Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 9721 - 9750 of 25673

Full-Text Articles in Social and Behavioral Sciences

Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake May 2014

Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake

Annual ADFSL Conference on Digital Forensics, Security and Law

Most of the Live Video Systems do not preserve the Confidentiality principle, and send all frames of the video without any protection, allowing an easy “man in the middle” attack. But when it does, it uses cryptographic techniques over streaming data or makes use of secure channel systems. This generates low frame rate and demands many processor resources. In fact native Live Video Streaming demands many resources of all System.

In this paper we propose a technique to preserve confidentiality in Video Live Streaming applying a confusing visual method making use of the Toral Automorphism Spatial Transformation over each frame. …


What Do Parents In Mississippi Really Think About Sex Education In School?: Results Of A State-Level Survey, Colleen Mckee, Kathleen Ragsdale, Linda H. Southward May 2014

What Do Parents In Mississippi Really Think About Sex Education In School?: Results Of A State-Level Survey, Colleen Mckee, Kathleen Ragsdale, Linda H. Southward

Journal of Health Disparities Research and Practice

Purpose: Despite broad public support for comprehensive sex education, its implementation remains controversial in the United States, especially in states such as Mississippi that have been identified as politically conservative. This study examined parental opinions regarding the implementation of age-appropriate sex-related education (SRE) (i.e., abstinence-plus education) in Mississippi public schools.

Methods: Data were used from the first state-level survey of a randomized sample of parents (N = 3,600) of public school students in Mississippi. The sample was relatively equally distributed between non-Hispanic whites (52.8%) and African Americans (48.2%). Bivariate and multivariate analyses were conducted to determine parental support for …


Sexual Dysfunction Among Latino Men And Women With Poorly Controlled Diabetes, Sonjia Kenya, Cynthia N. Lebron, Hua Li, Yisel Alonzo, Ernesto Reyes, Olveen Carrasquillo May 2014

Sexual Dysfunction Among Latino Men And Women With Poorly Controlled Diabetes, Sonjia Kenya, Cynthia N. Lebron, Hua Li, Yisel Alonzo, Ernesto Reyes, Olveen Carrasquillo

Journal of Health Disparities Research and Practice

Latinos are the largest minority population in the United States and are diagnosed with diabetes at nearly twice the rate of non-Hispanic whites. Latinos not only suffer disproportionately from diabetes but also from diabetes related complications, including sexual dysfunction. Much of the existing literature on sexual dysfunction among Latinos with diabetes has focused on erectile dysfunction (ED). There is a dearth of information on sexual functioning among Latina women with diabetes or information on both genders in other sexual domains. Our study examined the prevalence of sexual dysfunction among a cohort of 106 poorly controlled Latino diabetics in South Florida …


Hiv And Sti Risk For Young Blacks In High Prevalence Areas: Implications For Health Equity In Communities Hosting Historically Black Colleges And Universities (Hbcus), Tanya Telfair Leblanc, Madeline Y. Sutton, Peter Thomas, Wayne A. Duffus May 2014

Hiv And Sti Risk For Young Blacks In High Prevalence Areas: Implications For Health Equity In Communities Hosting Historically Black Colleges And Universities (Hbcus), Tanya Telfair Leblanc, Madeline Y. Sutton, Peter Thomas, Wayne A. Duffus

Journal of Health Disparities Research and Practice

Background

Every year, thousands of young, black, high school graduates who are seeking higher education, attend one of the 105 historically black colleges and universities (HBCUs) located primarily in the south and east. The objective of the research was to examine the geographic proximity of HBCUs to areas of high HIV and STI disease burden among college age people to assess infectivity of potential sex partners in the areas surrounding HBCUs.

Methods

We examined the 14 states reporting the greatest HIV diagnoses burden among persons age 20-24 years old and STI burden among persons age 15 to 24 years old …


To Test Or Not To Test: Barriers And Solutions To Testing African American College Students For Hiv At A Historically Black College/University, Naomi M. Hall-Byers, Jennifer Peterson, Malynnda Johnson May 2014

To Test Or Not To Test: Barriers And Solutions To Testing African American College Students For Hiv At A Historically Black College/University, Naomi M. Hall-Byers, Jennifer Peterson, Malynnda Johnson

Journal of Health Disparities Research and Practice

Young African Americans are disproportionately affected by sexually transmitted infections, including HIV. The purpose was to identify reasons that African American college students at a historically Black college/university (HBCU) identified as barriers to HIV testing, and how these barriers can be removed. Fifty-seven heterosexual-identified undergraduate students (ages 18-25) attending an HBCU in the southeastern US participated in the study. Latent content analytic techniques were used to code the transcripts for themes and categories, and representative quotations were used in the findings. Qualitative data indicates three main themes used to avoid testing and three themes to encourage testing. Students were forthcoming …


Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt May 2014

Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt

Annual ADFSL Conference on Digital Forensics, Security and Law

As cybercrime continues to increase, new cyber forensics techniques are needed to combat the constant challenge of Internet anonymity. In instant messaging (IM) communications, criminals use virtual identities to hide their true identity, which hinders social accountability and facilitates cybercrime. Current instant messaging products are not addressing the anonymity and ease of impersonation over instant messaging. It is necessary to have IM cyber forensics techniques to assist in identifying cyber criminals as part of the criminal investigation. Instant messaging behavioral biometrics include online writing habits, which may be used to create an author writeprint to assist in identifying an author …


Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack May 2014

Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack

Annual ADFSL Conference on Digital Forensics, Security and Law

Botnets are responsible for a large percentage of damages and criminal activity on the Internet. They have shifted attacks from push activities to pull techniques for the distribution of malwares and continue to provide economic advantages to the exploiters at the expense of other legitimate Internet service users. In our research we asked; what is the cost of the procedural steps for forensically investigating a Botnet attack? The research method applies investigation guidelines provided by other researchers and evaluates these guidelines in terms of the cost to a digital forensic investigator. We conclude that investigation of Botnet attacks is both …


Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang May 2014

Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang

Annual ADFSL Conference on Digital Forensics, Security and Law

The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …


The Digital Repository Landscape: Developing A Research Guide To Selected Digital Repositories, Zheng (Jessica) Lu May 2014

The Digital Repository Landscape: Developing A Research Guide To Selected Digital Repositories, Zheng (Jessica) Lu

Jessica Lu

No abstract provided.


Computer Forensics For Accountants, Grover S. Kearns May 2014

Computer Forensics For Accountants, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …


Death By Masculinity, Elizabeth A. Rupert May 2014

Death By Masculinity, Elizabeth A. Rupert

SURGE

On Friday, May 23rd, a 22-year-old man killed four men and two women and injured 13 more people at the University of California Santa Barbara, citing women who were not “attracted” to him or “looked down on [him] as an inferior man” as the primary cause for his violent outbreak.


Lavery's Collection Development: At The Corner Of Library Wide Assessment And Value Added Services, Kate Ross, Micquel Little May 2014

Lavery's Collection Development: At The Corner Of Library Wide Assessment And Value Added Services, Kate Ross, Micquel Little

Lavery Library Faculty/Staff Publications

St. John Fisher College’s Lavery Library is focused on assessing value. One area being examined is the value of library collections in support of the library’s mission. In an effort to develop our collection at a user level, Lavery instituted a purchase on demand (POD) program in 2009. Increasingly, academic library POD programs are set up to automate the process based on specific criteria that will trigger a purchase, as a way to save time and streamline the process. In Lavery’s case study, Acquisitions has gone completely in the opposite direction, focusing on the service experience for our patrons instead. …


South Dakota 2014 Agricultural Land Values And Cash Rental Rates, Larry Janssen, Kim Dillivan, Bronc Mcmurty May 2014

South Dakota 2014 Agricultural Land Values And Cash Rental Rates, Larry Janssen, Kim Dillivan, Bronc Mcmurty

Economics Commentator

No abstract provided.


On The Art Of Teaching And Learning About Civilizations: History, Diversity, And Plot, David Curley May 2014

On The Art Of Teaching And Learning About Civilizations: History, Diversity, And Plot, David Curley

Global Humanities and Religion

This is the transcript of a lecture given at Western Washington University in the Department of Liberal Studies. My lecture will be part memoir, part book review, and part a history of the department in our early days. There will be three sections: ‘The History of Western Civilization’ at the University of Chicago; Great Books and Teaching about Diversity; and Plots and Curricula in the Department of Liberal Studies. My fundamental idea is that a course about a civilization’s history must be a kind of narrative, and that we can evaluate courses by thinking carefully about the relation between forms …


The “Community Entertainment District” Designation As A Tool For Urban Redevelopment In Cincinnati, Ohio, Whitney Mcintyre Miller, Julie Cencula Olberding May 2014

The “Community Entertainment District” Designation As A Tool For Urban Redevelopment In Cincinnati, Ohio, Whitney Mcintyre Miller, Julie Cencula Olberding

Education Faculty Articles and Research

Many urban neighborhoods in the United States have experienced an exodus of businesses. Their Main Streets—once consisting of bustling restaurants and stores—are now marked by “for rent” signs and boarded windows. Some community leaders have given up, but others are actively trying to bring businesses back. In Cincinnati, Ohio, several neighborhoods are starting to use the community entertainment district (CED) designation to attract entertainment and arts establishments. This paper presents an evaluation of the implementation and early impacts of the CED in one neighborhood, which may be insightful to leaders in other urban areas in Ohio and beyond.


A Lost Generation, Christopher R. Fee May 2014

A Lost Generation, Christopher R. Fee

English Faculty Publications

America is in immediate danger of throwing away a vast number of our young people; these are kids who have fallen through the gaping holes in our social services net and have landed on our streets. They roam this country by the thousands in search of simple necessities such as food and a warm place to sleep, often trading their bodies in exchange for the most basic of human rights. In the words of Michael Stoops, Director of Community Organizing at the National Coalition for the Homeless in Washington, DC, "there is a dire need for more shelter beds for …


Cuba: Punto X, Cuban Research Institute, Florida International University May 2014

Cuba: Punto X, Cuban Research Institute, Florida International University

Cuban Research Institute Events

This flyer promotes the play "Cuba: Punto X" presented by Sweet Home Museo Cubano.


Basic Human Health And Sustainable Community Development: A Case Study Of A Community In Monte Plata, Dominican Republic, Rachelle H. Arnoux May 2014

Basic Human Health And Sustainable Community Development: A Case Study Of A Community In Monte Plata, Dominican Republic, Rachelle H. Arnoux

Capstone Collection

One of my objectives in conducting this research is to enhance my skills in data collection while simultaneously improving my writing skills. More substantively, I wanted to explore how access to healthcare in a developing country like the Dominican Republic can contribute to sustainable development. As good health is fundamental and vital for all human beings, it is important in the context of this study to understand how the healthcare system in a particular country gives the population access to quality healthcare. Referring myself specifically to the situation at Batey Relief Alliance (BRA) Dominicana medical center in the Dominican Republic …


On The Link Between Conflict, Underdevelopment And The Pursuit Of Basic Needs Satisfaction: A Survey Of Haitian Construction Workers In The Dominican Republic, Joseph W. Alliance May 2014

On The Link Between Conflict, Underdevelopment And The Pursuit Of Basic Needs Satisfaction: A Survey Of Haitian Construction Workers In The Dominican Republic, Joseph W. Alliance

Capstone Collection

The purpose of this study was to explore how conflict and underdevelopment impact Haitian construction workers’ experiences and their basic human needs situation in the Dominican Republic. The Basic Human Needs Theory served as the main theoretical background to approach the topic. Qualitative data were gathered by employing a self- administered, one-time survey and conducting semi-structured interviews with 25 Haitian construction workers in sites located in the Distrito Nacional in the capital city, Santo Domingo and the Consuelo municipality in San Pedro de Macoris. Absence of work in Haiti for the very poor, systematic lack of access to social security, …


Cultivating Portlandia: A Mixed-Method Study Of Residential Urban Agriculture In Portland, Oregon, Nathan Mcclintock, Mike Simpson, Dillon Mahmoudi, Jacinto Pereira Santos May 2014

Cultivating Portlandia: A Mixed-Method Study Of Residential Urban Agriculture In Portland, Oregon, Nathan Mcclintock, Mike Simpson, Dillon Mahmoudi, Jacinto Pereira Santos

Urban Studies and Planning Faculty Publications and Presentations

Research Question:

  • What is the scale and scope of residential urban agriculture (UA) in metro Portland?
  • How does the practice of UA vary spatially?
  • How do gardeners' motivations and practices vary along socioeconomic lines?


Ua3/9/7 Information Technology, Wku President's Office - Ransdell May 2014

Ua3/9/7 Information Technology, Wku President's Office - Ransdell

WKU Administration Documents

Email from WKU president Gary Ransdell to faculty & staff regarding Information Technology.


Anticipated Coping With Interpersonal Stressors: Links With The Emotional Reactions Of Sadness, Anger, And Fear, Melanie Zimmer-Gembeck, Ellen Skinner, Helen Morris, Rae Thomas May 2014

Anticipated Coping With Interpersonal Stressors: Links With The Emotional Reactions Of Sadness, Anger, And Fear, Melanie Zimmer-Gembeck, Ellen Skinner, Helen Morris, Rae Thomas

Rae Thomas

The same stressor can evoke different emotions across individuals, and emotions can prompt certain coping responses. Responding to four videotaped interpersonal stressors, adolescents (N = 230, mean age = 10 years) reported their sadness, fear and anger, and 12 coping strategies. After identifying emotion patterns using cluster analysis, associations with coping were examined. Intensity of emotion, and emotion and stressor type were associated with coping. Adolescents with intense emotions (i.e., highly sad, afraid, and angry) anticipated using more of most coping responses, whereas diffuse but moderate intensity emotion was associated with more active coping relative to other strategies. Anger was …


Parent–Child Interaction Therapy: An Evidence-Based Treatment For Child Maltreatment, Rae Thomas, Melanie J. Zimmer-Gembeck May 2014

Parent–Child Interaction Therapy: An Evidence-Based Treatment For Child Maltreatment, Rae Thomas, Melanie J. Zimmer-Gembeck

Rae Thomas

It is common practice to augment efficacious treatment protocols for special populations (Durlak & DuPre, 2008), but this is often done before establishing that standard services are not appropriate. In this randomized controlled trial with families at risk or with a history of maltreatment (N = 151), we investigated the effectiveness of standard 12-session Parent–Child Interaction Therapy (PCIT). This is in contrast to other PCIT studies with similar parents, which have allowed for longer and sometimes variable treatment length and with modifications to PCIT protocol. After treatment and compared to Waitlist, mothers reported fewer child externalizing and internalizing behaviors, decreased …


Parent-Child Interaction Therapy: A Manualized Intervention For The Therapeutic Child Welfare Sector, Rae Thomas, Amy Herschell May 2014

Parent-Child Interaction Therapy: A Manualized Intervention For The Therapeutic Child Welfare Sector, Rae Thomas, Amy Herschell

Rae Thomas

Children who have experienced maltreatment can often display behavioral difficulties; their parents may lack disciplinary knowledge, be less sensitive to their children, and engage in coercive parenting practices. Parent-child interaction therapy (PCIT) is a well-known, evidence-based treatment (EBT) for child behavior problems and within the last decade has garnered significant evidence to suggest its utility for parents engaged in child maltreatment. This article uses a case example to describe PCIT treatment phases and PCIT research within the child maltreatment sector is synthesized with particular focus on treatment modifications. Successful augmentations and modifications include a motivation component, keeping therapeutic time shorter …


Managing The Public To Manage Data: Citizen Science And Astronomy, Peter Darch May 2014

Managing The Public To Manage Data: Citizen Science And Astronomy, Peter Darch

Peter Darch

Citizen Cyberscience Projects (CCPs) that recruit members of the public as volunteers to process and produce large datasets promise a great deal of benefits to scientists and science. However, if this promise is to be realised, and citizen science-produced datasets are to be widely-used by scientists, it is essential that these datasets win the trust of the scientific community. This task of securing credibility involves, in part, applying standard scientific procedures to clean-up datasets formed by volunteer contributions. However, the management of volunteers’ behaviour in terms of how they contribute also plays a significant role in improving both the quality …


Big Data, Open Data: Finding A Needle In A Digital Haystack, Christine L. Borgman May 2014

Big Data, Open Data: Finding A Needle In A Digital Haystack, Christine L. Borgman

Christine L. Borgman

Slides posted: https://cha.house.gov/2014-legislative-data-and-transparency-conference


Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov May 2014

Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov

Annual ADFSL Conference on Digital Forensics, Security and Law

Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient to various anti-forensic techniques, and others that require a reboot or are highly platform dependent. New resilient tools have certain disadvantages such as low speed or vulnerability to rootkits which directly manipulate kernel structures, e.g., page tables. A new memory forensic system – Malware Analysis System for Hidden Knotty Anomalies (MASHKA) is described in this paper. It is resilient to popular …


The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha May 2014

The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha

Annual ADFSL Conference on Digital Forensics, Security and Law

Pre-trial discovery is perpetually controversial. Parties advantaged by strict privacy can often avoid justice when this is disadvantageous to their interests. Contrawise, parties advantaged by relaxed litigation privacy can achieve justice when all facts are accessible irrespective of their repositories, ownership or control. American-style pre-trial discovery in civil and regulatory enforcement is relatively rare around the world. U.S. discovery rules open nearly all relevant and non-privileged data for use by opposing parties. The traditional discovery process was costly and time consuming in the world of tangible paper data. However, these burdens have increased, rather than diminished as often predicted, as …


Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter May 2014

Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Existing digital forensic investigation process models have provided guidelines for identifying and preserving potential digital evidence captured from a crime scene. However, for any of the digital forensic investigation process models developed across the world to be adopted and fully applied by the scientific community, it has to be tested. For this reason, the Harmonized Digital Forensic Investigation Process (HDFIP) model, currently a working draft towards becoming an international standard for digital forensic investigations (ISO/IEC 27043), needs to be tested.

This paper, therefore, presents the findings of a case study used to test the HDFIP model implemented in the ISO/IEC …


Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf May 2014

Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf

Annual ADFSL Conference on Digital Forensics, Security and Law

An important area in digital forensics is images of hard disks. The correct production of the images as well as the integrity and authenticity of each hard disk image is essential for the probative force of the image to be used at court. Integrity and authenticity are under suspicion as digital evidence is stored and used by software based systems. Modifications to digital objects are hard or even impossible to track and can occur even accidentally. Even worse, vulnerabilities occur for all current computing systems. Therefore, it is difficult to guarantee a secure environment for forensic investigations. But intended deletions …