Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 20401 - 20430 of 23314

Full-Text Articles in Social and Behavioral Sciences

Assessing Urban Environmental Management Practice With A Scalar Approach: The Case Of Shanghai, Wei Tu Jan 2012

Assessing Urban Environmental Management Practice With A Scalar Approach: The Case Of Shanghai, Wei Tu

School of Earth, Environment, and Sustainability Faculty Publications

Shanghai’s urban environmental management in the past three decades has been focused primarily on the environmental problems at the intra-urban level. While this ‘end of pipe’ approach greatly mitigated domestic and industrial pollution, progresses were much slower in dealing with environmental impacts both at a smaller (i.e., those related to people’s daily activities) scale and at a larger (i.e., those related to inter-urban/regional or global issues) scale. Urban environmental management policies in Shanghai and China should prioritize and address urban environmental impacts at continuous geographic scales to achieve long-term ‘triple bottom line’ sustainability.


Column: The Physics Of Digital Information-Part 2, Fred Cohen Jan 2012

Column: The Physics Of Digital Information-Part 2, Fred Cohen

Journal of Digital Forensics, Security and Law

In part 1 of this series (Cohen, 2011a), we discussed some of the basics of building a physics of digital information. Assuming, as we have, that science is about causality and that a scientific theory should require that cause(C) produces effect (E) via mechanism M (written C→ME), we explore that general theory of digital systems from the perspective of attributing effects (i.e., traces of activities in digital systems) to their causes. Full details of the current version of this physics are available online2 , and in this article, we explore a few more of them.


An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains Jan 2012

An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains

Journal of Digital Forensics, Security and Law

The introduction of Jumplists in Windows 7 was an important feature from a forensic examiners viewpoint. Jumplist configuration files can provide the examiner with a wealth of information relating to file access and in particular: dates/times, Volume GUIDs and unique file object IDs relating to those files. Some of the information in the Jumplist could be used to build a more precise timeline relating to system and file usage. In this article, we analyse the structure of a Jumplist configuration file and in particular a record from a Jumplist configuration file and highlight some of the important entries therein.


Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman Jan 2012

Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman

Journal of Digital Forensics, Security and Law

The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s …


Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott Jan 2012

Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott

Journal of Digital Forensics, Security and Law

The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO (Association of Chief Police Officers) or similar guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations. This study investigates the impact of cloud computing on ACPO’s core principles and asks whether these principles can still be applied in a cloud investigation and the challenges presented …


Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel Jan 2012

Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel

Journal of Digital Forensics, Security and Law

In nuclear physics, the phrase decay rate is used to denote the rate that atoms and other particles spontaneously decompose. Uranium-235 famously decays into a variety of daughter isotopes including Thorium and Neptunium, which themselves decay to others. Decay rates are widely observed and wildly different depending on many factors, both internal and external. U-235 has a half-life of 703,800,000 years, for example, while free neutrons have a half-life of 611 seconds and neutrons in an atomic nucleus are stable.


Dns In Computer Forensics, Neil F. Wright Jan 2012

Dns In Computer Forensics, Neil F. Wright

Journal of Digital Forensics, Security and Law

The Domain Name Service (DNS) is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP) based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data structure, from the Global and Country Code Top Level Domains (gTLD/ccTLD) down to the individual site and system leaf nodes, it is highly resilient although vulnerable to various attacks, exploits and systematic failures.


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser Jan 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Journal of Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …


Book Review: System Forensics, Investigation, And Response, Nate Keith Jan 2012

Book Review: System Forensics, Investigation, And Response, Nate Keith

Journal of Digital Forensics, Security and Law

I recently expressed an interest to a respected colleague in finding a way to “give back” to the forensic community. He suggested writing a review for a text he recently received and provide feedback to the community. It is my intent to present an objective analysis of System Forensics, Investigation, and Response.


Column: Analysis Of Digital Traces, Fred Cohen Jan 2012

Column: Analysis Of Digital Traces, Fred Cohen

Journal of Digital Forensics, Security and Law

In part 1 of this series (Cohen, 2011a), Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces.


On The Development Of A Digital Forensics Curriculum, Manghui Tu, Dianxiang Xu, Samsuddin Wira, Cristian Balan, Kyle Cronin Jan 2012

On The Development Of A Digital Forensics Curriculum, Manghui Tu, Dianxiang Xu, Samsuddin Wira, Cristian Balan, Kyle Cronin

Journal of Digital Forensics, Security and Law

Computer Crime and computer related incidents continue their prevalence and frequency, resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce that can effectively investigate computer crimes and incidents. There is presently no standard to guide the design of digital forensics curriculum for an academic program. In this research, previous work on digital forensics curriculum design and existing education programs are thoroughly investigated. Both digital forensics educators and practitioners were surveyed and results were analyzed to determine the industry and law enforcement …


Book Review: Dispute Resolution And E-Discovery, Milton Luoma Jan 2012

Book Review: Dispute Resolution And E-Discovery, Milton Luoma

Journal of Digital Forensics, Security and Law

As is apparent from its title, this book tackles two very current and difficult legal issues – electronic discovery and dispute resolution. The authors tie the two legal concepts together in an effort to provide litigants and practitioners a less expensive and less time consuming alternative than is typically the case with traditional litigation and court proceedings. By including electronic discovery in the discussions, the authors recognize the importance and significance of electronic discovery in mediation and arbitration as it is in traditional litigation.


Table Of Contents Jan 2012

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


The Science Of Digital Forensics: Recovery Of Data From Overwritten Areas Of Magnetic Media, Fred Cohen Jan 2012

The Science Of Digital Forensics: Recovery Of Data From Overwritten Areas Of Magnetic Media, Fred Cohen

Journal of Digital Forensics, Security and Law

The first time I encountered data loss and recovery effects of magnetic memory was as a night and weekend computer operator for the computer science department of Carnegie-Mellon University in the 1973-1974 time frame. Part of my job involved dealing directly with outages and failures associated with magnetic memory components used in what, at the time, were large computer systems. On occasions, portions of magnetic core memory or disk drives would encounter various failure modes and the systems using these devices would have to be reconfigured to operate without the failed components until repair personnel could come in to repair …


“Preemptive Suppression” – Judges Claim The Right To Find Digital Evidence Inadmissible Before It Is Even Discovered, Bob Simpson Jan 2012

“Preemptive Suppression” – Judges Claim The Right To Find Digital Evidence Inadmissible Before It Is Even Discovered, Bob Simpson

Journal of Digital Forensics, Security and Law

Vermont state prosecutors have asked the Vermont Supreme Court to end a state trial judge’s practice of attaching conditions to computer warrants. The Vermont judge’s conditions are drawn from five conditions established in the 2009 decision of the 9th Circuit Court of Appeals in the Comprehensive Drug Testing, Inc. case (CDT II). This is the first time the validity of the “CDT conditions” will be decided by a state court of final jurisdiction in the United States


An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk Jan 2012

An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk

Journal of Digital Forensics, Security and Law

It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.


Forensic Evidence Identification And Modeling For Attacks Against A Simulated Online Business Information System, Manghui Tu, Dianxiang Xu, Eugene Butler, Amanda Schwartz Jan 2012

Forensic Evidence Identification And Modeling For Attacks Against A Simulated Online Business Information System, Manghui Tu, Dianxiang Xu, Eugene Butler, Amanda Schwartz

Journal of Digital Forensics, Security and Law

Forensic readiness of business information systems can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business fraud. To establish forensics readiness, it is essential for an organization to identify which fingerprints are relevant and where they can be located, to determine whether they are logged in a forensically sound way and whether all the needed fingerprints are available to reconstruct the events successfully. Also, a fingerprint identification and locating mechanism should be provided to guide potential forensics investigation in the future. Furthermore, mechanisms should be established to automate the security incident tracking and reconstruction …


Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model, Gary Cantrell, David A. Dampier Jan 2012

Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model, Gary Cantrell, David A. Dampier

Journal of Digital Forensics, Security and Law

Digital triage is a pre-digital-forensic phase that sometimes takes place as a way of gathering quick intelligence. Although effort has been undertaken to model the digital forensics process, little has been done to-date to model digital triage. This work discusses the further development of a model that attempts to address digital triage, the Partially-automated Crime Specific Digital Triage Process model. The model itself will be presented along with a description of how its automated functionality was implemented to facilitate model testing.


Technology Corner: A Regular Expression Training App, Nick V. Flor Jan 2012

Technology Corner: A Regular Expression Training App, Nick V. Flor

Journal of Digital Forensics, Security and Law

Regular expressions enable digital forensic analysts to find information in files. The best way for an analyst to become proficient in writing regular expressions is to practice. This paper presents the code for an app that allows an analyst to practice writing regular expressions.


Table Of Contents Jan 2012

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Transnationalism And Identity: The Concept Of Community In Ghanaian Literature And Contemporary Ghanaian Culture, Devin M. Geary Jan 2012

Transnationalism And Identity: The Concept Of Community In Ghanaian Literature And Contemporary Ghanaian Culture, Devin M. Geary

Honors Theses

In my thesis, I use anthropology, literature, and adinkra, an indigenous art, to study Ghanaian concepts of community from an interactive standpoint. While each of these disciplines has individually been used to study the concept of community, the three have not previously been discussed in relation to one another. I explore the major findings of each field—mainly that in anthropology, transnational informants find communities upheld; in literature, transnational characters find the opposite; and in adinkra, there are elements of both continuity and dissolution—to discuss Ghanaian constructs of community in the transnational world. Throughout time, there have always been transnational individuals …


Academic Freedom, Intellectual Diversity, And The Place Of Politics In Geography, Reecia Orzeck Jan 2012

Academic Freedom, Intellectual Diversity, And The Place Of Politics In Geography, Reecia Orzeck

Faculty Publications-- Geography, Geology, and the Environment

This paper examines the conservative critique of higher education in the USA. I argue, first, that the right's call for greater “intellectual diversity” in American higher education should be understood as an attack on the professional self-regulation and disciplinary autonomy that are central to academic freedom in this country. Second, I suggest that the right's politicization of politics in the academy brings to light the importance of our developing a vision of the university that accounts for rather than disavows the political nature of the work we do.


Semantic Priming Of Familiar Songs, Sarah K. Johnson, Andrea R. Halpern Jan 2012

Semantic Priming Of Familiar Songs, Sarah K. Johnson, Andrea R. Halpern

Faculty Journal Articles

We explored the functional organization of semantic memory for music by comparing priming across familiar songs both within modalities (Experiment 1, tune to tune; Experiment 3, category label to lyrics) and across modalities (Experiment 2, category label to tune; Experiment 4, tune to lyrics). Participants judged whether or not the target tune or lyrics were real (akin to lexical decision tasks). We found significant priming, analogous to linguistic associative-priming effects, in reaction times for related primes as compared to unrelated primes, but primarily for within-modality comparisons. Reaction times to tunes (e.g., "Silent Night") were faster following related tunes ("Deck the …


Tags In The Catalogue: Insights From A Usability Study Of Librarything For Libraries, Carrie M. Pirmann Jan 2012

Tags In The Catalogue: Insights From A Usability Study Of Librarything For Libraries, Carrie M. Pirmann

Faculty Journal Articles

Library of Congress Subject Headings (LCSH), the standard subject language used in library catalogues, are often criticized for their lack of currency, biased language, and atypical syndetic structure. Conversely, folksonomies (or tags), which rely on the natural language of their users, offer a flexibility often lacking in controlled vocabularies and may offer a means of augmenting more rigid controlled vocabularies such as LCSH. Content analysis studies have demonstrated the potential for folksonomies to be used as a means of enhancing subject access to materials, and libraries are beginning to integrate tagging systems into their catalogues. This study examines the utility …


Tiered Networks: Modeling, Resource And Interference Management, Mustafa Cenk Erturk Jan 2012

Tiered Networks: Modeling, Resource And Interference Management, Mustafa Cenk Erturk

USF Tampa Graduate Theses and Dissertations

The wireless networks of the future are likely to be tiered, i.e., a heterogeneous mixture of overlaid networks that have different power, spectrum, hardware, coverage, mobility, complexity, and technology requirements. The focus of this dissertation is to improve the performance and increase the throughput of tiered networks with resource/interference management methods, node densification schemes, and transceiver designs; with their applications to advanced tiered network structures such as heterogeneous networks (i.e., picocells, femtocells, relay nodes, and distributed antenna systems), device-to-device (D2D) networks, and aeronautical communication networks (ACN).

Over the last few decades, there has been an incredible increase in the demand …


Introduction To The Neurosciences And Music Iv: Learning And Memory, Andrea R. Halpern Jan 2012

Introduction To The Neurosciences And Music Iv: Learning And Memory, Andrea R. Halpern

Faculty Conference Papers and Presentations

The conference entitled "The Neurosciences and Music-IV: Learning and Memory" was held at the University of Edinburgh from June 9-12, 2011, jointly hosted by the Mariani Foundation and the Institute for Music in Human and Social Development, and involving nearly 500 international delegates. Two opening workshops, three large and vibrant poster sessions, and nine invited symposia introduced a diverse range of recent research findings and discussed current research directions. Here, the proceedings are introduced by the workshop and symposia leaders on topics including working with children, rhythm perception, language processing, cultural learning, memory, musical imagery, neural plasticity, stroke rehabilitation, autism, …


How Selective Is Social Learning In Dolphins?, Stan A. Kuczaj Ii, Deirdre Yeater, Lauren Highfill Jan 2012

How Selective Is Social Learning In Dolphins?, Stan A. Kuczaj Ii, Deirdre Yeater, Lauren Highfill

Psychology Faculty Publications

Social learning is an important aspect of dolphin social life and dolphin behavioral development. In addition to vocal social learning, dolphins discover behaviors for foraging, play, and social interactions by observing other members of their social group. But dolphins neither indiscriminately observe nor mindlessly mimic other dolphins. To the contrary, dolphin calves are quite selective in their choices of who to observe and/or imitate. Calves are most likely to learn foraging behaviors from their mothers, but they are more likely to watch and reproduce the play behaviors of other calves than the play behaviors of adult dolphins (including their mothers). …


The Impact Of Parental Alcohol Use On Alcohol-Related Cognitions, Cathryn Frances Glanton Jan 2012

The Impact Of Parental Alcohol Use On Alcohol-Related Cognitions, Cathryn Frances Glanton

Legacy Theses & Dissertations (2009 - 2024)

This research was designed to examine parental and cognitive factors that are structurally related to intention for alcohol consumption in college students as well as potential gender differences in these relationships. Multiple-group comparison was used in structural equation modeling to assess data-to-model fit of the hypothesized model. Perceived parental alcohol use, positive expectancies, abstinence self-efficacy in social situations, and intent to drink alcohol were structurally modeled and examined. Seven hundred and fourteen college students completed a number of self-report measures in the data collection stage of the study. Results showed good fit indices of the hypothesized model in both men …


This Pipe's For You : A Qualitative Exploration Of Glass Shop Owners' Networks, Legitimacy And The Glass Pipe Arts Movement, Anna K. Ryan Jan 2012

This Pipe's For You : A Qualitative Exploration Of Glass Shop Owners' Networks, Legitimacy And The Glass Pipe Arts Movement, Anna K. Ryan

Legacy Theses & Dissertations (2009 - 2024)

The goal of this dissertation was to gain an insider perspective of the glass shop industry. A qualitative methodology was employed to gather in depth information from 15 participants who owned glass shops. Through interviews and extensive fieldwork, I was given the opportunity to delve into the work lives of innovative and goal oriented entrepreneurs. My motivation for engaging in this research was to uncover the processes that quasi-legitimate business owners utilized in order to operate under paraphernalia laws, which define the products they sell as illegal. Throughout my research, I learned that today's head shops have evolved from their …


The Toyota Way To Lean Leadership: Achieving And Sustaining Excellence Through Leadership Development [Review] / Liker, Jeffery K. And Gary L. Convis, Wendy Keough Jan 2012

The Toyota Way To Lean Leadership: Achieving And Sustaining Excellence Through Leadership Development [Review] / Liker, Jeffery K. And Gary L. Convis, Wendy Keough

Journal of Applied Christian Leadership

No abstract provided.