Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Sociology

Conference

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 134

Full-Text Articles in Law

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds Apr 2024

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds

Cybersecurity Undergraduate Research Showcase

The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.

Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …


Global Criminal Justice Practices And Public Safety, Rachel Hwang Jan 2024

Global Criminal Justice Practices And Public Safety, Rachel Hwang

Posters-at-the-Capitol

Popular political discourse in the U.S. assumes that more funding for law enforcement and prison facilities will make civilians safer, presumably by reducing crime and sense of disorder. However, studies have shown that the relationship between these factors may not be as straightforward. With the killing of George Floyd and increased media coverage of police brutality, existing literature focuses mainly on the relationship between police and crime in the U.S. The impact of incarceration (the result of procedural justice) on the community (for whom procedural justice exists) is less known, especially on a global scale. We argue that cycling people …


Criminological Evaluation Of The Impact Of Pathological Ludomania To Gambling Among Nigerian Youths, George Nzeadi Duru Mr., Larry Okechukwu Awo Mr. May 2023

Criminological Evaluation Of The Impact Of Pathological Ludomania To Gambling Among Nigerian Youths, George Nzeadi Duru Mr., Larry Okechukwu Awo Mr.

International Conference on Gambling & Risk Taking

ABSTRACT

The study was designed to evaluate the effects of pathological ludomania to gambling on Nigerian youth. The study looked at how get-rich-quick mentality, access to gaming, and poverty can lead to gambling ludomania in young people. The Social Learning and Differential Association Theories were debated and chosen as the theoretical framework for the study. A questionnaire created to represent the study's research topics was utilized to collect the study's data. A structured questionnaire was sent to two hundred (200) respondents, who were chosen using a multi-stage sampling procedure. The data were analyzed using simple percentage, descriptive, and chi-square statistical …


Giglio Feds: The Void Of Ethical Leadership Within Federal Law Enforcement, Christopher J. Boosey May 2023

Giglio Feds: The Void Of Ethical Leadership Within Federal Law Enforcement, Christopher J. Boosey

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Crossfire In The Crosshairs: Why Prosecutions Are Necessary In The Interests Of The Republic, Christopher J. Boosey May 2023

Crossfire In The Crosshairs: Why Prosecutions Are Necessary In The Interests Of The Republic, Christopher J. Boosey

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Gbsv Resource Guide And Review For The University Of Western Ontario And Surrounding Area, Alyssa J. Madhani Aug 2022

Gbsv Resource Guide And Review For The University Of Western Ontario And Surrounding Area, Alyssa J. Madhani

Undergraduate Student Research Internships Conference

During the 2021-2022 academic year, gender-based violence and sexual assault became a major topic of discussion due to a number of troubling incidents throughout the year. One of the largest calls to action by the student body was for more resources and trainings. This paper compiles the resources and trainings that can be found on campus of the University of Western Ontario and in the surrounding areas into a cohesive list of major relevant sources. The goal of this paper is to amplify the many different programs already in place that can be added to the training cohorts or made …


A Qualitative Look Into Repair Practices, Jumana Labib Aug 2022

A Qualitative Look Into Repair Practices, Jumana Labib

Undergraduate Student Research Internships Conference

This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …


Reformation Within The Nation: Adapting The Nordic Rehabilitation And Reintegration Model To Positively Recondition The United States Criminal Justice System, Jessica Cornell Apr 2022

Reformation Within The Nation: Adapting The Nordic Rehabilitation And Reintegration Model To Positively Recondition The United States Criminal Justice System, Jessica Cornell

Helm's School of Government Conference - American Revival: Citizenship & Virtue

An analytical and statistical based comparison of criminal sentencing, incarceration, rehabilitation and reintegration in the United States of America to those of the five countries which follows those of the Nordic Criminal Justice System.


How The Family And Medical Leave Act Does Not Serve Women Of Color, Anahi Casas Perez Mar 2022

How The Family And Medical Leave Act Does Not Serve Women Of Color, Anahi Casas Perez

Seaver College Research And Scholarly Achievement Symposium

Presentation Type

Poster Presentation

Keywords

Woman of Color, single mother of color, Family and Medical Leave Act

Department

Social Work/ Sociology

Major

Music with an Emphasis in Voice

Abstract

The Family and Medical Leave, FMLA, was enacted into Federal law in 1993 under the Bill Clinton Administration to enable employees to take unpaid time off to tend to a medical or familial event that makes attendance at work impossible. Specifically, FMLA was created to

“to balance the demands of the workplace with the needs of families, to promote the stability, economic security of families, and promote national interests in preserving …


Sticky Situations: Understanding The Law And Life, Krystal Banks Mar 2022

Sticky Situations: Understanding The Law And Life, Krystal Banks

National Youth Advocacy and Resilience Conference

Law and life go hand in hand. Understanding the law and how it connects to life can be an effective tool in teaching youth and adults the value of making good decisions when it comes to life and the law. Sticky Situations places real-world situations in the context of learning how to apply the law and effectively respond to life's sticky situations.


2022 Mlk Keynote Address: Eddie Glaude Jr. Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr. Jan 2022

2022 Mlk Keynote Address: Eddie Glaude Jr. Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr.

Martin Luther King, Jr. Series

One of the nation’s most prominent scholars, Eddie Glaude, Jr. is an author, political commentator, public intellectual and passionate educator who examines the complex dynamics of the American experience. His writings, including his most recent—the New York Times bestseller Begin Again: James Baldwin’s America and Its Urgent Lessons for our Own—take a wide look at Black communities, the difficulties of race in the United States and the challenges we face as a democracy.

In his writing and speaking, Glaude is an American critic in the tradition of James Baldwin and Ralph Waldo Emerson, confronting history and bringing our nation’s …


2022 Mlk Keynote Address: Eddie Glaude Jr. Pre-Event Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr. Jan 2022

2022 Mlk Keynote Address: Eddie Glaude Jr. Pre-Event Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr.

Martin Luther King, Jr. Series

One of the nation’s most prominent scholars, Eddie Glaude, Jr. is an author, political commentator, public intellectual and passionate educator who examines the complex dynamics of the American experience. His writings, including his most recent—the New York Times bestseller Begin Again: James Baldwin’s America and Its Urgent Lessons for our Own—take a wide look at Black communities, the difficulties of race in the United States and the challenges we face as a democracy.

In his writing and speaking, Glaude is an American critic in the tradition of James Baldwin and Ralph Waldo Emerson, confronting history and bringing our nation’s …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Refugee Homes And The Right To Property: Sunk Costs And Networked Mobility, Jordan Hayes Dec 2021

Refugee Homes And The Right To Property: Sunk Costs And Networked Mobility, Jordan Hayes

Biennial Conference: The Social Practice of Human Rights

For refugees outside their state of origin, access to humanitarian protection can come at the cost of the right to own a home. Following Anneke Smit’s scholarship on the possible contradictions between humanitarian protection and property rights, this paper explores the case of refugee homes built in the Kurdistan Region of Iraq (KRI) by Syrian asylum seekers. Interviews with Syrian refugees collected in Iraq from 2018-2019 reveal the paradoxical situation faced by refugees who invest time, expertise, memory, hope, and money in a house—yet do not own it. While non-citizens in the KRI rarely have the chance to secure legal …


Parental Leave Policy And It's Impacts On Educators In Public Schools., Tahy Addison Nov 2021

Parental Leave Policy And It's Impacts On Educators In Public Schools., Tahy Addison

Symposium of Student Scholars

Parental Leave and it’s impacts on educators within public schools. Tahy Addison Candidate for the B.S. in Human Services with a concentration in Nonprofit Management and Social Innovation Department of Social Work and Human Services

Dr. Jennifer A. Wade-Berg, Research Mentor

Abstract

Public Law 103-3 cited as the Family and Medical leave Act of 1993, was enacted to grant family and temporary medical leave under certain circumstances. The Family Medical Leave Act (FMLA) was created for Americans who feel that their career takes valuable time away from their children and loved ones. FMLA allows eligible employees up to 12-weeks of …


The Right To Repair: (Re)Building A Better Future, Jumana Labib Aug 2021

The Right To Repair: (Re)Building A Better Future, Jumana Labib

Undergraduate Student Research Internships Conference

The goal of this research project was to take a multi-faceted, interdisciplinary approach to research and examine the Right to Repair movement’s progress, current repair practices, impediments, and imperatives, and the various large-scale implications (environmental, economic, social, etc.) stemming from diminished consumer freedom as a result of increased corporate greed and lack of governmental regulations with regards to repair and the environment. This poster exhibits the highlights of my general research project on the Right to Repair movement over the course of this four month internship, and aims to disseminate information about the movement to the wider public in an …


The Experiences Of Healthcare Workers And Lawyers Engaging In Remote Work, Desha Puri, Tracey L. Adams Dr. Aug 2021

The Experiences Of Healthcare Workers And Lawyers Engaging In Remote Work, Desha Puri, Tracey L. Adams Dr.

Undergraduate Student Research Internships Conference

This study aims to compare the experiences of healthcare workers and lawyers engaging in remote work during the Covid-19 pandemic. The research poster presents a content analysis of the current research on the experiences of professions in the two fields mentioned above. In engaging in content analysis, the study advances a select number of thematic value codes that effectively characterize the similarities and differences between the two professions. With these thematic values codes, it has been found that the healthcare profession and law profession have had a similar experience working from home. With these similarities and differences, one can propose …


Intersectionality And Accessibility To Social Services, Nora Khuder Apr 2021

Intersectionality And Accessibility To Social Services, Nora Khuder

Thinking Matters Symposium

In times of a crisis the intersectionality of sex, class, and ability creates a vulnerable population. Many available “resources'' are exhausted, due to high demand. Intersectionality signifies the impact of multiple intersecting identities in society as a direct correlation to the specific and unique barriers of marginalized groups. Resources are currently limited due to the lack of representative data. Although many studies have been conducted, many researchers have failed to capture the need of social services in rural areas.


Pornography: Social, Emotional And Mental Implications Among Adolescents, William Kelly Canady Mar 2021

Pornography: Social, Emotional And Mental Implications Among Adolescents, William Kelly Canady

National Youth Advocacy and Resilience Conference

This presentation will explain the historical development of pornography. It will highlight four segments: 1- Porn’s impact on brain development of reward pathways, ultimately increasing the appetite for more porn. 2- Porn can be a false substitute for real intimacy, resulting in decreased sexual satisfaction with a real person and increased verbal and physical aggression. 3- Porn promotes sex trafficking, promotes multiple sex partners and reduced STD prevention. 4- A review of interventions available to assist clients in navigating a lifestyle away from pornography.


#Aminext: The Link Between European Colonization And Gender-Based Violence In Contemporary South Africa, Jenna Meredith Pagel Jan 2021

#Aminext: The Link Between European Colonization And Gender-Based Violence In Contemporary South Africa, Jenna Meredith Pagel

Capstone Showcase

Alarmingly, the female murder rate in South Africa is five times the global average (BBC News 2019). According to data from 2017 and 2018, a woman is murdered every four hours in South Africa (Wilkinson 2019). More than 30 women were killed by their spouses in August 2019, and at least 137 sexual offenses are committed per day in South Africa (Francke 2019).

For this thesis, and in order to understand why South Africa has some of the highest rates of violence against women in the world, I consult a number of scholars who conclude that the overall issue of …


Title Ix Effectiveness At American Universities, Corrine K. Girard Apr 2020

Title Ix Effectiveness At American Universities, Corrine K. Girard

Discovery Day - Prescott

The purpose of this research is to contribute to and improve existing university knowledge of the effectiveness of the University Title IX reporting process. After discussing experiences with Title IX with students at ERAU, it is apparent that there is a negative connotation among university students with this program. This research will build off of the research completed last year in which ERAU Title IX processes were compared to that of Occidental College and CalTech. This research aims to provide clarity to Title IX offices at the University to aid in successfully adapting their program to the needs of the …