Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (187)
- University of Nevada, Las Vegas (25)
- Liberty University (10)
- University at Albany, State University of New York (9)
- University of Dayton (7)
-
- Old Dominion University (6)
- Georgia Southern University (5)
- Georgia State University (5)
- University of Nebraska at Omaha (5)
- Long Island University (4)
- Arcadia University (3)
- Duquesne University (3)
- Kennesaw State University (3)
- Ohio Wesleyan University (3)
- Olivet Nazarene University (3)
- Portland State University (3)
- Cedarville University (2)
- Murray State University (2)
- University of Windsor (2)
- Dominican University of California (1)
- Georgia College (1)
- Illinois Math and Science Academy (1)
- James Madison University (1)
- La Salle University (1)
- Marshall University (1)
- Ouachita Baptist University (1)
- Pepperdine University (1)
- Purdue University (1)
- South Dakota State University (1)
- The University of San Francisco (1)
- Keyword
-
- Human rights (4)
- Police (4)
- COVID-19 (3)
- Criminal justice (3)
- Management (3)
-
- Prisons (3)
- Psychology (3)
- China (2)
- Crime (2)
- Crime – Prevention (2)
- Culture (2)
- Edd_pubs (2)
- Ethics (2)
- Family violence (2)
- Human trafficking (2)
- Incarceration (2)
- Law (2)
- Leadership (2)
- Mental health (2)
- Mental illness (2)
- Nevada (2)
- Nevada – Las Vegas (2)
- Police Department (2)
- Police Officer (2)
- Police – Death (2)
- Police-community relations (2)
- Recidivism (2)
- Sex trafficking (2)
- Social media (2)
- Traffic accidents (2)
- Publication Year
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (187)
- Graduate Research Symposium (GCUA) (2010 - 2017) (21)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (8)
- Biennial Conference: The Social Practice of Human Rights (7)
- CHAR (7)
-
- Cybersecurity Undergraduate Research Showcase (5)
- Georgia State Undergraduate Research Conference (5)
- National Youth Advocacy and Resilience Conference (5)
- UNO Student Research and Creative Activity Fair (5)
- Post & Beyond (4)
- Capstone Showcase (3)
- Scholar Week 2016 - present (3)
- Student Symposium (3)
- Symposium of Student Scholars (3)
- CURCE Annual Undergraduate Conference (2)
- Graduate Student Research Symposium (2)
- Liberty University Research Week (2)
- Posters-at-the-Capitol (2)
- The Research and Scholarship Symposium (2013-2019) (2)
- Board of Regents Documents (1)
- Caesars Hospitality Research Summit (1)
- College of Engineering: Graduate Celebration Programs (1)
- Creative Activity and Research Day - CARD (1)
- EURēCA: Exhibition of Undergraduate Research and Creative Achievement (1)
- Festival of Communities: UG Symposium (Posters) (1)
- Georgia College Student Research Events (1)
- International Conference on Gambling & Risk Taking (1)
- International Symposium on Arab Youth (1)
- La Salle University Relationship Research Symposium (1)
- MAD-RUSH Undergraduate Research Conference (1)
- File Type
Articles 1 - 30 of 304
Full-Text Articles in Social and Behavioral Sciences
Racial Diversity Among Juvenile Offenders, Josh Slocum
Racial Diversity Among Juvenile Offenders, Josh Slocum
Scholars Day Conference
Through many years juvenile delinquency has been something that tends to radar and becomes less relevant in the criminal justice world. Though there has been a substantial amount of research in juvenile prevention efforts as well as locating the highest number of offenders based on racial background. My research explores the difference in characteristics among different racial offenders as well as why specific races are more present in corrections.
Influences Of Social Media, Samuel Whatley Ii
Influences Of Social Media, Samuel Whatley Ii
Helm's School of Government Conference - American Revival: Citizenship & Virtue
The Internet is a double-edged sword because it provides easy access to information of both good and bad intentions. Censorship justifications under whoever deems something misinformation, provide little oversight on being a neutral public forum. For instance, the influence of elections by not covering a story and censoring opposing views does not promote the notion of being a neutral public forum. Artificial intelligence being applied to many technological applications have fueled the censorship machine. In some instances, artificial intelligence can generate stories to media sites (i.e., ChatGPT) with no verification of the details. From science fiction to science reality, taking …
The Effectiveness Of Canines In Law Enforcement, Shelly Stroud, Riley Kaufmann
The Effectiveness Of Canines In Law Enforcement, Shelly Stroud, Riley Kaufmann
Scholar Week 2016 - present
Police K-9s play a multifaceted role in policing including crime control and public relations.The advent of these police specialty units coincided with the movement to professionalize policing and have been used to aid law enforcement since the start of the 20th century.
We will demonstrate the role of a working K-9 and the many different areas that are covered in law enforcement such as: bite, detection, narcotics, firearms, explosives, and technology. We will examine the role of the K-9 handler and the impact of their relationship with their k-9 and how this bond influences the effectiveness of law enforcement tasks.
Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds
Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds
Cybersecurity Undergraduate Research Showcase
The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.
Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …
Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian
Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian
Seaver College Research And Scholarly Achievement Symposium
Coomassie Brilliant Blue Dye is a dye commonly used to stain proteins. Because of its ability to adhere to proteins, this research has focused on perfecting a method of dyeing a fractured flat bone in order to most accurately observe and analyze fracture markings within the trabecular layer. Stereoscopic microscopy was the chosen technique of analysis for this research because of its proven effectiveness in glass and ceramic fractography to observe varying depths. In order to most effectively apply stereoscopic microscopy to this research, the following variables were manipulated to maximize color contrast in the trabecular layer in order to …
Problem Gambling, General-Strain Theory, And Gender, Michelle Malkin
Problem Gambling, General-Strain Theory, And Gender, Michelle Malkin
International Conference on Gambling & Risk Taking
Prior research identified a host of factors that increase the likelihood that an individual will become a problem gambler, most of which would be identified by criminologists as “strains” under the framework of General Strain Theory (GST). Yet, GST has not been widely used as a possible explanation for why people become problem gamblers. In addition, there has been little examination of how gender interacts with those variables to affect problem gambling. In this research, I display how propositions from GST provide a framework for understanding why people become problem gamblers and whether gender is a moderating factor in this …
The Departure From The Original Intent Of The 14th Amendment, Johnny B. Davis
The Departure From The Original Intent Of The 14th Amendment, Johnny B. Davis
Helm's School of Government Conference - American Revival: Citizenship & Virtue
No abstract provided.
American Sign Language Legal Interpretation Complications: A Comprehensive Analysis Of Linguistic Barriers Within The Criminal Justice System, Katherine R. Doan
American Sign Language Legal Interpretation Complications: A Comprehensive Analysis Of Linguistic Barriers Within The Criminal Justice System, Katherine R. Doan
Helm's School of Government Conference - American Revival: Citizenship & Virtue
The founding documents of the United States of America tend to be rather universal and impartial in their vernacular. Because all citizens of a nation are deserving of the same rights and privileges regardless of age, race, ethnicity, or disability status, accommodations must be provided to the Deaf to give them equal access to information throughout interrogations, trials, and police interactions. While it may seem obvious that interpreters should be provided during legal situations involving a Deaf individual, visual communication can make legal interactions quite complicated when police or attorneys can only reveal limited details. When Deaf culture involving expansion …
Drug Ideologies Of The United States, Macy Montgomery
Drug Ideologies Of The United States, Macy Montgomery
Helm's School of Government Conference - American Revival: Citizenship & Virtue
The United States has been increasingly creating lenient drug policies. Seventeen states and Washington, the District of Columbia, legalized marijuana, and Oregon decriminalized certain drugs, including methamphetamine, heroin, and cocaine. The medical community has proven that drugs, including marijuana, have myriad adverse health side effects. This leads to two questions: Why does the United States government continue to create lenient drug policies, and what reasons do citizens give for legalizing drugs when the medical community has proven them harmful? The paper hypothesizes that the disadvantages of drug legalization outweigh its benefits because of the numerous harms it causes, such as …
Adverse Childhood Experiences And Their Correlation To College Major, Rachel Ling Xiu Held
Adverse Childhood Experiences And Their Correlation To College Major, Rachel Ling Xiu Held
Helm's School of Government Conference - American Revival: Citizenship & Virtue
The term adverse childhood experiences or ACEs for short, is well known in many fields of study including criminal justice, psychology, social work, and education. There are a multitude of studies that compare ACEs with other risk factors, use ACEs as a comparison tool with other behavioral issues, as well as linking ACEs to criminality, mental health disorders, and physical health. Adverse childhood experiences (ACEs) have been identified as a key risk factor for a range of negative life outcomes, including a strong correlation in juvenile delinquency and crime. Despite many works regarding adverse childhood experiences and the ACE test, …
The Impact Of The Convention On The Elimination Of Discrimination Against Women On Ecuador's Domestic Policy, Brittani Stiltner
The Impact Of The Convention On The Elimination Of Discrimination Against Women On Ecuador's Domestic Policy, Brittani Stiltner
Student Symposium
In 1979, Ecuador became one of the first Latin American countries to ratify the Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW). In this paper, I use Ecuador as a case study for analyzing the effectiveness of international human rights treaties on the countries that ratify them, looking specifically into the impact the CEDAW had on Ecuador’s domestic policies and action it has taken to expand women’s rights since 1979. I begin by giving a historical basis for the culture and political organization of the country due to colonization. I then articulate Ecuador as a leader …
Patterns Of Domestic Violence And Abuse Within Intimate Relationships, Ryeana Klopfenstein
Patterns Of Domestic Violence And Abuse Within Intimate Relationships, Ryeana Klopfenstein
Liberty University Research Week
Undergraduate
Textual or Investigative
Smss, Gaming, Social Media, And Cyber Trafficking, Rachel Held
Smss, Gaming, Social Media, And Cyber Trafficking, Rachel Held
Liberty University Research Week
Undergraduate
Theoretical Proposal
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Cybersecurity Undergraduate Research Showcase
According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).
The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter
UNO Student Research and Creative Activity Fair
In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.
Sticky Situations: Understanding The Law And Life, Krystal Banks
Sticky Situations: Understanding The Law And Life, Krystal Banks
National Youth Advocacy and Resilience Conference
Law and life go hand in hand. Understanding the law and how it connects to life can be an effective tool in teaching youth and adults the value of making good decisions when it comes to life and the law. Sticky Situations places real-world situations in the context of learning how to apply the law and effectively respond to life's sticky situations.
Session 8: Ensemble Of Score Likelihood Ratios For The Common Source Problem, Federico Veneri, Danica M. Ommen
Session 8: Ensemble Of Score Likelihood Ratios For The Common Source Problem, Federico Veneri, Danica M. Ommen
SDSU Data Science Symposium
Machine learning-based Score Likelihood Ratios have been proposed as an alternative to traditional Likelihood Ratios and Bayes Factor to quantify the value of evidence when contrasting two opposing propositions.
Under the common source problem, the opposing proposition relates to the inferential problem of assessing whether two items come from the same source. Machine learning techniques can be used to construct a (dis)similarity score for complex data when developing a traditional model is infeasible, and density estimation is used to estimate the likelihood of the scores under both propositions.
In practice, the metric and its distribution are developed using pairwise comparisons …
The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt
The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt
Posters-at-the-Capitol
Current legislation and policies are not effective enough to fight human trafficking as it continues to change and evolve worldwide. Human trafficking is not just sex trafficking; labor trafficking, organ trafficking, people smuggling, and forced criminal activities. This evolving and changing global issue continues to grow into a highly profitable "business." Overseas, many countries struggle to handle this issue, and some countries do not handle it at all. The United States has a major human trafficking problem that will continue to worsen unless there is a change in the government. The U.S. Congress should be more focused on the growing …
Smoke But No Fire: Convicting The Innocent Of Crimes That Never Happened, Autumn Huber
Smoke But No Fire: Convicting The Innocent Of Crimes That Never Happened, Autumn Huber
Symposium of Student Scholars
“Smoke but no Fire” published by Jessica Henry provides various discussions of no-crime wrongful convictions of those who are innocent. Throughout this novel, the evaluation of forensic error, police roles, judiciary roles, and misdemeanors bring to light the phantom crimes that occur within our criminal justice system. The criminal justice system brings the injustice of those wrongfully convicted to the eyes of readers worldwide. Part of this research provided throughout her novel includes the National Registry of Exonerations, short for NRE, which assesses evidence of exonerations of those who were innocent and those who remain inside the four walls of …
Evaluating The New York State Bail Reform Act: What Impact Does It Have On Law Enforcement?, Nicholas Cole
Evaluating The New York State Bail Reform Act: What Impact Does It Have On Law Enforcement?, Nicholas Cole
Helm's School of Government Conference - American Revival: Citizenship & Virtue
No abstract provided.
Protecting Violent Free Speech And Combatting True Homicidal Threats In Cyberspace, Aimee Lillie
Protecting Violent Free Speech And Combatting True Homicidal Threats In Cyberspace, Aimee Lillie
Helm's School of Government Conference - American Revival: Citizenship & Virtue
No abstract provided.
Sacrificing Liberty For Security, Samuel Whatley Ii
Sacrificing Liberty For Security, Samuel Whatley Ii
Helm's School of Government Conference - American Revival: Citizenship & Virtue
This paper attempts to address ongoing problems associated with the U.S. justice system as it relates to collaboration with state and local agencies. Also, some focus areas will include management, policy, and evidence-based programs that are needing to be addressed.
How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson
How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson
Cybersecurity Undergraduate Research Showcase
As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.
Bars To Bridges: Culturally Responsive Education Advocacy, Micaella Flores, Christine Otto
Bars To Bridges: Culturally Responsive Education Advocacy, Micaella Flores, Christine Otto
National Youth Advocacy and Resilience Conference
We'll explore tangible ways to advocate for BIPOC students who've experienced educational disruptions. We’ll discuss the methods and model The Bars to Bridges Program uses to successfully transition justice involved youth into their academic settings and maintain engagement in education.
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Annual ADFSL Conference on Digital Forensics, Security and Law
The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …