Open Access. Powered by Scholars. Published by Universities.®

Forensic Science and Technology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Forensic Science and Technology

An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing Sep 2019

An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing

International Journal of Cybersecurity Intelligence & Cybercrime

Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it. …


Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett Sep 2019

Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett

International Journal of Cybersecurity Intelligence & Cybercrime

The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack …


The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade Sep 2019

The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies …


A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander Sep 2019

A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander

International Journal of Cybersecurity Intelligence & Cybercrime

This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant effects …


The Accumulation Of Wear On Footwear Pattern Analysis, Sarah Pawloski May 2019

The Accumulation Of Wear On Footwear Pattern Analysis, Sarah Pawloski

Themis: Research Journal of Justice Studies and Forensic Science

Wear is defined as the erosion of a shoe’s outsole or the loss of tread pattern, and it happens gradually over time with use. After a shoeprint is collected from a crime scene, it is questioned whether an individualization can be made if an exemplar is created after additional use of the shoe. The shoes of ten volunteers at San Jose State University were analyzed over a period of 40-45 days. Wear and Randomly Acquired Characteristics (RACs) were analyzed over time to determine if there were any observable changes or additions to the already present wear. It was hypothesized that …


Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister May 2019

Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister

Themis: Research Journal of Justice Studies and Forensic Science

Forensic analysis of questioned documents includes chemical analyses of paper and ink as well as handwriting comparisons. Several elements affect handwriting analyses, including the presence of discriminatory factors that can individualize a handwriting sample and whether the handwriting has been disguised. Five handwriting samples were gathered from six individuals comprising of one reference, three natural unknowns, and one disguised sample per person. A novice conducted analyses on every collected sample and conducted comparisons of the reference sample to the unknown and disguised samples in an attempt to correctly source the unknown and disguised samples. The novice showed a high level …


Decomposition Of Pig Carcasses At Varying Room Temperature, Jacqueline Abad Santos May 2019

Decomposition Of Pig Carcasses At Varying Room Temperature, Jacqueline Abad Santos

Themis: Research Journal of Justice Studies and Forensic Science

The goal of this study is to assess the qualitative scoring of decomposition scales with statistical analysis while also determining which indoor environment will decompose the fastest. When comparing the three indoor environments, water decomposition appears to be the fastest, but the method of analysis for this study determines that using decomposition scales to analyze such environments may produce statistically insignificant results. For this study, piglets were put in a dry steel tub, a water filled steel tub, and a suitcase. These were recorded using photographs for 25 days and then scored using decomposition scales. The total score was divided …


Scientific Evidence Admissibility: Improving Judicial Proceedings To Decrease Erroneous Outcomes, Leica Kwong May 2019

Scientific Evidence Admissibility: Improving Judicial Proceedings To Decrease Erroneous Outcomes, Leica Kwong

Themis: Research Journal of Justice Studies and Forensic Science

In the United States, Federal Rules of Evidence 702, the Frye and Daubert standards govern the admissibility of scientific evidence in the courtroom. Some states adopted Frye while others adopted Daubert, causing varying judicial outcomes. The verdicts in some cases may be erroneous due to a nationally used standard. Frye has broad criteria of requiring scientific evidence to be generally accepted. While Daubert contains more requirements for the evidence to be admissible, such as peer review, publication, and scientific principles. Daubert, alongside FRE 702, provides a thorough guideline for trial judges who have the gatekeeping role to decide admissibility aiming …


Physical Match: Uniqueness Of Torn Paper, Marilyn Aguilar May 2019

Physical Match: Uniqueness Of Torn Paper, Marilyn Aguilar

Themis: Research Journal of Justice Studies and Forensic Science

In the forensic science field, it is generally accepted that all tears and fractures are unique; however, there is limited scientific evidence to support this. This study tests the claim that all tears are unique, focusing on paper. One-hundred Office Depot brand 3” x 5” blank, white index cards were torn in half by hand. Six halves were randomly removed; the remaining 94 halves were mixed and then matched by a novice using end-match analysis. The removal of the 6 random halves left 44 matching pairs. Of the remaining halves, all 44 pairs were correctly matched. The results show that …


A Framework To Reveal Clandestine Organ Trafficking In The Dark Web And Beyond, Michael P. Heinl, Bo Yu, Duminda Wijesekera Mar 2019

A Framework To Reveal Clandestine Organ Trafficking In The Dark Web And Beyond, Michael P. Heinl, Bo Yu, Duminda Wijesekera

Journal of Digital Forensics, Security and Law

Due to the scarcity of transplantable organs, patients have to wait on long lists for many years to get a matching kidney. This scarcity has created an illicit market place for wealthy recipients to avoid long waiting times. Brokers arrange such organ transplants and collect most of the payment that is sometimes channeled to fund other illicit activities. In order to collect and disburse payments, they often resort to money laundering-like schemes of money transfers. As the low-cost Internet arrives in some of the affected countries, social media and the dark web are used to illegally trade human organs. This …


Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim Feb 2019

Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim

International Journal of Cybersecurity Intelligence & Cybercrime

Awareness is a starting point to recognize, understand, or know a situation or fact, and the perception makes a difference in how to deal with it. Although the term cybercrime may not be new to the most public and the police, not all of them are well aware of the nature and extent of cybercrimes, cybercriminals, and cyber-victims, which in turn affects their perceptions of matters. The four papers in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime empirically examine these important topics and discuss policy implications.


Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler Feb 2019

Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler

International Journal of Cybersecurity Intelligence & Cybercrime

The ubiquity of the Internet and computer technology has enabled individuals to engage in bullying, threats, and harassing communications online. Limited research has found that local line officers may not view these offenses as serious compared to real world crimes despite their negative physical and emotional impact on victims. The perceptions of officers can produce poor interactions with victims during calls for service, particularly victim blaming, which can reduce citizens’ confidence in police agencies generally. However, local law enforcement agencies are increasingly mandated to respond to these cases, calling to question how their views may impact the community. This study …


Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke Feb 2019

Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke

International Journal of Cybersecurity Intelligence & Cybercrime

The advancement of Information and Communication Technologies (ICT) opens new avenues and ways for cybercriminals to commit crime. The primary goal of this paper is to raise awareness regarding gaps that exist with regards to Nigeria’s capabilities to adequately legislate, investigate and prosecute cases of cybercrimes. The major source of cybercrime legislation in Nigeria is an act of the National Assembly which is majorly a symbolic legislation rather than a full and active legislation. In perusing these avenues of inquiry, the authors seek to identify systemic impediments which hinder law enforcement agencies, prosecutors, and investigators from properly carrying out their …