Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cybercrime (3)
- Admissibility (2)
- Daubert (2)
- Error rates (2)
- Firearms (2)
-
- Forensics (2)
- Frye (2)
- Toolmark (2)
- Victimization (2)
- Accurate core point location (1)
- Advertising (1)
- Audio (1)
- Awareness (1)
- Awareness Categories (1)
- Bias (1)
- Booter service (1)
- Confluence (1)
- Consumer Behavior (1)
- Corporate Communication (1)
- Crime at place (1)
- Crime pattern theory (1)
- Crime science (1)
- Criminal career paradigm (1)
- Criminal investigation (1)
- Critical infrastructure (1)
- Cryptocurrency (1)
- Cryptographic authentication; Kerberos; Kerberoasting; Network security (1)
- Cyber Deviance (1)
- Cyber alerts (1)
- Cyber threat intelligence (1)
- Publication
-
- International Journal of Cybersecurity Intelligence & Cybercrime (11)
- Annual ADFSL Conference on Digital Forensics, Security and Law (10)
- Cybersecurity Undergraduate Research Showcase (2)
- Department of Statistics: Faculty Publications (2)
- Electronic Theses and Dissertations, 2020- (2)
-
- Graduate Theses, Dissertations, and Problem Reports (2)
- Student Theses (2)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- FIU Electronic Theses and Dissertations (1)
- Honors Undergraduate Theses (1)
- Incite: The Journal of Undergraduate Scholarship (1)
- Proceedings (1)
- Research outputs 2014 to 2021 (1)
- SMU Data Science Review (1)
- Student Theses and Dissertations (1)
- Theses: Doctorates and Masters (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
- Publication Type
Articles 1 - 30 of 41
Full-Text Articles in Physical Sciences and Mathematics
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
International Journal of Cybersecurity Intelligence & Cybercrime
Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
International Journal of Cybersecurity Intelligence & Cybercrime
Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
International Journal of Cybersecurity Intelligence & Cybercrime
The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …
Book Review: Digital Forensics And Cyber Investigation
Book Review: Digital Forensics And Cyber Investigation
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Examining Bias In Jury Selection For Criminal Trials In Dallas County, Megan Ball, Brandon Birmingham, Matt Farrow, Katherine Mitchell, Bivin Sadler, Lynne Stokes
Examining Bias In Jury Selection For Criminal Trials In Dallas County, Megan Ball, Brandon Birmingham, Matt Farrow, Katherine Mitchell, Bivin Sadler, Lynne Stokes
SMU Data Science Review
One of the hallmarks of the American judicial system is the concept of trial by jury, and for said trial to consist of an impartial jury of your peers. Several landmark legal cases in the history of the United States have challenged this notion of equal representation by jury—most notably Batson v. Kentucky, 476 U.S. 79 (1986). Most of the previous research, focus, and legal precedence has centered around peremptory challenges and attempting to prove if bias was suspected in excluding certain jurors from serving. Few studies, however, focus on examining challenges for cause based on self-reported biases from the …
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Kerberoasting, an attack vector aimed at the Kerberos authentication protocol, can be used as part of an adversary’s attack arsenal. Kerberos is a type of network authentication protocol that allows a client and server to conduct a mutual verification before providing the requested resource to the client. A successful Kerberoasting attack allows an adversary to leverage the architectural limitations of Kerberos, providing access to user password hashes that can be subject to offline cracking. A cracked user password could give a bad actor the ability to maintain persistence, move laterally, or escalate privileges in a system. Persistence or movement within …
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
International Journal of Cybersecurity Intelligence & Cybercrime
Cryptography has been applied to a range of modern technologies which criminals also exploit to gain criminal rewards while hiding their identity. Although understanding of cybercrime involving this technique is necessary in devising effective preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles, featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, that will enhance our understanding of cryptography-related crime, ranging from cryptocurrency and darknet market to password-cracking. The articles were presented by the winners of the student paper competition at the 2022 International …
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
International Journal of Cybersecurity Intelligence & Cybercrime
The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions …
A Comparison Of Methods Used For The Elimination Of Organics From Soil Prior To Analysis By Ftir-Atr And Sem-Eds, Argeliz Pomales
A Comparison Of Methods Used For The Elimination Of Organics From Soil Prior To Analysis By Ftir-Atr And Sem-Eds, Argeliz Pomales
Student Theses
This project suggests improvements to the treatment methods utilized for the sample preparation and evaluation of minerals in soil samples encountered in forensic science casework and research. The evaluation of pre-treated and post-treated soil samples were performed using Fourier-Transform Infrared Spectroscopy with Attenuated Total Reflection (FTIR-ATR) and Scanning Electron Microscopy-Energy Dispersive Spectroscopy (SEM-EDS). Because soil samples contain a significant amount of organic matter and water which interfere with examination of these minerals while using these instruments, pretreatment methods are necessary to isolate the mineral fraction for examination and analysis.
Soil samples were first sieved with various size stainless steel mesh …
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Department of Statistics: Faculty Publications
1 Preliminaries
1.1 Scope
The aim of this document is to respond to issues raised in Federal Bureau of Investigation1 and Alex Biedermann, Bruce Budowle & Christophe Champod.2
1.2 Conflict of Interest
We are statisticians employed at public institutions of higher education (Iowa State University and University of Nebraska, Lincoln) and have not been paid for our time or expertise when preparing either this response or the original affidavit.3 We provide this information as a public service and as scientists and researchers in this area.
1.3 Organization
The rest of the document precedes as follows: we begin …
Investigating The Mechanisms Driving Mercury Reduction And Emissions In Soil, Hamil Patel
Investigating The Mechanisms Driving Mercury Reduction And Emissions In Soil, Hamil Patel
Student Theses
The water-induced emission of mercury from soil has been studied, but a complete understanding of the mechanisms driving mercury reduction and emission in soil has not been reached. The current understanding is an immediate expulsion of soil gaseous mercury upon water treatment and an upward transport of dissolved soil ionic mercury as the water evaporates. We analyzed emissions from several types of samples using various methods to further our understanding on the mechanisms involved. Light-induced emissions from aqueous samples of humic acid (HA) spiked with mercury (II) chloride (HgCl2) showed that at higher concentrations of HA, less mercury …
The Significance Of Sonic Branding To Strategically Stimulate Consumer Behavior: Content Analysis Of Four Interviews From Jeanna Isham’S “Sound In Marketing” Podcast, Ina Beilina
Student Theses and Dissertations
Purpose:
Sonic branding is not just about composing jingles like McDonald’s “I’m Lovin’ It.” Sonic branding is an industry that strategically designs a cohesive auditory component of a brand’s corporate identity. This paper examines the psychological impact of music and sound on consumer behavior reviewing studies from the past 40 years and investigates the significance of stimulating auditory perception by infusing sound in consumer experience in the modern 2020s.
Design/methodology/approach:
Qualitative content analysis of audio media was used to test two hypotheses. Four archival oral interview recordings from Jeanna Isham’s podcast “Sound in Marketing” featuring the sonic branding experts …
Built Environment, Land Use, And Crime: A Las Vegas Study, Stacey Lynn Clouse
Built Environment, Land Use, And Crime: A Las Vegas Study, Stacey Lynn Clouse
UNLV Theses, Dissertations, Professional Papers, and Capstones
This study examined land use and crime against persons and crime against property in Las Vegas, Nevada at varying spatial levels of analysis. Using crime data provided by the Las Vegas Metropolitan Police Department and the Clark County Assessor’s office, results at the macro-level of analysis reveal that property crime rates concentrated on commercial, transportation, communication and utilities, and industrial land use, whereas violent crime concentrated at commercial, multi-residential, and civic, institutional, and recreational land use. Upon examining the subtypes of land use that generate or radiate more crime, property crime concentrated on transportation land use, class 1 resorts, and …
Volume 13, Payton Davenport, Audrey Lemons, Jacob Shope, Haley Smith, Cassandra Poole, Rachel Cannon, Rachel Boch, Suzanne Stetson
Volume 13, Payton Davenport, Audrey Lemons, Jacob Shope, Haley Smith, Cassandra Poole, Rachel Cannon, Rachel Boch, Suzanne Stetson
Incite: The Journal of Undergraduate Scholarship
Introduction Dr. Roger A. Byrne, Dean
From the Editor Dr. Larissa “Kat” Tracy
From the Designers Rachel English, Rachel Hanson
The Effect of Compliment Type on the Estimated Value of the Compliment by Payton Davenport, Audrey Lemons, and Jacob Shope
The Imperial Japanese Military: A New Identity in the Twentieth Century, 1853–1922 by Haley Smith
Longwood University’s campus: Human-cultivated Soil has Higher Microbial Diversity than Soil Collected from Wild Sites by Cassandra Poole
Reminiscent Modernism: Poetry Magazine’s Modernist Nostalgia for the Past by Rachel Cannon
Challenges Faced by Healthcare Workers During the COVID-19 Pandemic: A Preliminary Study of Age and …
Annual Faculty Research Symposium 2022, Oakwood University
Annual Faculty Research Symposium 2022, Oakwood University
Proceedings
No abstract provided.
How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson
How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson
Cybersecurity Undergraduate Research Showcase
As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.
Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford
Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford
FIU Electronic Theses and Dissertations
This dissertation seeks to address the research gap in serial homicide regarding home invasion serial killers (HISKs) and add to existing policy by providing insight and approaches to assist in serial murder investigations of such killers. Data for the study was obtained from the 2019 Radford University/Florida Gulf Coast University Serial Killer Database (RU/FGCU SKD) and additional public information searches. A retrospective comparative design and proportionate stratified random sampling of 326 serial killers from the RU/FGCU SKD (2019) were used to examine the differences and classifications of HISKs and non-home invasion serial killers (non-HISKs) in three investigations: (1) common characteristics; …
The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann
The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann
International Journal of Cybersecurity Intelligence & Cybercrime
Criminologists and psychologists have long recognized that parenting practices can affect childhood outcomes and the development of moral beliefs in children. Another body of literature provides evidence that morality is a key cause of antisocial behavior. Yet, a noticeable gap in this line of work has been testing the mediation effects of parenting practices on cyberbullying via moral beliefs. Using a sample of South Korean adolescents, we tested whether moral beliefs mediate the relationships between parenting practices and cyberbullying perpetration. Results show that parental supervision and excessive parenting can influence cyberbullying perpetration and that the impact of parenting practices is …
Understanding Cybercrime Offending And Victimization Patterns From A Global Perspective, Jin R. Lee
Understanding Cybercrime Offending And Victimization Patterns From A Global Perspective, Jin R. Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Cybercrime research within criminology and criminal justice sciences has increased over the past few decades, improving the knowledge and evidence-base around cybercrime offending and victimization generally. While earlier cybercrime studies were based primarily in the United States, there has been a recent surge in studies using international samples and multidisciplinary approaches to understand cybercrime patterns. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime consists of four articles that seek to advance our understanding of cybercrime behaviors from a global perspective. To that end, the objective of this paper is to provide a brief overview of the …
Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos
Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos
International Journal of Cybersecurity Intelligence & Cybercrime
The proliferation of internet technologies has shaped interactions in contemporary society. Despite the pivotal importance of the internet to the global economy, it has several negative consequences such as internet fraud. This study examined the perception that young adults in Nigeria hold about internet fraud as an innovative means to economic survival rather than as a criminal enterprise. Robert Merton’s Anomie/Strain Theory (AST) was adopted as the theoretical thrust of the study. Adopting a qualitative data collection method, 15 participants were selected using the non-probabilistic purposive and snowballing techniques while opinions were sampled through in-depth interviews in different locations within …
Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz
Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz
International Journal of Cybersecurity Intelligence & Cybercrime
As threat actor operations become increasingly sophisticated and emphasize the targeting of critical infrastructure and services, the need for cybersecurity information sharing will continue to grow. Escalating demand for cyber threat intelligence and information sharing across the cybersecurity community has resulted in the need to better understand the information produced by reputable sources such as U.S. CISA Alerts and ICS-CERT advisories. The text analysis program, Profiler Plus, is used to extract information from 1,574 U.S. government alerts and advisories to develop visualizations and generate enhanced insights into different cyber threat actor types, the tactics which can be used for cyber …
Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry
Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry
Department of Statistics: Faculty Publications
We have outlined several problems with the state of error rate studies on firearm and toolmark examination. Fundamentally, we do not know what the error rate is for these types of comparisons. This is a failure of the scientific study of toolmarks, rather than the examiners themselves, but until this is corrected with multiple studies that meet the criteria described in Section 3, we cannot support the use of this evidence in criminal proceedings.
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Annual ADFSL Conference on Digital Forensics, Security and Law
The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …
The Global Impact Of Covid-19 And Tourism On Conservation Rangers' Guardianship Capabilities, Zachary Bockler
The Global Impact Of Covid-19 And Tourism On Conservation Rangers' Guardianship Capabilities, Zachary Bockler
Honors Undergraduate Theses
This thesis explores how the COVID-19 pandemic has impacted wildlife rangers with an emphasis on the influences of tourism rates. Two sets of data are used: one is a survey of rangers around the world and the other looks at global governmental tourism data. While coming from a routine activities perspective, the problem of decreased capable guardianship becomes apparent in the form of massively decreased tourism arrivals and troubling ranger perceptions. This data allows for the establishment of tourism trends and changes during COVID. The findings of this thesis link the downturn in tourism with impacts on formal and informal …