Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Legal Studies

Conference

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 304

Full-Text Articles in Social and Behavioral Sciences

Racial Diversity Among Juvenile Offenders, Josh Slocum Apr 2024

Racial Diversity Among Juvenile Offenders, Josh Slocum

Scholars Day Conference

Through many years juvenile delinquency has been something that tends to radar and becomes less relevant in the criminal justice world. Though there has been a substantial amount of research in juvenile prevention efforts as well as locating the highest number of offenders based on racial background. My research explores the difference in characteristics among different racial offenders as well as why specific races are more present in corrections.


Influences Of Social Media, Samuel Whatley Ii Apr 2024

Influences Of Social Media, Samuel Whatley Ii

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The Internet is a double-edged sword because it provides easy access to information of both good and bad intentions. Censorship justifications under whoever deems something misinformation, provide little oversight on being a neutral public forum. For instance, the influence of elections by not covering a story and censoring opposing views does not promote the notion of being a neutral public forum. Artificial intelligence being applied to many technological applications have fueled the censorship machine. In some instances, artificial intelligence can generate stories to media sites (i.e., ChatGPT) with no verification of the details. From science fiction to science reality, taking …


The Effectiveness Of Canines In Law Enforcement, Shelly Stroud, Riley Kaufmann Apr 2024

The Effectiveness Of Canines In Law Enforcement, Shelly Stroud, Riley Kaufmann

Scholar Week 2016 - present

Police K-9s play a multifaceted role in policing including crime control and public relations.The advent of these police specialty units coincided with the movement to professionalize policing and have been used to aid law enforcement since the start of the 20th century.

We will demonstrate the role of a working K-9 and the many different areas that are covered in law enforcement such as: bite, detection, narcotics, firearms, explosives, and technology. We will examine the role of the K-9 handler and the impact of their relationship with their k-9 and how this bond influences the effectiveness of law enforcement tasks.


Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds Apr 2024

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds

Cybersecurity Undergraduate Research Showcase

The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.

Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …


Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian Mar 2024

Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian

Seaver College Research And Scholarly Achievement Symposium

Coomassie Brilliant Blue Dye is a dye commonly used to stain proteins. Because of its ability to adhere to proteins, this research has focused on perfecting a method of dyeing a fractured flat bone in order to most accurately observe and analyze fracture markings within the trabecular layer. Stereoscopic microscopy was the chosen technique of analysis for this research because of its proven effectiveness in glass and ceramic fractography to observe varying depths. In order to most effectively apply stereoscopic microscopy to this research, the following variables were manipulated to maximize color contrast in the trabecular layer in order to …


Problem Gambling, General-Strain Theory, And Gender, Michelle Malkin May 2023

Problem Gambling, General-Strain Theory, And Gender, Michelle Malkin

International Conference on Gambling & Risk Taking

Prior research identified a host of factors that increase the likelihood that an individual will become a problem gambler, most of which would be identified by criminologists as “strains” under the framework of General Strain Theory (GST). Yet, GST has not been widely used as a possible explanation for why people become problem gamblers. In addition, there has been little examination of how gender interacts with those variables to affect problem gambling. In this research, I display how propositions from GST provide a framework for understanding why people become problem gamblers and whether gender is a moderating factor in this …


The Departure From The Original Intent Of The 14th Amendment, Johnny B. Davis May 2023

The Departure From The Original Intent Of The 14th Amendment, Johnny B. Davis

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


American Sign Language Legal Interpretation Complications: A Comprehensive Analysis Of Linguistic Barriers Within The Criminal Justice System, Katherine R. Doan May 2023

American Sign Language Legal Interpretation Complications: A Comprehensive Analysis Of Linguistic Barriers Within The Criminal Justice System, Katherine R. Doan

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The founding documents of the United States of America tend to be rather universal and impartial in their vernacular. Because all citizens of a nation are deserving of the same rights and privileges regardless of age, race, ethnicity, or disability status, accommodations must be provided to the Deaf to give them equal access to information throughout interrogations, trials, and police interactions. While it may seem obvious that interpreters should be provided during legal situations involving a Deaf individual, visual communication can make legal interactions quite complicated when police or attorneys can only reveal limited details. When Deaf culture involving expansion …


Drug Ideologies Of The United States, Macy Montgomery May 2023

Drug Ideologies Of The United States, Macy Montgomery

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The United States has been increasingly creating lenient drug policies. Seventeen states and Washington, the District of Columbia, legalized marijuana, and Oregon decriminalized certain drugs, including methamphetamine, heroin, and cocaine. The medical community has proven that drugs, including marijuana, have myriad adverse health side effects. This leads to two questions: Why does the United States government continue to create lenient drug policies, and what reasons do citizens give for legalizing drugs when the medical community has proven them harmful? The paper hypothesizes that the disadvantages of drug legalization outweigh its benefits because of the numerous harms it causes, such as …


Adverse Childhood Experiences And Their Correlation To College Major, Rachel Ling Xiu Held May 2023

Adverse Childhood Experiences And Their Correlation To College Major, Rachel Ling Xiu Held

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The term adverse childhood experiences or ACEs for short, is well known in many fields of study including criminal justice, psychology, social work, and education. There are a multitude of studies that compare ACEs with other risk factors, use ACEs as a comparison tool with other behavioral issues, as well as linking ACEs to criminality, mental health disorders, and physical health. Adverse childhood experiences (ACEs) have been identified as a key risk factor for a range of negative life outcomes, including a strong correlation in juvenile delinquency and crime. Despite many works regarding adverse childhood experiences and the ACE test, …


The Impact Of The Convention On The Elimination Of Discrimination Against Women On Ecuador's Domestic Policy, Brittani Stiltner Apr 2023

The Impact Of The Convention On The Elimination Of Discrimination Against Women On Ecuador's Domestic Policy, Brittani Stiltner

Student Symposium

In 1979, Ecuador became one of the first Latin American countries to ratify the Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW). In this paper, I use Ecuador as a case study for analyzing the effectiveness of international human rights treaties on the countries that ratify them, looking specifically into the impact the CEDAW had on Ecuador’s domestic policies and action it has taken to expand women’s rights since 1979. I begin by giving a historical basis for the culture and political organization of the country due to colonization. I then articulate Ecuador as a leader …


Patterns Of Domestic Violence And Abuse Within Intimate Relationships, Ryeana Klopfenstein Apr 2023

Patterns Of Domestic Violence And Abuse Within Intimate Relationships, Ryeana Klopfenstein

Liberty University Research Week

Undergraduate

Textual or Investigative


Smss, Gaming, Social Media, And Cyber Trafficking, Rachel Held Apr 2023

Smss, Gaming, Social Media, And Cyber Trafficking, Rachel Held

Liberty University Research Week

Undergraduate

Theoretical Proposal


Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr Apr 2023

Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr

Cybersecurity Undergraduate Research Showcase

According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).

The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …


Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter Mar 2023

Healthcare Facilities: Maintaining Accessibility While Implementing Security, Ryan Vilter

UNO Student Research and Creative Activity Fair

In the wake of the Tulsa, Oklahoma hospital shooting in the summer of 2022, it was made clear that more security needed to be implemented in healthcare facilities. As a result, I inquired: What is the happy balance for healthcare facilities to maintain their accessibility to the public while also implementing security measures to prevent terrorist attacks? With that base, I give recommendations in the areas of cybersecurity, physical infrastructure, and physical and mental health, based off the existing literature and data gathered from terrorist attacks against hospitals over several decades.


Sticky Situations: Understanding The Law And Life, Krystal Banks Mar 2023

Sticky Situations: Understanding The Law And Life, Krystal Banks

National Youth Advocacy and Resilience Conference

Law and life go hand in hand. Understanding the law and how it connects to life can be an effective tool in teaching youth and adults the value of making good decisions when it comes to life and the law. Sticky Situations places real-world situations in the context of learning how to apply the law and effectively respond to life's sticky situations.


Session 8: Ensemble Of Score Likelihood Ratios For The Common Source Problem, Federico Veneri, Danica M. Ommen Feb 2023

Session 8: Ensemble Of Score Likelihood Ratios For The Common Source Problem, Federico Veneri, Danica M. Ommen

SDSU Data Science Symposium

Machine learning-based Score Likelihood Ratios have been proposed as an alternative to traditional Likelihood Ratios and Bayes Factor to quantify the value of evidence when contrasting two opposing propositions.

Under the common source problem, the opposing proposition relates to the inferential problem of assessing whether two items come from the same source. Machine learning techniques can be used to construct a (dis)similarity score for complex data when developing a traditional model is infeasible, and density estimation is used to estimate the likelihood of the scores under both propositions.

In practice, the metric and its distribution are developed using pairwise comparisons …


The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt Jan 2023

The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt

Posters-at-the-Capitol

Current legislation and policies are not effective enough to fight human trafficking as it continues to change and evolve worldwide. Human trafficking is not just sex trafficking; labor trafficking, organ trafficking, people smuggling, and forced criminal activities. This evolving and changing global issue continues to grow into a highly profitable "business." Overseas, many countries struggle to handle this issue, and some countries do not handle it at all. The United States has a major human trafficking problem that will continue to worsen unless there is a change in the government. The U.S. Congress should be more focused on the growing …


Smoke But No Fire: Convicting The Innocent Of Crimes That Never Happened, Autumn Huber Dec 2022

Smoke But No Fire: Convicting The Innocent Of Crimes That Never Happened, Autumn Huber

Symposium of Student Scholars

“Smoke but no Fire” published by Jessica Henry provides various discussions of no-crime wrongful convictions of those who are innocent. Throughout this novel, the evaluation of forensic error, police roles, judiciary roles, and misdemeanors bring to light the phantom crimes that occur within our criminal justice system. The criminal justice system brings the injustice of those wrongfully convicted to the eyes of readers worldwide. Part of this research provided throughout her novel includes the National Registry of Exonerations, short for NRE, which assesses evidence of exonerations of those who were innocent and those who remain inside the four walls of …


Evaluating The New York State Bail Reform Act: What Impact Does It Have On Law Enforcement?, Nicholas Cole Apr 2022

Evaluating The New York State Bail Reform Act: What Impact Does It Have On Law Enforcement?, Nicholas Cole

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Protecting Violent Free Speech And Combatting True Homicidal Threats In Cyberspace, Aimee Lillie Apr 2022

Protecting Violent Free Speech And Combatting True Homicidal Threats In Cyberspace, Aimee Lillie

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Sacrificing Liberty For Security, Samuel Whatley Ii Apr 2022

Sacrificing Liberty For Security, Samuel Whatley Ii

Helm's School of Government Conference - American Revival: Citizenship & Virtue

This paper attempts to address ongoing problems associated with the U.S. justice system as it relates to collaboration with state and local agencies. Also, some focus areas will include management, policy, and evidence-based programs that are needing to be addressed.


How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson Apr 2022

How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson

Cybersecurity Undergraduate Research Showcase

As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.


Bars To Bridges: Culturally Responsive Education Advocacy, Micaella Flores, Christine Otto Mar 2022

Bars To Bridges: Culturally Responsive Education Advocacy, Micaella Flores, Christine Otto

National Youth Advocacy and Resilience Conference

We'll explore tangible ways to advocate for BIPOC students who've experienced educational disruptions. We’ll discuss the methods and model The Bars to Bridges Program uses to successfully transition justice involved youth into their academic settings and maintain engagement in education.


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …