Open Access. Powered by Scholars. Published by Universities.®
Forensic Science and Technology Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (28)
- Computer Sciences (18)
- Information Security (17)
- Criminology and Criminal Justice (15)
- Engineering (14)
-
- Computer Engineering (12)
- Sociology (11)
- Chemistry (10)
- Electrical and Computer Engineering (9)
- Life Sciences (9)
- Criminology (8)
- Analytical Chemistry (6)
- Medicine and Health Sciences (6)
- Law (4)
- Anatomy (3)
- Genetics and Genomics (3)
- Pharmacology, Toxicology and Environmental Health (3)
- Toxicology (3)
- Anthropology (2)
- Biological and Physical Anthropology (2)
- Biology (2)
- Computer and Systems Architecture (2)
- Constitutional Law (2)
- Criminal Law (2)
- Digital Communications and Networking (2)
- Psychology (2)
- Science and Technology Studies (2)
- Institution
-
- University of New Haven (22)
- City University of New York (CUNY) (14)
- Bridgewater State University (7)
- San Jose State University (6)
- University of Mississippi (4)
-
- Selected Works (3)
- West Virginia University (3)
- Embry-Riddle Aeronautical University (2)
- Pace University (2)
- University at Albany, State University of New York (2)
- University of Central Florida (2)
- University of Nebraska - Lincoln (2)
- Virginia Commonwealth University (2)
- Boise State University (1)
- Eastern Kentucky University (1)
- Edith Cowan University (1)
- Grand Valley State University (1)
- State University of New York College at Buffalo - Buffalo State College (1)
- University of Tennessee, Knoxville (1)
- Wayne State University (1)
- Keyword
-
- Forensic science (8)
- Cybercrime (4)
- DNA (4)
- Digital forensics (4)
- Forensics (3)
-
- Artificial intelligence (2)
- Attacks (2)
- Blockchain (2)
- Cryptocurrency (2)
- DNA analysis (2)
- Daubert (2)
- Distributed storage attacks (2)
- Fibers (2)
- Fingerprints (2)
- Frameup (2)
- Law enforcement (2)
- Security (2)
- Touch DNA (2)
- Virtual reality (2)
- 1 (1)
- 2 indanedione (1)
- Absortion (1)
- Accuracy (1)
- Adhesive (1)
- Admissibility (1)
- Analytical Chemistry (1)
- Antidepressant drugs (1)
- Antipsychotics (1)
- Applications (1)
- Applied Psychology (1)
- Publication
-
- Student Theses (14)
- Master's Theses (10)
- Electrical & Computer Engineering and Computer Science Faculty Publications (8)
- Honors Theses (7)
- International Journal of Cybersecurity Intelligence & Cybercrime (7)
-
- Themis: Research Journal of Justice Studies and Forensic Science (5)
- Forensic Science Publications (4)
- David Dampier (3)
- Graduate Theses, Dissertations, and Problem Reports (3)
- Honors College Theses (2)
- Annual ADFSL Conference on Digital Forensics, Security and Law (1)
- Biology Faculty Publications and Presentations (1)
- CURCE Annual Undergraduate Conference (1)
- EURēCA: Exhibition of Undergraduate Research and Creative Achievement (1)
- Electronic Theses and Dissertations (1)
- Faculty Publications (1)
- Forensic Science Theses (1)
- Honors Undergraduate Theses (1)
- Human Biology Open Access Pre-Prints (1)
- Journal of Digital Forensics, Security and Law (1)
- Library Philosophy and Practice (e-journal) (1)
- Masters Theses (1)
- Online Theses and Dissertations (1)
- Research outputs 2014 to 2021 (1)
- University Libraries Faculty Scholarship (1)
- Publication Type
Articles 1 - 30 of 78
Full-Text Articles in Forensic Science and Technology
Effect Of 17a - Ethynylestradiol On The Pupation Rate, Emergence Rate, And Sex Ratio Of Phormia Regina (Calliphoridae), Bethany K. Hoschar
Effect Of 17a - Ethynylestradiol On The Pupation Rate, Emergence Rate, And Sex Ratio Of Phormia Regina (Calliphoridae), Bethany K. Hoschar
Honors Theses
After death, blowflies are attracted to decomposing remains for feeding and reproduction purposes. Since blowflies are usually the first species to colonize a set of remains, they are important to forensic scientists when estimating the time since death. Using the knowledge of the life cycle of a blowfly and any interferences of the environment that can affect the development, forensic entomologists can estimate the time since the arrival of blowflies, otherwise considered time since deposition. This research investigated how a specific estrogen, 17 a-ethynylestradiol, present in pollutants affects the development time of blowflies, and therefore the time since death estimation. …
Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan
Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan
Electrical & Computer Engineering and Computer Science Faculty Publications
With the widespread integration of AI in everyday and critical technologies, it seems inevitable to witness increasing instances of failure in AI systems. In such cases, there arises a need for technical investigations that produce legally acceptable and scientifically indisputable findings and conclusions on the causes of such failures. Inspired by the domain of cyber forensics, this paper introduces the need for the establishment of AI Forensics as a new discipline under AI safety. Furthermore, we propose a taxonomy of the subfields under this discipline, and present a discussion on the foundational challenges that lay ahead of this new research …
Evaluation Of Dna From Blood And Saliva Overtime, Janine Smalling
Evaluation Of Dna From Blood And Saliva Overtime, Janine Smalling
Honors Theses
In this research, we will examine the quantity of DNA over time. In John M. Butlers, "Fundamentals of Forensic DNA Typing", he charts out the average amount of DNA extracted from different bodily fluid samples. Examples include blood, semen, saliva, urine, etc. Though valuable, the values presented are in the cases of a fresh extraction of the sample. It is important to note that in most cases when DNA is being extracted from crime scene evidence, the samples are not fresh and have been degraded to some extent. On a crime scene, time is only one of the factors affecting …
Effects Of Mercury On The Dopamine Transporter Cell Surface Expression In Pc12 Cells, Christina Hui
Effects Of Mercury On The Dopamine Transporter Cell Surface Expression In Pc12 Cells, Christina Hui
Student Theses
Environmental factors, such as heavy metal exposures, have been suggested to have an impact not only on neurodegenerative disease, such as Parkinson’s disease, but also on psychostimulants abuse and their toxicity. In this study, two questions were addressed: 1) effects of mercuric chloride on parkinsonian toxicant 1-methyl-4-phenylpyridinium (MPP+) induced cytotoxicity and 2) effects of mercuric chloride on cell surface dopamine transporter. Pheochromocytorma cells (PC12) were treated with various concentrations of mercuric chloride (0.02~2.0 ppm) for 4 hours with and without 0.1 mM MPP+. Significant potentiation of toxicity was observed when there was co-treatment with 0.5 ppm …
Evaluation Of A Novel Dna Collection Matrix Designed To Improve Recovery Of Touch Dna From Non-Porous Surfaces, Eric Ramirez
Evaluation Of A Novel Dna Collection Matrix Designed To Improve Recovery Of Touch Dna From Non-Porous Surfaces, Eric Ramirez
Student Theses
The collection of touch DNA from evidence has been a challenge in the field of Forensic Biology for decades. There are numerous collection protocols, substrates, and solutions that have been used to varying levels of success. Currently, no single method or substrate stands out as the single most effective collection protocol. The Gene Link Omni Matrix™ K105 solution is a novel collection method that can be sprayed onto the surface of non-porous evidence. The matrix dries into a film, capturing cells and cell-free DNA which can be scraped off and collected into a tube. During extraction, the matrix dissolves into …
Dna Mixture Statistics Using A Likelihood Ratio Software Tool: Effect Of Variations In Drop-Out Rates And Number Of Contributors, Felicia M. Lucero
Dna Mixture Statistics Using A Likelihood Ratio Software Tool: Effect Of Variations In Drop-Out Rates And Number Of Contributors, Felicia M. Lucero
Student Theses
Complex DNA mixtures can be very probative evidence, but comparisons to a person of interest can be affected by allelic drop-out and uncertainty regarding the number of individuals having contributed DNA to a sample. Scientific organizations such as the International Society of Forensic Genetics (Gill et al., 2006) recommend that likelihood ratios should be used to provide a statistical weight when a positive association is made between the DNA profile of a person of interest and an evidentiary DNA sample. To this effect the New York City Office of Chief Medical Examiner (OCME) developed a software program, Forensic Statistical Tool …
Catching Killers With Consumer Genetic Information, Angela Hackstadt
Catching Killers With Consumer Genetic Information, Angela Hackstadt
University Libraries Faculty Scholarship
In April 2018, Joseph James D'Angelo was arrested as a suspect in the Golden State Killer case. DNA evidence collected at a 1980 crime scene finally shed light on the murderer's identity in early 2018 when investigators turned to GEDMatch, a service that allows users to upload and share DNA data obtained from consumer genetic tests. Consumer genetic testing, DNA collection, and familial DNA searching all raise ethical and privacy concerns. If investigators are using genetic genealogy to solve cold cases, where does that leave consumers?
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
David Dampier
This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.
Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock
Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock
David Dampier
The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we have developed an architecture for a cloud-based distributed processing platform we have named Forensicloud. This architecture is designed to reduce the time taken to process digital evidence by leveraging the power of a high performance computing platform and by adapting existing tools to operate within this …
Haplotype Analysis For Irish Ancestry, Heather Miller Coyle, Robert Whiting
Haplotype Analysis For Irish Ancestry, Heather Miller Coyle, Robert Whiting
Forensic Science Publications
Forensic haplotype analysis of the male Y chromosome is currently used to establish the number of male donors in sexual assaults, the number of male bleeders in blood pattern analysis, and for ancestry correlation to genetic founder populations in biogeographic studies. In forensic laboratory applications, its primary use is for DNA profile generation with trace amounts of male DNA in the presence of excess female DNA (e.g. spermatozoa identification, male component of fingernail scrapings). Our study supports the potential use of the Y chromosome in a “dragnet” approach (most haplotypes are unique) similar to that described by Kayser in 2017 …
Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen
Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen
David Dampier
The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most costly. However, complete forensic duplication is standard practice among digital forensic laboratories.
The time it takes to complete these stages is quickly becoming a serious problem. Digital forensic laboratories do not have the resources and time to keep up with the growing demand for digital forensic examinations with the current methodologies. One solution to this problem is the use of pre-examination techniques …
An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing
An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing
International Journal of Cybersecurity Intelligence & Cybercrime
Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it. …
Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett
Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett
International Journal of Cybersecurity Intelligence & Cybercrime
The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack …
The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade
The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade
International Journal of Cybersecurity Intelligence & Cybercrime
New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies …
A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander
A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander
International Journal of Cybersecurity Intelligence & Cybercrime
This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant effects …
A Microspectra Analysis Of Synthetic Wig Fibers, Jaclyn R. Beshlian
A Microspectra Analysis Of Synthetic Wig Fibers, Jaclyn R. Beshlian
Student Theses
The goal of this study was to determine whether differentiation between 20 visually similar light brown synthetic wig fibers was possible with the use of a microspectrophotometer (MSP). Visually similar fibers were chosen to display the power of the instrument over the human eye. An MSP is an instrument that has the ability to aid in the analysis of certain microscopical samples. With this particular instrument one is able to collect the absorption and fluorescence spectra of microscopical colored samples without destroying the piece of evidence itself. Prior to any analysis with the MSP, the material of the fibers was …
Dna Recovery From Handwritten Documents Using A Novel Vacuum Technique, Patrick M. Mclaughlin
Dna Recovery From Handwritten Documents Using A Novel Vacuum Technique, Patrick M. Mclaughlin
Student Theses
Investigations of many crimes such as robberies, kidnappings, and terrorism are often associated with the recovery of a paper document which has been written by the perpetrator. Paper can provide a variety of forensic evidence such as DNA, latent fingermarks, and indented writing. The focus of this study was the collection of probative DNA profiles from the text region of a handwritten note through a vacuum suction device without altering or destroying the document. Collection of DNA evidence was carried out in two separate groups. The first group involved 11 volunteers providing a handwritten note sample with unwashed hands. The …
An Exploration Of Protein And Dna Components In Fingerprint Residue, Ashley Borrego
An Exploration Of Protein And Dna Components In Fingerprint Residue, Ashley Borrego
Student Theses
The main focus of this project was to investigate the protein and DNA components in both sebaceous and eccrine fingerprints. This study investigated the relative content of DNA and proteins in eccrine fingerprints to sebaceous fingerprints. All volunteers were instructed to wash and dry their hands prior to depositing parallel thumbprints. Twenty volunteers were instructed to touch their face to produce sebaceous prints, and 5 volunteers were instructed to wear gloves over a heat source to produce sweaty or eccrine prints. Microscopy was used to score the cellular debris of the right fingerprint on a scale of 1-4 based on …
Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh
Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh
Library Philosophy and Practice (e-journal)
Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based …
Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang
Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang
Electrical & Computer Engineering and Computer Science Faculty Publications
The ongoing popularity of health and fitness applications catalyzes
the need for exploring forensic artifacts produced by them. Sensitive
Personal Identifiable Information (PII) is requested by the applications
during account creation. Augmenting that with ongoing
user activities, such as the user’s walking paths, could potentially
create exculpatory or inculpatory digital evidence. We conducted
extensive manual analysis and explored forensic artifacts produced
by (n = 13) popular Android mobile health and fitness applications.
We also developed and implemented a tool that aided in the timely
acquisition and identification of artifacts from the examined applications.
Additionally, our work explored the type of …
Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili
Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …
Ethical Implications Of Codis, Lucy Grogan
Ethical Implications Of Codis, Lucy Grogan
Masters Theses
CODIS stores and maintains numerous DNA profiles, and is used as a tool by the criminal justice system in order to help solve crime. Deoxyribonucleic Acid, or DNA for short, is the genetic material that an individual inherits from one’s parents (NIH, 2019). Certain portions of this genetic material are selected for use within the CODIS database due to their lack of medically relevant information. There is an immense amount of power associated with DNA and the CODIS database that it is held within, which allows for many ethical issues to arise. In order to create a usable and safe …
The Development And Use Of Computational Tools In Forensic Science, Dennis E. Slice
The Development And Use Of Computational Tools In Forensic Science, Dennis E. Slice
Human Biology Open Access Pre-Prints
Modern computational resources make available a rich toolkit of statistical methods that can be applied to forensic questions. This toolkit is built on the foundation of statistical developments dating back to the 19th century. To fully and effectively exploit these developments, both the makers and users of software must be keenly aware of the quality, i.e., the accuracy and precision, of the data being modeled or analyzed, and end-users must be sufficiently familiar with the underlying theory to understand the process and results of any analysis or software they use. This is especially important for medico-legal personnel who might be …
Correcting Forensic Dna Errors, Greg Hampikian
Correcting Forensic Dna Errors, Greg Hampikian
Biology Faculty Publications and Presentations
DNA mixture interpretation can produce opposing conclusions by qualified forensic analysts, even within the same laboratory. The long-delayed publication of the National Institutes of Standards and Technology (NIST) study of 109 North American crime laboratories in this journal demonstrates this most clearly. This latest study supports earlier work that shows common methods such as the Combined Probability of Inclusion (CPI) have wrongly included innocent people as contributors to DNA mixtures.The 2016 President’s Council of Advisors on Science and Technology report concluded,“In summary, the interpretation of complex DNA mixtures with the CPI statistic has been an inadequately specified—and thus inappropriately subjective—method. …
Method Development And Validation For The Determination Of Designer Benzodiazepines In Blood By Lc-Ms/Ms, Victoria Mei
Method Development And Validation For The Determination Of Designer Benzodiazepines In Blood By Lc-Ms/Ms, Victoria Mei
Student Theses
The misuse of designer benzodiazepines, as an alternative to prescription benzodiazepines and for drug-facilitated sexual assaults, has emerged as a growing threat, due in part to the ease of purchasing these drugs on the internet at low prices. Causing concern for safety, is the lack of dosage information resulting in users self-medicating, often leading to unintended overdoses, coma, or death at higher doses. With limited published data regarding quantification of designer benzodiazepines in forensic cases, a method was validated for the determination of thirteen and screening for two designer benzodiazepines in blood, in addition to a limited number of common …
The Forensic Analysis Of Children's Temporary Tattoos, Erika Bravo
The Forensic Analysis Of Children's Temporary Tattoos, Erika Bravo
Student Theses
While children’s temporary tattoos have been produced since the 20th century, there are few scientific studies that have evaluated their physical and chemical characteristics. Therefore, this thesis is a preliminary study done to evaluate the composition of children’s temporary tattoos and consider the importance of such traces in a forensic content.
Colored regions in children’s temporary tattoos, such as red, pink, yellow and orange, were found to fluoresce with the use of an alternative light source while the use of microscopy led to the identification of different printing patterns between temporary tattoos. However, limitations in the ability to determine the …
The Forensic Analysis Of Adult Temporary Tattoos, Paige Cooper
The Forensic Analysis Of Adult Temporary Tattoos, Paige Cooper
Student Theses
Adult temporary tattoos have become more popular, yet there is very little research on them, especially regarding their use in forensics. This poses a problem because forensic investigators may not be able to distinguish a temporary tattoo from a real tattoo, possibly hindering their investigation. In this study, various types of adult temporary tattoos were examined and analyzed in attempts to identify and distinguish them, both from each other and from permanent tattoos. Infrared spectroscopy, specifically attenuated total reflection (ATR), proved to be more useful than ultra-violet visible light spectroscopy in terms of analyzing the samples. The natural adult temporary …
Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera
Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera
Student Theses
In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on what …
Simultaneous Determination Of Fourteen Antipsychotic Drugs In Whole Blood By Solid Phase Extraction And Liquid Chromatography Tandem Mass Spectrometry, Theresa M. Dawe
Simultaneous Determination Of Fourteen Antipsychotic Drugs In Whole Blood By Solid Phase Extraction And Liquid Chromatography Tandem Mass Spectrometry, Theresa M. Dawe
Student Theses
Anti-psychotic drugs are commonly prescribed to patients to treat several mental conditions, such as bipolar, schizophrenia, and manic-depressive disorder. The analysis of anti-psychotic drugs in blood is a common practice in clinical and forensic toxicology, to monitor drug treatment (therapeutic drug monitoring) or to explain the cause of the impairment or intoxication in human performance and in postmortem cases. However, most of the current studies have been performed in plasma, and a limited number in blood. We developed and validated a method to confirm and quantify a panel of commonly prescribed anti-psychotic drugs in whole blood using solid phase extraction …
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …