Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- SelectedWorks (6)
- Old Dominion University (2)
- Bard College (1)
- California State University, San Bernardino (1)
- Edith Cowan University (1)
-
- Louisiana State University (1)
- Montclair State University (1)
- San Jose State University (1)
- University at Albany, State University of New York (1)
- University of Kentucky (1)
- University of Massachusetts Amherst (1)
- University of Nebraska at Omaha (1)
- University of Pennsylvania Carey Law School (1)
- Virginia Commonwealth University (1)
- Keyword
-
- Criminal Justice (5)
- Forensic Science (5)
- Technology and the Law (4)
- Evidence (3)
- Forensic science (3)
-
- CSI (2)
- Jury (2)
- Social science (2)
- Technology (2)
- Television (2)
- Trauma (2)
- #KRKTR (1)
- ASL (1)
- Abolition (1)
- Accessibility (1)
- Action (1)
- Action learning (1)
- Action research (1)
- Agency (1)
- Algorithm (1)
- Algorithmic & community policing (1)
- Allies (1)
- American Sign Language (1)
- Anthropology (1)
- Apache (1)
- Appreciative inquiry (1)
- Art (1)
- Asylum (1)
- Backward chaining (1)
- Bias (1)
- Publication Year
- Publication
-
- Hon. Donald E. Shelton (5)
- Cybersecurity Undergraduate Research Showcase (2)
- All Faculty Scholarship (1)
- Behavioral Science Faculty Publications (1)
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
-
- Doctoral Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- LSU Master's Theses (1)
- Psychology Faculty Scholarship (1)
- Research outputs 2014 to 2021 (1)
- Senior Projects Spring 2022 (1)
- Themis: Research Journal of Justice Studies and Forensic Science (1)
- Theses and Dissertations (1)
- UNO Student Research and Creative Activity Fair (1)
- victor toom (1)
- Publication Type
Articles 1 - 20 of 20
Full-Text Articles in Science and Technology Studies
Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds
Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds
Cybersecurity Undergraduate Research Showcase
The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.
Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Cybersecurity Undergraduate Research Showcase
According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).
The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …
Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.
Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.
LSU Master's Theses
A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …
More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall
More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall
Research outputs 2014 to 2021
© 2020, The Author(s). The internet mafia trope has shaped our knowledge about organised crime groups online, yet the evidence is largely speculative and the logic often flawed. This paper adds to current knowledge by exploring the development, operation and demise of an online criminal group as a case study. In this article we analyse a DDoS (Distributed Denial of Service) stresser (also known as booter) which sells its services online to enable offenders to launch attacks. Using Social Network Analysis to explore the service operations and payment systems, our findings show a central business model that is similar to …
Comparing Political Implications Of Punitive Paradigms In Digital Surveillance And Data Driven Algorithms Between The Polities Of The United States Of America And The People's Republic Of China, Shedelande Lily Carpenter
Comparing Political Implications Of Punitive Paradigms In Digital Surveillance And Data Driven Algorithms Between The Polities Of The United States Of America And The People's Republic Of China, Shedelande Lily Carpenter
Senior Projects Spring 2022
Senior Project submitted to The Division of Social Studies of Bard College.
Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister
Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister
Themis: Research Journal of Justice Studies and Forensic Science
Forensic analysis of questioned documents includes chemical analyses of paper and ink as well as handwriting comparisons. Several elements affect handwriting analyses, including the presence of discriminatory factors that can individualize a handwriting sample and whether the handwriting has been disguised. Five handwriting samples were gathered from six individuals comprising of one reference, three natural unknowns, and one disguised sample per person. A novice conducted analyses on every collected sample and conducted comparisons of the reference sample to the unknown and disguised samples in an attempt to correctly source the unknown and disguised samples. The novice showed a high level …
Using Mhealth To Increase Treatment Utilization Among Recently Incarcerated Homeless Adults (Link2care): Protocol For A Randomized Controlled Trial, Jennifer M. Reingle Gonzalez, Michael S. Businelle, Darla Kendzor, Michele Staton, Carol S. North, Michael Swartz
Using Mhealth To Increase Treatment Utilization Among Recently Incarcerated Homeless Adults (Link2care): Protocol For A Randomized Controlled Trial, Jennifer M. Reingle Gonzalez, Michael S. Businelle, Darla Kendzor, Michele Staton, Carol S. North, Michael Swartz
Behavioral Science Faculty Publications
Background: There is a significant revolving door of incarceration among homeless adults. Homeless adults who receive professional coordination of individualized care (ie, case management) during the period following their release from jail experience fewer mental health and substance use problems, are more likely to obtain stable housing, and are less likely to be reincarcerated. This is because case managers work to meet the various needs of their clients by helping them to overcome barriers to needed services (eg, food, clothing, housing, job training, substance abuse and mental health treatment, medical care, medication, social support, proof of identification, and legal aid). …
Police Officer Perceptions Of Organizational Justice And Body-Worn Cameras: A Civilizing Effect?, Carolyn Naoroz Ph.D.
Police Officer Perceptions Of Organizational Justice And Body-Worn Cameras: A Civilizing Effect?, Carolyn Naoroz Ph.D.
Theses and Dissertations
This research sought to understand the potential association between officer perceptions of organizational justiceand officer perceptions of body-worn cameras (BWCs). A questionnaire was administered to a convenience sample of 362 officersfrom the 750 sworn personnel from the Richmond Police Department in Richmond, VA, yielding a response rate of 91% and representing 44% of the Richmond Police Department’s sworn employees. This study extends prior work by partially replicating a previous BWC survey conducted by leading body-worn camera scholars, utilizing a large sample from an urban mid-Atlantic police department. This study also extends prior work on officer perceptions of organizational justice …
Trigger Warnings: From Panic To Data, Francesca Laguardia, Venezia Michalsen, Holly Rider-Milkovich
Trigger Warnings: From Panic To Data, Francesca Laguardia, Venezia Michalsen, Holly Rider-Milkovich
Department of Justice Studies Faculty Scholarship and Creative Works
Following a practice that originated online, university faculty and staff have increasingly used “trigger warnings” to alert students to the possibility that they might be affected or even harmed by potentially traumatic material. This practice has led to a passionate debate about whether such warnings stifle or encourage student expression and academic freedom, and whether they are beneficial or detrimental to learning. In this article, we illustrate the history and current state of this debate and examine the scientific support for the arguments for and against the use of such warnings. Specifically, we question the scientific basis for the suggestion …
Engaging Users: Enabling Data Analysis, James M. Hopkins
Engaging Users: Enabling Data Analysis, James M. Hopkins
UNO Student Research and Creative Activity Fair
The challenge in many data collection/analysis efforts is that of engaging users to participate. The Juvenile Case Management System (JCMS) project is a solution to that challenge. JCMS is developed in a collaborative effort between the Juvenile Justice Institute (JJI), the Nebraska Crime Commission, and the Public Health Informatics Research Lab.
Information systems must engage their users to be effective. This research investigates engaging users to interact with information systems and improve data collection for analysis.
The JCMS platform provides a web-based, centralized, database system to users working across the state of Nebraska. By involving users in system and screen …
Legal Responses To Nonconsensual Pornography: Current Policy In The United States And Future Directions For Research, Cynthia J. Najdowski
Legal Responses To Nonconsensual Pornography: Current Policy In The United States And Future Directions For Research, Cynthia J. Najdowski
Psychology Faculty Scholarship
Technological advances have created new avenues for the perpetration of sexual violence. The widespread availability of cameras has made it easier to take covert recordings of an individual’s intimate body parts, and whether sexually explicit images are recorded with or without an individual’s consent, growing access to the Internet has facilitated the nonconsensual dissemination of those images. Yet criminal laws have not kept pace with technology in most jurisdictions across the United States, and victims of nonconsensual pornography typically have no avenue by which to seek justice. There have been efforts to reform laws in a variety of jurisdictions, some …
The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett Iv
The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett Iv
Electronic Theses, Projects, and Dissertations
China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from government and private sources, government white papers, legal codes, blogs …
Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle
Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle
All Faculty Scholarship
This Article examines the role military automated surveillance and intelligence systems and techniques have supported a self-reinforcing racial bias when used by civilian police departments to enhance predictive policing programs. I will focus on two facets of this problem. First, my research will take an inside-out perspective, studying the role played by advanced military technologies and methods within civilian police departments, and how they have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools, and which automates de facto penalization and …
Interpreting, Stephanie Jo Kent
Interpreting, Stephanie Jo Kent
Doctoral Dissertations
What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …
The Prüm Regime: Situated Dis/Empowerment In Transnational Dna Profile Exchange, Barbara Prainsack, Victor Toom
The Prüm Regime: Situated Dis/Empowerment In Transnational Dna Profile Exchange, Barbara Prainsack, Victor Toom
victor toom
This paper takes critique of surveillance studies scholars of the shortcomings of the panoptic model for analysing contemporary systems of surveillance as a starting point. We argue that core conceptual tools, in conjunction with an under-conceptualization of agency, privilege a focus on the oppressive elements of surveillance. This often yields unsatisfying insights to why surveillance works, for whom, and at whose costs. We discuss the so-called Prüm regime, pertaining to transnational data exchange for forensic and police use in the EU, to illustrate how—by articulating instances of what we call ‘situated dis/empowerment’—agency can be better conceptualized, sharpening our gaze for …
Forensic Science Evidence And Judicial Bias In Criminal Cases, Hon. Donald E. Shelton
Forensic Science Evidence And Judicial Bias In Criminal Cases, Hon. Donald E. Shelton
Hon. Donald E. Shelton
Although DNA exonerations and the NAS report have raised serious questions about the validity of many traditional non-DNA forms of forensic science evidence, criminal court judges continue to admit virtually all prosecution-proferred expert testimony. It is is suggested that this is the result of a systemic pro-prosecution bias by judges that is reflected in admissibility decisions. These "attitudinal blinders" are especially prevalent in state criminal trial and appellate courts.
Examining The "Csi-Effect" In The Cases Of Circumstantial Evidence And Eyewitness Testimony: Multivariate And Path Analyses, Hon. Donald E. Shelton, Young S. Kim, Gregg Barak
Examining The "Csi-Effect" In The Cases Of Circumstantial Evidence And Eyewitness Testimony: Multivariate And Path Analyses, Hon. Donald E. Shelton, Young S. Kim, Gregg Barak
Hon. Donald E. Shelton
As part of a larger investigation of the changing nature of juror behavior in the context of technology development, this study examined important questions unanswered by previous studies on the “CSI-effect.” In answering such questions, the present study applied multivariate and path analyses for the first time. The results showed that (a) watching CSI dramas had no independent effect on jurors' verdicts, (b) the exposure to CSI dramas did not interact with individual characteristics, (c) different individual characteristics were significantly associated with different types of evidence, and (d) CSI watching had no direct effect on jurors' decisions, and it had …
The Admissibility Of Social Science Evidence In Criminal Cases, Hon. Donald E. Shelton
The Admissibility Of Social Science Evidence In Criminal Cases, Hon. Donald E. Shelton
Hon. Donald E. Shelton
The rapid development of emerging scientific methods, especially the increased understanding of deoxyribonucleic acid ("DNA"), has had, and will undoubtedly continue to have, an almost stunning impact on our justice system, particularly at the trial level. The forensic applications of these new scientific discoveries have been most dramatically seen in the criminal trial court. They have also caused us to re-examine other forms of forensic evidence that have been rather routinely admitted in our courts. Forensic evidence from social scientists is certainly one of those forms. Which of these forms of scientific forensic evidence have sufficient validity to be used …
An Indirect-Effects Model Of Mediated Adjudication: The Csi Myth, The Tech Effect, And Metropolitan Jurors' Expectations For Scientific Evidence, Hon. Donald E. Shelton, Young S. Kim, Gregg Barak
An Indirect-Effects Model Of Mediated Adjudication: The Csi Myth, The Tech Effect, And Metropolitan Jurors' Expectations For Scientific Evidence, Hon. Donald E. Shelton, Young S. Kim, Gregg Barak
Hon. Donald E. Shelton
Part I of this article defines the "CSI effect", given that the phrase has come to have many different meanings ascribed to it. It emphasizes the epistemological importance of first describing the effect of the “CSI effect” as observed in juror behavior documented in a new study conducted in Wayne County (Detroit), Michigan, and then looking at causative factors that may be related to an explanation of those observed effects. Part II describes the methodology of the Wayne County study, provides a descriptive analysis of Wayne County jurors, and compares the jurors demographically to the Washtenaw County jurors who were …
Twenty-First Century Forensic Science Challenges For Trial Judges In Criminal Cases: Where The "Polybutadiene" Meets The "Bitumen", Hon. Donald E. Shelton
Twenty-First Century Forensic Science Challenges For Trial Judges In Criminal Cases: Where The "Polybutadiene" Meets The "Bitumen", Hon. Donald E. Shelton
Hon. Donald E. Shelton
This artice discusses the challenges faced by trial judges in crimnal cases in fulfilling their Daubert "gatekeeping" role in the face of rapid advancements in forensic science. Admissibility questions for various forms of scientific evidence are reviewed, from DNA to fingerprints to social science "syndrome" evidence. The article discusses the pretrial issues presented by DNA databases, search issues and limitations problems as well as the impact of forensic science developments on juror expectations. Finally, forensic science issues regarding trial conduct are discussed, including voir dire, arguments and jury instructions,