Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Conference

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 50

Full-Text Articles in Entire DC Network

Modeling The Dynamics Of Alcohol-Marijuana Co-Abuse In Virginia, Ana L. Vivas-Barber, James Tipton, Sujan Pant, Anne Fernando May 2023

Modeling The Dynamics Of Alcohol-Marijuana Co-Abuse In Virginia, Ana L. Vivas-Barber, James Tipton, Sujan Pant, Anne Fernando

Biology and Medicine Through Mathematics Conference

No abstract provided.


Drug Ideologies Of The United States, Macy Montgomery May 2023

Drug Ideologies Of The United States, Macy Montgomery

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The United States has been increasingly creating lenient drug policies. Seventeen states and Washington, the District of Columbia, legalized marijuana, and Oregon decriminalized certain drugs, including methamphetamine, heroin, and cocaine. The medical community has proven that drugs, including marijuana, have myriad adverse health side effects. This leads to two questions: Why does the United States government continue to create lenient drug policies, and what reasons do citizens give for legalizing drugs when the medical community has proven them harmful? The paper hypothesizes that the disadvantages of drug legalization outweigh its benefits because of the numerous harms it causes, such as …


Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr Apr 2023

Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr

Cybersecurity Undergraduate Research Showcase

According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).

The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …


Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter Mar 2023

Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter

UNO Student Research and Creative Activity Fair

In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.


Two-Stage Approach For Forensic Handwriting Analysis, Ashlan J. Simpson, Danica M. Ommen Feb 2023

Two-Stage Approach For Forensic Handwriting Analysis, Ashlan J. Simpson, Danica M. Ommen

SDSU Data Science Symposium

Trained experts currently perform the handwriting analysis required in the criminal justice field, but this can create biases, delays, and expenses, leaving room for improvement. Prior research has sought to address this by analyzing handwriting through feature-based and score-based likelihood ratios for assessing evidence within a probabilistic framework. However, error rates are not well defined within this framework, making it difficult to evaluate the method and can lead to making a greater-than-expected number of errors when applying the approach. This research explores a method for assessing handwriting within the Two-Stage framework, which allows for quantifying error rates as recommended by …


How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson Apr 2022

How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson

Cybersecurity Undergraduate Research Showcase

As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.


Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang Jan 2022

Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang

Cybersecurity Undergraduate Research Showcase

As artificial intelligence continues to evolve rapidly with emerging innovations, mass-scale digitization could be disrupted due to unfair algorithms with historically biased data. With the rising concerns of algorithmic bias, detecting biases is essential in mitigating and implementing an algorithm that promotes inclusive representation. The spread of ubiquitous artificial intelligence means that improving modeling robustness is at its most crucial point. This paper examines the omnipotence of artificial intelligence and its resulting bias, examples of AI bias in different groups, and a potential framework and mitigation strategies to improve AI fairness and remove AI bias from modeling techniques.


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Why Does An Ex-Offender Reoffend?, Jacob Rybak Aug 2021

Why Does An Ex-Offender Reoffend?, Jacob Rybak

Symposium of Student Scholars

What leads to an offender to go back to prison? Iowa has collected data tracking recidivism to evaluate the effectiveness of its programs for released offenders. This data set includes the following for all of the offenders: age groups, type of release (parole vs being discharged at the end of their sentence), race, sex, year of release, supervising district, original offense, and whether they recidivated. For the offenders who return to prison, the data set includes measures on days to return, type of recidivism (technicality or new crime), and what the specific offense was that caused their return.

In the …


Marijuana Arrests In Toronto Canada: A Look Into The Canadian Criminal Justice System, Steven Tully Aug 2021

Marijuana Arrests In Toronto Canada: A Look Into The Canadian Criminal Justice System, Steven Tully

Symposium of Student Scholars

Marijuana related drug offenses made up fifty-eight percent of all Controlled Drugs and Substances Act offenses in Canada in 2016. On October 17, 2018, Canada legalized marijuana. As part of the efforts to legalize marijuana, descriptive statistics of single variables, like the age of the arrestees and the number of people arrested per year, were reported by the Toronto Star newspaper. The dataset analyzed in this research predates the legalization of marijuana and was collected from 1997 to 2002 on 5,226 individuals arrested in Toronto, Canada for simple possession of small quantities of marijuana. When an offender was arrested for …


Why Does An Ex-Offender Reoffend?, Jacob Rybak May 2021

Why Does An Ex-Offender Reoffend?, Jacob Rybak

Symposium of Student Scholars

What leads an offender to go back to prison? This researcher has lived in the Georgia State prison system for 3.5 years. Using personal insights as well as analytics, this researcher analyzes Iowa state’s six-year data set tracking recidivism of released offenders and recommends changes to the prison system to address the analytical findings.

The Iowa recidivism data set includes the following information for all offenders: age group, type of release (parole vs different discharges), release year, original offense, and whether they recidivated. For the recidivating offenders, the data set includes the days to return to prison, the type of …


Tackling Ai Bias With Gans, Noam Stanislawski Jan 2021

Tackling Ai Bias With Gans, Noam Stanislawski

Cybersecurity Undergraduate Research Showcase

Throughout the relatively short history of artificial intelligence (AI), there has been a significant concern surrounding AI’s ability to incorporate and maintain certain characteristics which were not inherently modeled out in its coding. These behaviors stem from the prominent usage of neural network AI, which can inherit human biases from the input data it receives. This paper argues for two possible avenues to combat these biases. The first is to rethink the traditional framework for neural network projects and retool them to be usable by a Generative Adversarial Network (GAN). In a GAN’s zero-sum game, two network techniques can combat …


Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar Oct 2020

Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

Phishing continues to be a significant invasive threat to computer and mobile device users. Cybercriminals continuously develop new phishing schemes using email, and malicious search engine links to gather personal information of unsuspecting users. This information is used for financial gains through identity theft schemes or draining financial accounts of victims. Users are often distracted and fail to fully process the phishing attacks then unknowingly fall victim to the scam until much later. Users operating mobile phones and computers are likely to make judgment errors when making decisions in distracting environments due to cognitive overload. Distracted users can fail to …


The Disconnect Between Forensic Science And The Lawyers And Judges Who Represent It, Hannah Reidenbaugh Mar 2020

The Disconnect Between Forensic Science And The Lawyers And Judges Who Represent It, Hannah Reidenbaugh

Graduate Student Research Symposium

The goal of this research is to demonstrate a knowledge gap in the forensic science education of lawyers. In law schools across the country, there is minimal curriculum requirements focused on educating law students in forensic science. Of the top 50 law schools in the U.S., 20% offer a forensic science elective. After the rigor of law school, there is no requirement set to educate lawyers in forensic science. In fact, based on survey responses, 51% of criminal lawyers do not take part in forensic science continuing education programs. Though educators as well as professionals have voiced the need for …


The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes Jan 2020

The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes

Cybersecurity Undergraduate Research Showcase

This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source …


12th Annual Research Week--Event Proceedings, Office Of Research And Sponsored Projects Operations Apr 2019

12th Annual Research Week--Event Proceedings, Office Of Research And Sponsored Projects Operations

Research Week Archived Proceedings

12th Annual Research Week

"A Celebration of Student Research"


Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski Apr 2018

Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski

Student Scholar Showcase

The Enron Scandal of the early 2000s shook the financial world. The subsequent investigation of the Enron Corporation resulted in the arrests of many top-level executives, but are these employees the only ones responsible for the wide scale fraud in the company? A topical analysis of a social network of over 150 employees of the Enron Corporation using Graph Theory could result in new findings or prove that the investigators were correct in their original findings. The research is a retrospective analysis of a corpus of over 500,000 emails from more than 150 employees and top-level executives of the Enron …


Harnessing The Data Revolution, Chaitan Baru Oct 2017

Harnessing The Data Revolution, Chaitan Baru

Commonwealth Computational Summit

Harnessing Data for 21st Century Science and Engineering (aka Harnessing the Data Revolution, HDR) is one of NSF's six "Big Research Ideas," aimed at supporting fundamental research in data science and engineering; developing a cohesive, federated approach to the research data infrastructure needed to power this revolution; and developing of a 21st-century data-capable workforce. HDR will enable new modes of data-driven discovery allowing researchers to ask and answer new questions in frontier science and engineering, generate new knowledge and understanding by working with domain experts, and accelerate discovery and innovation. This initiative builds on NSF's history of data science investments. …


Early College High Schools: Achieving The Dream Of College For Urban, North Texas Students, Wendy N. Jasper Mar 2017

Early College High Schools: Achieving The Dream Of College For Urban, North Texas Students, Wendy N. Jasper

National Youth Advocacy and Resilience Conference

Tarrant County College, an Achieving the Dream Leader College, has created an environment at its district that has made an Associate’s Degree attainable for students in the county’s most challenged high schools and may provide ideas for outreach and recruitment to those interested in developing an Early College High School within their home institution.


17. Psychology, Northeastern State University Jan 2016

17. Psychology, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner May 2015

Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

The 2014 Digital Forensics Research Experience for Undergraduates (REU) Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on tracking criminal forums and Facebook groups. The UAB-REU Facebook team was provided with a list of about 60 known criminal groups on Facebook, with a goal to track illegal information posted in these groups and ultimately store the information in a searchable database for use by digital forensic analysts. Over the course of about eight weeks, the UAB-REU Facebook team created a database with over 400 Facebook groups conducting criminal activity along with over 100,000 unique users …


07. Criminal Justice, Northeastern State University Jan 2015

07. Criminal Justice, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang May 2014

Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang

Annual ADFSL Conference on Digital Forensics, Security and Law

The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …


Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar May 2014

Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …


07. Criminal Justice, University Of Central Oklahoma Jan 2014

07. Criminal Justice, University Of Central Oklahoma

Oklahoma Research Day Abstracts

No abstract provided.


Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha Jun 2013

Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha

Annual ADFSL Conference on Digital Forensics, Security and Law

This conceptual piece analyzes the role of criminal punishment and the nature of cyber crime to investigate whether the current punishment schemes are appropriate given the deontological and utilitarian goals of punishment: retribution, deterrence, incapacitation, and rehabilitation. The research has implications for policymaking in cybercriminal law.

Keywords: cybercrime, criminal law, punishment, retribution, deterrence, information economics


Session 4-2-A: Taking The Disorder Out Of Gambling Disorder, Denise F. Quirk, Colin M. Hodgen May 2013

Session 4-2-A: Taking The Disorder Out Of Gambling Disorder, Denise F. Quirk, Colin M. Hodgen

International Conference on Gambling & Risk Taking

DSM‐5 Gambling Disorder

A. Persistent and recurrent problematic gambling behavior leading to clinically significant impairment or distress, as indicated by four (or more) of the following in a 12‐month period:

A. Persistent and recurrent maladaptive gambling behavior as indicated by five (or more) of the following:


Development Of A Smart Application For Police Crash Reports, Sebastien Bonnet, Victor Molano, Alexander Paz Apr 2013

Development Of A Smart Application For Police Crash Reports, Sebastien Bonnet, Victor Molano, Alexander Paz

College of Engineering: Graduate Celebration Programs

  • Gaining a significant amount of time to help police work
  • Developing a User Friendly Interface
  • Optimizing the GPS Gaining a significant amount of time to help police work
  • Developing a User Friendly Interface
  • Optimizing the bar code scan technology
  • Application for MC 75 mobile technology


Longevity And Retirement: Thinking Outside The Box On Canada’S Retirement Income System, Michael Wolfson Mar 2013

Longevity And Retirement: Thinking Outside The Box On Canada’S Retirement Income System, Michael Wolfson

Population Change and Lifecourse Strategic Knowledge Cluster Conferences

No abstract provided.


07. Criminal Justice, University Of Central Oklahoma Jan 2013

07. Criminal Justice, University Of Central Oklahoma

Oklahoma Research Day Abstracts

No abstract provided.