Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (21)
- Old Dominion University (5)
- Southwestern Oklahoma State University (5)
- University of Nevada, Las Vegas (5)
- Kennesaw State University (4)
-
- Duquesne University (1)
- Georgia Southern University (1)
- Liberty University (1)
- South Dakota State University (1)
- University of Kentucky (1)
- University of Lynchburg (1)
- University of Nebraska at Omaha (1)
- University of the Incarnate Word (1)
- Virginia Commonwealth University (1)
- Western University (1)
- Keyword
-
- Application software (1)
- Automobile theft – Forecasting; Automobile theft—Prevention; Crime prevention (1)
- Big data (1)
- Biology (1)
- Botany (1)
-
- Chemistry (1)
- Climatic changes; Education (1)
- College (1)
- Computer Science (1)
- Constitutional right AND drugs (1)
- Data (1)
- Data science (1)
- Drug decriminalization (1)
- Drug legalization (1)
- Drug overdose (1)
- Drug trafficking (1)
- Drugs (1)
- Early college programs (1)
- Economics AND drugs (1)
- Engineering (1)
- Epidemiology (1)
- Health effects AND drugs (1)
- Higher; Sustainable development; Sustainability (1)
- Math (1)
- Mathematics (1)
- Opponents of drug legalization (1)
- Physics (1)
- Police (1)
- Police reports (1)
- Public-private sector cooperation; Service learning; Student volunteers in social service; Voluntarism (1)
- Publication Year
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (21)
- Cybersecurity Undergraduate Research Showcase (5)
- Oklahoma Research Day Abstracts (5)
- Symposium of Student Scholars (3)
- Biology and Medicine Through Mathematics Conference (1)
-
- College of Engineering: Graduate Celebration Programs (1)
- Commonwealth Computational Summit (1)
- Education for a Global Future: 21st Century Challenges in Sustainability & Climate Change Education (1)
- Graduate Research Symposium (GCUA) (2010 - 2017) (1)
- Graduate Student Research Symposium (1)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (1)
- International Conference on Gambling & Risk Taking (1)
- KSU Proceedings on Cybersecurity Education, Research and Practice (1)
- National Youth Advocacy and Resilience Conference (1)
- Population Change and Lifecourse Strategic Knowledge Cluster Conferences (1)
- Research Week Archived Proceedings (1)
- SDSU Data Science Symposium (1)
- Shaping the Future of Southern Nevada: Economic, Environmental, and Social Sustainability (1)
- Student Scholar Showcase (1)
- UNO Student Research and Creative Activity Fair (1)
- File Type
Articles 1 - 30 of 50
Full-Text Articles in Entire DC Network
Modeling The Dynamics Of Alcohol-Marijuana Co-Abuse In Virginia, Ana L. Vivas-Barber, James Tipton, Sujan Pant, Anne Fernando
Modeling The Dynamics Of Alcohol-Marijuana Co-Abuse In Virginia, Ana L. Vivas-Barber, James Tipton, Sujan Pant, Anne Fernando
Biology and Medicine Through Mathematics Conference
No abstract provided.
Drug Ideologies Of The United States, Macy Montgomery
Drug Ideologies Of The United States, Macy Montgomery
Helm's School of Government Conference - American Revival: Citizenship & Virtue
The United States has been increasingly creating lenient drug policies. Seventeen states and Washington, the District of Columbia, legalized marijuana, and Oregon decriminalized certain drugs, including methamphetamine, heroin, and cocaine. The medical community has proven that drugs, including marijuana, have myriad adverse health side effects. This leads to two questions: Why does the United States government continue to create lenient drug policies, and what reasons do citizens give for legalizing drugs when the medical community has proven them harmful? The paper hypothesizes that the disadvantages of drug legalization outweigh its benefits because of the numerous harms it causes, such as …
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Cybersecurity Undergraduate Research Showcase
According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).
The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
UNO Student Research and Creative Activity Fair
In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.
Two-Stage Approach For Forensic Handwriting Analysis, Ashlan J. Simpson, Danica M. Ommen
Two-Stage Approach For Forensic Handwriting Analysis, Ashlan J. Simpson, Danica M. Ommen
SDSU Data Science Symposium
Trained experts currently perform the handwriting analysis required in the criminal justice field, but this can create biases, delays, and expenses, leaving room for improvement. Prior research has sought to address this by analyzing handwriting through feature-based and score-based likelihood ratios for assessing evidence within a probabilistic framework. However, error rates are not well defined within this framework, making it difficult to evaluate the method and can lead to making a greater-than-expected number of errors when applying the approach. This research explores a method for assessing handwriting within the Two-Stage framework, which allows for quantifying error rates as recommended by …
How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson
How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson
Cybersecurity Undergraduate Research Showcase
As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.
Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang
Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang
Cybersecurity Undergraduate Research Showcase
As artificial intelligence continues to evolve rapidly with emerging innovations, mass-scale digitization could be disrupted due to unfair algorithms with historically biased data. With the rising concerns of algorithmic bias, detecting biases is essential in mitigating and implementing an algorithm that promotes inclusive representation. The spread of ubiquitous artificial intelligence means that improving modeling robustness is at its most crucial point. This paper examines the omnipotence of artificial intelligence and its resulting bias, examples of AI bias in different groups, and a potential framework and mitigation strategies to improve AI fairness and remove AI bias from modeling techniques.
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …
Why Does An Ex-Offender Reoffend?, Jacob Rybak
Why Does An Ex-Offender Reoffend?, Jacob Rybak
Symposium of Student Scholars
What leads to an offender to go back to prison? Iowa has collected data tracking recidivism to evaluate the effectiveness of its programs for released offenders. This data set includes the following for all of the offenders: age groups, type of release (parole vs being discharged at the end of their sentence), race, sex, year of release, supervising district, original offense, and whether they recidivated. For the offenders who return to prison, the data set includes measures on days to return, type of recidivism (technicality or new crime), and what the specific offense was that caused their return.
In the …
Marijuana Arrests In Toronto Canada: A Look Into The Canadian Criminal Justice System, Steven Tully
Marijuana Arrests In Toronto Canada: A Look Into The Canadian Criminal Justice System, Steven Tully
Symposium of Student Scholars
Marijuana related drug offenses made up fifty-eight percent of all Controlled Drugs and Substances Act offenses in Canada in 2016. On October 17, 2018, Canada legalized marijuana. As part of the efforts to legalize marijuana, descriptive statistics of single variables, like the age of the arrestees and the number of people arrested per year, were reported by the Toronto Star newspaper. The dataset analyzed in this research predates the legalization of marijuana and was collected from 1997 to 2002 on 5,226 individuals arrested in Toronto, Canada for simple possession of small quantities of marijuana. When an offender was arrested for …
Why Does An Ex-Offender Reoffend?, Jacob Rybak
Why Does An Ex-Offender Reoffend?, Jacob Rybak
Symposium of Student Scholars
What leads an offender to go back to prison? This researcher has lived in the Georgia State prison system for 3.5 years. Using personal insights as well as analytics, this researcher analyzes Iowa state’s six-year data set tracking recidivism of released offenders and recommends changes to the prison system to address the analytical findings.
The Iowa recidivism data set includes the following information for all offenders: age group, type of release (parole vs different discharges), release year, original offense, and whether they recidivated. For the recidivating offenders, the data set includes the days to return to prison, the type of …
Tackling Ai Bias With Gans, Noam Stanislawski
Tackling Ai Bias With Gans, Noam Stanislawski
Cybersecurity Undergraduate Research Showcase
Throughout the relatively short history of artificial intelligence (AI), there has been a significant concern surrounding AI’s ability to incorporate and maintain certain characteristics which were not inherently modeled out in its coding. These behaviors stem from the prominent usage of neural network AI, which can inherit human biases from the input data it receives. This paper argues for two possible avenues to combat these biases. The first is to rethink the traditional framework for neural network projects and retool them to be usable by a Generative Adversarial Network (GAN). In a GAN’s zero-sum game, two network techniques can combat …
Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar
Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
Phishing continues to be a significant invasive threat to computer and mobile device users. Cybercriminals continuously develop new phishing schemes using email, and malicious search engine links to gather personal information of unsuspecting users. This information is used for financial gains through identity theft schemes or draining financial accounts of victims. Users are often distracted and fail to fully process the phishing attacks then unknowingly fall victim to the scam until much later. Users operating mobile phones and computers are likely to make judgment errors when making decisions in distracting environments due to cognitive overload. Distracted users can fail to …
The Disconnect Between Forensic Science And The Lawyers And Judges Who Represent It, Hannah Reidenbaugh
The Disconnect Between Forensic Science And The Lawyers And Judges Who Represent It, Hannah Reidenbaugh
Graduate Student Research Symposium
The goal of this research is to demonstrate a knowledge gap in the forensic science education of lawyers. In law schools across the country, there is minimal curriculum requirements focused on educating law students in forensic science. Of the top 50 law schools in the U.S., 20% offer a forensic science elective. After the rigor of law school, there is no requirement set to educate lawyers in forensic science. In fact, based on survey responses, 51% of criminal lawyers do not take part in forensic science continuing education programs. Though educators as well as professionals have voiced the need for …
The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes
The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes
Cybersecurity Undergraduate Research Showcase
This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source …
12th Annual Research Week--Event Proceedings, Office Of Research And Sponsored Projects Operations
12th Annual Research Week--Event Proceedings, Office Of Research And Sponsored Projects Operations
Research Week Archived Proceedings
12th Annual Research Week
"A Celebration of Student Research"
Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski
Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski
Student Scholar Showcase
The Enron Scandal of the early 2000s shook the financial world. The subsequent investigation of the Enron Corporation resulted in the arrests of many top-level executives, but are these employees the only ones responsible for the wide scale fraud in the company? A topical analysis of a social network of over 150 employees of the Enron Corporation using Graph Theory could result in new findings or prove that the investigators were correct in their original findings. The research is a retrospective analysis of a corpus of over 500,000 emails from more than 150 employees and top-level executives of the Enron …
Harnessing The Data Revolution, Chaitan Baru
Harnessing The Data Revolution, Chaitan Baru
Commonwealth Computational Summit
Harnessing Data for 21st Century Science and Engineering (aka Harnessing the Data Revolution, HDR) is one of NSF's six "Big Research Ideas," aimed at supporting fundamental research in data science and engineering; developing a cohesive, federated approach to the research data infrastructure needed to power this revolution; and developing of a 21st-century data-capable workforce. HDR will enable new modes of data-driven discovery allowing researchers to ask and answer new questions in frontier science and engineering, generate new knowledge and understanding by working with domain experts, and accelerate discovery and innovation. This initiative builds on NSF's history of data science investments. …
Early College High Schools: Achieving The Dream Of College For Urban, North Texas Students, Wendy N. Jasper
Early College High Schools: Achieving The Dream Of College For Urban, North Texas Students, Wendy N. Jasper
National Youth Advocacy and Resilience Conference
Tarrant County College, an Achieving the Dream Leader College, has created an environment at its district that has made an Associate’s Degree attainable for students in the county’s most challenged high schools and may provide ideas for outreach and recruitment to those interested in developing an Early College High School within their home institution.
17. Psychology, Northeastern State University
17. Psychology, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner
Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner
Annual ADFSL Conference on Digital Forensics, Security and Law
The 2014 Digital Forensics Research Experience for Undergraduates (REU) Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on tracking criminal forums and Facebook groups. The UAB-REU Facebook team was provided with a list of about 60 known criminal groups on Facebook, with a goal to track illegal information posted in these groups and ultimately store the information in a searchable database for use by digital forensic analysts. Over the course of about eight weeks, the UAB-REU Facebook team created a database with over 400 Facebook groups conducting criminal activity along with over 100,000 unique users …
07. Criminal Justice, Northeastern State University
07. Criminal Justice, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang
Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang
Annual ADFSL Conference on Digital Forensics, Security and Law
The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …
Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar
Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …
07. Criminal Justice, University Of Central Oklahoma
07. Criminal Justice, University Of Central Oklahoma
Oklahoma Research Day Abstracts
No abstract provided.
Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha
Annual ADFSL Conference on Digital Forensics, Security and Law
This conceptual piece analyzes the role of criminal punishment and the nature of cyber crime to investigate whether the current punishment schemes are appropriate given the deontological and utilitarian goals of punishment: retribution, deterrence, incapacitation, and rehabilitation. The research has implications for policymaking in cybercriminal law.
Keywords: cybercrime, criminal law, punishment, retribution, deterrence, information economics
Session 4-2-A: Taking The Disorder Out Of Gambling Disorder, Denise F. Quirk, Colin M. Hodgen
Session 4-2-A: Taking The Disorder Out Of Gambling Disorder, Denise F. Quirk, Colin M. Hodgen
International Conference on Gambling & Risk Taking
DSM‐5 Gambling Disorder
A. Persistent and recurrent problematic gambling behavior leading to clinically significant impairment or distress, as indicated by four (or more) of the following in a 12‐month period:
A. Persistent and recurrent maladaptive gambling behavior as indicated by five (or more) of the following:
Development Of A Smart Application For Police Crash Reports, Sebastien Bonnet, Victor Molano, Alexander Paz
Development Of A Smart Application For Police Crash Reports, Sebastien Bonnet, Victor Molano, Alexander Paz
College of Engineering: Graduate Celebration Programs
- Gaining a significant amount of time to help police work
- Developing a User Friendly Interface
- Optimizing the GPS Gaining a significant amount of time to help police work
- Developing a User Friendly Interface
- Optimizing the bar code scan technology
- Application for MC 75 mobile technology
Longevity And Retirement: Thinking Outside The Box On Canada’S Retirement Income System, Michael Wolfson
Longevity And Retirement: Thinking Outside The Box On Canada’S Retirement Income System, Michael Wolfson
Population Change and Lifecourse Strategic Knowledge Cluster Conferences
No abstract provided.
07. Criminal Justice, University Of Central Oklahoma
07. Criminal Justice, University Of Central Oklahoma
Oklahoma Research Day Abstracts
No abstract provided.