Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 31 - 60 of 824

Full-Text Articles in Physical Sciences and Mathematics

Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski Jan 2023

Predicting Suicidal And Self-Injurious Events In A Correctional Setting Using Ai Algorithms On Unstructured Medical Notes And Structured Data, Hongxia Lu, Alex Barrett, Albert Pierce, Jianwei Zheng, Yun Wang, Chun Chiang, Cyril Rakovski

Mathematics, Physics, and Computer Science Faculty Articles and Research

Suicidal and self-injurious incidents in correctional settings deplete the institutional and healthcare resources, create disorder and stress for staff and other inmates. Traditional statistical analyses provide some guidance, but they can only be applied to structured data that are often difficult to collect and their recommendations are often expensive to act upon. This study aims to extract information from medical and mental health progress notes using AI algorithms to make actionable predictions of suicidal and self-injurious events to improve the efficiency of triage for health care services and prevent suicidal and injurious events from happening at California's Orange County Jails. …


Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr. Jan 2023

Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.

LSU Master's Theses

A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …


Cultivating Health, Not Wealth In The United States' Healthcare System: Comprehensive Revisions For The Orphan Drug Act Of 1983, Kayla Smith Jan 2023

Cultivating Health, Not Wealth In The United States' Healthcare System: Comprehensive Revisions For The Orphan Drug Act Of 1983, Kayla Smith

Regis University Student Publications (comprehensive collection)

This thesis explores the way in which the Orphan Drug Act of 1983, originally instituted in response to a lack of treatments for rare diseases in the United States of America, has failed to achieve its initial objectives in the 40 years since its implementation. In evaluating various successful examples of government subsidization programs designed to intervene in private industry, this thesis composes the criterion required for funding-based legislation which maximize market outcomes while minimizing tax-payer burden. An analysis of the synthetic organic chemistry industry – and a case study into the production of a particular orphan treatment for a …


Feature Extraction Of Footwear Impression Images For Quality Assessment, Alexandra Hill Jan 2023

Feature Extraction Of Footwear Impression Images For Quality Assessment, Alexandra Hill

Graduate Theses, Dissertations, and Problem Reports

Forensic footwear impression analysis is a valuable tool in criminal investigations. Extracting useful features from images of footwear impressions is a critical step in this process. However, the quality of these images can vary widely, making feature extraction challenging. In order to give a quality assessment rating to a footwear impression image, the image should first be analyzed to extract features from the impression. In this paper, we present a method to extract features from a 2D grayscale footwear impression image. A Hierarchical Grid Model implementation has been adapted from use on a 3D dataset to assist in finding features, …


A Picture Worth A Thousand Words: Factors Influencing Disability Accommodations, Alicia E. Martin Jan 2023

A Picture Worth A Thousand Words: Factors Influencing Disability Accommodations, Alicia E. Martin

Cal Poly Humboldt theses and projects

Because not all disabilities look the same it is difficult to label a person with disabilities just by looking at them. Given that our knowledge, attitudes, and perceptions impact how we interpret our world and our willingness to act, people, including professors, may be biased toward providing accommodations for those with easily recognizable disabilities and biased against those with non-recognizable disabilities, and this may impact the disabled person’s ability to learn. This thesis aims to address whether professors’ disability-related attitudes, perceptions of accommodation reasonableness, and willingness to provide accommodations differ when the disability is recognizable (student is pictured in a …


Analysis Of Fiber Uv Degradation Through An Environmental Chamber, Davis A. Eames Jan 2023

Analysis Of Fiber Uv Degradation Through An Environmental Chamber, Davis A. Eames

Undergraduate Research Posters

Environmentally degraded fibers could impact multiple aspects of a fiber comparison, considering that collected weathered fabrics/fibers may express an altered chemical structure and/or colorimetric property compared to their unexposed counterparts. Depending on the amount of degradation the evidence has suffered, it could be challenging for forensic scientists to make conclusions from their comparative analyses. Observations presented in this study were orchestrated to test the possible outcomes that sunlight has on fabric-based materials. Photodegradation of fabrics was investigated through the use of an environmental chamber for a duration of six weeks, which would be equivalent to three months of real-world UV …


Strengthening The Interpretation Of Glass And Paint Evidence Through The Study Of Random Frequency Of Occurrence And Analytical Information, Lauryn C. Alexander Jan 2023

Strengthening The Interpretation Of Glass And Paint Evidence Through The Study Of Random Frequency Of Occurrence And Analytical Information, Lauryn C. Alexander

Graduate Theses, Dissertations, and Problem Reports

Glass and paint particles are frequently discovered at crime scenes as valuable trace evidence. Often, these fragments are transferred from a crime scene to a victim or person-of-interest, and can subsequently be evaluated, analyzed, and classified according to their physical and optical measurements, and chemical properties, each of which can provide important information to the analyst to assist in the determining if a recovered particle is distinguishable or indistinguishable from a known source. Moreover, these minute materials can provide information about how the events took place, leading to the reconstruction of crime scenes and the identification of valuable clues for …


Meta-Analysis Of Scent Detection Canines And Potential Factors Influencing Their Success Rates, Molly Marie Jaskinia Jan 2023

Meta-Analysis Of Scent Detection Canines And Potential Factors Influencing Their Success Rates, Molly Marie Jaskinia

Graduate Student Theses, Dissertations, & Professional Papers

Objective: This is a meta-analysis focused on the success rates of scent detection canines and potential factors that could influence their accuracy. A series of statistical analyses were conducted to determine if certain demographic factors, such as the dog’s gender, age, and breed, have an effect on a scent dog’s accuracy during a search. Or if more circumstantial factors, like the dog’s level of experience in scent work, the type of target scent, and their handler’s awareness of the target’s location, affect the outcome of the search.

Materials and Methods: A dataset was created from 37 different articles consisting of …


Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park Nov 2022

Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park

International Journal of Cybersecurity Intelligence & Cybercrime

Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.


Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller Nov 2022

Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller

International Journal of Cybersecurity Intelligence & Cybercrime

Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …


Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa Nov 2022

Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa

International Journal of Cybersecurity Intelligence & Cybercrime

The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …


Book Review: Digital Forensics And Cyber Investigation Nov 2022

Book Review: Digital Forensics And Cyber Investigation

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Examining Bias In Jury Selection For Criminal Trials In Dallas County, Megan Ball, Brandon Birmingham, Matt Farrow, Katherine Mitchell, Bivin Sadler, Lynne Stokes Sep 2022

Examining Bias In Jury Selection For Criminal Trials In Dallas County, Megan Ball, Brandon Birmingham, Matt Farrow, Katherine Mitchell, Bivin Sadler, Lynne Stokes

SMU Data Science Review

One of the hallmarks of the American judicial system is the concept of trial by jury, and for said trial to consist of an impartial jury of your peers. Several landmark legal cases in the history of the United States have challenged this notion of equal representation by jury—most notably Batson v. Kentucky, 476 U.S. 79 (1986). Most of the previous research, focus, and legal precedence has centered around peremptory challenges and attempting to prove if bias was suspected in excluding certain jurors from serving. Few studies, however, focus on examining challenges for cause based on self-reported biases from the …


Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee Aug 2022

Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Kerberoasting, an attack vector aimed at the Kerberos authentication protocol, can be used as part of an adversary’s attack arsenal. Kerberos is a type of network authentication protocol that allows a client and server to conduct a mutual verification before providing the requested resource to the client. A successful Kerberoasting attack allows an adversary to leverage the architectural limitations of Kerberos, providing access to user password hashes that can be subject to offline cracking. A cracked user password could give a bad actor the ability to maintain persistence, move laterally, or escalate privileges in a system. Persistence or movement within …


Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti Aug 2022

Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti

International Journal of Cybersecurity Intelligence & Cybercrime

Cryptography has been applied to a range of modern technologies which criminals also exploit to gain criminal rewards while hiding their identity. Although understanding of cybercrime involving this technique is necessary in devising effective preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles, featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, that will enhance our understanding of cryptography-related crime, ranging from cryptocurrency and darknet market to password-cracking. The articles were presented by the winners of the student paper competition at the 2022 International …


Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee Aug 2022

Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions …


A Comparison Of Methods Used For The Elimination Of Organics From Soil Prior To Analysis By Ftir-Atr And Sem-Eds, Argeliz Pomales Aug 2022

A Comparison Of Methods Used For The Elimination Of Organics From Soil Prior To Analysis By Ftir-Atr And Sem-Eds, Argeliz Pomales

Student Theses

This project suggests improvements to the treatment methods utilized for the sample preparation and evaluation of minerals in soil samples encountered in forensic science casework and research. The evaluation of pre-treated and post-treated soil samples were performed using Fourier-Transform Infrared Spectroscopy with Attenuated Total Reflection (FTIR-ATR) and Scanning Electron Microscopy-Energy Dispersive Spectroscopy (SEM-EDS). Because soil samples contain a significant amount of organic matter and water which interfere with examination of these minerals while using these instruments, pretreatment methods are necessary to isolate the mineral fraction for examination and analysis.

Soil samples were first sieved with various size stainless steel mesh …


Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry Jul 2022

Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry

Department of Statistics: Faculty Publications

1 Preliminaries

1.1 Scope

The aim of this document is to respond to issues raised in Federal Bureau of Investigation1 and Alex Biedermann, Bruce Budowle & Christophe Champod.2

1.2 Conflict of Interest

We are statisticians employed at public institutions of higher education (Iowa State University and University of Nebraska, Lincoln) and have not been paid for our time or expertise when preparing either this response or the original affidavit.3 We provide this information as a public service and as scientists and researchers in this area.

1.3 Organization

The rest of the document precedes as follows: we begin …


Investigating The Mechanisms Driving Mercury Reduction And Emissions In Soil, Hamil Patel Jun 2022

Investigating The Mechanisms Driving Mercury Reduction And Emissions In Soil, Hamil Patel

Student Theses

The water-induced emission of mercury from soil has been studied, but a complete understanding of the mechanisms driving mercury reduction and emission in soil has not been reached. The current understanding is an immediate expulsion of soil gaseous mercury upon water treatment and an upward transport of dissolved soil ionic mercury as the water evaporates. We analyzed emissions from several types of samples using various methods to further our understanding on the mechanisms involved. Light-induced emissions from aqueous samples of humic acid (HA) spiked with mercury (II) chloride (HgCl2) showed that at higher concentrations of HA, less mercury …


The Significance Of Sonic Branding To Strategically Stimulate Consumer Behavior: Content Analysis Of Four Interviews From Jeanna Isham’S “Sound In Marketing” Podcast, Ina Beilina May 2022

The Significance Of Sonic Branding To Strategically Stimulate Consumer Behavior: Content Analysis Of Four Interviews From Jeanna Isham’S “Sound In Marketing” Podcast, Ina Beilina

Student Theses and Dissertations

Purpose:
Sonic branding is not just about composing jingles like McDonald’s “I’m Lovin’ It.” Sonic branding is an industry that strategically designs a cohesive auditory component of a brand’s corporate identity. This paper examines the psychological impact of music and sound on consumer behavior reviewing studies from the past 40 years and investigates the significance of stimulating auditory perception by infusing sound in consumer experience in the modern 2020s.

Design/methodology/approach:
Qualitative content analysis of audio media was used to test two hypotheses. Four archival oral interview recordings from Jeanna Isham’s podcast “Sound in Marketing” featuring the sonic branding experts …


Built Environment, Land Use, And Crime: A Las Vegas Study, Stacey Lynn Clouse May 2022

Built Environment, Land Use, And Crime: A Las Vegas Study, Stacey Lynn Clouse

UNLV Theses, Dissertations, Professional Papers, and Capstones

This study examined land use and crime against persons and crime against property in Las Vegas, Nevada at varying spatial levels of analysis. Using crime data provided by the Las Vegas Metropolitan Police Department and the Clark County Assessor’s office, results at the macro-level of analysis reveal that property crime rates concentrated on commercial, transportation, communication and utilities, and industrial land use, whereas violent crime concentrated at commercial, multi-residential, and civic, institutional, and recreational land use. Upon examining the subtypes of land use that generate or radiate more crime, property crime concentrated on transportation land use, class 1 resorts, and …


Volume 13, Payton Davenport, Audrey Lemons, Jacob Shope, Haley Smith, Cassandra Poole, Rachel Cannon, Rachel Boch, Suzanne Stetson Apr 2022

Volume 13, Payton Davenport, Audrey Lemons, Jacob Shope, Haley Smith, Cassandra Poole, Rachel Cannon, Rachel Boch, Suzanne Stetson

Incite: The Journal of Undergraduate Scholarship

Introduction Dr. Roger A. Byrne, Dean

From the Editor Dr. Larissa “Kat” Tracy

From the Designers Rachel English, Rachel Hanson

The Effect of Compliment Type on the Estimated Value of the Compliment by Payton Davenport, Audrey Lemons, and Jacob Shope

The Imperial Japanese Military: A New Identity in the Twentieth Century, 1853–1922 by Haley Smith

Longwood University’s campus: Human-cultivated Soil has Higher Microbial Diversity than Soil Collected from Wild Sites by Cassandra Poole

Reminiscent Modernism: Poetry Magazine’s Modernist Nostalgia for the Past by Rachel Cannon

Challenges Faced by Healthcare Workers During the COVID-19 Pandemic: A Preliminary Study of Age and …


Annual Faculty Research Symposium 2022, Oakwood University Apr 2022

Annual Faculty Research Symposium 2022, Oakwood University

Proceedings

No abstract provided.


How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson Apr 2022

How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson

Cybersecurity Undergraduate Research Showcase

As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.


Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford Mar 2022

Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford

FIU Electronic Theses and Dissertations

This dissertation seeks to address the research gap in serial homicide regarding home invasion serial killers (HISKs) and add to existing policy by providing insight and approaches to assist in serial murder investigations of such killers. Data for the study was obtained from the 2019 Radford University/Florida Gulf Coast University Serial Killer Database (RU/FGCU SKD) and additional public information searches. A retrospective comparative design and proportionate stratified random sampling of 326 serial killers from the RU/FGCU SKD (2019) were used to examine the differences and classifications of HISKs and non-home invasion serial killers (non-HISKs) in three investigations: (1) common characteristics; …


The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann Mar 2022

The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann

International Journal of Cybersecurity Intelligence & Cybercrime

Criminologists and psychologists have long recognized that parenting practices can affect childhood outcomes and the development of moral beliefs in children. Another body of literature provides evidence that morality is a key cause of antisocial behavior. Yet, a noticeable gap in this line of work has been testing the mediation effects of parenting practices on cyberbullying via moral beliefs. Using a sample of South Korean adolescents, we tested whether moral beliefs mediate the relationships between parenting practices and cyberbullying perpetration. Results show that parental supervision and excessive parenting can influence cyberbullying perpetration and that the impact of parenting practices is …


Understanding Cybercrime Offending And Victimization Patterns From A Global Perspective, Jin R. Lee Mar 2022

Understanding Cybercrime Offending And Victimization Patterns From A Global Perspective, Jin R. Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercrime research within criminology and criminal justice sciences has increased over the past few decades, improving the knowledge and evidence-base around cybercrime offending and victimization generally. While earlier cybercrime studies were based primarily in the United States, there has been a recent surge in studies using international samples and multidisciplinary approaches to understand cybercrime patterns. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime consists of four articles that seek to advance our understanding of cybercrime behaviors from a global perspective. To that end, the objective of this paper is to provide a brief overview of the …


Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos Mar 2022

Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos

International Journal of Cybersecurity Intelligence & Cybercrime

The proliferation of internet technologies has shaped interactions in contemporary society. Despite the pivotal importance of the internet to the global economy, it has several negative consequences such as internet fraud. This study examined the perception that young adults in Nigeria hold about internet fraud as an innovative means to economic survival rather than as a criminal enterprise. Robert Merton’s Anomie/Strain Theory (AST) was adopted as the theoretical thrust of the study. Adopting a qualitative data collection method, 15 participants were selected using the non-probabilistic purposive and snowballing techniques while opinions were sampled through in-depth interviews in different locations within …


Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz Mar 2022

Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz

International Journal of Cybersecurity Intelligence & Cybercrime

As threat actor operations become increasingly sophisticated and emphasize the targeting of critical infrastructure and services, the need for cybersecurity information sharing will continue to grow. Escalating demand for cyber threat intelligence and information sharing across the cybersecurity community has resulted in the need to better understand the information produced by reputable sources such as U.S. CISA Alerts and ICS-CERT advisories. The text analysis program, Profiler Plus, is used to extract information from 1,574 U.S. government alerts and advisories to develop visualizations and generate enhanced insights into different cyber threat actor types, the tactics which can be used for cyber …


Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry Jan 2022

Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry

Department of Statistics: Faculty Publications

We have outlined several problems with the state of error rate studies on firearm and toolmark examination. Fundamentally, we do not know what the error rate is for these types of comparisons. This is a failure of the scientific study of toolmarks, rather than the examiners themselves, but until this is corrected with multiple studies that meet the criteria described in Section 3, we cannot support the use of this evidence in criminal proceedings.