Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Adolescent Obesity (1)
- Adolescent Overweight (1)
- Camera device source (1)
- Communication (1)
- Corporate crime (1)
-
- Customer Lifetime Value (CLV) (1)
- Deep learning (1)
- Deterrence (1)
- Enforcement (1)
- Financial crisis (1)
- Forged information (1)
- Gradient Boosting Decision Tree (GBDT) (1)
- Human trafficking (1)
- Image source identification (1)
- IoT (1)
- Labor trafficking (1)
- Law and economics (1)
- Loss function (1)
- Muted Groups Theory (1)
- Pareto/GGG (1)
- Pareto/NBD (HB) (1)
- Physical Activity (1)
- Random Forest (RF) (1)
- Serious Gaming; Social Engineering; Human Factor; Information Security; Experiential Learning; Field Observation; Business and Management Environment (1)
- Sex trafficking (1)
- State Law (1)
- User identification framework (1)
- Publication
- Publication Type
Articles 1 - 14 of 14
Full-Text Articles in Criminology
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors, Mssj Staff
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors, Mssj Staff
Midwest Social Sciences Journal
No abstract provided.
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Midwest Social Sciences Journal
No abstract provided.
Volume 24, Full Contents, Mssj Staff
Volume 24, Full Contents, Mssj Staff
Midwest Social Sciences Journal
No abstract provided.
Mission And Editorial Policy, Mssj Staff
Mission And Editorial Policy, Mssj Staff
Midwest Social Sciences Journal
No abstract provided.
Corporate Crime And Punishment: An Empirical Study, Dorothy S. Lund, Natasha Sarin
Corporate Crime And Punishment: An Empirical Study, Dorothy S. Lund, Natasha Sarin
All Faculty Scholarship
For many years, law and economics scholars, as well as politicians and regulators, have debated whether corporate criminal enforcement overdeters beneficial corporate activity or in the alternative, lets corporate criminals off too easily. This debate has recently expanded in its polarization: On the one hand, academics, judges, and politicians have excoriated enforcement agencies for failing to send guilty bankers to jail in the wake of the 2008 financial crisis; on the other, the U.S. Department of Justice has since relaxed policies that encouraged individual prosecutions and reduced the size of fines and number of prosecutions. A crucial and yet understudied …
Communicating With Muted Groups: The Case Of Human Trafficking, Amy Matzke-Fawcett
Communicating With Muted Groups: The Case Of Human Trafficking, Amy Matzke-Fawcett
Communication & Theatre Arts Theses
The problem of human trafficking is global, affecting men and women, adults, and children, with exploitation of various forms including (but not limited to) sex work, hospitality and entertainment, labor, agriculture, soldiering, forced begging and organ removal. While it has been the focus of movies, news articles, documentaries, legislation and research, the discussion of the communication surrounding human trafficking is still in the formative stages. What is the messaging about human trafficking in legislation, both historically and in the present day, and how did news and popular media help to frame the discourse around trafficking in the United States? Using …
Looking For Better: A History Of Black Southern Migrations, Selena Sanderfer Doss
Looking For Better: A History Of Black Southern Migrations, Selena Sanderfer Doss
Midwest Social Sciences Journal
A broad overview of migrations affecting black southerners is presented, including the Atlantic slave trade, the domestic slave trade, colonization movements to Sierra Leone and Liberia, the Exoduster movement, the Great Migration, and the Return South migration. Emigrants convey their experiences and motivations through testimonies and personal accounts. Surviving the trauma of forced migrations, black southerners organized numerous migration movements both outside and within American polities in search of better opportunities. In the late 20th century, black southerners also initiated a return migration to the American South and have since achieved notable socioeconomic and political progress.
Effects Of States’ Laws On Youth Physical Activity Participation And Obesity Prevalence, Chae Young Chang
Effects Of States’ Laws On Youth Physical Activity Participation And Obesity Prevalence, Chae Young Chang
Midwest Social Sciences Journal
The alarming prevalence of obesity and lack of physical activity among adolescents led to immediate policy action to address these concerns. Accordingly, many states introduced and enacted their own legislation to encourage physical activity in schools. Few studies have explored the effectiveness of the new legislation, however, especially at the state level. To answer the fundamental question of whether policy is effective and to describe the varying effects of state obesity policies, this study analyzed the Youth Risk Behavior Surveillance System from 2007 to 2017. Using the difference-in-differences method, this study found that legislative efforts to encourage physical activity had …
Profitable Retail Customer Identification Based On A Combined Prediction Strategy Of Customer Lifetime Value, Yinglu Sun, Dong Cheng, Subir Bandyopadhyay, Wei Xue
Profitable Retail Customer Identification Based On A Combined Prediction Strategy Of Customer Lifetime Value, Yinglu Sun, Dong Cheng, Subir Bandyopadhyay, Wei Xue
Midwest Social Sciences Journal
As a fundamental concept of customer relationship management, customer lifetime value (CLV) serves as a crucial metric to identify profitable retail customers. Various methods are available to predict CLV in different contexts. With the development of consumer big data, modern statistics and machine learning algorithms have been gradually adopted in CLV modeling. We introduce two machine learning algorithms—the gradient boosting decision tree (GBDT) and the random forest (RF)—in retail customer CLV modeling and compare their predictive performance with two classical models—the Pareto/NBD (HB) and the Pareto/GGG. To ensure CLV prediction and customer identification robustness, we combined the predictions of the …
A Serious Game For Social Engineering Awareness Creation, Fabian Muhly, Philipp Leo, Stefano Caneppele
A Serious Game For Social Engineering Awareness Creation, Fabian Muhly, Philipp Leo, Stefano Caneppele
Journal of Cybersecurity Education, Research and Practice
Social engineering is a method used by offenders to deceive their targets utilizing rationales of human psychology. Offenders aim to exploit information and use them for intelligence purposes or financial gains. Generating resilience against these malicious methods is still challenging. Literature shows that serious gaming learning approaches are used more frequently to instill lasting retention effects. Serious games are interactive, experiential learning approaches that impart knowledge about rationales and concepts in a way that fosters retention. In three samples and totally 97 participants the study at hand evaluated a social engineering serious game for participants’ involvement and instruction compliance during …
Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu
Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Digital image forensics is a key branch of digital forensics that based on forensic analysis of image authenticity and image content. The advances in new techniques, such as smart devices, Internet of Things (IoT), artificial images, and social networks, make forensic image analysis play an increasing role in a wide range of criminal case investigation. This work focuses on image source identification by analysing both the fingerprints of digital devices and images in IoT environment. A new convolutional neural network (CNN) method is proposed to identify the source devices that token an image in social IoT environment. The experimental results …