Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

PDF

Series

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 147

Full-Text Articles in Physical Sciences and Mathematics

Discovering Significant Topics From Legal Decisions With Selective Inference, Jerrold Tsin Howe Soh Apr 2024

Discovering Significant Topics From Legal Decisions With Selective Inference, Jerrold Tsin Howe Soh

Research Collection Yong Pung How School Of Law

We propose and evaluate an automated pipeline for discovering significant topics from legal decision texts by passing features synthesized with topic models through penalized regressions and post-selection significance tests. The method identifies case topics significantly correlated with outcomes, topic-word distributions which can be manually interpreted to gain insights about significant topics, and case-topic weights which can be used to identify representative cases for each topic. We demonstrate the method on a new dataset of domain name disputes and a canonical dataset of European Court of Human Rights violation cases. Topic models based on latent semantic analysis as well as language …


The Right To A Glass Box: Rethinking The Use Of Artificial Intelligence In Criminal Justice, Brandon L. Garrett, Cynthia Rudin Jan 2024

The Right To A Glass Box: Rethinking The Use Of Artificial Intelligence In Criminal Justice, Brandon L. Garrett, Cynthia Rudin

Faculty Scholarship

Artificial intelligence (“AI”) increasingly is used to make important decisions that affect individuals and society. As governments and corporations use AI more pervasively, one of the most troubling trends is that developers so often design it to be a “black box.” Designers create AI models too complex for people to understand or they conceal how AI functions. Policymakers and the public increasingly sound alarms about black box AI. A particularly pressing area of concern has been criminal cases, in which a person’s life, liberty, and public safety can be at stake. In the United States and globally, despite concerns that …


Weird Winter Weather In The Anthropocene: How Volatile Temperatures Shape Violent Crime, Christopher Thomas, Kevin T. Wolff Jun 2023

Weird Winter Weather In The Anthropocene: How Volatile Temperatures Shape Violent Crime, Christopher Thomas, Kevin T. Wolff

Publications and Research

Purpose: Current evidence suggests volatile temperatures are becoming more common because of climate change and can be expected to become even more frequent in the future. By focusing on recent temperature variability, we attempt to estimate one important dimension of the impact of climate change on violent crime. We also explore whether sudden upward temperature anomalies have stronger positive impacts on violent crime in the coldest months of the year, as routine activities are likely to change more drastically during this period.

Methods: This study explores the association between sudden temperature anomalies (both upward and downward) and the daily incidence …


Volume 14, Ireland Seagle, Dalton C. Whitby, Cassandra Poole, Rachel Cannon, Heidi Parker-Combes, Devon G. Shifflett, Antonio Harvey Apr 2023

Volume 14, Ireland Seagle, Dalton C. Whitby, Cassandra Poole, Rachel Cannon, Heidi Parker-Combes, Devon G. Shifflett, Antonio Harvey

Incite: The Journal of Undergraduate Scholarship

Table of Contents:

  • Introduction: Dr. Amorette Barber
  • From the Editor: Dr. Larissa "Kat" Tracy
  • From the Designers: Rachel English, Rachel Hanson
  • Hungry Like the Wolf: The Wolf as Metaphor in Paramount Network’s Yellowstone: Ireland Seagle
  • “Floating Cities”: Illustrating the Commercial and Conservation Conflict of Alaskan Cruise Ship Tourism: Dalton C. Whitby
  • What Can You Do When Your Genes are the Enemy? Current Applications of Gene Manipulation and the Associated Ethical Considerations: Cassandra Poole
  • La doble cara: un tema romántico en las obras de Larra y Hawthorne: Rachel Cannon
  • Resolving a Conflict: How to …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski Jan 2023

Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski

Mathematics, Physics, and Computer Science Faculty Articles and Research

Suicidal and self-injurious incidents in correctional settings deplete the institutional and healthcare resources, create disorder and stress for staff and other inmates. Traditional statistical analyses provide some guidance, but they can only be applied to structured data that are often difficult to collect and their recommendations are often expensive to act upon. This study aims to extract information from medical and mental health progress notes using AI algorithms to make actionable predictions of suicidal and self-injurious events to improve the efficiency of triage for health care services and prevent suicidal and injurious events from happening at California's Orange County Jails. …


Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry Jul 2022

Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry

Department of Statistics: Faculty Publications

1 Preliminaries

1.1 Scope

The aim of this document is to respond to issues raised in Federal Bureau of Investigation1 and Alex Biedermann, Bruce Budowle & Christophe Champod.2

1.2 Conflict of Interest

We are statisticians employed at public institutions of higher education (Iowa State University and University of Nebraska, Lincoln) and have not been paid for our time or expertise when preparing either this response or the original affidavit.3 We provide this information as a public service and as scientists and researchers in this area.

1.3 Organization

The rest of the document precedes as follows: we begin …


Volume 13, Payton Davenport, Audrey Lemons, Jacob Shope, Haley Smith, Cassandra Poole, Rachel Cannon, Rachel Boch, Suzanne Stetson Apr 2022

Volume 13, Payton Davenport, Audrey Lemons, Jacob Shope, Haley Smith, Cassandra Poole, Rachel Cannon, Rachel Boch, Suzanne Stetson

Incite: The Journal of Undergraduate Scholarship

Introduction Dr. Roger A. Byrne, Dean

From the Editor Dr. Larissa “Kat” Tracy

From the Designers Rachel English, Rachel Hanson

The Effect of Compliment Type on the Estimated Value of the Compliment by Payton Davenport, Audrey Lemons, and Jacob Shope

The Imperial Japanese Military: A New Identity in the Twentieth Century, 1853–1922 by Haley Smith

Longwood University’s campus: Human-cultivated Soil has Higher Microbial Diversity than Soil Collected from Wild Sites by Cassandra Poole

Reminiscent Modernism: Poetry Magazine’s Modernist Nostalgia for the Past by Rachel Cannon

Challenges Faced by Healthcare Workers During the COVID-19 Pandemic: A Preliminary Study of Age and …


Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford Mar 2022

Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford

FIU Electronic Theses and Dissertations

This dissertation seeks to address the research gap in serial homicide regarding home invasion serial killers (HISKs) and add to existing policy by providing insight and approaches to assist in serial murder investigations of such killers. Data for the study was obtained from the 2019 Radford University/Florida Gulf Coast University Serial Killer Database (RU/FGCU SKD) and additional public information searches. A retrospective comparative design and proportionate stratified random sampling of 326 serial killers from the RU/FGCU SKD (2019) were used to examine the differences and classifications of HISKs and non-home invasion serial killers (non-HISKs) in three investigations: (1) common characteristics; …


Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry Jan 2022

Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry

Department of Statistics: Faculty Publications

We have outlined several problems with the state of error rate studies on firearm and toolmark examination. Fundamentally, we do not know what the error rate is for these types of comparisons. This is a failure of the scientific study of toolmarks, rather than the examiners themselves, but until this is corrected with multiple studies that meet the criteria described in Section 3, we cannot support the use of this evidence in criminal proceedings.


More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall Jan 2022

More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall

Research outputs 2014 to 2021

© 2020, The Author(s). The internet mafia trope has shaped our knowledge about organised crime groups online, yet the evidence is largely speculative and the logic often flawed. This paper adds to current knowledge by exploring the development, operation and demise of an online criminal group as a case study. In this article we analyse a DDoS (Distributed Denial of Service) stresser (also known as booter) which sells its services online to enable offenders to launch attacks. Using Social Network Analysis to explore the service operations and payment systems, our findings show a central business model that is similar to …


Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao Jan 2022

Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao

Computational Modeling & Simulation Engineering Faculty Publications

Singular point detection is a primary step in fingerprint recognition, especially for fingerprint alignment and classification. But in present there are still some problems and challenges such as more false-positive singular points or inaccurate reference point localization. This paper proposes an accurate core point localization method based on spatial domain features of fingerprint images from a completely different viewpoint to improve the fingerprint core point displacement problem of singular point detection. The method first defines new fingerprint features, called furcation and confluence, to represent specific ridge/valley distribution in a core point area, and uses them to extract the innermost Curve …


Evaluation Of The Trunarc Handheld Narcotics Analyzer As A Pre-Analysis Screening Device For The Orange County Crime Lab, Sarah Yang, D. Bauer, C. Woltz, S. Soto, Michael Ibba Dec 2021

Evaluation Of The Trunarc Handheld Narcotics Analyzer As A Pre-Analysis Screening Device For The Orange County Crime Lab, Sarah Yang, D. Bauer, C. Woltz, S. Soto, Michael Ibba

Student Scholar Symposium Abstracts and Posters

Forensic analysis of suspected narcotics is often dangerous as the substances’ composition is unknown. Many techniques for drug identification require handling of the substance outside of its packaging, which can expose the analyst to potentially harmful chemicals. The TruNarc Handheld Narcotics Analyzer is a portable Raman spectroscopy device that is non-destructive of evidence and can be used to screen drugs through simple packaging to minimize the risk of exposure. The Orange County Crime Lab (OCCL) is testing the limits of this device to determine if it can be used to screen new evidence within the Seized Drugs Lab. The OCCL …


Forensicast: A Non-Intrusive Approach & Tool For Logical Forensic Acquisition & Analysis Of The Google Chromecast Tv, Alex Sitterer, Nicholas Dubois, Ibrahim Baggili Aug 2021

Forensicast: A Non-Intrusive Approach & Tool For Logical Forensic Acquisition & Analysis Of The Google Chromecast Tv, Alex Sitterer, Nicholas Dubois, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The era of traditional cable Television (TV) is swiftly coming to an end. People today subscribe to a multitude of streaming services. Smart TVs have enabled a new generation of entertainment, not only limited to constant on-demand streaming as they now offer other features such as web browsing, communication, gaming etc. These functions have recently been embedded into a small IoT device that can connect to any TV with High Definition Multimedia Interface (HDMI) input known as Google Chromecast TV. Its wide adoption makes it a treasure trove for potential digital evidence. Our work is the primary source on forensically …


Forensic Artifact Finder (Forensicaf): An Approach & Tool For Leveraging Crowd-Sourced Curated Forensic Artifacts, Tyler Balon, Krikor Herlopian, Ibrahim Baggili, Cinthya Grajeda-Mendez Aug 2021

Forensic Artifact Finder (Forensicaf): An Approach & Tool For Leveraging Crowd-Sourced Curated Forensic Artifacts, Tyler Balon, Krikor Herlopian, Ibrahim Baggili, Cinthya Grajeda-Mendez

Electrical & Computer Engineering and Computer Science Faculty Publications

Current methods for artifact analysis and understanding depend on investigator expertise. Experienced and technically savvy examiners spend a lot of time reverse engineering applications while attempting to find crumbs they leave behind on systems. This takes away valuable time from the investigative process, and slows down forensic examination. Furthermore, when specific artifact knowledge is gained, it stays within the respective forensic units. To combat these challenges, we present ForensicAF, an approach for leveraging curated, crowd-sourced artifacts from the Artifact Genome Project (AGP). The approach has the overarching goal of uncovering forensically relevant artifacts from storage media. We explain our approach …


Duck Hunt: Memory Forensics Of Usb Attack Platforms, Tyler Thomas, Mathew Piscitelli, Bhavik Ashok Nahar, Ibrahim Baggili Aug 2021

Duck Hunt: Memory Forensics Of Usb Attack Platforms, Tyler Thomas, Mathew Piscitelli, Bhavik Ashok Nahar, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

To explore the memory forensic artifacts generated by USB-based attack platforms, we analyzed two of the most popular commercially available devices, Hak5's USB Rubber Ducky and Bash Bunny. We present two open source Volatility plugins, usbhunt and dhcphunt, which extract artifacts generated by these USB attacks from Windows 10 system memory images. Such artifacts include driver-related diagnostic events, unique device identifiers, and DHCP client logs. Our tools are capable of extracting metadata-rich Windows diagnostic events generated by any USB device. The device identifiers presented in this work may also be used to definitively detect device usage. Likewise, the DHCP logs …


Another Brick In The Wall: An Exploratory Analysis Of Digital Forensics Programs In The United States, Syria Mccullough, Stella Abudu, Ebere Onwubuariri, Ibrahim Baggili Aug 2021

Another Brick In The Wall: An Exploratory Analysis Of Digital Forensics Programs In The United States, Syria Mccullough, Stella Abudu, Ebere Onwubuariri, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

We present a comprehensive review of digital forensics programs offered by universities across the United States (U.S.). While numerous studies on digital forensics standards and curriculum exist, few, if any, have examined digital forensics courses offered across the nation. Since digital forensics courses vary from university to university, online course catalogs for academic institutions were evaluated to curate a dataset. Universities were selected based on online searches, similar to those that would be made by prospective students. Ninety-seven (n = 97) degree programs in the U.S. were evaluated. Overall, results showed that advanced technical courses are missing from curricula. We …


Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause Mar 2021

Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause

Honors Theses

This study examines Nebraska Department of Corrections inmate data from 1980-2020, looking specifically at inmate demographics and offense trends. State-of-the-art data analysis is conducted to collect, modify, and visualize the data sources. Inmates are organized by each decade they were incarcerated within. The current active prison population is also examined in their own research group. The demographic and offense trends are compared with previous local and national research. Historical context is given for evolving trends in offenses. Solutions for Nebraska prison overcrowding are presented from various interest groups. This study aims to enlighten all interested Nebraskans on who inhabits their …


Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison Feb 2021

Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison

EBCS Articles

Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username …


Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum Jan 2021

Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum

EBCS Articles

Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing environments may change computer users’ behaviors, this study tests the effectiveness of CPTED based approaches in mitigating system trespassing events. Findings from this randomized controlled field trial demonstrate that specific CPTED strategies can mitigate hacking events by: reducing the number of concurrent activities on the target computer, attenuating the number of commands typed in the attacked computer, and …


Zooming Into The Pandemic! A Forensic Analysis Of The Zoom Application, Andrew Mahr, Meghan Cichon, Sophia Mateo, Cinthya Grajeda, Ibrahim Baggili Jan 2021

Zooming Into The Pandemic! A Forensic Analysis Of The Zoom Application, Andrew Mahr, Meghan Cichon, Sophia Mateo, Cinthya Grajeda, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The global pandemic of COVID-19 has turned the spotlight on video conferencing applications like never before. In this critical time, applications such as Zoom have experienced a surge in its user base jump over the 300 million daily mark (ZoomBlog, 2020). The increase in use has led malicious actors to exploit the application, and in many cases perform Zoom Bombings. Therefore forensically examining Zoom is inevitable. Our work details the primary disk, network, and memory forensic analysis of the Zoom video conferencing application. Results demonstrate it is possible to find users' critical information in plain text and/or encrypted/encoded, such …


Advancing Applied Research In Conservation Criminology Through The Evaluation Of Corruption Prevention, Enhancing Compliance, And Reducing Recidivism, Jessica S. Kahler, Joseph W. Rivera, Zachary T. Steele, Pilar Morales-Giner, Christian J. Rivera, Carol F. Ahossin, Ashpreet Kaur, Diane J. Episcopio-Sturgeon Jan 2021

Advancing Applied Research In Conservation Criminology Through The Evaluation Of Corruption Prevention, Enhancing Compliance, And Reducing Recidivism, Jessica S. Kahler, Joseph W. Rivera, Zachary T. Steele, Pilar Morales-Giner, Christian J. Rivera, Carol F. Ahossin, Ashpreet Kaur, Diane J. Episcopio-Sturgeon

Biological Sciences Faculty Publications

Concomitant with an increase in the global illegal wildlife trade has been a substantial increase in research within traditional conservation-based sciences and conservation and green criminology. While the integration of criminological theories and methods into the wildlife conservation context has advanced our understanding of and practical responses to illegal wildlife trade, there remain discrepancies between the number of empirical vs. conceptual studies and a disproportionate focus on a few select theories, geographical contexts, and taxonomic groups. We present three understudied or novel applications of criminology and criminal justice research within the fields of fisheries, forestry, and wildlife conservation. First, we …


Digital Forensic Readiness Intelligence Crime Repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, Sadi Alawadi Jan 2021

Digital Forensic Readiness Intelligence Crime Repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, Sadi Alawadi

Research outputs 2014 to 2021

It may not always be possible to conduct a digital (forensic) investigation post-event if there is no process in place to preserve potential digital evidence. This study posits the importance of digital forensic readiness, or forensic-by-design, and presents an approach that can be used to construct a Digital Forensic Readiness Intelligence Repository (DFRIR). Based on the concept of knowledge sharing, the authors leverage this premise to suggest an intelligence repository. Such a repository can be used to cross-reference potential digital evidence (PDE) sources that may help digital investigators during the process. This approach employs a technique of capturing PDE from …


Digital Forensic Readiness In Operational Cloud Leveraging Iso/Iec 27043 Guidelines On Security Monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Sadi Alawadi Jan 2021

Digital Forensic Readiness In Operational Cloud Leveraging Iso/Iec 27043 Guidelines On Security Monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Sadi Alawadi

Research outputs 2014 to 2021

An increase in the use of cloud computing technologies by organizations has led to cybercriminals targeting cloud environments to orchestrate malicious attacks. Conversely, this has led to the need for proactive approaches through the use of digital forensic readiness (DFR). Existing studies have attempted to develop proactive prototypes using diverse agent-based solutions that are capable of extracting a forensically sound potential digital evidence. As a way to address this limitation and further evaluate the degree of PDE relevance in an operational platform, this study sought to develop a prototype in an operational cloud environment to achieve DFR in the cloud. …


Evaluating The Impact Of Sandbox Applications On Live Digital Forensics Investigation, Reem Bashir, Helge Janicke, Wen Zeng Jan 2021

Evaluating The Impact Of Sandbox Applications On Live Digital Forensics Investigation, Reem Bashir, Helge Janicke, Wen Zeng

Research outputs 2014 to 2021

Sandbox applications can be used as anti-forensics techniques to hide important evidence in the digital forensics investigation. There is limited research on sandboxing technologies, and the existing researches on sandboxing are focusing on the technology itself. The impact of sandbox applications on live digital forensics investigation has not been systematically analysed and documented. In this study, we proposed a methodology to analyse sandbox applications on Windows systems. The impact of having standalone sandbox applications on Windows operating systems image was evaluated. Experiments were conducted to examine the artefacts of three sandbox applications: Sandboxie, BufferZone and ToolWiz Time Freeze on Windows …


Wildlife Trade And Covid-19: Towards A Criminology Of Anthropogenic Pathogen Spillover, Piers Beirne Phd Dec 2020

Wildlife Trade And Covid-19: Towards A Criminology Of Anthropogenic Pathogen Spillover, Piers Beirne Phd

Department of Criminology

The general remit of this paper is the role of wildlife trade in pathogen spillover. Its underlying assumption is that, so far from being the exclusive domain of the life sciences, the study of pathogen spillover will be greatly enhanced by multi-perspectival approaches, including One Health and those employed here, namely, non-speciesist green criminology and critical animal studies. The paper moves from discussions of zoonosis, anthroponosis and wildlife trade to the emergence of COVID-19 in Wuhan, China. The paper recommends the abolition of all wildlife trade and the reclamation of wildlife habitat and broaches discussion of the extension of legal …


The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques Nov 2020

The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques

EBCS Articles

Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …


The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood Oct 2020

The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood

Publications and Research

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …


Memory Foreshadow: Memory Forensics Of Hardware Cryptocurrency Wallets – A Tool And Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, Ibrahim Baggili Sep 2020

Memory Foreshadow: Memory Forensics Of Hardware Cryptocurrency Wallets – A Tool And Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

We present Memory FORESHADOW: Memory FOREnSics of HArDware cryptOcurrency Wallets. To the best of our knowledge, this is the primary account of cryptocurrency hardware wallet client memory forensics. Our exploratory analysis revealed forensically relevant data in memory including transaction history, extended public keys, passphrases, and unique device identifiers. Data extracted with FORESHADOW can be used to associate a hardware wallet with a computer and allow an observer to deanonymize all past and future transactions due to hierarchical deterministic wallet address derivation. Additionally, our novel visualization framework enabled us to measure both the persistence and integrity of artifacts produced by the …


Exploring The Learning Efficacy Of Digital Forensics Concepts And Bagging & Tagging Of Digital Devices In Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, Ibrahim Baggili Sep 2020

Exploring The Learning Efficacy Of Digital Forensics Concepts And Bagging & Tagging Of Digital Devices In Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

This work presents the first account of evaluating learning inside a VR experience created to teach Digital Forensics (DF) concepts, and a hands-on laboratory exercise in Bagging & Tagging a crime scene with digital devices. First, we designed and developed an immersive VR experience which included a lecture and a lab. Next, we tested it with (n = 57) participants in a controlled experiment where they were randomly assigned to a VR group or a physical group. Both groups were subjected to the same lecture and lab, but one was in VR and the other was in the real world. …