Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Criminology and Criminal Justice Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Law enforcement (2)
- Burglary (1)
- Consequences (1)
- Criminology (1)
- Criticality (1)
-
- Digital evidence (1)
- Digital forensics (1)
- Effectiveness (1)
- First responder (1)
- Handling evidence (1)
- Information Technology (1)
- Information science (1)
- Information technology (1)
- Inimical (1)
- Management expectations (1)
- Network forensics (1)
- Patrol officer (1)
- Police (1)
- Police opinion (1)
- Property marking (1)
- Risk (1)
- Router forensics (1)
- Saturation (1)
- Security Management (1)
- Situational crime prevention (1)
- Stealing (1)
- Threat (1)
- Vulnerability (1)
- Wi-Fi routers (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Criminology and Criminal Justice
Digital Forensics And Community Supervision: Making A Case For Field Based Digital Forensics Training, Christopher Michael Flory
Digital Forensics And Community Supervision: Making A Case For Field Based Digital Forensics Training, Christopher Michael Flory
Open Access Theses
In this paper I will review the literature concerning investigator digital forensics models and how they apply to field investigators. A brief history of community supervision and how offenders are supervised will be established. I will also cover the difference between community supervision standards and police standards concerning searches, evidence, standards of proof, and the difference between parole boards and courts. Currently, the burden for digital forensics for community supervision officers is placed on local or state law enforcement offices, with personnel trained in forensics, but may not place a high priority on outside cases. Forensic field training for community …
Volume 07, Rachel C. Lombardi, Ben Osterhout, Lindsay Graybill, Rebecca E. Dey, Skyler T. Carpenter, Emma Beckett, Jason Ware, Mollie Andrews, James Bates, Landon Cooper, Tiffani Jeffries, Maria Wheaton, Dallas Price, Laura Kahler, Sarah Charlton, Anna Bultrowicz, Emily Spittle, Erin Godwin, Eamon Brokenbrough
Volume 07, Rachel C. Lombardi, Ben Osterhout, Lindsay Graybill, Rebecca E. Dey, Skyler T. Carpenter, Emma Beckett, Jason Ware, Mollie Andrews, James Bates, Landon Cooper, Tiffani Jeffries, Maria Wheaton, Dallas Price, Laura Kahler, Sarah Charlton, Anna Bultrowicz, Emily Spittle, Erin Godwin, Eamon Brokenbrough
Incite: The Journal of Undergraduate Scholarship
Introduction from Interim Dean Dr. Jennifer Apperson
Spatial Analysis of Potential Risk Factors Associated with Addition of Atlantic Coast Pipeline Through Virginia by Rachel C. Lombardi
"Delicate Matters with No Speaking," "Hope and Nothing," "Mono Duality" by Ben Osterhout
"Connect" Graphic Design Senior Project by Lindsay Graybill
Phenolic Acids in Brassicaceae Plants: Ovipositional Stimulants or Deterrents for Cabbage White Butterfly, Pieris Rapae? by Rebecca E. Dey And Skyler T. Carpenter
"Abecedarian Cards" by Emma Beckett, Jason Ware, And Mollie Andrews
Helvetica: A Type Specimen Book by James Bates, Landon Cooper, Tiffani Jeffries, And Maria Wheaton
“Things Left Behind” by Dallas …
Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey
Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey
Australian Security and Intelligence Conference
Security is a necessary cost for businesses wishing to operate in the developing economy of Papua New Guinea. The country continues to face levels of crime and violence out of proportion to other East Asian countries; which deters many would be investors. However, the potential in PNG is vast and eagerly sought after despite the high costs required to operate without harm, therefore, it is necessary manage the security situation. Experience from similar countries has shown by using optimal security management systems and structures it is possible to work safely, securely and effectively, but this requires a comprehensive security, threat …
Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson
Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson
Australian Security and Intelligence Conference
Burglary and stealing are crimes that have a significant impact and cost on its victims and society. To mitigate such crimes, property marking is a situational crime prevention strategy that attempts to prevent through dissuasion. There are many forms of property marking, yet there is limited research of its efficacy. Where there have been such studies, there has been some indications of success. Therefore, the study assessed the efficacy of property marking to reduce burglary and stealing crimes. The study undertook a quantitate approach using non-equivalent control groups to assess the geo-spatial impact of property marking when applied at a …
The Challenges Of Seizing And Searching The Contents Of Wi-Fi Devices For The Modern Investigator, Dan Blackman, Patryk Szewczyk
The Challenges Of Seizing And Searching The Contents Of Wi-Fi Devices For The Modern Investigator, Dan Blackman, Patryk Szewczyk
Australian Digital Forensics Conference
To the modern law enforcement investigator, the potential for an offender to have a mobile device on his or her person, who connects to a Wi-Fi network, may afford evidence to place them at a scene, at a particular time. Whilst tools to interrogate mobile devices and Wi-Fi networks, have undergone significant development, little research has been conducted with regards to interrogating Wi-Fi routers and the evidence they may contain. This paper demonstrates that multiple inhibiting factors exist for forensic investigators when attempting to extract data from Wi-Fi routers at the scene. Data volatility means the Wi-Fi router cannot be …
Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil
CCE Theses and Dissertations
This research examined opinions of local law enforcement agencies’ patrol officers in the State of Georgia regarding preparedness and expectations for handling of digital evidence. The increased criminal use of technology requires that patrol officers be prepared to handle digital evidence in many different situations. The researcher’s goal was to gain insight into how patrol officers view their preparedness to handle digital evidence as well as their opinions on management expectations regarding patrol officers’ abilities to handle digital evidence. The research focused on identifying whether a gap existed between patrol officers’ opinions of digital evidence and the patrol officers’ views …