Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (53)
- Selected Works (44)
- University of Nebraska at Omaha (25)
- Walden University (24)
- City University of New York (CUNY) (21)
-
- University of New Haven (20)
- University of South Florida (18)
- University of Pennsylvania Carey Law School (15)
- University at Buffalo School of Law (14)
- University of Central Florida (10)
- San Jose State University (9)
- The University of Southern Mississippi (9)
- University of Nevada, Las Vegas (8)
- Illinois State University (7)
- Bowling Green State University (6)
- Maurer School of Law: Indiana University (6)
- Portland State University (6)
- St. John's University School of Law (6)
- University of Nebraska - Lincoln (6)
- Edith Cowan University (5)
- Franklin University (5)
- Montclair State University (5)
- University at Albany, State University of New York (5)
- Washington University in St. Louis (5)
- Brigham Young University Law School (4)
- California State University, San Bernardino (4)
- Eastern Kentucky University (4)
- Nova Southeastern University (4)
- University of Texas Rio Grande Valley (4)
- University of Wisconsin Milwaukee (4)
- Keyword
-
- Police (14)
- Crime (11)
- Digital forensics (10)
- Law enforcement (10)
- Policing (10)
-
- Criminal justice (8)
- Law Enforcement (8)
- Criminal law (6)
- Criminology (6)
- Education (6)
- Police crime (6)
- Punishment (6)
- Computer forensics (5)
- Intimate partner violence (5)
- Law (5)
- Police misconduct (5)
- Policy (5)
- Prison (5)
- Program evaluation (5)
- Race (5)
- Sex trafficking (5)
- Terrorism (5)
- Cyber forensics (4)
- Hobby Lobby (4)
- Human trafficking (4)
- Juvenile justice (4)
- Legislation (4)
- Mass incarceration (4)
- Recidivism (4)
- Sentencing (4)
- Publication
-
- Journal of Digital Forensics, Security and Law (31)
- Reports (25)
- Walden Dissertations and Doctoral Studies (24)
- Annual ADFSL Conference on Digital Forensics, Security and Law (21)
- Philip M Stinson (18)
-
- All Faculty Scholarship (15)
- Electronic Theses and Dissertations (14)
- Criminal Justice Faculty Publications (13)
- Dissertations, Theses, and Capstone Projects (13)
- USF Tampa Graduate Theses and Dissertations (13)
- Buffalo Law Review (11)
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- Theses and Dissertations (10)
- Themis: Research Journal of Justice Studies and Forensic Science (9)
- Honors Theses (6)
- Publications and Research (6)
- Robert M. Lombardo (6)
- The Catholic Lawyer (6)
- Criminal Justice (5)
- Dissertations (5)
- Faculty Scholarship (5)
- Learning Showcase 2016: A Celebration of Discovery, Transformation and Success (5)
- Criminal Justice Faculty Publications and Presentations (4)
- Criminology Faculty Publications (4)
- Donna M. Hughes (4)
- ETI Publications (4)
- Forensic Science Publications (4)
- Graduate Research Symposium (GCUA) (2010 - 2017) (4)
- Master's Theses (4)
- Online Theses and Dissertations (4)
- Publication Type
Articles 1 - 30 of 453
Full-Text Articles in Social and Behavioral Sciences
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
A Study Of Ohio's Correctional Institution Inspection Committee's (Ciic) Inmate Surveys, Melissa W. Burek, John Liederbach, Joelle K. Bridges
A Study Of Ohio's Correctional Institution Inspection Committee's (Ciic) Inmate Surveys, Melissa W. Burek, John Liederbach, Joelle K. Bridges
Criminal Justice Faculty Publications
Correctional facilities have a discernible "social climate," or collection of contextual properties that derive from perceptions of both staff and prisoners. These properties include the physical, organizational, social, and emotional characteristics of correctional institutions. Ohio's Correctional Institution Inspection Committee (CIIC) requested research assistance to assess the validity of their adult and youth surveys, which are administered during the CIIC's regular inspections of facilities. The purpose of this study was to assess the validity of these instruments and the process by which they are administered. The study builds on the existing line of research on prison social climate surveys.
Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe
Georgia Journal of International & Comparative Law
No abstract provided.
State Failure In Venezuela, Marcus Littman
State Failure In Venezuela, Marcus Littman
Master's Theses
The role of the state is to provide political goods such as security and an environment conducive to economic growth. The Venezuelan state is failing to provide both security and conditions capable of producing economic growth. The government has exacerbated both by enacting failed policies. I measure the economic crisis in Venezuela based on the rates of inflation, falling foreign currency reserves, the food and medical supply shortage, falling government spending, and negative GDP growth. I measure the security crisis based on the escalating rate of kidnapping, human trafficking, drug sales, smuggling, theft, gun distribution, and homicide. In this thesis, …
Woof, Joseph D. Jaafari
Woof, Joseph D. Jaafari
Capstones
About 10 percent of Americans identify as polyamorous, defined as having multiple love affairs within a single relationship. Those relationships are as diverse as they are complicated with some ranging from having multiple people within a relationship to a couple having outside individual relationships.
Within the gay world, polyamory and open relationships has become a norm, and within the gay fetish scene it’s almost a requirement.
https://drive.google.com/open?id=0B_MnWyJVYJneYVAzXzcxU2U3bFE
But polyamory has its own set of complications legally. Because in America we have a system where only one person can receive benefits (be it through marriage or blood), there are complications if, …
In The Wake Of Broken Windows Policing How Aggressive Policing Contributed To East Harlem Residents Distrust Of Police, Stephanie Daniel, Nicole Lewis, Kalalea Kalalea
In The Wake Of Broken Windows Policing How Aggressive Policing Contributed To East Harlem Residents Distrust Of Police, Stephanie Daniel, Nicole Lewis, Kalalea Kalalea
Capstones
In 2015, the East Harlem neighborhood – specifically the 25th Precinct – had the highest rate of criminal court summonses amongst residential areas. At 145 summonses for every 1,000 residents, it was more than four times the citywide average, according to an analysis of data obtained from the NYPD.
Since 2010, summonses have declined as the NYPD moves towards a more community-based approach to policing. But the Broken Windows theory has left a lasting and often negative effect on the East Harlem community.
This past fall, CUNY reporters investigated how summonses have affected the relationship between East Harlem residents and …
Op-Ed: Cops Shoot And Kill Someone About 1,000 Times A Year: Few Are Prosecuted: What Can Be Done?, Philip M. Stinson
Op-Ed: Cops Shoot And Kill Someone About 1,000 Times A Year: Few Are Prosecuted: What Can Be Done?, Philip M. Stinson
Criminal Justice Faculty Publications
No abstract provided.
A Duty To Document, Marc Kosciejew
A Duty To Document, Marc Kosciejew
Proceedings from the Document Academy
Access to information is a bedrock principle of contemporary democratic governments and their public agencies and entities. Access to information depends upon these public institutions to document their activities and decisions. When public institutions do not document their activities and decisions, citizens’ right of access is ultimately denied. Public accountability and trust, in addition to institutional memory and the historical record, are undermined without the creation of appropriate records. Establishing and enforcing a duty to document helps promote accountability, openness, transparency, good governance, and public trust in public institutions. A duty to document should therefore be a fundamental component of …
Reformers Against The Clock, William Sloan Greenawalt
Reformers Against The Clock, William Sloan Greenawalt
The Catholic Lawyer
No abstract provided.
Too Little, Too Late?, Revius O. Ortique, Jr.
Too Little, Too Late?, Revius O. Ortique, Jr.
The Catholic Lawyer
No abstract provided.
Alternate Legal Assistance Plans, John D. Robb
Alternate Legal Assistance Plans, John D. Robb
The Catholic Lawyer
No abstract provided.
Trends In Legal Services For The Poor, Junius L. Allison
Trends In Legal Services For The Poor, Junius L. Allison
The Catholic Lawyer
No abstract provided.
The O.E.O. Legal Services Program, Earl Johnson, Jr.
The O.E.O. Legal Services Program, Earl Johnson, Jr.
The Catholic Lawyer
No abstract provided.
The Winds Of Changes Shift: An Analyis Of Recent Growth In Bargaining Units And Representation Efforts In Higher Education, William A. Herbert
The Winds Of Changes Shift: An Analyis Of Recent Growth In Bargaining Units And Representation Efforts In Higher Education, William A. Herbert
Publications and Research
This article analyzes data accumulated during the first three quarters of 2016 regarding completed and pending questions of representation involving faculty and student employees in higher education. It is part of a larger and continuing National Center research project that tracks faculty and graduate student employee unionization growth and representation efforts at private and public institutions of higher learning since January 1, 2013. The data presented in this article demonstrates that the rate of newly certified units at private colleges and universities since January 1, 2016 far outpaces new units in the public sector. There has been a 25.9% increase …
Are States That Legalized Physician-Assisted Death Also More Lenient Towards Abortion?, Young Sun Kim
Are States That Legalized Physician-Assisted Death Also More Lenient Towards Abortion?, Young Sun Kim
Criminal Justice
No abstract provided.
Persona Non Grata: The Marginalization Of Legal Scholarship In Criminology And Criminal Justice Journals, Brenda I. Rowe, Wesley S. Mccann, Craig Hemmens
Persona Non Grata: The Marginalization Of Legal Scholarship In Criminology And Criminal Justice Journals, Brenda I. Rowe, Wesley S. Mccann, Craig Hemmens
Criminology and Criminal Justice Faculty Publications
Recently, concern has been voiced within the academy regarding the marginalization of legal scholarship within the criminology and criminal justice (CCJ) discipline. Although conventional wisdom and anecdotal evidence indicate that it is difficult to get legal scholarship published in CCJ journals, there is a dearth of empirical evidence on the representation of legal scholarship in CCJ journals. The present study assesses the representation of legal scholarship in 20 CCJ journals from 2005 through 2015, examining both trends over time and variation across journals. Findings indicate legal scholarship comprises a very small portion of articles published, there has been a steep …
Vocational And Life Skills Quarterly Report: Quarter 2 (October-December 2016), Uno Nebraska Center For Justice Research, Johanna Peterson, Jordan Clark
Vocational And Life Skills Quarterly Report: Quarter 2 (October-December 2016), Uno Nebraska Center For Justice Research, Johanna Peterson, Jordan Clark
Reports
The Vocational and Life Skills Program was created by Nebraska Legislative Bill 907 in 2014 with the goals of reducing recidivism and increasing employment for individuals who are incarcerated, who have been incarcerated within the prior 18 months or who are under parole or probation supervision. Participants must begin programming under these conditions, but they may continue programming as the program sees fit for his or her individual needs. Eight programs were funded in Grant Cycle 2 which runs from July 2016-June 2018. The NCJR evaluation was initiated in May 2016 with the primary goal of identifying types of programming …
Vocational And Life Skills Monthly Data Update: December 2016, Uno Nebraska Center For Justice Research, Johanna Peterson
Vocational And Life Skills Monthly Data Update: December 2016, Uno Nebraska Center For Justice Research, Johanna Peterson
Reports
Grantees use an online data management system to submit data on participants served under their Vocational and Life Skills programming. This data is due monthly and reflects all services provided during the previous month to participants. Evaluators at the Nebraska Center for Justice Research work with grantees directly to correct any data errors on an ongoing basis during monthly update calls and site visits.
Data presented below is from the monthly data pulls. Because this data comes for an active database with live data being entered and updated daily, data, including previously submitted information, may fluctuate depending on changes made …
Police Education And Training: A Comparative Analysis Of Law Enforcement Preparation In The United States And Canada, Citlali Alexandra Déverge
Police Education And Training: A Comparative Analysis Of Law Enforcement Preparation In The United States And Canada, Citlali Alexandra Déverge
Master's Theses
Police academy training for newly hired officers varies across locations and regions in regard to both training process and training content. The needs and demands of modern-day societies have evolved, and it is very important for police training academies to keep up with the practice of the police profession. Higher education adds value to police training as it reinforces the development of critical thinking skills and the necessary values needed to face the needs and demands of society, particularly in terms of accountability, professionalism, and legitimacy. This research presents a case study of two police training academies located in a …
"I Can Haz Applicants": An Analysis Of Police Recruitment And Marketing Through Social Media, Kelly Lee Helldorfer
"I Can Haz Applicants": An Analysis Of Police Recruitment And Marketing Through Social Media, Kelly Lee Helldorfer
Master's Theses
In recent decades, the Internet has flourished with the advancement of social media: apps, blogs, social networking, multimedia sources, podcasts, and more. Consequently, the Millennial Generation has grown up immersed in both the Internet and social media networks differently than previous generations. Due to the rapid expansion of social media outlets and their effects on future employees, police departments must consider their agency “brand” and how effectively they market their departments to this generation for the purpose of recruitment both on the Internet and with social media platforms.
This research analysis employed a netnography to examine 500 police websites and …
Attributes Of Police Vehicle Crashes, David Lambert
Attributes Of Police Vehicle Crashes, David Lambert
Criminal Justice Faculty Publications
While overall on-duty law enforcement deaths has decreased moderately from over 160 in 1980 to a level under 120 per year in the late 2000s, fatalities by motor vehicle collisions have steadily increased. This descriptive analysis examines police vehicle crashes during specific conditions such as emergency response, road surface, lighting, and weather in a large statewide police agency. Police vehicle crashes are most likely to occur on dry roads, in daylight conditions, and in clear weather on weekdays as opposed to weekends. Weather and lighting conditions are not the most frequent factors associated with cruiser crashes in this examination.
Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou
Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou
McKelvey School of Engineering Theses & Dissertations
Images are key to fighting sex trafficking. They are: (a) used to advertise for sex services,(b) shared among criminal networks, and (c) connect a person in an image to the place where the image was taken. This work explores the ability to link images to indoor places in order to support the investigation and prosecution of sex trafficking. We propose and develop a framework that includes a database of open-source information available on the Internet, a crowd-sourcing approach to gathering additional images, and explore a variety of matching approaches based both on hand-tuned features such as SIFT and learned features …
Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm
Punishing Genocide: A Comparative Empirical Analysis Of Sentencing Laws And Practices At The International Criminal Tribunal For Rwanda (Ictr), Rwandan Domestic Courts, And Gacaca Courts, Barbora Hola, Hollie Nyseth Brehm
Genocide Studies and Prevention: An International Journal
This article compares sentencing of those convicted of participation in the 1994 genocide in Rwanda. With over one million people facing trial, Rwanda constitutes the world’s most comprehensive case of criminal accountability after genocide and presents an important case study of punishing genocide. Criminal courts at three different levels— international, domestic, and local—sought justice in the aftermath of the violence. In order to compare punishment at each level, we analyze an unprecedented database of sentences given by the ICTR, the Rwandan domestic courts, and Rwanda’s Gacaca courts. The analysis demonstrates that sentencing varied across the three levels—ranging from limited time …