Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Library and Information Science (3641)
- Sociology (3263)
- Arts and Humanities (3175)
- Psychology (3033)
- Public Affairs, Public Policy and Public Administration (2674)
-
- Education (2611)
- Economics (2457)
- Communication (2232)
- Medicine and Health Sciences (2031)
- Anthropology (1587)
- Political Science (1567)
- Business (1411)
- Law (1238)
- Physical Sciences and Mathematics (1217)
- Life Sciences (1099)
- Engineering (1071)
- International and Area Studies (1055)
- Science and Technology Studies (867)
- History (840)
- Geography (741)
- Archaeological Anthropology (702)
- Journalism Studies (673)
- Higher Education (656)
- Social Work (643)
- Urban Studies and Planning (571)
- Mass Communication (541)
- Family, Life Course, and Society (519)
- Sports Studies (505)
- Legal Studies (500)
- Institution
-
- Selected Works (4168)
- University of Wollongong (1357)
- SelectedWorks (985)
- Purdue University (717)
- University of Nebraska - Lincoln (486)
-
- Portland State University (416)
- Western Kentucky University (397)
- Singapore Management University (393)
- University of Nevada, Las Vegas (331)
- Kenyon College (328)
- University of Kentucky (308)
- Cedarville University (303)
- University of Central Florida (301)
- Western Michigan University (296)
- University of South Florida (263)
- Western University (248)
- San Jose State University (241)
- Wayne State University (241)
- University of Massachusetts Boston (233)
- City University of New York (CUNY) (225)
- University of Tennessee, Knoxville (213)
- Syracuse University (211)
- SIT Graduate Institute/SIT Study Abroad (209)
- Claremont Colleges (202)
- Brigham Young University (196)
- College of the Holy Cross (195)
- Nova Southeastern University (193)
- Georgia Southern University (188)
- Grand Valley State University (186)
- Gettysburg College (185)
- Keyword
-
- Cedarville (257)
- Athletics (252)
- Education (252)
- Archaeology (227)
- History (208)
-
- Gender (188)
- Information literacy (179)
- Hearing impaired (169)
- Church work with the deaf -- Catholic Church (168)
- Deaf -- Periodicals (168)
- Deaf culture (168)
- Pastoral care of people with disabilities (168)
- Psychology (164)
- CMMB (158)
- Sustainability (154)
- Women (148)
- Australia (141)
- Higher education (138)
- Journal Articles (138)
- Gettysburg College (137)
- Economic development (134)
- Health (134)
- Student newspaper (132)
- Western Kentucky University (132)
- Libraries (130)
- Children (123)
- Communication (122)
- Depression (121)
- Development (121)
- Economics (120)
- Publication
-
- Faculty of Engineering and Information Sciences - Papers: Part A (579)
- Faculty of Science, Medicine and Health - Papers: part A (421)
- Theses and Dissertations (388)
- Four Valleys Archive (328)
- Faculty of Social Sciences - Papers (Archive) (312)
-
- Electronic Theses and Dissertations (303)
- Against the Grain (287)
- Faculty Publications (192)
- Independent Study Project (ISP) Collection (181)
- USF Tampa Graduate Theses and Dissertations (180)
- Dissertations (158)
- Library Philosophy and Practice (e-journal) (157)
- Masters Theses (157)
- The Qualitative Report (147)
- Theses, Dissertations, and Projects (147)
- Publications and Research (140)
- Electronic Thesis and Dissertation Repository (126)
- CLCWeb: Comparative Literature and Culture (121)
- Northeast Historical Archaeology (120)
- Honors Theses (118)
- Journalism and Strategic Media Syllabi (117)
- Dissertations and Theses (112)
- Graduate Theses and Dissertations (110)
- SURGE (109)
- Legacy Theses & Dissertations (2009 - 2024) (108)
- Richard G Roberts (107)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (103)
- HIM 1990-2015 (101)
- Psychology Faculty Publications (101)
- WKU Administration Documents (94)
- Publication Type
Articles 21931 - 21960 of 24845
Full-Text Articles in Social and Behavioral Sciences
Does The Life-Cycle Theory Really Matter? Saving And Spending Habits Of College Students, Kaitlin Karlson
Does The Life-Cycle Theory Really Matter? Saving And Spending Habits Of College Students, Kaitlin Karlson
Psychology Honors Papers
This study looked at the financial behavior of college students and recent alumni as it relates to economic theory and the life-cycle hypothesis. With student loans increasing dramatically and credit card debt becoming more of a reality, it is critical to understand what drives financial stability or instability after graduation. The pool of 230 participants was composed of 174 women and 56 men, representative of eight years of graduating classes, 2009-2016, from Connecticut College. Students comprised 29.1% of the participants and alumni made up the remaining 70.9%. Participants completed a survey including three quantitative measures on credit card use, financial …
Table Of Contents
Journal of the International Association for the Study of the Global Achievement Gap
No abstract provided.
The Voices And Choices Of Women In The Academy, Ramona Ortega, Brenda L. H. Marina, Lena Boustani Darwich, Eunju Rho, Isa Rodriquez-Soto, Rajade Berry-James
The Voices And Choices Of Women In The Academy, Ramona Ortega, Brenda L. H. Marina, Lena Boustani Darwich, Eunju Rho, Isa Rodriquez-Soto, Rajade Berry-James
Journal of the International Association for the Study of the Global Achievement Gap
While it is clear that gender inequity still exists, this situation is compounded by race, ethnicity and sexism. The daily experiences of women confirm that racism and sexism is alive and well. This article presents and examines the experiences of Latino, Black, Arab, and Asian professional women and the consequences of their career decisions. Synthesized with literature, conceptual patterns of significance are noted for young girls and women of color aspiring and pursuing professional careers in education. The strategies utilized by these diverse professional women to cope with the trials and tribulations of contemporary educational and professional challenges are reviewed. …
Measuring Inconsistency Methods For Evidentiary Value, Fred Cohen
Measuring Inconsistency Methods For Evidentiary Value, Fred Cohen
Journal of Digital Forensics, Security and Law
Many inconsistency analysis methods may be used to detect altered records or statements. But for admission as evidence, the reliability of the method has to be determined and measured. For example, in China, for evidence to be admitted, it has to have 95% certainty of being correct,1 and that certainty must be shown to the court, while in the US, evidence is admitted if it is more probative than prejudicial (a >50% standard).2 In either case, it is necessary to provide a measurement of some sort in order to pass muster under challenges from the other side. And in most …
A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton
A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton
Journal of Digital Forensics, Security and Law
Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using …
How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw
How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw
Journal of Digital Forensics, Security and Law
This research introduced two new scales for the identification and measurement of negative sentiment and insider risk in communications in order to examine the unexplored relationship between these two constructs. The inter-rater reliability and criterion validity of the Scale of Negativity in Texts (SNIT) and the Scale of Insider Risk in Digital Communications (SIRDC) were established with a random sample of email from the Enron archive and criterion measures from established insiders, disgruntled employees, suicidal, depressed, angry, anxious, and other sampled groups. In addition, the sensitivity of the scales to changes over time as the risk of digital attack increased …
Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle
Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle
Journal of Digital Forensics, Security and Law
Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula
Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula
Journal of Digital Forensics, Security and Law
Fraud is a multi-billion dollar industry that continues to grow annually. Many organizations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper, we adopt a DesignScience methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated by developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of …
Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee
Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee
Journal of Digital Forensics, Security and Law
The discipline of information security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for the security professional, especially for areas such as digital forensics. Challenges can be in the form of new devices such as smartphones or new methods of sharing information, such as social networks. One such rapidly emerging interaction technology is the use of Quick Response (QR) codes. These offer a physical mechanism for quick access to Web sites for advertising and social interaction. This paper argues that the common implementation of QR codes potentially presents security …
How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw
How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw
Journal of Digital Forensics, Security and Law
This research uses two recently introduced observer rating scales, (Shaw et al., 2013) for the identification and measurement of negative sentiment (the Scale for Negativity in Text or SNIT) and insider risk (Scale of Indicators of Risk in Digital Communication or SIRDC) in communications to test the performance of psycholinguistic software designed to detect indicators of these risk factors. The psycholinguistic software program, WarmTouch (WT), previously used for investigations, appeared to be an effective means for locating communications scored High or Medium in negative sentiment by the SNIT or High in insider risk by the SIRDC within a randomly selected …
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle
Journal of Digital Forensics, Security and Law
Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …
Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, Thomas Nash
Journal of Digital Forensics, Security and Law
In this must read for any aspiring novice cybercrime investigator as well as the seasoned professional computer guru alike, Brett Shaver takes the reader into the ever changing and dynamic world of Cybercrime investigation. Shaver, an experienced criminal investigator, lays out the details and intricacies of a computer related crime investigation in a clear and concise manner in his new easy to read publication, Placing the Suspect behind the Keyboard. Using Digital Forensics and Investigative techniques to Identify Cybercrime Suspects. Shaver takes the reader from start to finish through each step of the investigative process in well organized …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko
Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko
Journal of Digital Forensics, Security and Law
The article surveys the changing risk environment for corporations from their employees’ electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of a traditional “laundry list” of internet use prohibitions.
Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
Journal of Digital Forensics, Security and Law
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson
Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson
Journal of Digital Forensics, Security and Law
Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades. As the total amount of data stored rapidly increases in conjunction with the amount of widely available computer-driven devices being used, solutions are being developed to better harness this data (LaTulippe, 2011). One of these solutions is commonly known as a search appliance. Search appliances have been used in e-discovery for several years. The Google Mini Search Appliance (Mini) has not only been used for e-discovery, but for indexing and searching internal documents. To accomplish these tasks, search …
The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann
The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann
Journal of Digital Forensics, Security and Law
As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the …
Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen
Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen
Journal of Digital Forensics, Security and Law
Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned.
Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler
Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler
Journal of Digital Forensics, Security and Law
Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multidigit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Letter Of Purpose Of The Feminist Evolutionary Psychology Society, T. Joel Wade
Letter Of Purpose Of The Feminist Evolutionary Psychology Society, T. Joel Wade
Faculty Journal Articles
It has been almost five years since the formation of the Feminist Evolutionary Psychology Society (FEPS), which was created with the hopes of drawing attention to issues that influence women’s role in evolution. In those years, FEPS has changed into a more structured society with clear aims. In this letter, we review the rationale for creating FEPS, as well as how we structured FEPS to be an effective organization. The majority of the letter pertains to four distinct goals of FEPS that we will continue to address in the future. These goals are to investigate the active role of women …
Still Desperately Seeking Citations: Undergraduate Research In The Age Of Web-Scale Discovery., Lisa Rose-Wiles, Melissa M. Hofmann
Still Desperately Seeking Citations: Undergraduate Research In The Age Of Web-Scale Discovery., Lisa Rose-Wiles, Melissa M. Hofmann
Praxis Publications
Web-scale discovery services promise fast, easy searching from a single Google-like box, pleasing users and making library resources more discoverable. Some librarians embrace the concept of giving users what they have come to expect from Google, while others are concerned that this will “dumb down” searching and undermine information literacy. In this paper we explore the potential impact of web-scale discovery tools on information literacy, focusing particularly on undergraduate research skills. We review the existing literature and present findings and experiences from two mid-sized academic libraries that have adopted EBSCO Discovery Service as their library home page portal.
Geographical Literacies And Their Publics: Reflections On The American Scene, Karen M. Morin
Geographical Literacies And Their Publics: Reflections On The American Scene, Karen M. Morin
Faculty Journal Articles
No abstract provided.
Significance Is Bliss: A Global Feminist Analysis Of The Liberian Truth And Reconciliation Commission And Its Privileging Of Americo-Liberian Over Indigenous Liberian Women's Voices, Morgan Lea Eubank
USF Tampa Graduate Theses and Dissertations
The purpose of my research is to analyze the Liberian Truth and Reconciliation Commission (LTRC) lack of attention towards accessing rural Liberian women's voices as opposed to privileged Liberian women residing in urban and Diaspora spaces. By analyzing the LTRC and its Final Report from a critical global feminist perspective, I was able to not only illuminate, but bring a spotlight over issues including access, privilege, and multicultural insensitivity related to Liberia's indigenous tribal cultures. Liberia, being a country founded by American colonials, is socially constructed by Western ideological norms. As Western ideology is mainly normalized and enforced by the …
Rurality And Intimate Partner Homicide: Exploring The Relationship Between Place, Social Structure, And Femicide In North Carolina, Amelia Kirkland
Rurality And Intimate Partner Homicide: Exploring The Relationship Between Place, Social Structure, And Femicide In North Carolina, Amelia Kirkland
USF Tampa Graduate Theses and Dissertations
A developing body of research within the fields of criminology and rural sociology has emphasized the importance of considering geographic place in the study of interpersonal violence, and domestic violence in particular. Exploring how place is related to domestic violence lends itself to considerations of geographic variation in socio-structural conditions. A handful of studies since the 1980s have explored structural correlates of intimate abuse largely rooted in one of two theoretical contexts: social disorganization or gender inequality/patriarchy. However, knowledge regarding the relationship between place, social structure, and specific types of violence remains limited. The present study is intended as an …
The Effect Of Stealth Advertising In Newscasts On Viewers' Recall, Fany Georgieva
The Effect Of Stealth Advertising In Newscasts On Viewers' Recall, Fany Georgieva
USF Tampa Graduate Theses and Dissertations
Product placement, also referred to as stealth advertising, raises important questions when it comes to television because a far larger audience views television than movies. Product placement in newscasts is even more controversial. Television news is expected to be free of persuasive attempts and provide citizens with basic information that is of public importance. Yet, product placement blurs the line between journalism and commercial promotion, thus destroying the integrity of the news.
Product placement in newscasts raises ethical questions about the effect it has on viewers, provided that they do not realize that they are presented with commercials, framed as …
Spanish Exiles In New York : Constructing Identities Through The Spanish-Language Press (1930s-1940s), Natacha Bolufer-Laurentie
Spanish Exiles In New York : Constructing Identities Through The Spanish-Language Press (1930s-1940s), Natacha Bolufer-Laurentie
Legacy Theses & Dissertations (2009 - 2024)
Spanish Exiles in New York: Constructing Identities through the Spanish-Language Press (1930s-1940s)
A Study Of Habitat Selection By Blanding's Turtles (Emydoidea Blandingii) In Dutchess County, New York, Shannon Rauch
A Study Of Habitat Selection By Blanding's Turtles (Emydoidea Blandingii) In Dutchess County, New York, Shannon Rauch
Legacy Theses & Dissertations (2009 - 2024)
The Blanding's turtle (Emydoidea blandingii) is a New York State-listed threatened species with several disjunct populations located throughout the state. Blanding's turtles require a variety of habitat types including ponds, wetlands, vernal pools, and the surrounding uplands. Preserving these habitat complexes is necessary to ensure the persistence of Blanding's turtle populations, but this is becoming increasingly challenging in some locations due to significant development pressure. Key components of habitat protection are identifying preferred habitat types and gaining a better understanding of the variables that influence habitat selection. Previous landscape-level studies of turtles have found that land cover type, wetland type, …