Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

Conference

Cybersecurity Undergraduate Research Showcase

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Law

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds Apr 2024

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds

Cybersecurity Undergraduate Research Showcase

The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.

Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …


The Role Of Osint In Criminal Investigations: Leveraging Open-Source Data To Combat Cybercrime And Organized Criminal Activities, Azariah Vaughan Mar 2024

The Role Of Osint In Criminal Investigations: Leveraging Open-Source Data To Combat Cybercrime And Organized Criminal Activities, Azariah Vaughan

Cybersecurity Undergraduate Research Showcase

In today's modern age driven by digital innovations, the widespread adoption of technology has transformed criminal activities, leading to the emergence of cybercrime as a significant challenge for law enforcement agencies globally. Cybercrime acts have left a considerable dent on criminal activities and nowadays that we are halfway into the subsequent technological era stands as one of the most crucial issues for law enforcement agencies all around the globe. The aim of this work is to discuss the relationship between cybercrime and organized crime and the importance of OSINT within criminal investigations in supporting law enforcement itself. Particularly, due to …


Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr Apr 2023

Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr

Cybersecurity Undergraduate Research Showcase

According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).

The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …


The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes Jan 2020

The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes

Cybersecurity Undergraduate Research Showcase

This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source …