Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (486)
- University of New Haven (61)
- Bridgewater State University (54)
- City University of New York (CUNY) (27)
- University of Central Florida (25)
-
- Longwood University (13)
- Edith Cowan University (12)
- Georgia State University (11)
- Old Dominion University (8)
- Selected Works (8)
- SelectedWorks (7)
- Florida International University (5)
- Kennesaw State University (5)
- West Virginia University (5)
- University of Colorado Law School (4)
- University of Nebraska - Lincoln (4)
- University of Nevada, Las Vegas (4)
- University of Pennsylvania Carey Law School (4)
- Western Kentucky University (4)
- California State University, San Bernardino (3)
- Duke Law (3)
- Eastern Kentucky University (3)
- Nova Southeastern University (3)
- University of Montana (3)
- Virginia Commonwealth University (3)
- Wayne State University (3)
- Central Washington University (2)
- Chapman University (2)
- Claremont Colleges (2)
- Dakota State University (2)
- Keyword
-
- Digital forensics (54)
- Forensics (26)
- Computer forensics (21)
- Cybercrime (21)
- Digital Forensics (21)
-
- Digital evidence (17)
- Cybersecurity (15)
- Privacy (12)
- Security (11)
- Computer Forensics (10)
- Approximate matching (9)
- Cyber forensics (9)
- Cyberbullying (9)
- Forensic (9)
- Mobile device forensics (9)
- Survey (9)
- Forensic science (8)
- Law enforcement (8)
- Mrsh-v2 (8)
- Cryptocurrency (7)
- Cyber security (7)
- Information security (7)
- Android (6)
- Data recovery (6)
- Evidence (6)
- Investigation (6)
- Network forensics (6)
- Sdhash (6)
- Android forensics (5)
- Children (5)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (295)
- Annual ADFSL Conference on Digital Forensics, Security and Law (187)
- Electrical & Computer Engineering and Computer Science Faculty Publications (56)
- International Journal of Cybersecurity Intelligence & Cybercrime (54)
- Electronic Theses and Dissertations (21)
-
- Student Theses (16)
- Incite: The Journal of Undergraduate Scholarship (13)
- EBCS Articles (10)
- Dissertations, Theses, and Capstone Projects (6)
- Emmanuel Mario B Santos aka Marc Guerrero (6)
- Graduate Theses, Dissertations, and Problem Reports (5)
- Honors Theses (5)
- Master's Theses (5)
- Research outputs 2014 to 2021 (5)
- All Faculty Scholarship (4)
- Cybersecurity Undergraduate Research Showcase (4)
- Drafting Model Laws on Indoor Pollution for Developing and Developed Nations (July 12-13) (4)
- FIU Electronic Theses and Dissertations (4)
- Publications (4)
- Publications and Research (4)
- Australian Security and Intelligence Conference (3)
- CCE Theses and Dissertations (3)
- Faculty Scholarship (3)
- Honors Undergraduate Theses (3)
- Online Theses and Dissertations (3)
- WKU Archives Records (3)
- Australian Digital Forensics Conference (2)
- CHAR (2)
- Department of Statistics: Faculty Publications (2)
- Electronic Theses and Dissertations, 2020- (2)
Articles 31 - 60 of 824
Full-Text Articles in Physical Sciences and Mathematics
Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski
Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski
Mathematics, Physics, and Computer Science Faculty Articles and Research
Suicidal and self-injurious incidents in correctional settings deplete the institutional and healthcare resources, create disorder and stress for staff and other inmates. Traditional statistical analyses provide some guidance, but they can only be applied to structured data that are often difficult to collect and their recommendations are often expensive to act upon. This study aims to extract information from medical and mental health progress notes using AI algorithms to make actionable predictions of suicidal and self-injurious events to improve the efficiency of triage for health care services and prevent suicidal and injurious events from happening at California's Orange County Jails. …
Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.
Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.
LSU Master's Theses
A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …
Cultivating Health, Not Wealth In The United States' Healthcare System: Comprehensive Revisions For The Orphan Drug Act Of 1983, Kayla Smith
Regis University Student Publications (comprehensive collection)
This thesis explores the way in which the Orphan Drug Act of 1983, originally instituted in response to a lack of treatments for rare diseases in the United States of America, has failed to achieve its initial objectives in the 40 years since its implementation. In evaluating various successful examples of government subsidization programs designed to intervene in private industry, this thesis composes the criterion required for funding-based legislation which maximize market outcomes while minimizing tax-payer burden. An analysis of the synthetic organic chemistry industry – and a case study into the production of a particular orphan treatment for a …
Feature Extraction Of Footwear Impression Images For Quality Assessment, Alexandra Hill
Feature Extraction Of Footwear Impression Images For Quality Assessment, Alexandra Hill
Graduate Theses, Dissertations, and Problem Reports
Forensic footwear impression analysis is a valuable tool in criminal investigations. Extracting useful features from images of footwear impressions is a critical step in this process. However, the quality of these images can vary widely, making feature extraction challenging. In order to give a quality assessment rating to a footwear impression image, the image should first be analyzed to extract features from the impression. In this paper, we present a method to extract features from a 2D grayscale footwear impression image. A Hierarchical Grid Model implementation has been adapted from use on a 3D dataset to assist in finding features, …
A Picture Worth A Thousand Words: Factors Influencing Disability Accommodations, Alicia E. Martin
A Picture Worth A Thousand Words: Factors Influencing Disability Accommodations, Alicia E. Martin
Cal Poly Humboldt theses and projects
Because not all disabilities look the same it is difficult to label a person with disabilities just by looking at them. Given that our knowledge, attitudes, and perceptions impact how we interpret our world and our willingness to act, people, including professors, may be biased toward providing accommodations for those with easily recognizable disabilities and biased against those with non-recognizable disabilities, and this may impact the disabled person’s ability to learn. This thesis aims to address whether professors’ disability-related attitudes, perceptions of accommodation reasonableness, and willingness to provide accommodations differ when the disability is recognizable (student is pictured in a …
Analysis Of Fiber Uv Degradation Through An Environmental Chamber, Davis A. Eames
Analysis Of Fiber Uv Degradation Through An Environmental Chamber, Davis A. Eames
Undergraduate Research Posters
Environmentally degraded fibers could impact multiple aspects of a fiber comparison, considering that collected weathered fabrics/fibers may express an altered chemical structure and/or colorimetric property compared to their unexposed counterparts. Depending on the amount of degradation the evidence has suffered, it could be challenging for forensic scientists to make conclusions from their comparative analyses. Observations presented in this study were orchestrated to test the possible outcomes that sunlight has on fabric-based materials. Photodegradation of fabrics was investigated through the use of an environmental chamber for a duration of six weeks, which would be equivalent to three months of real-world UV …
Strengthening The Interpretation Of Glass And Paint Evidence Through The Study Of Random Frequency Of Occurrence And Analytical Information, Lauryn C. Alexander
Strengthening The Interpretation Of Glass And Paint Evidence Through The Study Of Random Frequency Of Occurrence And Analytical Information, Lauryn C. Alexander
Graduate Theses, Dissertations, and Problem Reports
Glass and paint particles are frequently discovered at crime scenes as valuable trace evidence. Often, these fragments are transferred from a crime scene to a victim or person-of-interest, and can subsequently be evaluated, analyzed, and classified according to their physical and optical measurements, and chemical properties, each of which can provide important information to the analyst to assist in the determining if a recovered particle is distinguishable or indistinguishable from a known source. Moreover, these minute materials can provide information about how the events took place, leading to the reconstruction of crime scenes and the identification of valuable clues for …
Meta-Analysis Of Scent Detection Canines And Potential Factors Influencing Their Success Rates, Molly Marie Jaskinia
Meta-Analysis Of Scent Detection Canines And Potential Factors Influencing Their Success Rates, Molly Marie Jaskinia
Graduate Student Theses, Dissertations, & Professional Papers
Objective: This is a meta-analysis focused on the success rates of scent detection canines and potential factors that could influence their accuracy. A series of statistical analyses were conducted to determine if certain demographic factors, such as the dog’s gender, age, and breed, have an effect on a scent dog’s accuracy during a search. Or if more circumstantial factors, like the dog’s level of experience in scent work, the type of target scent, and their handler’s awareness of the target’s location, affect the outcome of the search.
Materials and Methods: A dataset was created from 37 different articles consisting of …
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
International Journal of Cybersecurity Intelligence & Cybercrime
Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
International Journal of Cybersecurity Intelligence & Cybercrime
Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
International Journal of Cybersecurity Intelligence & Cybercrime
The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …
Book Review: Digital Forensics And Cyber Investigation
Book Review: Digital Forensics And Cyber Investigation
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Examining Bias In Jury Selection For Criminal Trials In Dallas County, Megan Ball, Brandon Birmingham, Matt Farrow, Katherine Mitchell, Bivin Sadler, Lynne Stokes
Examining Bias In Jury Selection For Criminal Trials In Dallas County, Megan Ball, Brandon Birmingham, Matt Farrow, Katherine Mitchell, Bivin Sadler, Lynne Stokes
SMU Data Science Review
One of the hallmarks of the American judicial system is the concept of trial by jury, and for said trial to consist of an impartial jury of your peers. Several landmark legal cases in the history of the United States have challenged this notion of equal representation by jury—most notably Batson v. Kentucky, 476 U.S. 79 (1986). Most of the previous research, focus, and legal precedence has centered around peremptory challenges and attempting to prove if bias was suspected in excluding certain jurors from serving. Few studies, however, focus on examining challenges for cause based on self-reported biases from the …
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Kerberoasting, an attack vector aimed at the Kerberos authentication protocol, can be used as part of an adversary’s attack arsenal. Kerberos is a type of network authentication protocol that allows a client and server to conduct a mutual verification before providing the requested resource to the client. A successful Kerberoasting attack allows an adversary to leverage the architectural limitations of Kerberos, providing access to user password hashes that can be subject to offline cracking. A cracked user password could give a bad actor the ability to maintain persistence, move laterally, or escalate privileges in a system. Persistence or movement within …
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
International Journal of Cybersecurity Intelligence & Cybercrime
Cryptography has been applied to a range of modern technologies which criminals also exploit to gain criminal rewards while hiding their identity. Although understanding of cybercrime involving this technique is necessary in devising effective preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles, featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, that will enhance our understanding of cryptography-related crime, ranging from cryptocurrency and darknet market to password-cracking. The articles were presented by the winners of the student paper competition at the 2022 International …
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
International Journal of Cybersecurity Intelligence & Cybercrime
The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions …
A Comparison Of Methods Used For The Elimination Of Organics From Soil Prior To Analysis By Ftir-Atr And Sem-Eds, Argeliz Pomales
A Comparison Of Methods Used For The Elimination Of Organics From Soil Prior To Analysis By Ftir-Atr And Sem-Eds, Argeliz Pomales
Student Theses
This project suggests improvements to the treatment methods utilized for the sample preparation and evaluation of minerals in soil samples encountered in forensic science casework and research. The evaluation of pre-treated and post-treated soil samples were performed using Fourier-Transform Infrared Spectroscopy with Attenuated Total Reflection (FTIR-ATR) and Scanning Electron Microscopy-Energy Dispersive Spectroscopy (SEM-EDS). Because soil samples contain a significant amount of organic matter and water which interfere with examination of these minerals while using these instruments, pretreatment methods are necessary to isolate the mineral fraction for examination and analysis.
Soil samples were first sieved with various size stainless steel mesh …
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Department of Statistics: Faculty Publications
1 Preliminaries
1.1 Scope
The aim of this document is to respond to issues raised in Federal Bureau of Investigation1 and Alex Biedermann, Bruce Budowle & Christophe Champod.2
1.2 Conflict of Interest
We are statisticians employed at public institutions of higher education (Iowa State University and University of Nebraska, Lincoln) and have not been paid for our time or expertise when preparing either this response or the original affidavit.3 We provide this information as a public service and as scientists and researchers in this area.
1.3 Organization
The rest of the document precedes as follows: we begin …
Investigating The Mechanisms Driving Mercury Reduction And Emissions In Soil, Hamil Patel
Investigating The Mechanisms Driving Mercury Reduction And Emissions In Soil, Hamil Patel
Student Theses
The water-induced emission of mercury from soil has been studied, but a complete understanding of the mechanisms driving mercury reduction and emission in soil has not been reached. The current understanding is an immediate expulsion of soil gaseous mercury upon water treatment and an upward transport of dissolved soil ionic mercury as the water evaporates. We analyzed emissions from several types of samples using various methods to further our understanding on the mechanisms involved. Light-induced emissions from aqueous samples of humic acid (HA) spiked with mercury (II) chloride (HgCl2) showed that at higher concentrations of HA, less mercury …
The Significance Of Sonic Branding To Strategically Stimulate Consumer Behavior: Content Analysis Of Four Interviews From Jeanna Isham’S “Sound In Marketing” Podcast, Ina Beilina
Student Theses and Dissertations
Purpose:
Sonic branding is not just about composing jingles like McDonald’s “I’m Lovin’ It.” Sonic branding is an industry that strategically designs a cohesive auditory component of a brand’s corporate identity. This paper examines the psychological impact of music and sound on consumer behavior reviewing studies from the past 40 years and investigates the significance of stimulating auditory perception by infusing sound in consumer experience in the modern 2020s.
Design/methodology/approach:
Qualitative content analysis of audio media was used to test two hypotheses. Four archival oral interview recordings from Jeanna Isham’s podcast “Sound in Marketing” featuring the sonic branding experts …
Built Environment, Land Use, And Crime: A Las Vegas Study, Stacey Lynn Clouse
Built Environment, Land Use, And Crime: A Las Vegas Study, Stacey Lynn Clouse
UNLV Theses, Dissertations, Professional Papers, and Capstones
This study examined land use and crime against persons and crime against property in Las Vegas, Nevada at varying spatial levels of analysis. Using crime data provided by the Las Vegas Metropolitan Police Department and the Clark County Assessor’s office, results at the macro-level of analysis reveal that property crime rates concentrated on commercial, transportation, communication and utilities, and industrial land use, whereas violent crime concentrated at commercial, multi-residential, and civic, institutional, and recreational land use. Upon examining the subtypes of land use that generate or radiate more crime, property crime concentrated on transportation land use, class 1 resorts, and …
Volume 13, Payton Davenport, Audrey Lemons, Jacob Shope, Haley Smith, Cassandra Poole, Rachel Cannon, Rachel Boch, Suzanne Stetson
Volume 13, Payton Davenport, Audrey Lemons, Jacob Shope, Haley Smith, Cassandra Poole, Rachel Cannon, Rachel Boch, Suzanne Stetson
Incite: The Journal of Undergraduate Scholarship
Introduction Dr. Roger A. Byrne, Dean
From the Editor Dr. Larissa “Kat” Tracy
From the Designers Rachel English, Rachel Hanson
The Effect of Compliment Type on the Estimated Value of the Compliment by Payton Davenport, Audrey Lemons, and Jacob Shope
The Imperial Japanese Military: A New Identity in the Twentieth Century, 1853–1922 by Haley Smith
Longwood University’s campus: Human-cultivated Soil has Higher Microbial Diversity than Soil Collected from Wild Sites by Cassandra Poole
Reminiscent Modernism: Poetry Magazine’s Modernist Nostalgia for the Past by Rachel Cannon
Challenges Faced by Healthcare Workers During the COVID-19 Pandemic: A Preliminary Study of Age and …
Annual Faculty Research Symposium 2022, Oakwood University
Annual Faculty Research Symposium 2022, Oakwood University
Proceedings
No abstract provided.
How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson
How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson
Cybersecurity Undergraduate Research Showcase
As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.
Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford
Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford
FIU Electronic Theses and Dissertations
This dissertation seeks to address the research gap in serial homicide regarding home invasion serial killers (HISKs) and add to existing policy by providing insight and approaches to assist in serial murder investigations of such killers. Data for the study was obtained from the 2019 Radford University/Florida Gulf Coast University Serial Killer Database (RU/FGCU SKD) and additional public information searches. A retrospective comparative design and proportionate stratified random sampling of 326 serial killers from the RU/FGCU SKD (2019) were used to examine the differences and classifications of HISKs and non-home invasion serial killers (non-HISKs) in three investigations: (1) common characteristics; …
The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann
The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann
International Journal of Cybersecurity Intelligence & Cybercrime
Criminologists and psychologists have long recognized that parenting practices can affect childhood outcomes and the development of moral beliefs in children. Another body of literature provides evidence that morality is a key cause of antisocial behavior. Yet, a noticeable gap in this line of work has been testing the mediation effects of parenting practices on cyberbullying via moral beliefs. Using a sample of South Korean adolescents, we tested whether moral beliefs mediate the relationships between parenting practices and cyberbullying perpetration. Results show that parental supervision and excessive parenting can influence cyberbullying perpetration and that the impact of parenting practices is …
Understanding Cybercrime Offending And Victimization Patterns From A Global Perspective, Jin R. Lee
Understanding Cybercrime Offending And Victimization Patterns From A Global Perspective, Jin R. Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Cybercrime research within criminology and criminal justice sciences has increased over the past few decades, improving the knowledge and evidence-base around cybercrime offending and victimization generally. While earlier cybercrime studies were based primarily in the United States, there has been a recent surge in studies using international samples and multidisciplinary approaches to understand cybercrime patterns. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime consists of four articles that seek to advance our understanding of cybercrime behaviors from a global perspective. To that end, the objective of this paper is to provide a brief overview of the …
Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos
Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos
International Journal of Cybersecurity Intelligence & Cybercrime
The proliferation of internet technologies has shaped interactions in contemporary society. Despite the pivotal importance of the internet to the global economy, it has several negative consequences such as internet fraud. This study examined the perception that young adults in Nigeria hold about internet fraud as an innovative means to economic survival rather than as a criminal enterprise. Robert Merton’s Anomie/Strain Theory (AST) was adopted as the theoretical thrust of the study. Adopting a qualitative data collection method, 15 participants were selected using the non-probabilistic purposive and snowballing techniques while opinions were sampled through in-depth interviews in different locations within …
Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz
Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz
International Journal of Cybersecurity Intelligence & Cybercrime
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical infrastructure and services, the need for cybersecurity information sharing will continue to grow. Escalating demand for cyber threat intelligence and information sharing across the cybersecurity community has resulted in the need to better understand the information produced by reputable sources such as U.S. CISA Alerts and ICS-CERT advisories. The text analysis program, Profiler Plus, is used to extract information from 1,574 U.S. government alerts and advisories to develop visualizations and generate enhanced insights into different cyber threat actor types, the tactics which can be used for cyber …
Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry
Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry
Department of Statistics: Faculty Publications
We have outlined several problems with the state of error rate studies on firearm and toolmark examination. Fundamentally, we do not know what the error rate is for these types of comparisons. This is a failure of the scientific study of toolmarks, rather than the examiners themselves, but until this is corrected with multiple studies that meet the criteria described in Section 3, we cannot support the use of this evidence in criminal proceedings.