Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social Control, Law, Crime, and Deviance

2022

Institution
Keyword
Publication
Publication Type

Articles 31 - 33 of 33

Full-Text Articles in Law

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Towards A Psychological Science Of Abolition Democracy: Insights For Improving Theory And Research On Race And Public Safety, Cynthia J. Najdowski, Phillip Atiba Goff Jan 2022

Towards A Psychological Science Of Abolition Democracy: Insights For Improving Theory And Research On Race And Public Safety, Cynthia J. Najdowski, Phillip Atiba Goff

Psychology Faculty Scholarship

We call for psychologists to expand their thinking on fair and just public safety by engaging with the “Abolition Democracy” framework that Du Bois (1935) articulated as the need to dissolve slavery while simultaneously taking affirmative steps to rid its toxic consequences from the body politic. Because the legacies of slavery continue to produce disparities in public safety in the U.S, both harming Black people and the institutions that could keep them safe, psychologists must take seriously questions of history and structure in addition to immediate situations. In the present article, we consider the state of knowledge regarding psychological processes …