Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (8)
- Law (8)
- Physical Sciences and Mathematics (8)
- Public Affairs, Public Policy and Public Administration (8)
- Public Policy (5)
-
- Business (4)
- Computer Law (4)
- Engineering (4)
- Internet Law (4)
- Law and Society (4)
- Other Engineering (4)
- Science and Technology Studies (4)
- Social Policy (4)
- Technology and Innovation (4)
- Criminology and Criminal Justice (3)
- Defense and Security Studies (3)
- Information Security (3)
- Legal Studies (3)
- Law Enforcement and Corrections (2)
- Social Control, Law, Crime, and Deviance (2)
- Criminal Law (1)
- Political Science (1)
- Public Administration (1)
- Terrorism Studies (1)
- Institution
- Publication
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Criminology
Effects Of Witnessing Terrorist Attacks On Perceived Causes Of Terrorism And Support For Security Measures, Austin Trevor Sullivan
Effects Of Witnessing Terrorist Attacks On Perceived Causes Of Terrorism And Support For Security Measures, Austin Trevor Sullivan
Open Access Theses & Dissertations
The following research aims to understand how individuals who were aware of, and affected by, terrorist attacks at the time they took place perceive the causes of terrorism and support security measures. It is hypothesized that the extent to which one â??witnessedâ?? attacks characterized by more traditional forms of terrorism, such as bombings and religiously motivated and affiliated perpetrators (Wave four), versus new forms of terrorism, such as shootings and lone wolves (Wave five), would be affected by the age of the witness. This research proposes an indirect pathway from age to "witnessing" terrorist attacks to attributions for the attacks …
Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk
Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk
Graduate Theses and Dissertations
Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …
Environmental Factors And School Disorder: The Role Of Urbanicty, Brandon S. Coffey
Environmental Factors And School Disorder: The Role Of Urbanicty, Brandon S. Coffey
Electronic Theses and Dissertations
The purpose of this study is to explore the differential impact of various environmental and organizational factors on levels of school misconduct. Although we have a general understanding of this relationship, little effort has been made to determine whether the effects are influenced by urbanicity. The current study utilizes data from the 2007-2008 School Survey on Crime and Safety to address this gap in the literature by utilizing a series of negative binomial regression models that seek to determine differences between predictive factors in urban and rural settings. Results indicate that disorganization has a similar effect within urban and rural …
Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali
Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali
Information Technology Master Theses
In a technologically enabled world, local ideologically inspired warfare becomes global all too quickly, specifically terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to broadcast their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity. This study employs data mining tools to mine Twitter for …
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
Australian Security and Intelligence Conference
From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to the ethnic cleansing rumors in India and increasingly used by pedophiles, social media is a very powerful tool for pedophiles, troublemakers, criminals and even terrorists to target individuals and even to go against the establishment. On the other hand, social media can save lives in a disaster, and its a natural extension of community policing or engagement. Community engagement is a must-have strategy for any public safety and security agency. However, this strategy requires the removal of stovepipe processes and systems within an agency, allowing …
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
Australian Security and Intelligence Conference
Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
Australian Security and Intelligence Conference
No abstract provided.
A Study Of Surveillance And Privacy Rights, Jesse T. Kittle Mr.
A Study Of Surveillance And Privacy Rights, Jesse T. Kittle Mr.
Electronic Theses and Dissertations
The purpose of this study it to research the role and public perception of security surveillance on a university campus. The research measured variables such as age, gender, class standing political affiliation, and one's residence whether on campus or off campus. This study is focused on how students view security surveillance, and whether they see security surveillance as an important tool for the safety of the public or a threat to privacy. A student survey was administered to undergraduate students asking how they felt about crime on campus and whether crime was a problem that could be solved by security …
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …
The Effect Of Private Police On Crime: Evidence From A Geographic Regression Discontinuity Design, John M. Macdonald, Jonathan Klick, Ben Grunwald
The Effect Of Private Police On Crime: Evidence From A Geographic Regression Discontinuity Design, John M. Macdonald, Jonathan Klick, Ben Grunwald
All Faculty Scholarship
Research demonstrates that police reduce crime. The implication of this research for investment in a particular form of extra police services, those provided by private institutions, has not been rigorously examined. We capitalize on the discontinuity in police force size at the geographic boundary of a private university police department to estimate the effect of the extra police services on crime. Extra police provided by the university generate approximately 45-60 percent fewer crimes in the surrounding neighborhood. These effects appear to be similar to other estimates in the literature.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Associate Professor Katina Michael
With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Associate Professor Katina Michael
In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …
Ua12/8 Annual Campus Security And Fire Report, Wku Police
Ua12/8 Annual Campus Security And Fire Report, Wku Police
WKU Archives Records
This report is designed to provide students, prospective students, parents, faculty, and staff with accurate crime statistics, information on university services, and crime prevention programs. These programs are designed to help inform our campus community about safety practices that will help reduce the risk of becoming a victim of crime. These safe practices can provide individuals with vital information that they can carry with them through college and beyond, keeping them safe for the rest of their lives.
Civilian Aviation Screening: A Time-Series Analysis Of Confiscated Firearms At Screening Checkpoints, Shon Agard
Civilian Aviation Screening: A Time-Series Analysis Of Confiscated Firearms At Screening Checkpoints, Shon Agard
Online Theses and Dissertations
This study investigated the aviation screening process and sought to determine if the federalization of the screening process had any effect on the number of firearm confiscations at civilian aviation screening checkpoints. The hypothesis of the study was that airport screening firearms confiscations (per one million screenings) were lower before the U.S. government (TSA) took over screening in 2001-2002. This quantitative research required the performance of an interrupted time series analysis. Interrupted time series analysis evaluates the impact of one or more events on the values in the time series. An interrupted time series analysis attempts to determine whether an …