Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Security (3)
- Dark web (2)
- Firearm identification (2)
- Academic (1)
- Actuarial Risk Assessment (1)
-
- Actuarial Risk Assessment Tool (1)
- Alumni (1)
- Analytics (1)
- Anonymity networks (1)
- Athletics (1)
- Australia (1)
- Bail (1)
- Ballistic images (1)
- Ballistics (1)
- Big data (1)
- Bond (1)
- Browsers (1)
- Business intelligence (1)
- Camera device source (1)
- Class of 2008 (WKU) (1)
- Class of 2009 (WKU) (1)
- Class of 2010 (WKU) (1)
- Class of 2011 (WKU) (1)
- Climate Change (1)
- Cloud Services (1)
- Computer crime (1)
- Conference (1)
- Crime (1)
- Crime prevention (1)
- Criminal justice (1)
- Publication Year
- Publication
-
- Australian Security and Intelligence Conference (3)
- Publications and Research (2)
- Research outputs pre 2011 (2)
- Sociology & Criminal Justice Faculty Publications (2)
- Australian Digital Forensics Conference (1)
-
- Cornerstone 3 Reports : Interdisciplinary Informatics (1)
- EBCS Presentations (1)
- EBCS Reports (1)
- Information Technology & Decision Sciences Faculty Publications (1)
- Masters Theses & Specialist Projects (1)
- Research Collection School Of Computing and Information Systems (1)
- SIUE Faculty Research, Scholarship, and Creative Activity (1)
- Stevenson Center for Community and Economic Development—Student Research (1)
- WKU Archives Records (1)
Articles 1 - 19 of 19
Full-Text Articles in Criminology
Generative Stresnet For Crime Prediction, Ba Phong Tran, Hoong Chuin Lau
Generative Stresnet For Crime Prediction, Ba Phong Tran, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
In this work, we combine STResnet (Zhang et al., 2017) with VAE Kingma & Welling (2013) to generate crime distribution. The outputs can be used for downstream tasks such as patrol deployment planning Chase et al. (2021).
Civiic: Cybercrime In Virginia: Impacts On Industry And Citizens Final Report, Randy Gainey, Tancy Vandecar-Burdin, Jay Albanese, Thomas Dearden, James Hawdon, Katalin Parti
Civiic: Cybercrime In Virginia: Impacts On Industry And Citizens Final Report, Randy Gainey, Tancy Vandecar-Burdin, Jay Albanese, Thomas Dearden, James Hawdon, Katalin Parti
Sociology & Criminal Justice Faculty Publications
[First paragraph] Victimization from cybercrime is a major concern in Virginia, the US, and the world. As individuals and businesses spend more time online, it becomes increasingly important to understand cybercrime and how to protect against it. Such an understanding is dependent on valid and reliable baseline data that identifies the specific nature, extent, and outcomes of cybercrime activity. A better understanding of cybercrime activity is needed to target and prevent it more effectively, minimize its consequences, and provide support for both individual and corporate victims. Before that can occur, however, better baseline data are required, and this project was …
Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu
Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Digital image forensics is a key branch of digital forensics that based on forensic analysis of image authenticity and image content. The advances in new techniques, such as smart devices, Internet of Things (IoT), artificial images, and social networks, make forensic image analysis play an increasing role in a wide range of criminal case investigation. This work focuses on image source identification by analysing both the fingerprints of digital devices and images in IoT environment. A new convolutional neural network (CNN) method is proposed to identify the source devices that token an image in social IoT environment. The experimental results …
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
Publications and Research
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …
Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner
Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner
Publications and Research
This is a book review of Robert W. Gehl's Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (2018). The book explores these anonymity networks and the concept of legitimacy throughout. Using a multidisciplinary approach and interviews with network-builders and users, Gehl helps to demystify the dark web and critically examine these networks and technologies.
An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon
An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon
EBCS Presentations
No abstract provided.
Ssl/Tls Certificates And Their Prevalence On The Dark Web (First Report), David Maimon, Yubao Wu, Michael Mcguire, Nicholas Stubler, Zijie Qui
Ssl/Tls Certificates And Their Prevalence On The Dark Web (First Report), David Maimon, Yubao Wu, Michael Mcguire, Nicholas Stubler, Zijie Qui
EBCS Reports
As organizations focus on the digital transformation of their businesses, the importance of encryption as the cornerstone of security and privacy is increasingly vital. In 2018, over 70 percent of internet traffic was encrypted. Experts believe that this figure is expected to rise to 80 percent in 2019 (Google, 2019). Secure Sockets Layer (SSL, an older standard) and Transport Layer Security (TLS, a newer standard) certificates are essential to encryption because they authorize all encrypted communication between machines. SSL/TLS certificates are instrumental in protecting privacy and improving security, providing each machine with a unique machine identity. They control the flow …
Pretrial Release And Failure-To-Appear In Mclean County, Il, Jonathan Monsma
Pretrial Release And Failure-To-Appear In Mclean County, Il, Jonathan Monsma
Stevenson Center for Community and Economic Development—Student Research
Actuarial risk assessment tools increasingly have been employed in jurisdictions across the U.S. to assist courts in the decision of whether someone charged with a crime should be detained or released prior to their trial. These tools should be continually monitored and researched by independent 3rd parties to ensure that these powerful tools are being administered properly and used in the most proficient way as to provide socially optimal results. McLean County, Illinois began using the Public Safety Assessment-CourtTM (PSA-Court or simply PSA) risk assessment tool beginning in 2016. This study culls data from the McLean County Jail …
Cyber Security And Criminal Justice Programs In The United States: Exploring The Intersections, Brian K. Payne, Lora Hadzhidimova
Cyber Security And Criminal Justice Programs In The United States: Exploring The Intersections, Brian K. Payne, Lora Hadzhidimova
Sociology & Criminal Justice Faculty Publications
The study of cyber security is an interdisciplinary pursuit that includes STEM disciplines as well as the social sciences. While research on cyber security appears to be central in STEM disciplines, it is not yet clear how central cyber security and cyber crime is to criminal justice scholarship. In order to examine the connections between cyber security and criminal justice, in this study attention is given to the way that criminal justice scholars have embraced cyber crime research and coursework. Results show that while there are a number of cyber crime courses included in criminal justice majors there are not …
Climate Change And Interpersonal Violence: A "Global" Estimate And Regional Inequities, Dennis Mares, Kenneth W. Moffett
Climate Change And Interpersonal Violence: A "Global" Estimate And Regional Inequities, Dennis Mares, Kenneth W. Moffett
SIUE Faculty Research, Scholarship, and Creative Activity
This study estimates the predicted impact of climate change on levels of violence in a sample of 57 countries. We sample western and non-western countries and perform a multilevel ARFIMA regression to examine if warmer temperatures are associated with higher levels of homicide. Our results indicate that each degree Celsius increase in annual temperatures is associated with a nearly 6% average increase in homicides. Regional variation in this predicted effect is detected, for example, with no apparent effects in former Soviet countries and far stronger effects found in Africa. This variation indicates that climate change may acutely increase violence in …
Mining Social Networking Sites For Digital Evidence, Brian Cusack, Saud Alshaifi
Mining Social Networking Sites For Digital Evidence, Brian Cusack, Saud Alshaifi
Australian Digital Forensics Conference
OnLine Social Networking sites (SNS) hold a vast amount of information that individuals and organisations post about themselves. Investigations include SNS as sources of evidence and the challenge is to have effective tools to extract the evidence. In this exploratory research we apply the latest version of a proprietary tool to identify potential evidence from five SNS using three different browsers. We found that each web browser influenced the scope of the evidence extracted. In previous research we have shown that different open source and proprietary tools influence the scope of evidence obtained. In this research we asked, What variation …
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
Australian Security and Intelligence Conference
From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to the ethnic cleansing rumors in India and increasingly used by pedophiles, social media is a very powerful tool for pedophiles, troublemakers, criminals and even terrorists to target individuals and even to go against the establishment. On the other hand, social media can save lives in a disaster, and its a natural extension of community policing or engagement. Community engagement is a must-have strategy for any public safety and security agency. However, this strategy requires the removal of stovepipe processes and systems within an agency, allowing …
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
Australian Security and Intelligence Conference
Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
Australian Security and Intelligence Conference
No abstract provided.
S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan
S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan
Cornerstone 3 Reports : Interdisciplinary Informatics
No abstract provided.
Geographic Factors Of Residential Burglaries - A Case Study In Nashville, Tennessee, Jonathan A. Hall
Geographic Factors Of Residential Burglaries - A Case Study In Nashville, Tennessee, Jonathan A. Hall
Masters Theses & Specialist Projects
This study examines geographic patterns and geographic factors of residential burglary at the Nashville, TN area for a twenty year period at five year interval starting in 1988. The purpose of this study is to identify what geographic factors have impacted on residential burglary rates, and if there were changes in the geographic patterns of residential burglary over the study period. Several criminological theories guide this study, with the most prominent being Social Disorganization Theory and Routine Activities Theory. Both of these theories focus on the relationships of place and crime. A number of spatial analysis methods are hence adopted …
Ballistics Image Processing And Analysis For Firearm Identification, Dongguang Li
Ballistics Image Processing And Analysis For Firearm Identification, Dongguang Li
Research outputs pre 2011
Firearm identification is an intensive and time-consuming process that requires physical interpretation of forensic ballistics evidence. Especially as the level of violent crime involving firearms escalates, the number of firearms to be identified accumulates dramatically. The demand for an automatic firearm identification system arises. This chapter proposes a new, analytic system for automatic firearm identification based on the cartridge and projectile specimens. Not only do we present an approach for capturing and storing the surface image of the spent projectiles at high resolution using line-scan imaging technique for the projectiles database, but we also present a novel and effective FFT-based …
Ua12/2/1 College Heights Herald, Vol. 83, No. 2, Wku Student Affairs
Ua12/2/1 College Heights Herald, Vol. 83, No. 2, Wku Student Affairs
WKU Archives Records
WKU campus newspaper reporting campus, athletic and Bowling Green, Kentucky news.
Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li
Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li
Research outputs pre 2011
Charactetistic markings on the cartridge case and projectile of a fired bullet are created when it is fired. Over thirty different features within these marks can be distinguished, which in combination produce a "fingerprint" for a firearm. By analyzing features within such a set of fireann :fingerprints, it will be possible to identify not only the type and model of a fireann, but also each every individual weapon as effectively as human :fingerprint identification. A new analytic system based on fast Fourier transform (FFT) for identifying the projectile specimens by the line-scan imaging technique is proposed in this paper. Experimental …