tags In The Catalogue: Insights From A Usability Study Of Librarything For Libraries, Carrie M. Pirmann
Tags In The Catalogue: Insights From A Usability Study Of Librarything For Libraries, Carrie M. Pirmann
Faculty Journal Articles
Library of Congress Subject Headings (LCSH), the standard subject language used in library catalogues, are often criticized for their lack of currency, biased language, and atypical syndetic structure. Conversely, folksonomies (or tags), which rely on the natural language of their users, offer a flexibility often lacking in controlled vocabularies and may offer a means of augmenting more rigid controlled vocabularies such as LCSH. Content analysis studies have demonstrated the potential for folksonomies to be used as a means of enhancing subject access to materials, and libraries are beginning to integrate tagging systems into their catalogues. This study examines the utility …
Tiered Networks: Modeling, Resource And Interference Management, Mustafa Cenk Erturk
Tiered Networks: Modeling, Resource And Interference Management, Mustafa Cenk Erturk
USF Tampa Graduate Theses and Dissertations
The wireless networks of the future are likely to be tiered, i.e., a heterogeneous mixture of overlaid networks that have different power, spectrum, hardware, coverage, mobility, complexity, and technology requirements. The focus of this dissertation is to improve the performance and increase the throughput of tiered networks with resource/interference management methods, node densification schemes, and transceiver designs; with their applications to advanced tiered network structures such as heterogeneous networks (i.e., picocells, femtocells, relay nodes, and distributed antenna systems), device-to-device (D2D) networks, and aeronautical communication networks (ACN).
Over the last few decades, there has been an incredible increase in the demand …
Introduction To The Neurosciences And Music Iv: Learning And Memory, Andrea R. Halpern
Introduction To The Neurosciences And Music Iv: Learning And Memory, Andrea R. Halpern
Faculty Conference Papers and Presentations
The conference entitled "The Neurosciences and Music-IV: Learning and Memory" was held at the University of Edinburgh from June 9-12, 2011, jointly hosted by the Mariani Foundation and the Institute for Music in Human and Social Development, and involving nearly 500 international delegates. Two opening workshops, three large and vibrant poster sessions, and nine invited symposia introduced a diverse range of recent research findings and discussed current research directions. Here, the proceedings are introduced by the workshop and symposia leaders on topics including working with children, rhythm perception, language processing, cultural learning, memory, musical imagery, neural plasticity, stroke rehabilitation, autism, …
How Selective Is Social Learning In Dolphins?, Stan A. Kuczaj Ii, Deirdre Yeater, Lauren Highfill
How Selective Is Social Learning In Dolphins?, Stan A. Kuczaj Ii, Deirdre Yeater, Lauren Highfill
Psychology Faculty Publications
Social learning is an important aspect of dolphin social life and dolphin behavioral development. In addition to vocal social learning, dolphins discover behaviors for foraging, play, and social interactions by observing other members of their social group. But dolphins neither indiscriminately observe nor mindlessly mimic other dolphins. To the contrary, dolphin calves are quite selective in their choices of who to observe and/or imitate. Calves are most likely to learn foraging behaviors from their mothers, but they are more likely to watch and reproduce the play behaviors of other calves than the play behaviors of adult dolphins (including their mothers). …
The Impact Of Parental Alcohol Use On Alcohol-Related Cognitions, Cathryn Frances Glanton
The Impact Of Parental Alcohol Use On Alcohol-Related Cognitions, Cathryn Frances Glanton
Legacy Theses & Dissertations (2009 - 2024)
This research was designed to examine parental and cognitive factors that are structurally related to intention for alcohol consumption in college students as well as potential gender differences in these relationships. Multiple-group comparison was used in structural equation modeling to assess data-to-model fit of the hypothesized model. Perceived parental alcohol use, positive expectancies, abstinence self-efficacy in social situations, and intent to drink alcohol were structurally modeled and examined. Seven hundred and fourteen college students completed a number of self-report measures in the data collection stage of the study. Results showed good fit indices of the hypothesized model in both men …
This Pipe's For You : A Qualitative Exploration Of Glass Shop Owners' Networks, Legitimacy And The Glass Pipe Arts Movement, Anna K. Ryan
This Pipe's For You : A Qualitative Exploration Of Glass Shop Owners' Networks, Legitimacy And The Glass Pipe Arts Movement, Anna K. Ryan
Legacy Theses & Dissertations (2009 - 2024)
The goal of this dissertation was to gain an insider perspective of the glass shop industry. A qualitative methodology was employed to gather in depth information from 15 participants who owned glass shops. Through interviews and extensive fieldwork, I was given the opportunity to delve into the work lives of innovative and goal oriented entrepreneurs. My motivation for engaging in this research was to uncover the processes that quasi-legitimate business owners utilized in order to operate under paraphernalia laws, which define the products they sell as illegal. Throughout my research, I learned that today's head shops have evolved from their …
The Toyota Way To Lean Leadership: Achieving And Sustaining Excellence Through Leadership Development [Review] / Liker, Jeffery K. And Gary L. Convis, Wendy Keough
Journal of Applied Christian Leadership
No abstract provided.