Open Access. Powered by Scholars. Published by Universities.®
Forensic Science and Technology Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Keyword
-
- Cybercrime (4)
- Daubert (2)
- Forensic science (2)
- Admissibility (1)
- Awareness (1)
-
- Blockchain (1)
- Clandestine Organ Transplants (1)
- Court-appointed experts (1)
- Cyber victimization (1)
- Cyber-intelligence (1)
- Cyberbullying (1)
- Cybercriminal (1)
- Cyberstalking (1)
- Dark Web Crawling (1)
- Digital Forensics (1)
- Digital divide (1)
- Disorder (1)
- Distributed systems (1)
- End-match (1)
- Fear of crime (1)
- Fear of cybercrime (1)
- Footwear evidence (1)
- Forensic taphonomy (1)
- Frye (1)
- Handwriting comparison (1)
- Holistic approach (1)
- Human factor (1)
- Indoor decomposition (1)
- Investigation (1)
- Legislation (1)
Articles 1 - 13 of 13
Full-Text Articles in Forensic Science and Technology
An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing
An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing
International Journal of Cybersecurity Intelligence & Cybercrime
Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it. …
Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett
Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett
International Journal of Cybersecurity Intelligence & Cybercrime
The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack …
The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade
The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade
International Journal of Cybersecurity Intelligence & Cybercrime
New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies …
A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander
A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander
International Journal of Cybersecurity Intelligence & Cybercrime
This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant effects …
The Accumulation Of Wear On Footwear Pattern Analysis, Sarah Pawloski
The Accumulation Of Wear On Footwear Pattern Analysis, Sarah Pawloski
Themis: Research Journal of Justice Studies and Forensic Science
Wear is defined as the erosion of a shoe’s outsole or the loss of tread pattern, and it happens gradually over time with use. After a shoeprint is collected from a crime scene, it is questioned whether an individualization can be made if an exemplar is created after additional use of the shoe. The shoes of ten volunteers at San Jose State University were analyzed over a period of 40-45 days. Wear and Randomly Acquired Characteristics (RACs) were analyzed over time to determine if there were any observable changes or additions to the already present wear. It was hypothesized that …
Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister
Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister
Themis: Research Journal of Justice Studies and Forensic Science
Forensic analysis of questioned documents includes chemical analyses of paper and ink as well as handwriting comparisons. Several elements affect handwriting analyses, including the presence of discriminatory factors that can individualize a handwriting sample and whether the handwriting has been disguised. Five handwriting samples were gathered from six individuals comprising of one reference, three natural unknowns, and one disguised sample per person. A novice conducted analyses on every collected sample and conducted comparisons of the reference sample to the unknown and disguised samples in an attempt to correctly source the unknown and disguised samples. The novice showed a high level …
Decomposition Of Pig Carcasses At Varying Room Temperature, Jacqueline Abad Santos
Decomposition Of Pig Carcasses At Varying Room Temperature, Jacqueline Abad Santos
Themis: Research Journal of Justice Studies and Forensic Science
The goal of this study is to assess the qualitative scoring of decomposition scales with statistical analysis while also determining which indoor environment will decompose the fastest. When comparing the three indoor environments, water decomposition appears to be the fastest, but the method of analysis for this study determines that using decomposition scales to analyze such environments may produce statistically insignificant results. For this study, piglets were put in a dry steel tub, a water filled steel tub, and a suitcase. These were recorded using photographs for 25 days and then scored using decomposition scales. The total score was divided …
Scientific Evidence Admissibility: Improving Judicial Proceedings To Decrease Erroneous Outcomes, Leica Kwong
Scientific Evidence Admissibility: Improving Judicial Proceedings To Decrease Erroneous Outcomes, Leica Kwong
Themis: Research Journal of Justice Studies and Forensic Science
In the United States, Federal Rules of Evidence 702, the Frye and Daubert standards govern the admissibility of scientific evidence in the courtroom. Some states adopted Frye while others adopted Daubert, causing varying judicial outcomes. The verdicts in some cases may be erroneous due to a nationally used standard. Frye has broad criteria of requiring scientific evidence to be generally accepted. While Daubert contains more requirements for the evidence to be admissible, such as peer review, publication, and scientific principles. Daubert, alongside FRE 702, provides a thorough guideline for trial judges who have the gatekeeping role to decide admissibility aiming …
Physical Match: Uniqueness Of Torn Paper, Marilyn Aguilar
Physical Match: Uniqueness Of Torn Paper, Marilyn Aguilar
Themis: Research Journal of Justice Studies and Forensic Science
In the forensic science field, it is generally accepted that all tears and fractures are unique; however, there is limited scientific evidence to support this. This study tests the claim that all tears are unique, focusing on paper. One-hundred Office Depot brand 3” x 5” blank, white index cards were torn in half by hand. Six halves were randomly removed; the remaining 94 halves were mixed and then matched by a novice using end-match analysis. The removal of the 6 random halves left 44 matching pairs. Of the remaining halves, all 44 pairs were correctly matched. The results show that …
A Framework To Reveal Clandestine Organ Trafficking In The Dark Web And Beyond, Michael P. Heinl, Bo Yu, Duminda Wijesekera
A Framework To Reveal Clandestine Organ Trafficking In The Dark Web And Beyond, Michael P. Heinl, Bo Yu, Duminda Wijesekera
Journal of Digital Forensics, Security and Law
Due to the scarcity of transplantable organs, patients have to wait on long lists for many years to get a matching kidney. This scarcity has created an illicit market place for wealthy recipients to avoid long waiting times. Brokers arrange such organ transplants and collect most of the payment that is sometimes channeled to fund other illicit activities. In order to collect and disburse payments, they often resort to money laundering-like schemes of money transfers. As the low-cost Internet arrives in some of the affected countries, social media and the dark web are used to illegally trade human organs. This …
Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim
Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim
International Journal of Cybersecurity Intelligence & Cybercrime
Awareness is a starting point to recognize, understand, or know a situation or fact, and the perception makes a difference in how to deal with it. Although the term cybercrime may not be new to the most public and the police, not all of them are well aware of the nature and extent of cybercrimes, cybercriminals, and cyber-victims, which in turn affects their perceptions of matters. The four papers in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime empirically examine these important topics and discuss policy implications.
Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler
Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler
International Journal of Cybersecurity Intelligence & Cybercrime
The ubiquity of the Internet and computer technology has enabled individuals to engage in bullying, threats, and harassing communications online. Limited research has found that local line officers may not view these offenses as serious compared to real world crimes despite their negative physical and emotional impact on victims. The perceptions of officers can produce poor interactions with victims during calls for service, particularly victim blaming, which can reduce citizens’ confidence in police agencies generally. However, local law enforcement agencies are increasingly mandated to respond to these cases, calling to question how their views may impact the community. This study …
Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke
Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke
International Journal of Cybersecurity Intelligence & Cybercrime
The advancement of Information and Communication Technologies (ICT) opens new avenues and ways for cybercriminals to commit crime. The primary goal of this paper is to raise awareness regarding gaps that exist with regards to Nigeria’s capabilities to adequately legislate, investigate and prosecute cases of cybercrimes. The major source of cybercrime legislation in Nigeria is an act of the National Assembly which is majorly a symbolic legislation rather than a full and active legislation. In perusing these avenues of inquiry, the authors seek to identify systemic impediments which hinder law enforcement agencies, prosecutors, and investigators from properly carrying out their …