Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 822

Full-Text Articles in Physical Sciences and Mathematics

Discovering Significant Topics From Legal Decisions With Selective Inference, Jerrold Tsin Howe Soh Apr 2024

Discovering Significant Topics From Legal Decisions With Selective Inference, Jerrold Tsin Howe Soh

Research Collection Yong Pung How School Of Law

We propose and evaluate an automated pipeline for discovering significant topics from legal decision texts by passing features synthesized with topic models through penalized regressions and post-selection significance tests. The method identifies case topics significantly correlated with outcomes, topic-word distributions which can be manually interpreted to gain insights about significant topics, and case-topic weights which can be used to identify representative cases for each topic. We demonstrate the method on a new dataset of domain name disputes and a canonical dataset of European Court of Human Rights violation cases. Topic models based on latent semantic analysis as well as language …


Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian Mar 2024

Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian

Seaver College Research And Scholarly Achievement Symposium

Coomassie Brilliant Blue Dye is a dye commonly used to stain proteins. Because of its ability to adhere to proteins, this research has focused on perfecting a method of dyeing a fractured flat bone in order to most accurately observe and analyze fracture markings within the trabecular layer. Stereoscopic microscopy was the chosen technique of analysis for this research because of its proven effectiveness in glass and ceramic fractography to observe varying depths. In order to most effectively apply stereoscopic microscopy to this research, the following variables were manipulated to maximize color contrast in the trabecular layer in order to …


Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee Feb 2024

Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.


The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz Feb 2024

The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz

International Journal of Cybersecurity Intelligence & Cybercrime

According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …


Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones Feb 2024

Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones

International Journal of Cybersecurity Intelligence & Cybercrime

Doubleday released Andy Greenberg’s Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency in November 2022. Through vivid case studies of global criminal investigations, the book dispels myths about the anonymizing power of cryptocurrency. The book details how the ability to identify cryptocurrency users and payment methods successfully brought down several large criminal empires, while also highlighting the continuous cat-and-mouse game between law enforcement officials and criminal actors using cryptocurrency. The book is an excellent resource for law enforcement officials, academics, and general cybersecurity practitioners interested in cryptocurrency-related criminal activities and law enforcement techniques.


Making Sense Of Making Parole In New York, Alexandra Mcglinchy Feb 2024

Making Sense Of Making Parole In New York, Alexandra Mcglinchy

Dissertations, Theses, and Capstone Projects

For many individuals incarcerated in New York, the initial step toward freedom begins with an interview with the Board of Parole. This process, however, is frequently a complex and challenging one, characterized by repeated denials and extended incarcerations. The disparity in outcomes – where one individual may receive over 20 denials and another is granted parole on their first attempt – highlights the ambiguity and inconsistency in the parole decision-making process. This project aims to clarify the factors that influence parole decisions by concentrating on measurable variables. These include age, race, duration of sentence served, proportion of sentence served, type …


Containerization Of Seafarers In The International Shipping Industry: Contemporary Seamanship, Maritime Social Infrastructures, And Mobility Politics Of Global Logistics, Liang Wu Feb 2024

Containerization Of Seafarers In The International Shipping Industry: Contemporary Seamanship, Maritime Social Infrastructures, And Mobility Politics Of Global Logistics, Liang Wu

Dissertations, Theses, and Capstone Projects

This dissertation discusses the mobility politics of container shipping and argues that technological development, political-economic order, and social infrastructure co-produce one another. Containerization, the use of standardized containers to carry cargo across modes of transportation that is said to have revolutionized and globalized international trade since the late 1950s, has served to expand and extend the power of international coalitions of states and corporations to control the movements of commodities (shipments) and labor (seafarers). The advent and development of containerization was driven by a sociotechnical imaginary and international social contract of seamless shipping and cargo flows. In practice, this liberal, …


Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo Aug 2023

Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo

International Journal of Cybersecurity Intelligence & Cybercrime

The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …


Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi Aug 2023

Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi

International Journal of Cybersecurity Intelligence & Cybercrime

Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.


Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi Aug 2023

Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi

International Journal of Cybersecurity Intelligence & Cybercrime

Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …


Identification Of Different Hair Dyes In Dyed Hair Using Attenuated Total Reflectance (Atr Ft-Ir), Surface Enhancing Raman Spectroscopy (Sers) Techniques, Nicholas Lovera Jun 2023

Identification Of Different Hair Dyes In Dyed Hair Using Attenuated Total Reflectance (Atr Ft-Ir), Surface Enhancing Raman Spectroscopy (Sers) Techniques, Nicholas Lovera

Student Theses

This investigation compares the ability of Attenuated Total Reflection Fourier Transfer Infrared Spectroscopy (ATR FT-IR) and Surface Enhance Raman Spectroscopy (SERS) to identify and differentiate different hair dye brands on dyed hair samples. Hair is a common type of trace evidence found at crime scenes and can provide numerous information through forensic hair analysis. Cosmetic hair treatment such as dying the hair different colors has grown and became popular, thus it can be a very common type of trace evidence. This study can provide a forensic scientist an additional method for analyzing dyed hair samples. The goal was to compare …


Weird Winter Weather In The Anthropocene: How Volatile Temperatures Shape Violent Crime, Christopher Thomas, Kevin T. Wolff Jun 2023

Weird Winter Weather In The Anthropocene: How Volatile Temperatures Shape Violent Crime, Christopher Thomas, Kevin T. Wolff

Publications and Research

Purpose: Current evidence suggests volatile temperatures are becoming more common because of climate change and can be expected to become even more frequent in the future. By focusing on recent temperature variability, we attempt to estimate one important dimension of the impact of climate change on violent crime. We also explore whether sudden upward temperature anomalies have stronger positive impacts on violent crime in the coldest months of the year, as routine activities are likely to change more drastically during this period.

Methods: This study explores the association between sudden temperature anomalies (both upward and downward) and the daily incidence …


Structural Integrity And Stability Of Dna In Ionic Liquid And Near-Infrared Indolizine Squaraine Dye, Ember Yeji Suh May 2023

Structural Integrity And Stability Of Dna In Ionic Liquid And Near-Infrared Indolizine Squaraine Dye, Ember Yeji Suh

Honors Theses

Luminol, the most common presumptive test for blood at a crime scene, has multiple issues, such as false positive results with chemical agents, no luminescence due to “active oxygen” cleaning agents on bloodstains, and inability to penetrate textile materials. A combination of indolizine squaraine dye and ionic liquid (IL), or Dye Enhanced Textile Emission for Crime Tracking (DETECT), have shown potential to address these issues. The purpose of this study was to assess the binding mechanism of CG (1:1) and SO3SQ dye to HSA and how the mechanism can explain the W214 fluorescence quenching effect and to determine …


Drug Ideologies Of The United States, Macy Montgomery May 2023

Drug Ideologies Of The United States, Macy Montgomery

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The United States has been increasingly creating lenient drug policies. Seventeen states and Washington, the District of Columbia, legalized marijuana, and Oregon decriminalized certain drugs, including methamphetamine, heroin, and cocaine. The medical community has proven that drugs, including marijuana, have myriad adverse health side effects. This leads to two questions: Why does the United States government continue to create lenient drug policies, and what reasons do citizens give for legalizing drugs when the medical community has proven them harmful? The paper hypothesizes that the disadvantages of drug legalization outweigh its benefits because of the numerous harms it causes, such as …


Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston May 2023

Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston

Master's Theses

In investigations, locating missing persons and clandestine remains are imperative. One way that first responder and police agencies can search for the remains is by using cadaver dogs as biological detectors. Cadaver dogs are typically used due to their olfactory sensitivity and ability to detect low concentrations of volatile organic compounds produced by biological remains. Cadaver dogs are typically chosen for their stamina, agility, and olfactory sensitivity. However, what is not taken into account often is the size of the animal and the expense of maintaining and training the animal. Cadaver dogs are typically large breeds that cannot fit in …


Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis May 2023

Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis

Master's Theses

This study aspires to find a new screening approach to trace DNA recovery techniques to yield a higher quantity of trace DNA from larger items of evidence. It takes the path of visualizing trace DNA on items of evidence with potential DNA so analysts can swab a more localized area rather than attempting to recover trace DNA through the general swabbing technique currently used for trace DNA recovery. The first and second parts consisted of observing trace DNA interaction with Diamond Dye on porous and non-porous surfaces.

The third part involved applying the Diamond Dye solution by spraying it onto …


Volume 14, Ireland Seagle, Dalton C. Whitby, Cassandra Poole, Rachel Cannon, Heidi Parker-Combes, Devon G. Shifflett, Antonio Harvey Apr 2023

Volume 14, Ireland Seagle, Dalton C. Whitby, Cassandra Poole, Rachel Cannon, Heidi Parker-Combes, Devon G. Shifflett, Antonio Harvey

Incite: The Journal of Undergraduate Scholarship

Table of Contents:

  • Introduction: Dr. Amorette Barber
  • From the Editor: Dr. Larissa "Kat" Tracy
  • From the Designers: Rachel English, Rachel Hanson
  • Hungry Like the Wolf: The Wolf as Metaphor in Paramount Network’s Yellowstone: Ireland Seagle
  • “Floating Cities”: Illustrating the Commercial and Conservation Conflict of Alaskan Cruise Ship Tourism: Dalton C. Whitby
  • What Can You Do When Your Genes are the Enemy? Current Applications of Gene Manipulation and the Associated Ethical Considerations: Cassandra Poole
  • La doble cara: un tema romántico en las obras de Larra y Hawthorne: Rachel Cannon
  • Resolving a Conflict: How to …


Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr Apr 2023

Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr

Cybersecurity Undergraduate Research Showcase

According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).

The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …


Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler Mar 2023

Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler

International Journal of Cybersecurity Intelligence & Cybercrime

This research aims to explore the influence of news media on the fear of cyberterrorism and how cyberterrorism is framed in the media. Using a mixed-method approach as a research strategy, this paper reports on two studies that explore the influence of news reading on the fear of cyberterrorism. The first study analyzed survey responses from 1,190 participants and found that increased exposure to reading news media was associated with increased fear of cyberterrorism. The second study, built on the first, sought to investigate how cyberterrorism is framed and constructed as a threat by the US local and national newspapers. …


Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins Mar 2023

Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins

International Journal of Cybersecurity Intelligence & Cybercrime

The difference in depression between non-cyberbullied and cyberbullied youth is not well understood. To describe the prevalence and trends in depression among cyberbullied adolescents. Using cross-sectional, nationally-representative data from the YRBS 2011 - 2019, we estimated the prevalence and trends of depression across the total years and within cyberbullied groups that include biological sex and race and ethnicity among adolescents. The results indicated the prevalence of depression was higher among those that were cyberbullied. Within the cyberbullied groups the total trend was higher than the non-cyberbullied, females had a higher prevalence of depression than males, and Hispanics had a higher …


New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens Mar 2023

New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens

International Journal of Cybersecurity Intelligence & Cybercrime

This editorial introduction will present an overview of the four articles contained in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The articles examine the profiling of hackers, the role of the media in shaping public perceptions of cyberterrorism, research trends in cybersecurity and cybercrime, as well as the impacts of cyberbullying.


Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke Mar 2023

Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke

International Journal of Cybersecurity Intelligence & Cybercrime

Studies on cybercrime and cybersecurity have expanded in both scope and breadth in recent years. This study offers a bibliometric review of research trends in cybercrime and cybersecurity over the past 26 years (1995-2021) based on Web of Science core collection database. Specifically, we examine the growth of scholarship and the expanded scope of subject categories and relevant journals. We also analyze the research collaboration network based on authors’ affiliated institutions and countries. Finally, we identify major topics within the fields, how each topic relates to – and diverges from – one another, and their evolution over time. Overall, we …


Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld Mar 2023

Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld

International Journal of Cybersecurity Intelligence & Cybercrime

Recently, it seems as if hacking-related stories can be found in the news every day. To study, and hopefully prevent, this new type of crime, the field of cyber criminology has emerged. This study adds to the existing cybercrime literature by examining hacking behavior specifically. It determines if there is a relationship between the age, gender, and nationality of hackers and characteristics of the cyberattacks that they perpetrate. To do this, this study analyzes 122 United States Department of Justice (USDOJ) press reports from January 2019 to December 2021. Some key results include the finding that older hackers and international …


Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter Mar 2023

Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter

UNO Student Research and Creative Activity Fair

In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Session 8: Ensemble Of Score Likelihood Ratios For The Common Source Problem, Federico Veneri, Danica M. Ommen Feb 2023

Session 8: Ensemble Of Score Likelihood Ratios For The Common Source Problem, Federico Veneri, Danica M. Ommen

SDSU Data Science Symposium

Machine learning-based Score Likelihood Ratios have been proposed as an alternative to traditional Likelihood Ratios and Bayes Factor to quantify the value of evidence when contrasting two opposing propositions.

Under the common source problem, the opposing proposition relates to the inferential problem of assessing whether two items come from the same source. Machine learning techniques can be used to construct a (dis)similarity score for complex data when developing a traditional model is infeasible, and density estimation is used to estimate the likelihood of the scores under both propositions.

In practice, the metric and its distribution are developed using pairwise comparisons …


Unlocking Potential: The School-To-Prison Pipeline For Students With Disabilities, Navena F. Chaitoo Feb 2023

Unlocking Potential: The School-To-Prison Pipeline For Students With Disabilities, Navena F. Chaitoo

Dissertations, Theses, and Capstone Projects

This research uses quasi-experimental, matched sampling to examine the school-to-prison pipeline for students with disabilities using data from the National Longitudinal Study of Adolescent to Adult Health. This study presents novel insights into an at-risk group that has faced disproportionate rates of school discipline and incarceration. The study finds school suspension to be associated with future involvement in the criminal legal system and lower educational attainment. Disability was not found to mediate the relationship between suspension and future involvement in the criminal legal system or the relationship between suspension and academic outcomes. However, disability was found to be a statistically …


Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski Jan 2023

Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski

Mathematics, Physics, and Computer Science Faculty Articles and Research

Suicidal and self-injurious incidents in correctional settings deplete the institutional and healthcare resources, create disorder and stress for staff and other inmates. Traditional statistical analyses provide some guidance, but they can only be applied to structured data that are often difficult to collect and their recommendations are often expensive to act upon. This study aims to extract information from medical and mental health progress notes using AI algorithms to make actionable predictions of suicidal and self-injurious events to improve the efficiency of triage for health care services and prevent suicidal and injurious events from happening at California's Orange County Jails. …


Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr. Jan 2023

Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.

LSU Master's Theses

A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …


A Picture Worth A Thousand Words: Factors Influencing Disability Accommodations, Alicia E. Martin Jan 2023

A Picture Worth A Thousand Words: Factors Influencing Disability Accommodations, Alicia E. Martin

Cal Poly Humboldt theses and projects

Because not all disabilities look the same it is difficult to label a person with disabilities just by looking at them. Given that our knowledge, attitudes, and perceptions impact how we interpret our world and our willingness to act, people, including professors, may be biased toward providing accommodations for those with easily recognizable disabilities and biased against those with non-recognizable disabilities, and this may impact the disabled person’s ability to learn. This thesis aims to address whether professors’ disability-related attitudes, perceptions of accommodation reasonableness, and willingness to provide accommodations differ when the disability is recognizable (student is pictured in a …