Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

PDF

2020

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Physical Sciences and Mathematics

Wildlife Trade And Covid-19: Towards A Criminology Of Anthropogenic Pathogen Spillover, Piers Beirne Phd Dec 2020

Wildlife Trade And Covid-19: Towards A Criminology Of Anthropogenic Pathogen Spillover, Piers Beirne Phd

Department of Criminology

The general remit of this paper is the role of wildlife trade in pathogen spillover. Its underlying assumption is that, so far from being the exclusive domain of the life sciences, the study of pathogen spillover will be greatly enhanced by multi-perspectival approaches, including One Health and those employed here, namely, non-speciesist green criminology and critical animal studies. The paper moves from discussions of zoonosis, anthroponosis and wildlife trade to the emergence of COVID-19 in Wuhan, China. The paper recommends the abolition of all wildlife trade and the reclamation of wildlife habitat and broaches discussion of the extension of legal …


The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques Nov 2020

The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques

EBCS Articles

Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …


The Effects Of Self-Control On The Cyber Victim-Offender Overlap, Brooke Nodeland Nov 2020

The Effects Of Self-Control On The Cyber Victim-Offender Overlap, Brooke Nodeland

International Journal of Cybersecurity Intelligence & Cybercrime

Increasingly, the overlap between victims and offenders has received empirical attention with regard to traditional forms of deviance. More recently, the growth of cyber offending has led to a need to examine whether traditional criminological theories can be used to explain these crimes in the same manner as traditional offenses. However, limited attention has been given to victim-offender overlap in cyber-offending. The current study uses a sample of American college students to examine the influence of self-control on cyber offending, cyber victimization, and the cyber victim-offender overlap. The results indicate that low self-control significantly predicts participation in cyber offending as …


Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade Nov 2020

Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

Academic institutions house enormous amounts of critical information from social security numbers of students to proprietary research data. Thus, maintaining up to date cybersecurity practices to protect academic institutions’ information and facilities against cyber-perpetrators has become a top priority. The purpose of this study is to assess common cybersecurity measures through a situational crime prevention (SCP) theoretical framework. Using a national data set of academic institutions in the United States, this study investigates the link between common cybersecurity measures, crime prevention activities, and cybercrimes. By focusing on the conceptualization of cybersecurity measures as SCP techniques, this study also offers the …


Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong Nov 2020

Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong

International Journal of Cybersecurity Intelligence & Cybercrime

This paper discusses and proposes the inclusion of a cyber or security risk assessment section during the course of public health initiatives involving the use of information and communication computer technology. Over the last decade, many public health research efforts have included information technologies such as Mobile Health (mHealth), Electronic Health (eHealth), Telehealth, and Digital Health to assist with unmet global development health needs. This paper provides a background on the lack of documentation on cybersecurity risks or vulnerability assessments in global public health areas. This study suggests existing frameworks and policies be adopted for public health. We also propose …


Book Review: Computer Capers: Tales Of Electronic Thievery, Embezzlement, And Fraud. By Thomas Whiteside, Brian Nussbaum Nov 2020

Book Review: Computer Capers: Tales Of Electronic Thievery, Embezzlement, And Fraud. By Thomas Whiteside, Brian Nussbaum

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee Nov 2020

Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through …


Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara Oct 2020

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara

Journal of Digital Forensics, Security and Law

Following a series of high profile miscarriages of justice in the UK linked to questionable expert evidence, the post of the Forensic Science Regulator was created in 2008. The main objective of this role is to improve the standard of practitioner competences and forensic procedures. One of the key strategies deployed to achieve this is the push to incorporate a greater level of scientific conduct in the various fields of forensic practice. Currently there is no statutory requirement for practitioners to become accredited to continue working with the Criminal Justice System of England and Wales. However, the Forensic Science Regulator …


The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood Oct 2020

The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood

Publications and Research

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …


Memory Foreshadow: Memory Forensics Of Hardware Cryptocurrency Wallets – A Tool And Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, Ibrahim Baggili Sep 2020

Memory Foreshadow: Memory Forensics Of Hardware Cryptocurrency Wallets – A Tool And Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

We present Memory FORESHADOW: Memory FOREnSics of HArDware cryptOcurrency Wallets. To the best of our knowledge, this is the primary account of cryptocurrency hardware wallet client memory forensics. Our exploratory analysis revealed forensically relevant data in memory including transaction history, extended public keys, passphrases, and unique device identifiers. Data extracted with FORESHADOW can be used to associate a hardware wallet with a computer and allow an observer to deanonymize all past and future transactions due to hierarchical deterministic wallet address derivation. Additionally, our novel visualization framework enabled us to measure both the persistence and integrity of artifacts produced by the …


Exploring The Learning Efficacy Of Digital Forensics Concepts And Bagging & Tagging Of Digital Devices In Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, Ibrahim Baggili Sep 2020

Exploring The Learning Efficacy Of Digital Forensics Concepts And Bagging & Tagging Of Digital Devices In Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

This work presents the first account of evaluating learning inside a VR experience created to teach Digital Forensics (DF) concepts, and a hands-on laboratory exercise in Bagging & Tagging a crime scene with digital devices. First, we designed and developed an immersive VR experience which included a lecture and a lab. Next, we tested it with (n = 57) participants in a controlled experiment where they were randomly assigned to a VR group or a physical group. Both groups were subjected to the same lecture and lab, but one was in VR and the other was in the real world. …


The Relationship Between Impact Energy And Glass Fracture Via .177 Caliber Steel Bbs, Jocenel Beach Aug 2020

The Relationship Between Impact Energy And Glass Fracture Via .177 Caliber Steel Bbs, Jocenel Beach

Student Theses

Fractured glass is often found at shooting scenes and can provide useful information for crime scene reconstruction. Mechanical glass fracture from a projectile impact can result in different types of fracture patterns. The degree of fracture depends on several factors including: type of glass, the thickness of the glass, curvature (if any), distance from the muzzle, contact angle, and type of projectile. Correlating impact energy to the degree of glass fracture can provide useful information regarding the muzzle-to-target distance for a particular firearm/ammunition combination. This research focuses on the projectile impact velocity of .177 steel BBs shot from a pneumatic …


Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman Jun 2020

Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..


Assessing Evidence Relevance By Disallowing Assessment, John Licato, Michael Cooper Jun 2020

Assessing Evidence Relevance By Disallowing Assessment, John Licato, Michael Cooper

OSSA Conference Archive

Guidelines for assessing whether potential evidence is relevant to some argument tend to rely on criteria that are subject to well-known biasing effects. We describe a framework for argumentation that does not allow participants to directly decide whether evidence is potentially relevant to an argument---instead, evidence must prove its relevance through demonstration. This framework, called WG-A, is designed to translate into a dialogical game playable by minimally trained participants.


Photofading Of Black Dyes In Cotton And Polyester Fibers Resulting From Environmental Exposure To Sunlight, Maggie E. Mahaney May 2020

Photofading Of Black Dyes In Cotton And Polyester Fibers Resulting From Environmental Exposure To Sunlight, Maggie E. Mahaney

Honors Theses

Color is one of the most important properties analyzed during forensic fiber examinations due to its discriminatory power. Differing colors in fibers are usually sufficient grounds for exclusion, but in cases where a lengthy period has passed between crime commission and evidence recovery, the high probability of environmental degradation having altered the questioned fibers’ properties could lead to false exclusions. Photofading, the loss of color resulting from exposure to light, is a common form of degradation observed in fibers. Although well-known in the dyeing industry, it is not typically factored into forensic fiber examinations. Published photofading research has been limited …


Investigation Of The History Of Fingerprinting, Advancements In The Field, And Development Of Potential Methods That Could Improve The Detection Of Endogenous And Exogenous Drugs In Latent Prints, Kristen Malloy May 2020

Investigation Of The History Of Fingerprinting, Advancements In The Field, And Development Of Potential Methods That Could Improve The Detection Of Endogenous And Exogenous Drugs In Latent Prints, Kristen Malloy

Honors Theses

When someone thinks of fingerprinting, they are most likely going to picture how a latent print is matched to the fingerprint of a suspect based on ridge pattern analysis. However, there is much more information that can be obtained from a latent print. The work performed in this thesis focuses the detection of exogenous and endogenous drugs in latent prints. The experiments performed analyzed fingerprints from volunteers that were contaminated with one of three common painkillers: acetaminophen, acetylsalicylic acid (ASA), and ibuprofen. Three different instruments were tested for this purpose: MALDI-MS, ATR-FTIR, and LC-MS. Based on the results gathered, it …


Small Island Taphonomy In Western Australia, Courtney J. Newberry May 2020

Small Island Taphonomy In Western Australia, Courtney J. Newberry

Honors Theses

Forensic death investigations rely on postmortem interval estimations to establish a timeline surrounding a decedent’s death. Several methods are used, often together, to make such estimations. One of the main methods is the evaluation of the stage of decomposition; although decomposition follows the same general steps, the length of the process can vary by location and environmental factors. Animal scavenging can also impact decomposition by consuming flesh and impacting insect activity on the remains.

This study investigates the scavenging guilds and rate of decomposition of pig (Sus scrofa) legs on Rottnest Island, Australia. Three sites with unique environments were selected …


The Ability Of Vitreous Metabolite Concentration To Determine Time Of Death, Victoria Wiggins May 2020

The Ability Of Vitreous Metabolite Concentration To Determine Time Of Death, Victoria Wiggins

Themis: Research Journal of Justice Studies and Forensic Science

This paper analyzes the ability of vitreous fluid to determine time of death. The high variability in current methods used to establish post-mortem interval (PMI), or the amount of time between death and post-mortem examination make it difficult to obtain an accurate estimation. The concentration of metabolites found within vitreous fluid, such as potassium (K+), hypoxanthine (Hx), and magnesium (Mg), are the most researched alternatives to traditional methods in PMI determination because of the relative isolation of vitreous within the body and its ability to withstand degradation. There is no clear consensus on which metabolite provides the most accurate data …


Volume 12, Haleigh James, Hannah Meyls, Hope Irvin, Megan E. Hlavaty, Samara L. Gall, Austin J. Funk, Karyn Keane, Sarah Ghali, Antonio Harvey, Andrew Jones, Rachel Hazelwood, Madison Schmitz, Marija Venta, Haley Tebo, Jeremiah Gilmer, Bridget Dunn, Benjamin Sullivan, Mckenzie Johnson Apr 2020

Volume 12, Haleigh James, Hannah Meyls, Hope Irvin, Megan E. Hlavaty, Samara L. Gall, Austin J. Funk, Karyn Keane, Sarah Ghali, Antonio Harvey, Andrew Jones, Rachel Hazelwood, Madison Schmitz, Marija Venta, Haley Tebo, Jeremiah Gilmer, Bridget Dunn, Benjamin Sullivan, Mckenzie Johnson

Incite: The Journal of Undergraduate Scholarship

Introduction, Dr. Roger A. Byrne, Dean

From the Editor, Dr. Larissa "Kat" Tracy

From the Designers, Rachel English, Rachel Hanson

Immortality in the Mortal World: Otherworldly Intervention in "Lanval" and "The Wife of Bath's Tale" by Haleigh James

Analysis of Phenolic Compounds in Moroccan Olive Oils by HPLC by Hannah Meyls

Art by Hope Irvin

The Effects of Cell Phone Use on Gameplay Enjoyment and Frustration by Megan E. Hlavaty, Samara L. Gall, and Austin J. Funk

Care, No Matter What: Planned Parenthood's Use of Organizational Rhetoric to Expand its Reputation by Karyn Keane

Analysis of Petroleum Products for …


Digital Forensic Readiness: An Examination Of Law Enforcement Agencies In The State Of Maryland, James B. Mcnicholas Iii Apr 2020

Digital Forensic Readiness: An Examination Of Law Enforcement Agencies In The State Of Maryland, James B. Mcnicholas Iii

Masters Theses & Doctoral Dissertations

Digital forensic readiness within the law enforcement community, especially at the local level, has gone mostly unexplored. As a result, a current lack of data exists that examines the digital forensic readiness of individual agencies, the possibility of proximity relationships, and correlations between readiness and backlogs. This quantitative, crosssectional research study sought to explore these issues by focusing on the state of Maryland. The study resulted in the creation of a digital forensic readiness scoring model that was then used to assign digital forensic readiness scores to thirty (30) of the one-hundred-forty-one (141) law enforcement agencies throughout Maryland. It was …


Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon Mar 2020

Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon

EBCS Articles

The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …


Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah Mar 2020

Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah

EBCS Articles

The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …


Free Battered Texas Women: Survivor-Advocates Organizing At The Crossroads Of Gendered Violence, Disability, And Incarceration, Cathy Marston Phd Feb 2020

Free Battered Texas Women: Survivor-Advocates Organizing At The Crossroads Of Gendered Violence, Disability, And Incarceration, Cathy Marston Phd

Verbum Incarnatum: An Academic Journal of Social Justice

This article recaps my symposium presentation, where I argue that feminist organizing strategies are central to healing our society and creating restorative justice from my perspective as a survivor of occupational injury, battering, and criminalization for self-defense. This includes the creation of Free Battered Texas Women. We prefer to think of ourselves as survivor-advocates who use a variety of tactics to empower ourselves, incarcerated battered women, and citizens. These strategies include pedagogy; poetry and other written forms; art; and legislative advocacy. I blend this grassroots activism with feminist disability theory, radical feminist theory, feminist ethnography, and feminist criminology.


Illegal Gambling And Its Operation Via The Darknet And Bitcoin: An Application Of Routine Activity Theory, Sinyong Choi, Kyung-Shick Choi, Yesim Sungu-Eryilmaz, Hee-Kyung Park Feb 2020

Illegal Gambling And Its Operation Via The Darknet And Bitcoin: An Application Of Routine Activity Theory, Sinyong Choi, Kyung-Shick Choi, Yesim Sungu-Eryilmaz, Hee-Kyung Park

International Journal of Cybersecurity Intelligence & Cybercrime

The Darknet and Bitcoins have been widely utilized by those who wish to anonymously perform illegal activities in cyberspace. Restricted in many countries, gambling websites utilize Bitcoin payments that allow users to freely engage in illegal gambling activities with the absence of a formal capable guardian. Despite the urgency and limited knowledge available to law enforcement regarding this issue, few empirical studies have focused on illegal gambling websites. The current study attempts to examine the characteristics and operations of online gambling websites on both the Darknet and Surface Web, which allow Bitcoin payments. The findings suggest that both websites on …


An Empirical Study To Determine The Role Of File-System In Modification Of Hash Value, Kumarshankar Raychaudhuri, M. George Christopher Feb 2020

An Empirical Study To Determine The Role Of File-System In Modification Of Hash Value, Kumarshankar Raychaudhuri, M. George Christopher

International Journal of Cybersecurity Intelligence & Cybercrime

In digital forensics, maintaining the integrity of digital exhibits is an essential aspect of the entire investigation and examination process, which is established using the technique of hashing. Lack of knowledge, while handling digital exhibits, might lead to unintentional alteration of computed hash, rendering the exhibit unacceptable in the court of Law. The hash value of a physical drive does not solely depend upon the data files present in it but also its file-system. Therefore, any change to the file-system might result in the change of the disk hash, even when the data files within it remain untouched. In this …


A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson Feb 2020

A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson

International Journal of Cybersecurity Intelligence & Cybercrime

How individuals conceptualize their accountability related to digital technology. There may also be age-based vulnerabilities resulting from personal perceptions about the importance of engaging in best-practices. However, age may not be as critical as experience when it comes to implementation of these behaviors. Using the Cybersecurity Behaviors subscale of the Online Security Behaviors and Beliefs Questionnaire (OSBBQ), this study compared the self-reported cybersecurity attitudes and behaviors across college-aged individuals from Generation Y and Generation Z. Data were derived from a convenience sample of predominantly African-American and Caucasian respondents (N=593) recruited from two public universities in Virginia, USA. Four of the …


Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa Feb 2020

Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Review Of Fundamental To Know About The Future, Hannarae Lee Feb 2020

Review Of Fundamental To Know About The Future, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

What we consider fundamental elements can be easily overlooked or perceived as facts without the process of empirical testing. Especially in the field of cybercrime and cybersecurity, there are more speculations regarding the prevalence and the scope of harm carried out by wrongdoers than empirically tested studies. To fill the void, three articles included in the current issue addresses empirical findings of fundamental concerns and knowledge in the field of cybercrime and cybersecurity.


Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta Jan 2020

Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta

Journal of Cybersecurity Education, Research and Practice

Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This article discusses the need to incorporate courses discussing the Dark Web in criminal justice. A review of existing cyber-criminal justice programs in Texas and nationally suggests that most community colleges and 4-year universities have yet to develop courses/programs in understanding and investigating the Dark Web on the internet. The Dark Web serves as the …


The Effect Of Time And Temperature On The Quality Of Latent Fingerprints On Incandescent Lightbulbs, Varying Donors Age And Sex, Kinaysha M. Collazo Maldonado Jan 2020

The Effect Of Time And Temperature On The Quality Of Latent Fingerprints On Incandescent Lightbulbs, Varying Donors Age And Sex, Kinaysha M. Collazo Maldonado

Theses and Dissertations

Fingerprints are used as a means of identification, but there are no established methodologies to determine time since deposition of latent fingerprints by visual means alone. This research considered the influence of age and sex on the quality of recovered latent prints from lit and unlit lightbulbs from 1 to 10 days, using accumulated degree hours (ADH) to account for both heat and time simultaneously. Two male and two female donors (one of each aged <40 and >40 years) were used. A thermal imaging camera was used to monitor the lightbulbs top and middle regions, which were significantly different (p≤0.05) for the …