Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

PDF

2021

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 35

Full-Text Articles in Physical Sciences and Mathematics

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Evaluation Of The Trunarc Handheld Narcotics Analyzer As A Pre-Analysis Screening Device For The Orange County Crime Lab, Sarah Yang, D. Bauer, C. Woltz, S. Soto, Michael Ibba Dec 2021

Evaluation Of The Trunarc Handheld Narcotics Analyzer As A Pre-Analysis Screening Device For The Orange County Crime Lab, Sarah Yang, D. Bauer, C. Woltz, S. Soto, Michael Ibba

Student Scholar Symposium Abstracts and Posters

Forensic analysis of suspected narcotics is often dangerous as the substances’ composition is unknown. Many techniques for drug identification require handling of the substance outside of its packaging, which can expose the analyst to potentially harmful chemicals. The TruNarc Handheld Narcotics Analyzer is a portable Raman spectroscopy device that is non-destructive of evidence and can be used to screen drugs through simple packaging to minimize the risk of exposure. The Orange County Crime Lab (OCCL) is testing the limits of this device to determine if it can be used to screen new evidence within the Seized Drugs Lab. The OCCL …


Evaluation Of The Potential Of Automated Sem-Eds Analysis For The Discrimination Of Inorganic Soil Particles, Anna S. Duggar Sep 2021

Evaluation Of The Potential Of Automated Sem-Eds Analysis For The Discrimination Of Inorganic Soil Particles, Anna S. Duggar

Dissertations, Theses, and Capstone Projects

Soil, that complex mixture of minerals, organic particles, chemicals, and anthropogenic materials, is ubiquitous and easily transferred, which gives it forensic relevance. Forensic soil analysis has traditionally included the identification and comparison of both organic and inorganic components, the inorganic portion being most commonly examined by light microscopy and other instrumental techniques. Predominantly, the inorganic materials in soil are naturally-occurring minerals, contributed as grains from the surrounding bedrock, which gives a soil its regional character. That parent material then undergoes physical, chemical, and anthropogenic changes producing wide geographic variation within a single region. This variation forms the basis for potential …


Why Does An Ex-Offender Reoffend?, Jacob Rybak Aug 2021

Why Does An Ex-Offender Reoffend?, Jacob Rybak

Symposium of Student Scholars

What leads to an offender to go back to prison? Iowa has collected data tracking recidivism to evaluate the effectiveness of its programs for released offenders. This data set includes the following for all of the offenders: age groups, type of release (parole vs being discharged at the end of their sentence), race, sex, year of release, supervising district, original offense, and whether they recidivated. For the offenders who return to prison, the data set includes measures on days to return, type of recidivism (technicality or new crime), and what the specific offense was that caused their return.

In the …


Forensicast: A Non-Intrusive Approach & Tool For Logical Forensic Acquisition & Analysis Of The Google Chromecast Tv, Alex Sitterer, Nicholas Dubois, Ibrahim Baggili Aug 2021

Forensicast: A Non-Intrusive Approach & Tool For Logical Forensic Acquisition & Analysis Of The Google Chromecast Tv, Alex Sitterer, Nicholas Dubois, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The era of traditional cable Television (TV) is swiftly coming to an end. People today subscribe to a multitude of streaming services. Smart TVs have enabled a new generation of entertainment, not only limited to constant on-demand streaming as they now offer other features such as web browsing, communication, gaming etc. These functions have recently been embedded into a small IoT device that can connect to any TV with High Definition Multimedia Interface (HDMI) input known as Google Chromecast TV. Its wide adoption makes it a treasure trove for potential digital evidence. Our work is the primary source on forensically …


Forensic Artifact Finder (Forensicaf): An Approach & Tool For Leveraging Crowd-Sourced Curated Forensic Artifacts, Tyler Balon, Krikor Herlopian, Ibrahim Baggili, Cinthya Grajeda-Mendez Aug 2021

Forensic Artifact Finder (Forensicaf): An Approach & Tool For Leveraging Crowd-Sourced Curated Forensic Artifacts, Tyler Balon, Krikor Herlopian, Ibrahim Baggili, Cinthya Grajeda-Mendez

Electrical & Computer Engineering and Computer Science Faculty Publications

Current methods for artifact analysis and understanding depend on investigator expertise. Experienced and technically savvy examiners spend a lot of time reverse engineering applications while attempting to find crumbs they leave behind on systems. This takes away valuable time from the investigative process, and slows down forensic examination. Furthermore, when specific artifact knowledge is gained, it stays within the respective forensic units. To combat these challenges, we present ForensicAF, an approach for leveraging curated, crowd-sourced artifacts from the Artifact Genome Project (AGP). The approach has the overarching goal of uncovering forensically relevant artifacts from storage media. We explain our approach …


Duck Hunt: Memory Forensics Of Usb Attack Platforms, Tyler Thomas, Mathew Piscitelli, Bhavik Ashok Nahar, Ibrahim Baggili Aug 2021

Duck Hunt: Memory Forensics Of Usb Attack Platforms, Tyler Thomas, Mathew Piscitelli, Bhavik Ashok Nahar, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

To explore the memory forensic artifacts generated by USB-based attack platforms, we analyzed two of the most popular commercially available devices, Hak5's USB Rubber Ducky and Bash Bunny. We present two open source Volatility plugins, usbhunt and dhcphunt, which extract artifacts generated by these USB attacks from Windows 10 system memory images. Such artifacts include driver-related diagnostic events, unique device identifiers, and DHCP client logs. Our tools are capable of extracting metadata-rich Windows diagnostic events generated by any USB device. The device identifiers presented in this work may also be used to definitively detect device usage. Likewise, the DHCP logs …


Another Brick In The Wall: An Exploratory Analysis Of Digital Forensics Programs In The United States, Syria Mccullough, Stella Abudu, Ebere Onwubuariri, Ibrahim Baggili Aug 2021

Another Brick In The Wall: An Exploratory Analysis Of Digital Forensics Programs In The United States, Syria Mccullough, Stella Abudu, Ebere Onwubuariri, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

We present a comprehensive review of digital forensics programs offered by universities across the United States (U.S.). While numerous studies on digital forensics standards and curriculum exist, few, if any, have examined digital forensics courses offered across the nation. Since digital forensics courses vary from university to university, online course catalogs for academic institutions were evaluated to curate a dataset. Universities were selected based on online searches, similar to those that would be made by prospective students. Ninety-seven (n = 97) degree programs in the U.S. were evaluated. Overall, results showed that advanced technical courses are missing from curricula. We …


North Korean Cyber Attacks And Policy Responses: An Interdisciplinary Theoretical Framework, Jeeseon Hwang, Kyung-Shick Choi Aug 2021

North Korean Cyber Attacks And Policy Responses: An Interdisciplinary Theoretical Framework, Jeeseon Hwang, Kyung-Shick Choi

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Level Of Engagement With Social Networking Services And Fear Of Online Victimization: The Role Of Online Victimization Experiences, Yeonjae Park, Lynne M. Vieraitis Aug 2021

Level Of Engagement With Social Networking Services And Fear Of Online Victimization: The Role Of Online Victimization Experiences, Yeonjae Park, Lynne M. Vieraitis

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Editorial Introduction To The Special Issue: Supporting Future Scholarship On Cybercrime, Jaeyong Choi, Brandon Dulisse, Richard L. Wentling, Nathan Kruis Aug 2021

Editorial Introduction To The Special Issue: Supporting Future Scholarship On Cybercrime, Jaeyong Choi, Brandon Dulisse, Richard L. Wentling, Nathan Kruis

International Journal of Cybersecurity Intelligence & Cybercrime

This editorial introduction will present an overview of the three papers published in this special issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The winners of the student paper competition during the 2021 Whitehat Conference have prepared their papers for this special issue. Their research directs our attention to key issues regarding cybercrime that have often been overlooked in the literature ranging from North Korean cyberterrorism to the relationship between COVID-19 and cybercrime and to fear of online victimization.


Malware Infections In The U.S. During The Covid-19 Pandemic: An Empirical Study, Sydney Gero, Sinchul Back, Jennifer Laprade, Joonggon Kim Aug 2021

Malware Infections In The U.S. During The Covid-19 Pandemic: An Empirical Study, Sydney Gero, Sinchul Back, Jennifer Laprade, Joonggon Kim

International Journal of Cybersecurity Intelligence & Cybercrime

The COVID-19 pandemic has changed the world in many ways, especially in the landscape of cyber threats. The pandemic has pro-vided cybercriminals with more opportunities to commit crimes due to more people engaging in online activities, along with the increased use of computers for school, work, and social events. The current study seeks to explore cybercrime trends, in particular malware infections, during the COVID-19 pandemic. Thus, this study examines the relationship between the number of malware in-fections, COVID-19 positive cases, closed non-essential businesses, and closed K-12 public schools in the United States. Data utilized in this study derives from (1) …


Bullet Ricochet Of Polymer Coated Bullets, Stephen Daly Aug 2021

Bullet Ricochet Of Polymer Coated Bullets, Stephen Daly

Student Theses

Polymer coated bullets were designed to limit a shooter’s exposure to lead. However, despite the advantages that these bullets give there are still difficulties which arise in a forensic firearms examination. Unlike in a typical metal coated bullet, individualizing striations will typically not be imparted to a polymer coated bullet making it unable to be linked to a specific firearm. Due to this difficulty any information that can be gained at the scene of the crime could be crucial. Some obtainable information includes the angle of ricochet and the angle of incidence of the discharged bullet as well as traces …


Weather And Crime: New York State, Yuna Kim Jun 2021

Weather And Crime: New York State, Yuna Kim

Student Theses

The present study assesses the degree to which temperature affects the crime rates in all 62 counties in the State of New York. Five different crimes (i.e., robbery, aggravated assault, burglary; larceny, and motor vehicle theft) for the year 2019 were selected from the Division of Criminal Justice Services of New York to be examined. The current study examined whether the rate of these crimes was associated with the changes in weather, with the assumption that higher weathers would lead to higher property and violent crimes, when controlling for the effect of various control variables. The findings suggest that the …


Why Does An Ex-Offender Reoffend?, Jacob Rybak May 2021

Why Does An Ex-Offender Reoffend?, Jacob Rybak

Symposium of Student Scholars

What leads an offender to go back to prison? This researcher has lived in the Georgia State prison system for 3.5 years. Using personal insights as well as analytics, this researcher analyzes Iowa state’s six-year data set tracking recidivism of released offenders and recommends changes to the prison system to address the analytical findings.

The Iowa recidivism data set includes the following information for all offenders: age group, type of release (parole vs different discharges), release year, original offense, and whether they recidivated. For the recidivating offenders, the data set includes the days to return to prison, the type of …


Cyber-Victimization Trends In Trinidad & Tobago: The Results Of An Empirical Research, Troy Smith, Nikolaos Stamatakis Apr 2021

Cyber-Victimization Trends In Trinidad & Tobago: The Results Of An Empirical Research, Troy Smith, Nikolaos Stamatakis

International Journal of Cybersecurity Intelligence & Cybercrime

Cybertechnology has brought benefits to the Caribbean in the form of new regional economic and social growth. In the last years, Caribbean countries have also become attractive targets for cybercrime due to increased economic success and online presence with a low level of cyber resilience. This study examines the online-related activities that affect cybercrime victimization by using the Routine Activity Theory (RAT). The present study seeks to identify activities that contribute to different forms of cybercrime victimization and develop risk models for these crimes, particularly the understudied cyber-dependent crimes of Hacking and Malware. It also aims to explore if there …


Assessing The Credibility Of Cyber Adversaries, Jenny A. Wells, Dana S. Lafon, Margaret Gratian Apr 2021

Assessing The Credibility Of Cyber Adversaries, Jenny A. Wells, Dana S. Lafon, Margaret Gratian

International Journal of Cybersecurity Intelligence & Cybercrime

Online communications are ever increasing, and we are constantly faced with the challenge of whether online information is credible or not. Being able to assess the credibility of others was once the work solely of intelligence agencies. In the current times of disinformation and misinformation, understanding what we are reading and to who we are paying attention to is essential for us to make considered, informed, and accurate decisions, and it has become everyone’s business. This paper employs a literature review to examine the empirical evidence across online credibility, trust, deception, and fraud detection in an effort to consolidate this …


Cyberbullying: Its Social And Psychological Harms Among Schoolers, Hyeyoung Lim, Hannarae Lee Apr 2021

Cyberbullying: Its Social And Psychological Harms Among Schoolers, Hyeyoung Lim, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Criminal justice around the world has prioritized the prevention and protection of bullying and its victims due to the rapid increases in peer violence. Nevertheless, relatively few studies have examined what treatments or assistance are effective for peer victims to reduce and recover from their social and psychological suffering, especially in cyberbullying cases. Using data derived from the National Crime Victimization Survey-School Crime Supplement data in 2011 and 2013 (N=823), the current study examined the impact of two emotional support groups (i.e., adult and peer groups) on cyberbullying victims' social and psychological harm. The findings indicated that both adult and …


The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum Apr 2021

The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum

International Journal of Cybersecurity Intelligence & Cybercrime

This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of approaches and methodologies: 1) online credibility; 2) cyberbullying; and 3) unauthorized access of information. An emphasis on the importance of policy development and better protection of potential victims is a common thread throughout the issue.


A Macro Analysis Of Illegal Hunting And Fishing Across Texas Counties: Using An Economic Structural Approach, Leo J. Genco Jr. Apr 2021

A Macro Analysis Of Illegal Hunting And Fishing Across Texas Counties: Using An Economic Structural Approach, Leo J. Genco Jr.

USF Tampa Graduate Theses and Dissertations

The purpose of this disseration is to examine the distribution of illegal hunting and fishing violations across Texas counties in respect to the economic structure. Illegal hunting plays a part in the extraction of resources that are overly withdrawn, and criminologists have ignored this form of deviancy that has large ramifications for the environment. To view this criminal phenomenon, the study uses the Treadmill of Production theory to determine economic structural factors and whether those factors explain the distribution of illegal hunting and fishing. Using regression analyses and SatScan, the findings suggested that while there are significant factors related to …


The Absence Or Misuse Of Statistics In Forensic Science As A Contributor To Wrongful Convictions: From Pattern Matching To Medical Opinions About Child Abuse, Keith A. Findley Apr 2021

The Absence Or Misuse Of Statistics In Forensic Science As A Contributor To Wrongful Convictions: From Pattern Matching To Medical Opinions About Child Abuse, Keith A. Findley

Dickinson Law Review (2017-Present)

The new scrutiny that has been applied to the forensic sciences since the emergence of DNA profiling as the gold standard three decades ago has identified numerous concerns about the absence of a solid scientific footing for most disciplines. This article examines one of the lesser-considered problems that afflicts virtually all of the pattern-matching (or “individualization”) disciplines (largely apart from DNA), and even undermines the validity of other forensic disciplines like forensic pathology and medical determinations about child abuse, particularly Shaken Baby Syndrome/Abusive Head Trauma (SBS/AHT). That problem is the absence or misuse of statistics. This article begins by applying …


Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause Mar 2021

Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause

Honors Theses

This study examines Nebraska Department of Corrections inmate data from 1980-2020, looking specifically at inmate demographics and offense trends. State-of-the-art data analysis is conducted to collect, modify, and visualize the data sources. Inmates are organized by each decade they were incarcerated within. The current active prison population is also examined in their own research group. The demographic and offense trends are compared with previous local and national research. Historical context is given for evolving trends in offenses. Solutions for Nebraska prison overcrowding are presented from various interest groups. This study aims to enlighten all interested Nebraskans on who inhabits their …


A Consent Framework For The Internet Of Things In The Gdpr Era, Gerald Chikukwa Mar 2021

A Consent Framework For The Internet Of Things In The Gdpr Era, Gerald Chikukwa

Masters Theses & Doctoral Dissertations

The Internet of Things (IoT) is an environment of connected physical devices and objects that communicate amongst themselves over the internet. The IoT is based on the notion of always-connected customers, which allows businesses to collect large volumes of customer data to give them a competitive edge. Most of the data collected by these IoT devices include personal information, preferences, and behaviors. However, constant connectivity and sharing of data create security and privacy concerns. Laws and regulations like the General Data Protection Regulation (GDPR) of 2016 ensure that customers are protected by providing privacy and security guidelines to businesses. Data …


Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison Feb 2021

Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison

EBCS Articles

Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username …


Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum Jan 2021

Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum

EBCS Articles

Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing environments may change computer users’ behaviors, this study tests the effectiveness of CPTED based approaches in mitigating system trespassing events. Findings from this randomized controlled field trial demonstrate that specific CPTED strategies can mitigate hacking events by: reducing the number of concurrent activities on the target computer, attenuating the number of commands typed in the attacked computer, and …


Zooming Into The Pandemic! A Forensic Analysis Of The Zoom Application, Andrew Mahr, Meghan Cichon, Sophia Mateo, Cinthya Grajeda, Ibrahim Baggili Jan 2021

Zooming Into The Pandemic! A Forensic Analysis Of The Zoom Application, Andrew Mahr, Meghan Cichon, Sophia Mateo, Cinthya Grajeda, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The global pandemic of COVID-19 has turned the spotlight on video conferencing applications like never before. In this critical time, applications such as Zoom have experienced a surge in its user base jump over the 300 million daily mark (ZoomBlog, 2020). The increase in use has led malicious actors to exploit the application, and in many cases perform Zoom Bombings. Therefore forensically examining Zoom is inevitable. Our work details the primary disk, network, and memory forensic analysis of the Zoom video conferencing application. Results demonstrate it is possible to find users' critical information in plain text and/or encrypted/encoded, such …


Analysis Of Lubricants At Trace Levels Using Infrared Spectroscopy, Tanmai Bandarupalli Jan 2021

Analysis Of Lubricants At Trace Levels Using Infrared Spectroscopy, Tanmai Bandarupalli

Honors Undergraduate Theses

Analysis of trace evidence involved in sexual assault investigations holds considerable potential as a newer avenue of identification when bulk, larger evidence is not found or unreliable. Trace analysis of forensic materials involves common findings such as strands of hair, residues left on clothing, shards of paint or glass, etc. In recent research focused on the analysis of trace materials found as evidence in a sexual assault, there has been promise in condom and bottled lubricant classification based on their chemical profiles that can provide an associative link in an investigation. Few studies have considered the examination of lubricant evidence …


A Gender And Race Theoretical And Probabilistic Analysis Of The Recent Title Ix Policy Changes, Jordan Wellington Jan 2021

A Gender And Race Theoretical And Probabilistic Analysis Of The Recent Title Ix Policy Changes, Jordan Wellington

Scripps Senior Theses

On May 6th, 2020, after extensive public comment and review, the Department of Education published the final rule for the new Title IX regulations, which took effect in schools on August 14th. Title IX is the nearly fifty year old piece of the Education Amendments that prohibits sexual discrimination in federally funded schools. Several of these changes, such as the inclusion of live hearings and cross examination of witnesses, have been widely criticized by victims’ rights advocates for potentially retraumatizing victims of sexual assault and discouraging students from pursuing a Title IX claim. While the impact of the new regulations …


Advancing Applied Research In Conservation Criminology Through The Evaluation Of Corruption Prevention, Enhancing Compliance, And Reducing Recidivism, Jessica S. Kahler, Joseph W. Rivera, Zachary T. Steele, Pilar Morales-Giner, Christian J. Rivera, Carol F. Ahossin, Ashpreet Kaur, Diane J. Episcopio-Sturgeon Jan 2021

Advancing Applied Research In Conservation Criminology Through The Evaluation Of Corruption Prevention, Enhancing Compliance, And Reducing Recidivism, Jessica S. Kahler, Joseph W. Rivera, Zachary T. Steele, Pilar Morales-Giner, Christian J. Rivera, Carol F. Ahossin, Ashpreet Kaur, Diane J. Episcopio-Sturgeon

Biological Sciences Faculty Publications

Concomitant with an increase in the global illegal wildlife trade has been a substantial increase in research within traditional conservation-based sciences and conservation and green criminology. While the integration of criminological theories and methods into the wildlife conservation context has advanced our understanding of and practical responses to illegal wildlife trade, there remain discrepancies between the number of empirical vs. conceptual studies and a disproportionate focus on a few select theories, geographical contexts, and taxonomic groups. We present three understudied or novel applications of criminology and criminal justice research within the fields of fisheries, forestry, and wildlife conservation. First, we …


Digital Forensic Readiness Intelligence Crime Repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, Sadi Alawadi Jan 2021

Digital Forensic Readiness Intelligence Crime Repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, Sadi Alawadi

Research outputs 2014 to 2021

It may not always be possible to conduct a digital (forensic) investigation post-event if there is no process in place to preserve potential digital evidence. This study posits the importance of digital forensic readiness, or forensic-by-design, and presents an approach that can be used to construct a Digital Forensic Readiness Intelligence Repository (DFRIR). Based on the concept of knowledge sharing, the authors leverage this premise to suggest an intelligence repository. Such a repository can be used to cross-reference potential digital evidence (PDE) sources that may help digital investigators during the process. This approach employs a technique of capturing PDE from …