Open Access. Powered by Scholars. Published by Universities.®
Social Control, Law, Crime, and Deviance Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Criminology (37)
- Law (33)
- Legal Studies (33)
- Public Affairs, Public Policy and Public Administration (26)
- Criminology and Criminal Justice (21)
-
- Politics and Social Change (19)
- Social Justice (19)
- Arts and Humanities (16)
- Inequality and Stratification (15)
- Criminal Law (14)
- Political Science (14)
- Defense and Security Studies (12)
- Physical Sciences and Mathematics (12)
- Computer Sciences (11)
- Engineering (11)
- Forensic Science and Technology (11)
- Information Security (11)
- Aviation (10)
- Aviation Safety and Security (10)
- Computer Law (10)
- National Security Law (10)
- OS and Networks (10)
- Other Computer Sciences (10)
- Psychology (10)
- Race and Ethnicity (10)
- Gender and Sexuality (9)
- Law and Society (9)
- Institution
-
- Embry-Riddle Aeronautical University (10)
- University of Arkansas, Fayetteville (9)
- University of Pennsylvania Carey Law School (7)
- Bard College (4)
- Chapman University (4)
-
- City University of New York (CUNY) (3)
- University of Kentucky (3)
- University of Rhode Island (3)
- University of Tennessee, Knoxville (3)
- Florida International University (2)
- Georgia Southern University (2)
- Liberty University (2)
- Old Dominion University (2)
- South Dakota State University (2)
- The University of San Francisco (2)
- University of Central Florida (2)
- University of Pittsburgh School of Law (2)
- University of South Carolina (2)
- University of Washington Tacoma (2)
- Arcadia University (1)
- Clemson University (1)
- Duquesne University (1)
- Eastern Kentucky University (1)
- Gardner-Webb University (1)
- Louisiana State University (1)
- Minnesota State University, Mankato (1)
- Mississippi State University (1)
- Ouachita Baptist University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- San Jose State University (1)
- Keyword
-
- Policing (6)
- Race (5)
- Sex trafficking (5)
- Mass incarceration (4)
- Recidivism (4)
-
- COVID-19 (3)
- Criminal justice (3)
- Human trafficking (3)
- Law enforcement (3)
- Neoliberalism (3)
- Women (3)
- Abolition (2)
- Abortion (2)
- Black (2)
- Crime (2)
- Criminal law (2)
- Empirical desert (2)
- Gender (2)
- Healthcare (2)
- Justice (2)
- Labor trafficking (2)
- Predictive policing (2)
- Prison (2)
- Prisons (2)
- Psychedelics (2)
- Rape (2)
- Social justice (2)
- Stigma (2)
- Substance use (2)
- Surveillance (2)
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (10)
- All Faculty Scholarship (7)
- Sociology and Criminology Undergraduate Honors Theses (4)
- Dignity: A Journal of Analysis of Exploitation and Violence (3)
- Senior Projects Spring 2022 (3)
-
- Articles (2)
- Doctoral Dissertations (2)
- Electronic Theses and Dissertations, 2020- (2)
- FIU Electronic Theses and Dissertations (2)
- Graduate Theses and Dissertations (2)
- Great Plains Sociologist (2)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (2)
- National Youth Advocacy and Resilience Conference (2)
- Research Projects (2)
- Sociology & Criminal Justice Faculty Publications (2)
- Theses and Dissertations--Sociology (2)
- Undergraduate Honors Theses (2)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- All Theses (1)
- College of Arts & Sciences Senior Honors Theses (1)
- Community Engaged Learning Final Projects (1)
- Dissertations, Theses, and Capstone Projects (1)
- Education Faculty Articles and Research (1)
- Electronic Theses and Dissertations (1)
- Emancipations: A Journal of Critical Social Analysis (1)
- Forensic Science: Faculty and Staff Publications (1)
- Graduate School of Professional Psychology: Doctoral Papers and Masters Projects (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Honors Theses (1)
- Independent Study Project (ISP) Collection (1)
- Publication Type
- File Type
Articles 31 - 60 of 91
Full-Text Articles in Social Control, Law, Crime, and Deviance
Racialized Mass Incarceration In The United States: Exposing The Facade Of “Liberty And Justice For All”, Emily Wingfield
Racialized Mass Incarceration In The United States: Exposing The Facade Of “Liberty And Justice For All”, Emily Wingfield
The Compass
No abstract provided.
Reformation Within The Nation: Adapting The Nordic Rehabilitation And Reintegration Model To Positively Recondition The United States Criminal Justice System, Jessica Cornell
Helm's School of Government Conference - American Revival: Citizenship & Virtue
An analytical and statistical based comparison of criminal sentencing, incarceration, rehabilitation and reintegration in the United States of America to those of the five countries which follows those of the Nordic Criminal Justice System.
Abortion And Child Sexual Exploitation: Abortion As A Tool Of Traffickers And Abusers, Gabrielle Tornow
Abortion And Child Sexual Exploitation: Abortion As A Tool Of Traffickers And Abusers, Gabrielle Tornow
Helm's School of Government Conference - American Revival: Citizenship & Virtue
An examination of how child sexual abusers use abortion as a tool to exert control over their victims and cover up the evidence of their crimes
Does Diversity Matter? Police Violence, Minority Representation, And Urban Policing, Maddy Mcvaugh
Does Diversity Matter? Police Violence, Minority Representation, And Urban Policing, Maddy Mcvaugh
PPPA Paper Prize
This paper argues that, while increasing officer diversity may prove beneficial to some urban departments, for the majority, increased diversity within law enforcement does not substantially decrease the amount of violence towards racial minorities due to police culture and institutional practices. Specifically, I examine how structural policing methods target and excessively monitor Black and Hispanic communities, which leads to increased police encounters. Through police culture, these increased encounters then create further opportunities for acts of violence to be used against these minority communities. I begin by discussing several claims regarding the value of increased officer diversity. I then discuss why …
Slow Violence And Racial Capitalism: Understanding Mass Incarceration Through A Case Study Of The California Prison System, Mason Joiner
Slow Violence And Racial Capitalism: Understanding Mass Incarceration Through A Case Study Of The California Prison System, Mason Joiner
Senior Theses
This thesis will analyze the growth of the California prison system, situating it in the national context of mass incarceration in the United States. In Ruth Wilson Gilmore’s book Golden Gulag: Prisons, Surplus, Crisis, and Opposition in Globalizing California, Gilmore utilizes the theory of racial capitalism to explain the history and development of the California prison system. By analyzing Gilmore’s arguments about racial capitalism and integrating them with Rob Nixon’s theory of slow violence from his book Slow Violence and the Environmentalism of the Poor, this thesis provides a new perspective in the current discourse around mass incarceration. …
The Bursting Of The Non-Profit Bubble: Why Non-Profit Kids Simply Won’T Catch A Break, Jederick Estrella
The Bursting Of The Non-Profit Bubble: Why Non-Profit Kids Simply Won’T Catch A Break, Jederick Estrella
Senior Theses and Projects
Studying conceptions of success within nonprofit and boarding school students and how they envision their future. Through an understanding of students' individual conceptions of success, one can start to analyze how reliant students were on elite educational institutions and nonprofit scholar programs to make them worthy of sponsored mobility through their track record of success.
Neighbors At Risk, Jeffrey A. Butts, Gina Moreno, Richard A. Espinobarros
Neighbors At Risk, Jeffrey A. Butts, Gina Moreno, Richard A. Espinobarros
Publications and Research
Most New York City neighborhoods did not experience high rates of shootings in recent years, but others clearly did. Comparing crime rates across these relatively small geographic areas is important for officials considering where to invest in resources that support public safety and community wellbeing.
Unofficial Torturers And Helpless Victims: Applying The Convention Against Torture To Organized Criminal Groups, Emmanuel Orozco Castellanos
Unofficial Torturers And Helpless Victims: Applying The Convention Against Torture To Organized Criminal Groups, Emmanuel Orozco Castellanos
Independent Study Project (ISP) Collection
Since its inception, the United Nations Convention Against Torture (UNCAT) conceived torture as a state crime. The Convention established a so-called “state-nexus” that effectively excludes torture committed by non-state actors. The Committee Against Torture as well as the world’s major anti-torture NGOs have almost exclusively focused on ill-treatment perpetrated by state entities. Yet, there have been efforts to extend the definition to private actors, including the “de facto authority” approach, and the due diligence doctrine. This article explores the effectiveness of these efforts to expand the scope of the UNCAT when applied to organized criminal organization such as gangs and …
Pharmakon In The Firelands: Connecting Historical Discourses And Small-Town Social Contexts With Substance Use Experience, Andrew Robert Burns
Pharmakon In The Firelands: Connecting Historical Discourses And Small-Town Social Contexts With Substance Use Experience, Andrew Robert Burns
LSU Doctoral Dissertations
The ongoing increase in opioid and polysubstance-related overdoses and mortality in United States coincides with a shift in the ways substance use is understood. Once almost exclusively treated as a criminal problem, substance use, and overdose is increasingly viewed in terms of public health and from an urban to rural issue. The discourse surrounding the use of psychoactive substances largely omits the voices of the very people who use them. Likewise, the social context of small towns, at once not quite rural nor entirely urban, is generally given little consideration. To address these gaps in the research, I conduct two …
Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford
Do Home Invasion Serial Killers Warrant A Distinct Classification From Other Serial Killer Location Types? A Retrospective Comparative Examination, Caroline V. Comerford
FIU Electronic Theses and Dissertations
This dissertation seeks to address the research gap in serial homicide regarding home invasion serial killers (HISKs) and add to existing policy by providing insight and approaches to assist in serial murder investigations of such killers. Data for the study was obtained from the 2019 Radford University/Florida Gulf Coast University Serial Killer Database (RU/FGCU SKD) and additional public information searches. A retrospective comparative design and proportionate stratified random sampling of 326 serial killers from the RU/FGCU SKD (2019) were used to examine the differences and classifications of HISKs and non-home invasion serial killers (non-HISKs) in three investigations: (1) common characteristics; …
Pornography: Social, Emotional And Mental Implications Among Adolescents, William K. Canady
Pornography: Social, Emotional And Mental Implications Among Adolescents, William K. Canady
National Youth Advocacy and Resilience Conference
This presentation will explain the historical development of pornography. It will highlight four segments: 1- Porn’s impact on brain development of reward pathways, ultimately increasing the appetite for more porn. 2- Porn can be a false substitute for real intimacy, resulting in decreased sexual satisfaction with a real person and increased verbal and physical aggression. 3- Porn promotes sex trafficking, promotes multiple sex partners and reduced STD prevention. 4- A review of interventions available to assist clients in navigating a lifestyle away from pornography.
Sticky Situations: Understanding The Law And Life, Krystal Banks
Sticky Situations: Understanding The Law And Life, Krystal Banks
National Youth Advocacy and Resilience Conference
Law and life go hand in hand. Understanding the law and how it connects to life can be an effective tool in teaching youth and adults the value of making good decisions when it comes to life and the law. Sticky Situations places real-world situations in the context of learning how to apply the law and effectively respond to life's sticky situations.
‘They Did Not Have To Burn My Sister Alive’: Causes And Distribution By State Of Dowry Murder In India, Peter Mayer
‘They Did Not Have To Burn My Sister Alive’: Causes And Distribution By State Of Dowry Murder In India, Peter Mayer
Dignity: A Journal of Analysis of Exploitation and Violence
Dowry, the money, goods, property, or gifts given by the bride’s family to the groom or his family at the time of marriage, is a common custom in South Asia. Although it is illegal to demand—or offer—a dowry in India, it is a nearly universal custom in many parts of the country. If, after marriage, a husband’s family feels that the wife’s dowry was insufficient, they may harass or inflict other forms of domestic violence on her to put pressure on her family to provide an additional dowry. At its most extreme, this violence may lead to the murder of …
Tax Evasion And Fraud In The United States Sex Market, Youngbee Dale
Tax Evasion And Fraud In The United States Sex Market, Youngbee Dale
Dignity: A Journal of Analysis of Exploitation and Violence
This study describes tax evasion or fraud in the United States sex market. Prior to this study, scholars have recognized the problem of tax evasion in the commercial sex market as an obstacle to national revenue collection. Tax violation and fraud investigations also are ways to combat the illegal commercial sex industry. However, no studies have focused on the problem in the United States sex market. Hence, this study aims to describe tax evasion or fraud methods used by the criminals operating in the United States sex market. This study relies on both quantitative and qualitative methods to examine the …
"Women And Crime" In Criminology Textbooks, Patricia Ann Wasely Lomire
"Women And Crime" In Criminology Textbooks, Patricia Ann Wasely Lomire
Great Plains Sociologist
The purpose of this research note is to encourage both students and faculty to critically evaluate assumptions regarding the limited coverage of "women and crime" topics in contemporary criminology textbooks. The specific objectives are 1) to briefly review the research findings of Richard A. Wright's 1987 article entitled "Are Sisters in Crime Finally Being Booked? The Coverage of Women and Crime in Journals and Textbooks"; 20 to evaluate the coverage of female related topics in 631 articles form Criminology: An Interdisciplinary Journal -- The Official Publication of the American Society of Criminology, (1970-1989); 3) to critique a variety of explanations …
Gender And Perceived Severity Of Informal Sanctions: A Case Study Of Convicted Dui Offenders In Cass County, North Dakota, Terry D. Stratton, James H. Larson
Gender And Perceived Severity Of Informal Sanctions: A Case Study Of Convicted Dui Offenders In Cass County, North Dakota, Terry D. Stratton, James H. Larson
Great Plains Sociologist
The use of informal sanctions as deterrents to socially undesirable behavior is not new. Particularly at a time when individuals (especially public figures) are subject to growing scrutinization, the breadth of public censure is expanding to envelop a seemingly wider array of moral and legal violations. Minor law-breakers, too, are being made increasingly aware of the public's social monitoring role a role which functions as a dynamic reference point by which individuals, on the basis of certain actions, are deemed to be "deviant" or "respectable" (Douglas, 1970). "What is relatively new, however, is the "formalization of the informal sanction"; that …
Remodeling Criminal Insanity: Exploring Philosophical, Legal, And Medical Premises Of The Medical Model Used In Norwegian Law, Linda Gröning, Unn K. Haukvik, Stephen J. Morse, Susanna Radovic
Remodeling Criminal Insanity: Exploring Philosophical, Legal, And Medical Premises Of The Medical Model Used In Norwegian Law, Linda Gröning, Unn K. Haukvik, Stephen J. Morse, Susanna Radovic
All Faculty Scholarship
This paper clarifies the conceptual space of discussion of legal insanity by considering the virtues of the ‘medical model’ model that has been used in Norway for almost a century. The medical model identifies insanity exclusively with mental disorder, and especially with psychosis, without any requirement that the disorder causally influenced the commission of the crime. We explore the medical model from a transdisciplinary perspective and show how it can be utilised to systematise and reconsider the central philosophical, legal and medical premises involved in the insanity debate. A key concern is how recent transdiagnostic and dimensional approaches to psychosis …
Internal And External Challenges To Culpability, Stephen J. Morse
Internal And External Challenges To Culpability, Stephen J. Morse
All Faculty Scholarship
This article was presented at “Guilty Minds: A Virtual Conference on Mens Rea and Criminal Justice Reform” at Arizona State University’s Sandra Day O’Connor College of Law. It is forthcoming in Arizona State Law Journal Volume 53, Issue 2.
The thesis of this article is simple: As long as we maintain the current folk psychological conception of ourselves as intentional and potentially rational creatures, as people and not simply as machines, mental states will inevitably remain central to ascriptions of culpability and responsibility more generally. It is also desirable. Nonetheless, we are in a condition of unprecedented internal challenges to …
Translatina Immigrant Mental Health Wellness: Suggestive Intervention Strategies The City Of San Francisco Should Consider Adopting, Valeria Vera
Master's Theses
Translatina immigrants in the United States often suffer from intersectional traumas due to their race, gender, sexual orientation, religion, and immigration status — putting them in a vulnerable position socially, psychologically, economically, and medically. Due to their positionality in the intersections of migration, criminalization, cissexism, and mental health, they are often more marginalized and have greater needs than communities with privileged sociocultural identities. As a particularly vulnerable group, they need guaranteed access to gender-affirming healthcare that is inclusive of mental health services. Despite Translatinas’ need for mental health services, there exist many barriers making services inaccessible and insufficient in San …
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Annual ADFSL Conference on Digital Forensics, Security and Law
The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …
Insistence: The Active Quest Of Citizens For Achieving Their Health And Justice Rights In Mexico, Julia Hernández-Gutiérrez
Insistence: The Active Quest Of Citizens For Achieving Their Health And Justice Rights In Mexico, Julia Hernández-Gutiérrez
The Journal of Sociology & Social Welfare
In Mexico’s public healthcare and justice institutions, where insufficient infrastructure, unnecessary, confusing procedures, and mistreatment are common obstacles to fundamental rights, insistence can be interpreted as an indicator of a citizen’s active quest to ensure their rights are respected. Even if citizen dependence on the State is reinforced on a daily basis within some public institutions, service users are not inactive patients or victims waiting for their turn, but rather are active agents claiming their rights, because access to healthcare and justice cannot be achieved in Mexico without the ability to cope with bureaucratic barriers and the despotic attitude of …
Wanderscaping: Stirring Agitated Reflections Into Our Home The Campus, K. Annie Bingham
Wanderscaping: Stirring Agitated Reflections Into Our Home The Campus, K. Annie Bingham
Selected Undergraduate Works
Wanderscaping is a two part project completed over the 2021-2022 school year. The first portion, "Wanderscaping Our Home The Campus" meanders through the physical space of Sarah Lawrence College, as a landscape and an institution, while the second, "Stirring An Agitated Reflection" floats that knowledge in the psychic space of an interconnected host of guides, through books, conversations, and other media. As a whole this project is a process-oriented wrangling of freedom, connection, and their borders. It has culminated in practices of public participatory performance, photography, mapping, iconography, audio recording, and writing. Wanderscaping aims to share a space to dream …
Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff
Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff
Research Projects
In January 2022, the U.S. Department of Justice announced Seditious Conspiracy charges against members of the anti-government extremist group Oath Keepers in connection to the January 6th (2021) siege of the U.S. Capitol Building. Several have entered not guilty pleas and a trial is expected in July 2022.
To provide context, this brief offers an overview of 11 Seditious Conspiracy cases included in the American Terrorism Study (ATS) since 1980. In total, these cases involve nine groups (a.k.a."cells" or "plots") and 78 defendants charged with Seditious Conspiracy (18 USC§ 2384), a relatively rare charge that comprises less than one half …
Using Simulation For Law Enforcement De-Escalation Training, Julie Kent
Using Simulation For Law Enforcement De-Escalation Training, Julie Kent
Electronic Theses and Dissertations, 2020-
Law enforcement needs simulation practice tailored to de-escalation skills. Law enforcement officers spend most of their training time practicing how to use force appropriately and very little time practicing how to avoid using force. There is little research into the best ways for law enforcement to reduce their use of force and the best ways to provide training to individuals to coach them to avoid using force. There are many training programs promoting de-escalation techniques, but there is little research into the effectiveness of these programs beyond the ability of individuals to perform the skills that are trained. There is …
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …