Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Applied Psychology (1)
- Artificial intelligence (1)
- Augmented reality (1)
- Blameworthiness proportionality (1)
- Brainwashing (1)
-
- Central Mediterranean route (1)
- Clinical Psychology (1)
- Coercive or military indoctrination (1)
- Criminal law codification (1)
- Cyberpsychology (1)
- Debt bondage (1)
- Deference to authority (1)
- Digital addiction (1)
- Digital anxiety. (1)
- Digital devices (1)
- Disutility of injustice (1)
- Empirical desert (1)
- Excuse defense (1)
- Girls (1)
- Human trafficking (1)
- In-group favoritism (1)
- Literature review (1)
- Mental health (1)
- Mitigation (1)
- Nigeria (1)
- PTSD (1)
- Prostitution (1)
- Psychological trauma. African Traditional Religion (1)
- Religious radicalization (1)
- Rhetorical advantage (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Human Factors Psychology
Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.
Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.
LSU Master's Theses
A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …
Indoctrination And Social Influence As A Defense To Crime: Are We Responsible For Who We Are?, Paul H. Robinson, Lindsay Holcomb
Indoctrination And Social Influence As A Defense To Crime: Are We Responsible For Who We Are?, Paul H. Robinson, Lindsay Holcomb
All Faculty Scholarship
A patriotic POW is brainwashed by his North Korean captors into refusing repatriation and undertaking treasonous anti-American propaganda for the communist regime. Despite the general abhorrence of treason in time of war, the American public opposes criminal liability for such indoctrinated soldiers, yet existing criminal law provides no defense or mitigation because, at the time of the offense, the indoctrinated offender suffers no cognitive or control dysfunction, no mental or emotional impairment, and no external or internal compulsion. Rather, he was acting purely in the exercise of free of will, albeit based upon beliefs and values that he had not …
Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh
Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh
Library Philosophy and Practice (e-journal)
Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based …
Bound By Silence: Psychological Effects Of The Traditional Oath Ceremony Used In The Sex Trafficking Of Nigerian Women And Girls, Jennifer Millett-Barrett
Bound By Silence: Psychological Effects Of The Traditional Oath Ceremony Used In The Sex Trafficking Of Nigerian Women And Girls, Jennifer Millett-Barrett
Dignity: A Journal of Analysis of Exploitation and Violence
Nigerian women and children have been trafficked to Italy over the last 30 years for commercial sexual exploitation with an alarming increase in the past three years. The Central Mediterranean Route that runs from West African countries to Italy is rife with organized crime gangs that have created a highly successful trafficking operation. As part of the recruitment process, the Nigerian mafia and its operatives exploit victims by subjecting them to a traditional religious juju oath ceremony, which is an extremely effective control mechanism to silence victims and trap them in debt bondage. This study explores the psychological effects of …
Trigger Warnings: From Panic To Data, Francesca Laguardia, Venezia Michalsen, Holly Rider-Milkovich
Trigger Warnings: From Panic To Data, Francesca Laguardia, Venezia Michalsen, Holly Rider-Milkovich
Department of Justice Studies Faculty Scholarship and Creative Works
Following a practice that originated online, university faculty and staff have increasingly used “trigger warnings” to alert students to the possibility that they might be affected or even harmed by potentially traumatic material. This practice has led to a passionate debate about whether such warnings stifle or encourage student expression and academic freedom, and whether they are beneficial or detrimental to learning. In this article, we illustrate the history and current state of this debate and examine the scientific support for the arguments for and against the use of such warnings. Specifically, we question the scientific basis for the suggestion …