Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds Apr 2024

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds

Cybersecurity Undergraduate Research Showcase

The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.

Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …


Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung Apr 2024

Analyzing The Role Of Cybersecurity In Correctional Facilities, Jaysia I. Leeheung

Cybersecurity Undergraduate Research Showcase

In recent years, the use of technology has evolved in correctional facilities which may result in more vulnerabilities in correctional facilities systems. This study analyzes the types of security measures used in correctional facilities to stop cyber attacks such as firewalls, artificial intelligence, and facial recognition systems. The analysis also examines new challenges correctional facilities may face in cyber security and prevention strategies that will enhance cyber protection in correctional facilities. Additionally, this analysis compares the implementation of cyber security methods between jails and prisons.


The Role Of Osint In Criminal Investigations: Leveraging Open-Source Data To Combat Cybercrime And Organized Criminal Activities, Azariah Vaughan Mar 2024

The Role Of Osint In Criminal Investigations: Leveraging Open-Source Data To Combat Cybercrime And Organized Criminal Activities, Azariah Vaughan

Cybersecurity Undergraduate Research Showcase

In today's modern age driven by digital innovations, the widespread adoption of technology has transformed criminal activities, leading to the emergence of cybercrime as a significant challenge for law enforcement agencies globally. Cybercrime acts have left a considerable dent on criminal activities and nowadays that we are halfway into the subsequent technological era stands as one of the most crucial issues for law enforcement agencies all around the globe. The aim of this work is to discuss the relationship between cybercrime and organized crime and the importance of OSINT within criminal investigations in supporting law enforcement itself. Particularly, due to …


Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania Dec 2023

Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania

Cybersecurity Undergraduate Research Showcase

This paper will examine how the Philippines can make cybersecurity education more accessible in their public school system. The solutions it proposes include making cybersecurity a part of the school curriculum, creating summer/internship programs for Junior and Senior High School students in multiple different areas within cybersecurity, and providing basic infrastructure and resources for students to meet their educational needs and aspirations.


Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow Dec 2023

Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow

Cybersecurity Undergraduate Research Showcase

This paper delves into the intricate landscape of deepfakes, exploring their genesis, capabilities, and far-reaching implications. The rise of deepfake technology presents an unprecedented threat to American national security, propagating disinformation and manipulation across various media formats. Notably, deepfakes have evolved from a historical backdrop of disinformation campaigns, merging with the advancements of artificial intelligence (AI) and machine learning to craft convincing but false multimedia content.

Examining the capabilities of deepfakes reveals their potential for misuse, evidenced by instances targeting individuals, companies, and even influencing political events like the 2020 U.S. elections. The paper highlights the direct threats posed by …


Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr Apr 2023

Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr

Cybersecurity Undergraduate Research Showcase

According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).

The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …


Application Of U.S. Sanction Laws And Ransomware Payments, Trinity Woodbury Apr 2022

Application Of U.S. Sanction Laws And Ransomware Payments, Trinity Woodbury

Cybersecurity Undergraduate Research Showcase

Ransomware is a major threat that widely affects individuals and organizations, including businesses. Ransomware victims face the situation of potentially paying ransom payments to threat actors, some of whom might be foreign-based criminals. Ransomware affects victims from all sectors and industries.


Cybersecurity & Correctional Institutions, Kelly Himelwright Jan 2022

Cybersecurity & Correctional Institutions, Kelly Himelwright

Cybersecurity Undergraduate Research Showcase

Cybersecurity is becoming an increasingly important aspect of correctional operations. To properly maintain security, more jails and prisons are using comprehensive cyber protection techniques. Correctional facilities face risks that were perhaps unimaginable only a few decades ago. Many organizations have used information technology to help them run their businesses, but few have the resources or vision to foresee and adequately manage the cyber dangers that come with it. Institutions need to be more aware of these hazards, as well as have more information security experts on staff.


Gdpr, Pipl & Lgpd: Privacy Regulations & Policies Across The Globe, Raymond H. Geistel Nov 2021

Gdpr, Pipl & Lgpd: Privacy Regulations & Policies Across The Globe, Raymond H. Geistel

Cybersecurity Undergraduate Research Showcase

Several privacy laws around the world are adopting similar regulations to the GPDR; this has effects on privacy policies of companies providing services in across multiple countries & continents. While these regulations share many attributes, their differing requirements can make things difficult for companies regarding said policies. Automation could be a potential solution to both analyze and compare regulations from different nations & international organizations, analyze and monitor privacy policy adherence to said regulations.


Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta Oct 2021

Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta

Cybersecurity Undergraduate Research Showcase

In recent years, the incorporation of cloud computing and cloud services has increased in many different types of organizations and companies. This paper will focus on the philosophical, economical, and political factors that cloud computing and cloud services have in the workforce and different organizations. Based on various scholarly articles and resources it was observed that organizations used cloud computing and cloud services to increase their overall productivity as well as decrease the overall cost of their operations, as well as the different policies that were created by lawmakers to control the realm of cloud computing. The results of this …


The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes Jan 2020

The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes

Cybersecurity Undergraduate Research Showcase

This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source …