Open Access. Powered by Scholars. Published by Universities.®

Forensic Science and Technology Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Discipline
Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 395

Full-Text Articles in Forensic Science and Technology

Understandings Of Vulnerability And Social Determinants Of Health In Forensic And Expert Social Anthropology: A Scoping Review, James W. W. Rose, David M. Tran Apr 2024

Understandings Of Vulnerability And Social Determinants Of Health In Forensic And Expert Social Anthropology: A Scoping Review, James W. W. Rose, David M. Tran

The Qualitative Report

Forensic and expert social anthropology (FESA) is a branch of social anthropology that specialises in the provision of evidence to legal-administrative processes, which are overseen by courts and other legally empowered bodies, and which give regard to the social cultures of legally and administratively involved individuals and communities (LAIICs). Despite a preoccupation with political advocacy in the broader philosophy of social anthropology, FESA literature does not typically give regard to LAIIC vulnerability defined qualitatively in terms of social determinants of health, including physical, mental, and social well-being. This paper presents findings from a JBI/PRISMA-ScR scoping review of n=1,674 texts, identifying …


Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee Feb 2024

Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.


Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones Feb 2024

Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones

International Journal of Cybersecurity Intelligence & Cybercrime

Doubleday released Andy Greenberg’s Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency in November 2022. Through vivid case studies of global criminal investigations, the book dispels myths about the anonymizing power of cryptocurrency. The book details how the ability to identify cryptocurrency users and payment methods successfully brought down several large criminal empires, while also highlighting the continuous cat-and-mouse game between law enforcement officials and criminal actors using cryptocurrency. The book is an excellent resource for law enforcement officials, academics, and general cybersecurity practitioners interested in cryptocurrency-related criminal activities and law enforcement techniques.


2023 Ulm Student Research Symposium Proceedings, Burton Ashworth Jan 2024

2023 Ulm Student Research Symposium Proceedings, Burton Ashworth

Multidisciplinary Psychology: A Journal of Collaboration

This is the results and proceedings from the 2023 ULM Student Research Symposium.


Who Owns Children’S Dna?, Nila Bala Dec 2023

Who Owns Children’S Dna?, Nila Bala

Michigan Law Review

In recent years, DNA has become increasingly easy to collect, test, and sequence, making it far more accessible to law enforcement. While legal scholars have examined this phenomenon generally, this Article examines the control and use of children’s DNA, asking who ultimately owns children’s DNA. I explore two common ways parents—currently considered “owners” of children’s DNA— might turn over children’s DNA to law enforcement: (1) “consensual” searches and (2) direct-to-consumer testing. My fundamental thesis is that parental consent is an insufficient safeguard to protect a child’s DNA from law enforcement. At present, the law leaves parents in complete control of …


Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo Aug 2023

Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo

International Journal of Cybersecurity Intelligence & Cybercrime

The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …


Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi Aug 2023

Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi

International Journal of Cybersecurity Intelligence & Cybercrime

Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.


Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi Aug 2023

Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi

International Journal of Cybersecurity Intelligence & Cybercrime

Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …


Blood’S Evidentiary Value Based On Its Biological And Physical Properties, Samantha Boman May 2023

Blood’S Evidentiary Value Based On Its Biological And Physical Properties, Samantha Boman

Themis: Research Journal of Justice Studies and Forensic Science

Prior to 1955, bloodstain evidence was considered to be unreliable and therefore inadmissible in a court of law. Today, DNA profiles can be derived from leukocytes, which comprise less than 1% of our total blood volume. Aside from genetic profiles, the biological and physical properties of blood can reveal a great deal to investigators. The first landmark case to utilize blood’s class characteristics reliably was in the State of Ohio vs. Samuel Sheppard. This paper explains how viscosity, surface tension, flow, velocity, and Newtonian laws of motion can be used to determine: the relative locations of victims and offenders, handedness …


Advancements In Technology To Solve Cold Cases, Melissa Hernandez May 2023

Advancements In Technology To Solve Cold Cases, Melissa Hernandez

Themis: Research Journal of Justice Studies and Forensic Science

The purpose of this paper is to highlight the crisis of cold case investigations and discuss the advancements being made in this area over the last four decades. Technology such as CCTV cameras, DNA Phenotyping, and Genetic Genealogy have allowed many cases to be reopened but there are still not enough resources or funds to close the immense number of unsolved cases. There are also ethical concerns being addressed to allow for this technology to continue to be applicable. In some instances, it takes a combination of preexisting technology and new applications to work around previous barriers in investigations. Despite …


Examining The Relationship Between Legal Systems And Forensic Science: Current Issues And Proposed Solutions, Rowan Dunton May 2023

Examining The Relationship Between Legal Systems And Forensic Science: Current Issues And Proposed Solutions, Rowan Dunton

Themis: Research Journal of Justice Studies and Forensic Science

Forensics and legal systems are often seen working together, but the relationship between the two disciplines is thornier and more complex than it may appear on the surface. This paper will examine why courtrooms struggle to accommodate forensic fields, how the nature of science can impede its utilization in court, and where legal education may fall short in educating students about the forensic sciences. After the literature is reviewed, solutions will be proposed to address each area of concern. Where possible, these solutions expand on existing infrastructure and ideas to make them easier to incorporate. Since the greater-scope issue is …


Discovering A Pathway To Reestablishing Policing By Consent In The United States, Everett Glynn May 2023

Discovering A Pathway To Reestablishing Policing By Consent In The United States, Everett Glynn

Themis: Research Journal of Justice Studies and Forensic Science

Policing in the 21st century faces issues with leadership and accountability within officer ranks. Police organizations increasingly resemble paramilitary organizations, from their hierarchy to their eagerness to use force. Investigations into the conduct of the Minneapolis, Chicago, and Ferguson police departments uncover widespread, paternal issues of abuse from police officers. The abuse includes paternal excessive force, discrimination, and even the social media targeting of community members of color Solutions proposed from President Obama’s Task Force on 21st Century Policing, combined with a proposition to espouse Sir Robert Peel’s Principles of community policing, offer a pathway toward regaining the …


The Crisis Of Femicides In Mexico, Alejandra Vela May 2023

The Crisis Of Femicides In Mexico, Alejandra Vela

Themis: Research Journal of Justice Studies and Forensic Science

Femicides are a growing issue in Mexico. These murders are intertwined with the incompetence of authorities, poverty, corruption, and organized crime. Authorities tend to blame victims by not taking missing reports seriously, nor do they conduct searches in these urgent situations. Authorities do not have DNA databases, space in morgues, and have little forensic science training. Ways of identifying remains involve odontology, bitemarks, and saliva. These provide a means of identifying through individual characteristics and DNA. Evidence is usually mishandled and not tested, or purposely lost to stop the investigation, thus, involving corruption. Criminal organizations, known as cartels, bribe authorities …


Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler Mar 2023

Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler

International Journal of Cybersecurity Intelligence & Cybercrime

This research aims to explore the influence of news media on the fear of cyberterrorism and how cyberterrorism is framed in the media. Using a mixed-method approach as a research strategy, this paper reports on two studies that explore the influence of news reading on the fear of cyberterrorism. The first study analyzed survey responses from 1,190 participants and found that increased exposure to reading news media was associated with increased fear of cyberterrorism. The second study, built on the first, sought to investigate how cyberterrorism is framed and constructed as a threat by the US local and national newspapers. …


Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins Mar 2023

Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins

International Journal of Cybersecurity Intelligence & Cybercrime

The difference in depression between non-cyberbullied and cyberbullied youth is not well understood. To describe the prevalence and trends in depression among cyberbullied adolescents. Using cross-sectional, nationally-representative data from the YRBS 2011 - 2019, we estimated the prevalence and trends of depression across the total years and within cyberbullied groups that include biological sex and race and ethnicity among adolescents. The results indicated the prevalence of depression was higher among those that were cyberbullied. Within the cyberbullied groups the total trend was higher than the non-cyberbullied, females had a higher prevalence of depression than males, and Hispanics had a higher …


New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens Mar 2023

New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens

International Journal of Cybersecurity Intelligence & Cybercrime

This editorial introduction will present an overview of the four articles contained in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The articles examine the profiling of hackers, the role of the media in shaping public perceptions of cyberterrorism, research trends in cybersecurity and cybercrime, as well as the impacts of cyberbullying.


Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke Mar 2023

Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke

International Journal of Cybersecurity Intelligence & Cybercrime

Studies on cybercrime and cybersecurity have expanded in both scope and breadth in recent years. This study offers a bibliometric review of research trends in cybercrime and cybersecurity over the past 26 years (1995-2021) based on Web of Science core collection database. Specifically, we examine the growth of scholarship and the expanded scope of subject categories and relevant journals. We also analyze the research collaboration network based on authors’ affiliated institutions and countries. Finally, we identify major topics within the fields, how each topic relates to – and diverges from – one another, and their evolution over time. Overall, we …


Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld Mar 2023

Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld

International Journal of Cybersecurity Intelligence & Cybercrime

Recently, it seems as if hacking-related stories can be found in the news every day. To study, and hopefully prevent, this new type of crime, the field of cyber criminology has emerged. This study adds to the existing cybercrime literature by examining hacking behavior specifically. It determines if there is a relationship between the age, gender, and nationality of hackers and characteristics of the cyberattacks that they perpetrate. To do this, this study analyzes 122 United States Department of Justice (USDOJ) press reports from January 2019 to December 2021. Some key results include the finding that older hackers and international …


Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park Nov 2022

Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park

International Journal of Cybersecurity Intelligence & Cybercrime

Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.


Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller Nov 2022

Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller

International Journal of Cybersecurity Intelligence & Cybercrime

Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …


Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa Nov 2022

Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa

International Journal of Cybersecurity Intelligence & Cybercrime

The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …


Book Review: Digital Forensics And Cyber Investigation Nov 2022

Book Review: Digital Forensics And Cyber Investigation

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee Aug 2022

Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Kerberoasting, an attack vector aimed at the Kerberos authentication protocol, can be used as part of an adversary’s attack arsenal. Kerberos is a type of network authentication protocol that allows a client and server to conduct a mutual verification before providing the requested resource to the client. A successful Kerberoasting attack allows an adversary to leverage the architectural limitations of Kerberos, providing access to user password hashes that can be subject to offline cracking. A cracked user password could give a bad actor the ability to maintain persistence, move laterally, or escalate privileges in a system. Persistence or movement within …


Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti Aug 2022

Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti

International Journal of Cybersecurity Intelligence & Cybercrime

Cryptography has been applied to a range of modern technologies which criminals also exploit to gain criminal rewards while hiding their identity. Although understanding of cybercrime involving this technique is necessary in devising effective preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles, featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, that will enhance our understanding of cryptography-related crime, ranging from cryptocurrency and darknet market to password-cracking. The articles were presented by the winners of the student paper competition at the 2022 International …


Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee Aug 2022

Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions …


An Interview With Dr. Steven Lee: Scientist, Jazz Musician, Athlete, Wine Connoisseur, And Founder And Former Director Of The Forensic Science Program At Sjsu, Steven Lee May 2022

An Interview With Dr. Steven Lee: Scientist, Jazz Musician, Athlete, Wine Connoisseur, And Founder And Former Director Of The Forensic Science Program At Sjsu, Steven Lee

Themis: Research Journal of Justice Studies and Forensic Science

No abstract provided.


The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann Mar 2022

The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann

International Journal of Cybersecurity Intelligence & Cybercrime

Criminologists and psychologists have long recognized that parenting practices can affect childhood outcomes and the development of moral beliefs in children. Another body of literature provides evidence that morality is a key cause of antisocial behavior. Yet, a noticeable gap in this line of work has been testing the mediation effects of parenting practices on cyberbullying via moral beliefs. Using a sample of South Korean adolescents, we tested whether moral beliefs mediate the relationships between parenting practices and cyberbullying perpetration. Results show that parental supervision and excessive parenting can influence cyberbullying perpetration and that the impact of parenting practices is …


Understanding Cybercrime Offending And Victimization Patterns From A Global Perspective, Jin R. Lee Mar 2022

Understanding Cybercrime Offending And Victimization Patterns From A Global Perspective, Jin R. Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercrime research within criminology and criminal justice sciences has increased over the past few decades, improving the knowledge and evidence-base around cybercrime offending and victimization generally. While earlier cybercrime studies were based primarily in the United States, there has been a recent surge in studies using international samples and multidisciplinary approaches to understand cybercrime patterns. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime consists of four articles that seek to advance our understanding of cybercrime behaviors from a global perspective. To that end, the objective of this paper is to provide a brief overview of the …


Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos Mar 2022

Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos

International Journal of Cybersecurity Intelligence & Cybercrime

The proliferation of internet technologies has shaped interactions in contemporary society. Despite the pivotal importance of the internet to the global economy, it has several negative consequences such as internet fraud. This study examined the perception that young adults in Nigeria hold about internet fraud as an innovative means to economic survival rather than as a criminal enterprise. Robert Merton’s Anomie/Strain Theory (AST) was adopted as the theoretical thrust of the study. Adopting a qualitative data collection method, 15 participants were selected using the non-probabilistic purposive and snowballing techniques while opinions were sampled through in-depth interviews in different locations within …


Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz Mar 2022

Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz

International Journal of Cybersecurity Intelligence & Cybercrime

As threat actor operations become increasingly sophisticated and emphasize the targeting of critical infrastructure and services, the need for cybersecurity information sharing will continue to grow. Escalating demand for cyber threat intelligence and information sharing across the cybersecurity community has resulted in the need to better understand the information produced by reputable sources such as U.S. CISA Alerts and ICS-CERT advisories. The text analysis program, Profiler Plus, is used to extract information from 1,574 U.S. government alerts and advisories to develop visualizations and generate enhanced insights into different cyber threat actor types, the tactics which can be used for cyber …