Open Access. Powered by Scholars. Published by Universities.®

Forensic Science and Technology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Forensic Science and Technology

Fabricated Forensics: Examining An Undergraduate Population’S Ability To Detect Fallacies In Crime-Based Media, Conner Davis Dec 2019

Fabricated Forensics: Examining An Undergraduate Population’S Ability To Detect Fallacies In Crime-Based Media, Conner Davis

Senior Capstone Theses

My research examines the effects of general education on students’ perspectives of the CSI effect. The CSI effect is a phenomenon in which people’s perceptions of criminal investigation are distorted from the truth because of the media’s portrayal of criminal investigation. The study sample includes undergraduate students enrolled in a Mid-Atlantic University. To quantify the degrees in which subjects are susceptible to the CSI effect, the subjects will be measured on their ability to identify basic forensic investigation flaws portrayed in three different television series. Subjects were given a worksheet, exposed to a fifteen-minute video compilation, and were told to …


An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing Sep 2019

An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing

International Journal of Cybersecurity Intelligence & Cybercrime

Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it. …


Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett Sep 2019

Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett

International Journal of Cybersecurity Intelligence & Cybercrime

The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack …


The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade Sep 2019

The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies …


A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander Sep 2019

A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander

International Journal of Cybersecurity Intelligence & Cybercrime

This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant effects …


Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh Aug 2019

Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh

Library Philosophy and Practice (e-journal)

Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based …


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


Determination Of Intersex Humans In Human Remains, Audria Payne May 2019

Determination Of Intersex Humans In Human Remains, Audria Payne

CURCE Annual Undergraduate Conference

Currently, there isn’t much research on whether forensic anthropologists include the identification of intersex humans in human remains. Forensic anthropologists tend to have varied training that is related to identifying skeletal remains, but there isn’t much research about how to identify intersex humans after death or whether they have come across intersex in skeletal remains at all, besides those they have classified as ambiguous. In this paper, I will be researching various skeletal remains to see if the current identification methods of identifying sex are accurate in identifying intersex. I will also research ambiguous and undetermined remains to see if …


A Framework To Reveal Clandestine Organ Trafficking In The Dark Web And Beyond, Michael P. Heinl, Bo Yu, Duminda Wijesekera Mar 2019

A Framework To Reveal Clandestine Organ Trafficking In The Dark Web And Beyond, Michael P. Heinl, Bo Yu, Duminda Wijesekera

Journal of Digital Forensics, Security and Law

Due to the scarcity of transplantable organs, patients have to wait on long lists for many years to get a matching kidney. This scarcity has created an illicit market place for wealthy recipients to avoid long waiting times. Brokers arrange such organ transplants and collect most of the payment that is sometimes channeled to fund other illicit activities. In order to collect and disburse payments, they often resort to money laundering-like schemes of money transfers. As the low-cost Internet arrives in some of the affected countries, social media and the dark web are used to illegally trade human organs. This …


Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim Feb 2019

Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim

International Journal of Cybersecurity Intelligence & Cybercrime

Awareness is a starting point to recognize, understand, or know a situation or fact, and the perception makes a difference in how to deal with it. Although the term cybercrime may not be new to the most public and the police, not all of them are well aware of the nature and extent of cybercrimes, cybercriminals, and cyber-victims, which in turn affects their perceptions of matters. The four papers in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime empirically examine these important topics and discuss policy implications.


Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler Feb 2019

Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler

International Journal of Cybersecurity Intelligence & Cybercrime

The ubiquity of the Internet and computer technology has enabled individuals to engage in bullying, threats, and harassing communications online. Limited research has found that local line officers may not view these offenses as serious compared to real world crimes despite their negative physical and emotional impact on victims. The perceptions of officers can produce poor interactions with victims during calls for service, particularly victim blaming, which can reduce citizens’ confidence in police agencies generally. However, local law enforcement agencies are increasingly mandated to respond to these cases, calling to question how their views may impact the community. This study …


Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke Feb 2019

Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke

International Journal of Cybersecurity Intelligence & Cybercrime

The advancement of Information and Communication Technologies (ICT) opens new avenues and ways for cybercriminals to commit crime. The primary goal of this paper is to raise awareness regarding gaps that exist with regards to Nigeria’s capabilities to adequately legislate, investigate and prosecute cases of cybercrimes. The major source of cybercrime legislation in Nigeria is an act of the National Assembly which is majorly a symbolic legislation rather than a full and active legislation. In perusing these avenues of inquiry, the authors seek to identify systemic impediments which hinder law enforcement agencies, prosecutors, and investigators from properly carrying out their …