Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 9751 - 9780 of 25673

Full-Text Articles in Social and Behavioral Sciences

Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson May 2014

Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson

Annual ADFSL Conference on Digital Forensics, Security and Law

During the present age and time, it seems as though people in society have become addicted to nearly anything and everything, whether it be to a substance, an activity or an object. The Internet and pornography is no exception. While commonly thought of as a deviant behavior, many are displaying addictions towards the Internet and pornography. More alarming, however, are those who are viewing, downloading, or trading child pornography and displaying addictive Internet behaviors, for they are spending excessive amounts of time engaging in the proliferation of child pornographic materials. For this reason, addiction to the Internet and usage of …


Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar May 2014

Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …


Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore May 2014

Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence …


Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone May 2014

Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone

Annual ADFSL Conference on Digital Forensics, Security and Law

Penetration testing of networks is a process that is overused when demonstrating or evaluating the cyber security posture of an organisation. Most penetration testing is not aligned with the actual intent of the testing, but rather is driven by a management directive of wanting to be seen to be addressing the issue of cyber security. The use of penetration testing is commonly a reaction to an adverse audit outcome or as a result of being penetrated in the first place. Penetration testing used in this fashion delivers little or no value to the organisation being tested for a number of …


Awareness Of Scam E-Mails: An Exploratory Research Study, Tejashree D. Datar, Kelly A. Cole, Marcus K. Rogers May 2014

Awareness Of Scam E-Mails: An Exploratory Research Study, Tejashree D. Datar, Kelly A. Cole, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

The goal of this research was to find the factors that influence a user’s ability to identify e-mail scams. It also aimed to understand user’s awareness regarding e-mail scams and actions that need to be taken if and when victimized. This study was conducted on a university campus with 163 participants. This study presented the participants with two scam e-mails and two legitimate e-mails and asked the participants to correctly identify these e-mails as scam or legitimate. The study focused on the ability of people to differentiate between scam and legitimate e-mails. The study attempted to determine factors that influence …


Privacy, Restriction, And Access: Legal And Ethical Dilemmas, Camila Z. Tessler May 2014

Privacy, Restriction, And Access: Legal And Ethical Dilemmas, Camila Z. Tessler

School of Information Student Research Journal

This paper examines the intersection of privacy and access in archival repositories. Archival repositories are well known for containing restricted material, and for protecting the privacy of the donors. This literature review examines the need for restricted material from both legal and ethical standpoints, as well as discussing culturally sensitive materials while determining what archives and libraries can do to protect both themselves and their donors while enhancing accessibility and freedom of information.


Digitization And Digital Preservation: A Review Of The Literature, Stephanie Routhier Perry May 2014

Digitization And Digital Preservation: A Review Of The Literature, Stephanie Routhier Perry

School of Information Student Research Journal

Digitization and digital preservation are rapidly becoming the standard forms of preservation for libraries, archives, and other cultural heritage institutions, yet there is still much confusion as to what they mean and how they are meant to be used. Through a review of the recent literature, this paper aims to define both concepts, as well as find some of the common challenges associated with these preservation processes. Different preservation methods, collaboration techniques, and metadata schema are also discussed.


Preparing Lis Students For A Career In Metadata Librarianship, Brighid Mooney Gonzales May 2014

Preparing Lis Students For A Career In Metadata Librarianship, Brighid Mooney Gonzales

School of Information Student Research Journal

This study examines the field of metadata librarianship and its emergence from the field of traditional MARC cataloging. Through a survey distributed to academic librarians, public librarians, digital librarians, special librarians, corporate librarians, archivists and others currently working with metadata, data was collected to determine what Library and Information Science students interested in metadata librarianship need to know to pursue a career in this field. The data collected includes job titles encompassing metadata work, the typical career trajectories of those working in the field, education and training received both prior to and after entering the metadata field, and the most …


First Class: Pioneering Students At San José State University’S School Of Library And Information Science, 1928-1940, Debra L. Hansen May 2014

First Class: Pioneering Students At San José State University’S School Of Library And Information Science, 1928-1940, Debra L. Hansen

School of Information Student Research Journal

This article examines the backgrounds, education, and careers of the first group of students in San José State University’s School of Library and Information Science. It finds that the 1928-1929 cohort were typical of the students attending teacher’s colleges in the early 1900s and represented the first generation of women pursuing higher education and professional careers following the passage of the 19th amendment in 1920. The study also explores the challenges working women faced during the 1930s, particularly the Great Depression’s impact California librarians.


Then & Now: The Changing Face Of The Library Professional, Adrienne Mathewson May 2014

Then & Now: The Changing Face Of The Library Professional, Adrienne Mathewson

School of Information Student Research Journal

No abstract provided.


Utility Players: A Library's Research Services Easily Integrate Into Translational Science Support, Sally A. Gore, Lisa A. Palmer May 2014

Utility Players: A Library's Research Services Easily Integrate Into Translational Science Support, Sally A. Gore, Lisa A. Palmer

Lisa A. Palmer

Describes how an institutional repository of scholarly publications and other library services can be utilized to support the dissemination of translational science research by providing access to an institution's published research, collecting and archiving grey literature, publicizing individual and department collections, and measuring research impact via usage statistics.

Presentation during the National Program Committee Section on Translational Research, Medical Library Association Annual Meeting, May 2012, Seattle, WA.


The Fashion Lottery: Cooperative Innovation In Stochastic Markets, Jonathan Barnett, Gilles Grolleau, Sana El Harbi May 2014

The Fashion Lottery: Cooperative Innovation In Stochastic Markets, Jonathan Barnett, Gilles Grolleau, Sana El Harbi

Jonathan M Barnett

The fashion market is an anomaly: innovation is vigorous but original producers are substantially unprotected against imitation, which proliferates under an incomplete property regime consisting of strong trademark protections and weak design protections. We account for this anomaly through a “cooperative innovation” model where producers prefer an incomplete property regime that permits some imitation to alternative regimes that permit no imitation or all imitation, independent of budget constraints. A property regime that permits positive but limited levels of imitation operates as a form of group insurance that alleviates the risk of recoupment failure in a market characterized by demand uncertainty, …


The Host's Dilemma: Strategic Forfeiture In Platform Markets For Informational Goods, Jonathan M. Barnett May 2014

The Host's Dilemma: Strategic Forfeiture In Platform Markets For Informational Goods, Jonathan M. Barnett

Jonathan M Barnett

Voluntary forfeiture of intellectual assets—often, exceptionally valuable assets--is surprisingly widespread in information technology markets. A simple economic rationale can account for these practices. By giving away access to core technologies, a platform holder commits against expropriating (and thereby induces) user investments that support platform value. To generate revenues that cover development and maintenance costs, the platform holder must regulate access to other goods and services within the total consumption bundle. The tradeoff between forfeiting access (to induce adoption) and regulating access (to recover costs) anticipates the substantial convergence of open and closed innovation models. Organizational patterns in the software and …


Intermediaries Revisited: Is Efficient Certification Consistent With Profit Maximization?, Jonathan M. Barnett May 2014

Intermediaries Revisited: Is Efficient Certification Consistent With Profit Maximization?, Jonathan M. Barnett

Jonathan M Barnett

Private certification mechanisms are a key component of the regulatory infrastructure in the financial sector and other commercial settings. It is generally assumed that certification intermediaries have profit-based incentives to deliver accurate information to the certified market. But this view does not account for repeated failures in certification markets. Those failures can be explained by an inherent defect in the incentive structure of certification intermediaries: entry barriers both support and undermine the consistent supply of accurate information to the certified market. Certification markets tend to converge on a handful of providers protected by switching costs, product opacity and reputational noise. …


Intellectual Property As A Law Of Organization, Jonathan M. Barnett May 2014

Intellectual Property As A Law Of Organization, Jonathan M. Barnett

Jonathan M Barnett

The incentive thesis for patents is challenged by the existence of alternative means by which firms can capture returns on innovation. Taking into account patent alternatives yields a robust reformulation of the incentive thesis as mediated by organizational form. Patents enable innovators to make efficient selections of firm scope by transacting with least-cost suppliers of commercialization inputs. These expanded transactional opportunities reduce the minimum size of the market into which any innovator—or the supplier of any other technological or production input—can attempt entry. Disaggregation of the innovation and commercialization process then induces the formation of secondary markets in disembodied technology …


Property As Process: How Innovation Markets Select Innovation Regimes, Jonathan M. Barnett May 2014

Property As Process: How Innovation Markets Select Innovation Regimes, Jonathan M. Barnett

Jonathan M Barnett

It is commonly asserted that innovation markets suffer from excessive intellectualproperty protections, which in turn stifle output. But empirical inquiries can neither confirm nor deny this assertion. Under the “agnostic” assumption that we cannot assess directly whether intellectual-property coverage is excessive, an alternative query is proposed: can the market assess if any “propertization outcome” is excessive and then undertake actions to yield a socially preferable outcome? Grounded in the “bottom up” methodology of new institutional economics, this process-based approach takes the view that innovator populations make rent-seeking investments that continuously “select” among a range of “innovation regimes” that trade off …


City Of Concord Complete Streets Plan Data, William Riggs May 2014

City Of Concord Complete Streets Plan Data, William Riggs

City and Regional Planning

Bicycle & pedestrian volume data from May 7 & 8, 2014 gathered as a part of by CalPoly San Luis Obispo students. data gathering and analysis for the City of Concord Streetscape Assessment. A data summary map is available on Google at: https://mapsengine.google.com/map/edit?mid=zUgcypEGSusE.kTpGu2CWK_OE.


Apologies Of The Rich And Famous: Cultural, Cognitive, And Social Explanations Of Why We Care And Why We Forgive, Janet M. Ruane, Karen Cerulo May 2014

Apologies Of The Rich And Famous: Cultural, Cognitive, And Social Explanations Of Why We Care And Why We Forgive, Janet M. Ruane, Karen Cerulo

Department of Sociology Faculty Scholarship and Creative Works

In recent years, U.S. and other Western media have inundated the public with celebrity apologies. The public (measured via representative opinion polls) then expresses clear ideas about who deserves forgiveness. Is forgiveness highly individualized or tied to broader social, cultural, and cognitive factors? To answer this question, we analyzed 183 celebrity apologies offered between October 1, 2000, and October 1, 2012. Results are twofold and based in both cultural and social psychological perspectives. First, we found that public forgiveness is systematically tied to discursive characteristics of apologies—particularly sequential structures. Certain sequences appear to cognitively prime the public, creating associative links …


Business As A Calling / Profit As A Virtue, C. William Pollard May 2014

Business As A Calling / Profit As A Virtue, C. William Pollard

C. William Pollard Papers

This speech was delivered at a Symposium on Corporations, Capitalism, and Christianity sponsored by The Center for Lifelong Learning at Windsor Park Retirement Community in Carol Stream, IL. In it Pollard considers the integration of business and faith, focusing primarily on how leaders must cultivate the humanity of their employees while simultaneously maximizing profit.


Keynote: Big Data, Big Opportunities, Christine Borgman May 2014

Keynote: Big Data, Big Opportunities, Christine Borgman

Christine L. Borgman

The enthusiasm for big data is obscuring the complexity and diversity of data in scholarship and the challenges for stewardship. Inside the black box of data are a plethora of research, technology, and policy issues. Data are not shiny objects that are easily exchanged. Rather, data are representations of observations, objects, or other entities used as evidence of phenomena for the purposes of research or scholarship. Data practices are local, varying from field to field, individual to individual, and country to country. They are a lens to observe the rapidly changing landscape of scholarly work in the sciences, social sciences, …


City Of Concord Complete Streets Plan Data, William Riggs May 2014

City Of Concord Complete Streets Plan Data, William Riggs

William W. Riggs

Bicycle & pedestrian volume data from May 7 & 8, 2014 gathered as a part of by CalPoly San Luis Obispo students. data gathering and analysis for the City of Concord Streetscape Assessment. A data summary map is available on Google at: https://mapsengine.google.com/map/edit?mid=zUgcypEGSusE.kTpGu2CWK_OE.


Klein, Thorpe, & Jenkins: Orland Park Public Library Fight – Part 6 -, Unknown May 2014

Klein, Thorpe, & Jenkins: Orland Park Public Library Fight – Part 6 -, Unknown

Orland Park Public Library (Illinois), 2013

No abstract provided.


Klein, Thorpe, & Jenkins: Orland Park Public Library Fight – Part 5 -, Unknown May 2014

Klein, Thorpe, & Jenkins: Orland Park Public Library Fight – Part 5 -, Unknown

Orland Park Public Library (Illinois), 2013

No abstract provided.


Seeking Alternatives To High-Cost Textbooks: A Case Study Of The Umass Amherst Open Education Initiative, Marilyn S. Billings May 2014

Seeking Alternatives To High-Cost Textbooks: A Case Study Of The Umass Amherst Open Education Initiative, Marilyn S. Billings

Marilyn S. Billings

The high cost and lack of availability of commercial print textbooks is a major concern for both students and their parents. To address these concerns, the Provost’s Office and the University Libraries of the University of Massachusetts Amherst launched the Open Education Initiative (OEI) in the Spring of 2011, having saved over $1 million to date. This presentation provides a case study of the UMA experience. This model has an implementation strategy that is easy for others to adopt.


Ux, It’S Not A New State In The Union: User Experience Explained!, Amy Vecchione, Deana Brown May 2014

Ux, It’S Not A New State In The Union: User Experience Explained!, Amy Vecchione, Deana Brown

Library Faculty Publications and Presentations

Using user experience (UX) methodologies, libraries can improve their web site by identifying the tasks that their users need to accomplish, and then eliminate those barriers. This process sounds easy enough, but if your library makes web site decisions based on self-referential or anecdotal data, then it’s not being geared towards user’s tasks and goals. By following user experience principles, libraries can clearly identify problematic touchpoints, or expand upon touchpoints that users value the most. Here’s a quick overview.


Femininity, Masculinity, Gender, And The Role Of Shame On Christian Men And Women In The Evangelical Church Culture, Joy L. Hottenstein May 2014

Femininity, Masculinity, Gender, And The Role Of Shame On Christian Men And Women In The Evangelical Church Culture, Joy L. Hottenstein

Doctor of Psychology (PsyD)

Previous research has suggested that individuals (men and women) who endorse more feminine characteristics according to Bem’s Sex Role Inventory (BSRI) are more prone to shame. There have been no known studies conducted to determine if this link also exists within the Evangelical Christian church. Shame, across the research literature, is linked to psychological maladjustment and is defined as a sense that one’s core self is defective and comes up short on expectations. The purpose of this study is to test the relationship between gender, gender role, and shame for men and women who are active in the Evangelical church …


Cuba In Splinters: Eleven Stories From The New Cuba, Book Presentation By Editor Orlando Luis Pardo Lazo, Cuban Research Institute, Florida International University May 2014

Cuba In Splinters: Eleven Stories From The New Cuba, Book Presentation By Editor Orlando Luis Pardo Lazo, Cuban Research Institute, Florida International University

Cuban Research Institute Events

This flyer promotes the event "Cuba in Splinters: Eleven Stories from the New Cuba, Book Presentation by Editor Orlando Luis Pardo Lazo" held at Books & Books in Coral Gables.


Mediating Academic Success: Race, Class, Gender And Community College Persistence, Schaylee Marie Esparza May 2014

Mediating Academic Success: Race, Class, Gender And Community College Persistence, Schaylee Marie Esparza

Dissertations and Theses

Over the last forty years, the U.S. community college system has expanded, allowing disadvantaged groups greater access to higher education. With that expansion, a body of research has emerged examining community college students' educational outcomes. However, the research is limited in understanding the academic persistence of low-income students and community college student in particular. The purpose of this comparative, qualitative study is to explore some of the unanswered questions about how low income white and Latino students' experience academic persistence similarly and differently and understand how gender influences the challenges students may face during college.

This study draws from interviews …


Romanian Children’S Representations Of Negative And Self-Conscious Emotions In A Narrative Story Stem Technique, Loredana Apavaloaie, Timothy Page, Loren D. Marks May 2014

Romanian Children’S Representations Of Negative And Self-Conscious Emotions In A Narrative Story Stem Technique, Loredana Apavaloaie, Timothy Page, Loren D. Marks

Faculty Publications

This research uses children’s story-stem play narratives to investigate dimensions of negative emotional expression. Fifty-one Romanian children between 6 and 11-years old participated in the study. Children’s narratives were coded for three basic negative emotions and five self-conscious emotions. Parents completed a general questionnaire for demographic data and the amount of time they spent with their children. Differences were found for frequencies of negative emotional representations in relation to the specific story-stems in which they occurred. Girls were more likely than boys to enact in their narratives guilt feelings coupled with apology following some wrongdoing. Children who spent more time …


Where Are Your Papers?, Rebekah Mccloud May 2014

Where Are Your Papers?, Rebekah Mccloud

UCF Forum

My friend of 30 years died recently. Her husband called one Sunday in February to say she was gone.