Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Social and Behavioral Sciences

Recidivism Outcomes For Young People Who Have Committed A Sexual Offence And Received Treatment: A Systematic Narrative Review Of Studies Conducted In Australia And New Zealand, James L. Finney, Natalie Gately, Suzanne Rock Jan 2024

Recidivism Outcomes For Young People Who Have Committed A Sexual Offence And Received Treatment: A Systematic Narrative Review Of Studies Conducted In Australia And New Zealand, James L. Finney, Natalie Gately, Suzanne Rock

Research outputs 2022 to 2026

Young people who have committed a sexual offence present unique and serious challenges to the criminal justice systems of Australia and New Zealand. To understand the current state of existing literature, we systematically collated and critically appraised studies using narrative synthesis, examining the recidivism outcomes of young people who have committed a sexual offence and received treatment. Eight studies were identified utilising a sample of 1528 young people. Recidivism was higher among participants who did not complete treatment, compared to those who completed treatment, but highest in those who commenced but subsequently “dropped out”. Our findings highlight a need for …


More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall Jan 2022

More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall

Research outputs 2014 to 2021

© 2020, The Author(s). The internet mafia trope has shaped our knowledge about organised crime groups online, yet the evidence is largely speculative and the logic often flawed. This paper adds to current knowledge by exploring the development, operation and demise of an online criminal group as a case study. In this article we analyse a DDoS (Distributed Denial of Service) stresser (also known as booter) which sells its services online to enable offenders to launch attacks. Using Social Network Analysis to explore the service operations and payment systems, our findings show a central business model that is similar to …


Digital Forensic Readiness Intelligence Crime Repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, Sadi Alawadi Jan 2021

Digital Forensic Readiness Intelligence Crime Repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, Sadi Alawadi

Research outputs 2014 to 2021

It may not always be possible to conduct a digital (forensic) investigation post-event if there is no process in place to preserve potential digital evidence. This study posits the importance of digital forensic readiness, or forensic-by-design, and presents an approach that can be used to construct a Digital Forensic Readiness Intelligence Repository (DFRIR). Based on the concept of knowledge sharing, the authors leverage this premise to suggest an intelligence repository. Such a repository can be used to cross-reference potential digital evidence (PDE) sources that may help digital investigators during the process. This approach employs a technique of capturing PDE from …


Digital Forensic Readiness In Operational Cloud Leveraging Iso/Iec 27043 Guidelines On Security Monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Sadi Alawadi Jan 2021

Digital Forensic Readiness In Operational Cloud Leveraging Iso/Iec 27043 Guidelines On Security Monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Sadi Alawadi

Research outputs 2014 to 2021

An increase in the use of cloud computing technologies by organizations has led to cybercriminals targeting cloud environments to orchestrate malicious attacks. Conversely, this has led to the need for proactive approaches through the use of digital forensic readiness (DFR). Existing studies have attempted to develop proactive prototypes using diverse agent-based solutions that are capable of extracting a forensically sound potential digital evidence. As a way to address this limitation and further evaluate the degree of PDE relevance in an operational platform, this study sought to develop a prototype in an operational cloud environment to achieve DFR in the cloud. …


Evaluating The Impact Of Sandbox Applications On Live Digital Forensics Investigation, Reem Bashir, Helge Janicke, Wen Zeng Jan 2021

Evaluating The Impact Of Sandbox Applications On Live Digital Forensics Investigation, Reem Bashir, Helge Janicke, Wen Zeng

Research outputs 2014 to 2021

Sandbox applications can be used as anti-forensics techniques to hide important evidence in the digital forensics investigation. There is limited research on sandboxing technologies, and the existing researches on sandboxing are focusing on the technology itself. The impact of sandbox applications on live digital forensics investigation has not been systematically analysed and documented. In this study, we proposed a methodology to analyse sandbox applications on Windows systems. The impact of having standalone sandbox applications on Windows operating systems image was evaluated. Experiments were conducted to examine the artefacts of three sandbox applications: Sandboxie, BufferZone and ToolWiz Time Freeze on Windows …


Do Sequential Lineups Impair Underlying Discriminability?, Matthew Kaesler, John C. Dunn, Keith Ransom, Carolyn Semmler Dec 2020

Do Sequential Lineups Impair Underlying Discriminability?, Matthew Kaesler, John C. Dunn, Keith Ransom, Carolyn Semmler

Research outputs 2014 to 2021

© 2020, The Author(s). Debate regarding the best way to test and measure eyewitness memory has dominated the eyewitness literature for more than 30 years. We argue that resolution of this debate requires the development and application of appropriate measurement models. In this study we developed models of simultaneous and sequential lineup presentations and used these to compare these procedures in terms of underlying discriminability and response bias, thereby testing a key prediction of diagnostic feature detection theory, that underlying discriminability should be greater for simultaneous than for stopping-rule sequential lineups. We fit the models to the corpus of studies …


Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm Jan 2020

Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm

Research outputs 2014 to 2021

© 2020 The Author(s) Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise data from a broad range of Internet of Things devices, across complex environment(s) to solve different problems. This paper surveys existing literature on the potential of using supervised classical machine learning techniques, such as K-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing live digital forensics for different IoT configurations. There are also a number of challenges associated with the use of machine learning techniques, as discussed in this paper.


Rethinking Digital Forensics, Andrew Jones, Stilianos Vidalis Jan 2019

Rethinking Digital Forensics, Andrew Jones, Stilianos Vidalis

Research outputs 2014 to 2021

In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour. There has been an exponential increase in the complexity of the networks with the rise of the Internet of Things, cloud technologies and fog computing altering business operations and models. Adding to the problem are the increased capacity of storage devices and the increased diversity of devices that are attached to networks, operating autonomously. We argue that the laws and standards that have been written, the processes, procedures and tools that …


I Understand You Feel That Way, But I Feel This Way: The Benefits Of I-Language And Communicating Perspective During Conflict, Shane L. Rogers, Jill Howieson, Casey Neame Jan 2018

I Understand You Feel That Way, But I Feel This Way: The Benefits Of I-Language And Communicating Perspective During Conflict, Shane L. Rogers, Jill Howieson, Casey Neame

Research outputs 2014 to 2021

Using hypothetical scenarios, we provided participants with potential opening statements to a conflict discussion that varied on I/you language and communicated perspective. Participants rated the likelihood that the recipient of the statement would react in a defensive manner. Using I-language and communicating perspective were both found to reduce perceptions of hostility. Statements that communicated both self- and other-perspective using I-language (e.g. ‘I understand why you might feel that way, but I feel this way, so I think the situation is unfair’) were rated as the best strategy to open a conflict discussion. Simple acts of initial language use can …


Give Them A Chance: Public Attitudes To Sentencing Young Offenders In Western Australia, Suzanne Ellis, Natalie J. Gately Dr, Shane Rogers, Andree Horrigan Jan 2018

Give Them A Chance: Public Attitudes To Sentencing Young Offenders In Western Australia, Suzanne Ellis, Natalie J. Gately Dr, Shane Rogers, Andree Horrigan

Research outputs 2014 to 2021

Public opinion is often reported as punitive towards sentencing young people. Attitudes remain important to investigate given their potential to influence policy within the criminal justice system. Therefore, it is important to understand the formation of these attitudes and their consistency with sentencing principles. Semi-structured interviews (n = 72) and surveys (n = 502) were used to gauge opinions of sentencing young people under different scenario manipulations (age, weapon, drug treatment, prior record). The findings revealed the public expected punishment, but favoured rehabilitation with an opportunity to repent, suggesting the public are open to alternatives to ‘tough on …


Acknowledging Children’S Voice And Participation In Family Courts: Criteria That Guide Western Australian Court Consultants, Vicki Banham, Alfred Allan, J. Bergman, Jasmin Jau Jan 2017

Acknowledging Children’S Voice And Participation In Family Courts: Criteria That Guide Western Australian Court Consultants, Vicki Banham, Alfred Allan, J. Bergman, Jasmin Jau

Research outputs 2014 to 2021

The Australian family courts introduced Child Inclusive Conferencing after the country adopted the United Nations Convention on the Rights of the Child. The legislation governing these conferences is minimalistic but the Family Court Consultants in the Family Court of Australia and the Federal Circuit Court have well-developed and documented guidelines. The Family Court of Western Australia is, however, a separate entity and in the absence of regulatory guidelines its Family Consultants developed their own process and criteria. This model is unique, in Australia at least, because it has been organically developed by the practitioners providing the Child Inclusive Conferences with …


Improving Forensic Software Tool Performance In Detecting Fraud For Financial Statements, Brian Cusack, Tau’Aho Ahokov Jan 2016

Improving Forensic Software Tool Performance In Detecting Fraud For Financial Statements, Brian Cusack, Tau’Aho Ahokov

Australian Digital Forensics Conference

The use of computer forensics is important for forensic accounting practice because most accounting information is in digital forms today. The access to evidence is increasingly more complex and in far greater volumes than in previous decades. The effective and efficient means of detecting fraud are required for the public to maintain their confidence in the reliability of accounting audit and the reputation of accounting firms. The software tools used by forensic accounting can be called into question. Many appear inadequate when faced with the complexity of fraud and there needs to be the development of automated and specialist problem-solving …


The Influence Of The Sex Of And Prior Relationship Between The Perpetrator And Victim On Perceptions Of Stalking: A Qualitative Analysis, Jeff Bath, Adrian J. Scott Jan 2016

The Influence Of The Sex Of And Prior Relationship Between The Perpetrator And Victim On Perceptions Of Stalking: A Qualitative Analysis, Jeff Bath, Adrian J. Scott

Research outputs 2014 to 2021

The sex of and prior relationship between the perpetrator and victim have been shown to influence perceptions of stalking. To explore the ways in which shared assumptions around these factors interact to shape perceptions of stalking, this study analyses the deliberations of mock juries as they attempt to reach a unanimous verdict on a hypothetical stalking case summary. Twelve mock juries comprising between five and six ‘jurors’ (n = 64) were presented with one of three versions of a case summary (stranger, acquaintance, and ex-partner) describing a man stalking a woman or a woman stalking a man. Thematic analysis shows …


A Morphometric Study Of The Human Mandible In The Indian Population For Sex Determination, Maneesha Sharma, Rakesh K. Gorea, Arshdeep Gorea, Abdulwahab A. Abuderman Jan 2016

A Morphometric Study Of The Human Mandible In The Indian Population For Sex Determination, Maneesha Sharma, Rakesh K. Gorea, Arshdeep Gorea, Abdulwahab A. Abuderman

Research outputs 2014 to 2021

Sex determination from bones is important in forensic investigations for establishing identity in cases of mutilated bodies. Many morphometric criteria have been laid down for various bones for sex determination in previous studies. The present study aimed at setting up some parameters of the mandible as indicators of sex in the Indian population. The length of body of the mandible, angle of the mandible and minimum ramus breadth were considered as chief parameters for sex determination from dried bones obtained from the Departments of Anatomy in two medical colleges of Punjab and Chandigarh. There was a statistically significant difference found …


Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok Jan 2015

Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok

Australian Security and Intelligence Conference

The terrorist attack on a member of the Police service by a 15 year old boy in late 2015 sent shock waves not only through Australia but also throughout the world as the realisation of Islamic State targeting teenagers becomes a reality. This paper uses a blend of theoretical and empirical evidence to examine how the radicalised self is formed. Insights from various frameworks including: developmental psychology (teenage identity formation and role confusion), Foucault’s technologies of the self, governmentality and sociological issues including the perceived gap between Muslim values and those of the West. Coupled with these theoretical frameworks are …


Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks Jan 2015

Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks

Australian Security and Intelligence Conference

Closed Circuit Television (CCTV) systems are found in a variety of environments and used for a multitude of purposes, leading to differing views of CCTV within an organisation. In accordance to management theory, organisations contain a stratum of work where each level requires specific skills set. In accordance with this work stratum, the study’s methodology used semi-structured interviews with different levels of security personnel in a Casino complex to extract and undertake a thematic analysis. The study extracted 10 CCTV surveillance features across two themes, being its aims and functions. CCTV features included creating a safe environment, protection, legal compliance …


Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey Jan 2015

Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey

Australian Security and Intelligence Conference

Security is a necessary cost for businesses wishing to operate in the developing economy of Papua New Guinea. The country continues to face levels of crime and violence out of proportion to other East Asian countries; which deters many would be investors. However, the potential in PNG is vast and eagerly sought after despite the high costs required to operate without harm, therefore, it is necessary manage the security situation. Experience from similar countries has shown by using optimal security management systems and structures it is possible to work safely, securely and effectively, but this requires a comprehensive security, threat …


Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson Jan 2015

Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson

Australian Security and Intelligence Conference

Burglary and stealing are crimes that have a significant impact and cost on its victims and society. To mitigate such crimes, property marking is a situational crime prevention strategy that attempts to prevent through dissuasion. There are many forms of property marking, yet there is limited research of its efficacy. Where there have been such studies, there has been some indications of success. Therefore, the study assessed the efficacy of property marking to reduce burglary and stealing crimes. The study undertook a quantitate approach using non-equivalent control groups to assess the geo-spatial impact of property marking when applied at a …


The Challenges Of Seizing And Searching The Contents Of Wi-Fi Devices For The Modern Investigator, Dan Blackman, Patryk Szewczyk Jan 2015

The Challenges Of Seizing And Searching The Contents Of Wi-Fi Devices For The Modern Investigator, Dan Blackman, Patryk Szewczyk

Australian Digital Forensics Conference

To the modern law enforcement investigator, the potential for an offender to have a mobile device on his or her person, who connects to a Wi-Fi network, may afford evidence to place them at a scene, at a particular time. Whilst tools to interrogate mobile devices and Wi-Fi networks, have undergone significant development, little research has been conducted with regards to interrogating Wi-Fi routers and the evidence they may contain. This paper demonstrates that multiple inhibiting factors exist for forensic investigators when attempting to extract data from Wi-Fi routers at the scene. Data volatility means the Wi-Fi router cannot be …


Bite Marks On Skin And Clay: A Comparative Analysis, R K. Gorea, O. P. Jasuja, Abdulwahab Ali Abuderman, Abhinav Gorea Dec 2014

Bite Marks On Skin And Clay: A Comparative Analysis, R K. Gorea, O. P. Jasuja, Abdulwahab Ali Abuderman, Abhinav Gorea

Research outputs 2014 to 2021

Bite marks are always unique because teeth are distinctive. Bite marks are often observed at the crime scene in sexual and in physical assault cases on the skin of the victims and sometimes on edible leftovers in burglary cases. This piece of evidence is often ignored, but if properly harvested and investigated, bite marks may prove useful in apprehending and successfully prosecuting the criminals. Due to the importance of bite marks, we conducted a progressive randomised experimental study conducted on volunteers. A total of 188 bite marks on clay were studied. Based on these findings, 93.34% of the volunteers could …


Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle Jan 2013

Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle

Research outputs 2013

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


The Influence Of Prior Relationship On Perceptions Of Stalking: A Comparison Of Laypersons, Nonspecialist Police Officers And Specialist Police Officers, Adrian J. Scott, Keri Nixon, Lorraine Sheridan Jan 2013

The Influence Of Prior Relationship On Perceptions Of Stalking: A Comparison Of Laypersons, Nonspecialist Police Officers And Specialist Police Officers, Adrian J. Scott, Keri Nixon, Lorraine Sheridan

Research outputs 2013

The current research examined the influence of prior relationship on perceptions of stalking, and compared the perceptions of laypersons, nonspecialist police officers, and specialist police officers. Two studies employed experimental designs where participants were presented with one of three vignettes in which the nature of the prior relationship was manipulated so that the perpetrator and victim were portrayed as strangers, acquaintances, or ex-partners. Participants comprised 101 nonspecialist police officers and 108 laypersons in Study 1, and 49 specialist police officers and 49 nonspecialist police officers in Study 2. Findings indicate that nonspecialist police officers and laypersons shared the common misperception …


International Perceptions Of Stalking And Responsibility: The Influence Of Prior Relationship And Severity Of Behavior, Adrian J. Scott, Nikki Rajakaruna, Lorraine Sheridan, Emma Sleath Jan 2013

International Perceptions Of Stalking And Responsibility: The Influence Of Prior Relationship And Severity Of Behavior, Adrian J. Scott, Nikki Rajakaruna, Lorraine Sheridan, Emma Sleath

Research outputs 2013

This study investigates the influence of prior relationship and severity of behavior on perceptions of stalking and responsibility with a combined sample of 1,080 members of the community from Australia, the United States, and the United Kingdom. Participants were presented with 1 of 12 versions of a hypothetical stalking scenario and responded to scale items regarding the behavior of a male perpetrator toward a female target. Prior relationship and severity of behavior influenced perceptions of stalking and responsibility, and the pattern of findings was consistent across the three countries. The perpetrator’s behavior was perceived to constitute stalking, and necessitate police …


Framing And Perceptions Of Stalking: The Influence Of Conduct Severity And The Perpetrator-Target Relationship, Adrian J. Scott, Nikki Rajakaruna, Lorraine P. Sheridan Jan 2013

Framing And Perceptions Of Stalking: The Influence Of Conduct Severity And The Perpetrator-Target Relationship, Adrian J. Scott, Nikki Rajakaruna, Lorraine P. Sheridan

Research outputs 2013

Research has demonstrated that the way in which questions are presented (i.e. framed) has the capacity to influence responses to subsequent questions. In the context of stalking, perception research has often been framed in terms of whether or not particular behaviours constitute stalking. The current research investigates whether the framing of the opening question (question frame), conduct severity and the perpetrator target relationship influence perceptions of stalking. Two studies employed experimental 3 3 independent factorial designs: one to examine question frame and conduct severity, the other to examine question frame and the perpetrator target relationship. Participants in both studies (total …


Technology Corner: Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle Jan 2013

Technology Corner: Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle

Research outputs 2013

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Understanding Perceptions Of Stalking: The Impact Of Additional Contextual Information Regarding The Breakdown Of Relationships, Simon C. Duff, Adrian J. Scott Jan 2013

Understanding Perceptions Of Stalking: The Impact Of Additional Contextual Information Regarding The Breakdown Of Relationships, Simon C. Duff, Adrian J. Scott

Research outputs 2013

Purpose – Perception research has demonstrated that people view stranger stalkers to be more persistentand dangerous than ex-partner stalkers. Although these findings are consistent with the outcome of legal processes where stranger stalkers are more likely to be convicted, they contrast with the findings of national surveys and applied research where ex-partner stalkers represent the most persistent and dangerous relational subtype. The aim of the current study is to further examine the influence of prior relationship on perceptions of stalking by considering the impact of additional contextual information regarding the breakdown of ex-partners’ relationships for the first time. Design/methodology/approach – …


The Attribution Of Responsibility In Cases Of Stalking, Adrian J. Scott, Jeffery Gavin, Emma Sleath, Lorraine Sheridan Jan 2013

The Attribution Of Responsibility In Cases Of Stalking, Adrian J. Scott, Jeffery Gavin, Emma Sleath, Lorraine Sheridan

Research outputs 2013

There is a general belief that stranger stalkers present the greatest threat to the personal safety of victims, despite national victimisation surveys and applied research demonstrating that ex-partner stalkers are generally more persistent and violent. The just-world hypothesis offers a possible explanation for this apparent contradiction. The current research used nine hypothetical scenarios, administered to 328 university students, to investigate the assumptions that underlie attributions of responsibility in cases of stalking. It explores whether these assumptions are consistent with the proposed mechanisms of the just-world hypothesis, and whether they vary according to the nature of the perpetrator–victim relationship and conduct …


Virtue Ethics: Analysing Emotions In A Police Interview With A Crime Suspect, Ann-Claire Larsen, Michael Crowley Jan 2012

Virtue Ethics: Analysing Emotions In A Police Interview With A Crime Suspect, Ann-Claire Larsen, Michael Crowley

Research outputs 2012

Justice goes some way to being served when statements from police interviews with suspects are admissible as evidence in court. Admissible evidence confirms that the police have worked within legal constraints and satisfied universal ethical principles that appear in the police code of conduct. Conversely, when police behave improperly and an accused person walks free, police authorities have needed to placate an outraged public by promising reforms. This article explores sections of Arthurs’ case to illustrate differences between legal and illegal police conduct when interviewing a murder suspect. Parts of the interview were admissible as legal evidence; the majority was …