Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Security

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 15 of 15

Full-Text Articles in Criminology

Effects Of Witnessing Terrorist Attacks On Perceived Causes Of Terrorism And Support For Security Measures, Austin Trevor Sullivan May 2023

Effects Of Witnessing Terrorist Attacks On Perceived Causes Of Terrorism And Support For Security Measures, Austin Trevor Sullivan

Open Access Theses & Dissertations

The following research aims to understand how individuals who were aware of, and affected by, terrorist attacks at the time they took place perceive the causes of terrorism and support security measures. It is hypothesized that the extent to which one â??witnessedâ?? attacks characterized by more traditional forms of terrorism, such as bombings and religiously motivated and affiliated perpetrators (Wave four), versus new forms of terrorism, such as shootings and lone wolves (Wave five), would be affected by the age of the witness. This research proposes an indirect pathway from age to "witnessing" terrorist attacks to attributions for the attacks …


Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk May 2022

Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk

Graduate Theses and Dissertations

Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …


Environmental Factors And School Disorder: The Role Of Urbanicty, Brandon S. Coffey May 2017

Environmental Factors And School Disorder: The Role Of Urbanicty, Brandon S. Coffey

Electronic Theses and Dissertations

The purpose of this study is to explore the differential impact of various environmental and organizational factors on levels of school misconduct. Although we have a general understanding of this relationship, little effort has been made to determine whether the effects are influenced by urbanicity. The current study utilizes data from the 2007-2008 School Survey on Crime and Safety to address this gap in the literature by utilizing a series of negative binomial regression models that seek to determine differences between predictive factors in urban and rural settings. Results indicate that disorganization has a similar effect within urban and rural …


Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali Apr 2016

Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali

Information Technology Master Theses

In a technologically enabled world, local ideologically inspired warfare becomes global all too quickly, specifically terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to broadcast their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity. This study employs data mining tools to mine Twitter for …


The Bad Guys Are Using It, Are You?, Hong-Eng Koh Jan 2014

The Bad Guys Are Using It, Are You?, Hong-Eng Koh

Australian Security and Intelligence Conference

From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to the ethnic cleansing rumors in India and increasingly used by pedophiles, social media is a very powerful tool for pedophiles, troublemakers, criminals and even terrorists to target individuals and even to go against the establishment. On the other hand, social media can save lives in a disaster, and its a natural extension of community policing or engagement. Community engagement is a must-have strategy for any public safety and security agency. However, this strategy requires the removal of stovepipe processes and systems within an agency, allowing …


I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone Jan 2014

I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone

Australian Security and Intelligence Conference

Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …


7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University Jan 2014

7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University

Australian Security and Intelligence Conference

No abstract provided.


A Study Of Surveillance And Privacy Rights, Jesse T. Kittle Mr. May 2013

A Study Of Surveillance And Privacy Rights, Jesse T. Kittle Mr.

Electronic Theses and Dissertations

The purpose of this study it to research the role and public perception of security surveillance on a university campus. The research measured variables such as age, gender, class standing political affiliation, and one's residence whether on campus or off campus. This study is focused on how students view security surveillance, and whether they see security surveillance as an important tool for the safety of the public or a threat to privacy. A student survey was administered to undergraduate students asking how they felt about crime on campus and whether crime was a problem that could be solved by security …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


The Effect Of Private Police On Crime: Evidence From A Geographic Regression Discontinuity Design, John M. Macdonald, Jonathan Klick, Ben Grunwald Nov 2012

The Effect Of Private Police On Crime: Evidence From A Geographic Regression Discontinuity Design, John M. Macdonald, Jonathan Klick, Ben Grunwald

All Faculty Scholarship

Research demonstrates that police reduce crime. The implication of this research for investment in a particular form of extra police services, those provided by private institutions, has not been rigorously examined. We capitalize on the discontinuity in police force size at the geographic boundary of a private university police department to estimate the effect of the extra police services on crime. Extra police provided by the university generate approximately 45-60 percent fewer crimes in the surrounding neighborhood. These effects appear to be similar to other estimates in the literature.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael Jan 2012

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …


Ua12/8 Annual Campus Security And Fire Report, Wku Police Jan 2012

Ua12/8 Annual Campus Security And Fire Report, Wku Police

WKU Archives Records

This report is designed to provide students, prospective students, parents, faculty, and staff with accurate crime statistics, information on university services, and crime prevention programs. These programs are designed to help inform our campus community about safety practices that will help reduce the risk of becoming a victim of crime. These safe practices can provide individuals with vital information that they can carry with them through college and beyond, keeping them safe for the rest of their lives.


Civilian Aviation Screening: A Time-Series Analysis Of Confiscated Firearms At Screening Checkpoints, Shon Agard Jan 2012

Civilian Aviation Screening: A Time-Series Analysis Of Confiscated Firearms At Screening Checkpoints, Shon Agard

Online Theses and Dissertations

This study investigated the aviation screening process and sought to determine if the federalization of the screening process had any effect on the number of firearm confiscations at civilian aviation screening checkpoints. The hypothesis of the study was that airport screening firearms confiscations (per one million screenings) were lower before the U.S. government (TSA) took over screening in 2001-2002. This quantitative research required the performance of an interrupted time series analysis. Interrupted time series analysis evaluates the impact of one or more events on the values in the time series. An interrupted time series analysis attempts to determine whether an …