Open Access. Powered by Scholars. Published by Universities.®

Forensic Science and Technology Commons

Open Access. Powered by Scholars. Published by Universities.®

808 Full-Text Articles 1,101 Authors 185,873 Downloads 56 Institutions

All Articles in Forensic Science and Technology

Faceted Search

808 full-text articles. Page 1 of 33.

Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen 2019 Marshall University

Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen

David Dampier

The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most costly. However, complete forensic duplication is standard practice among digital forensic laboratories.

The time it takes to complete these stages is quickly becoming a serious problem. Digital forensic laboratories do not have the resources and time to keep up with the growing demand for digital forensic examinations with the current methodologies. One solution to this problem is the use of pre-examination techniques ...


A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-shick Choi, Sinyong Choi, Elizabeth Englander 2019 Bridgewater State University

A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander

International Journal of Cybersecurity Intelligence & Cybercrime

This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant ...


An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing 2019 Bridgewater State University

An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing

International Journal of Cybersecurity Intelligence & Cybercrime

Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it ...


Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett 2019 Bridgewater State University

Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett

International Journal of Cybersecurity Intelligence & Cybercrime

The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack ...


The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer LaPrade 2019 Bridgewater State University

The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies ...


A Microspectra Analysis Of Synthetic Wig Fibers, Jaclyn R. Beshlian 2019 CUNY John Jay College

A Microspectra Analysis Of Synthetic Wig Fibers, Jaclyn R. Beshlian

Student Theses

The goal of this study was to determine whether differentiation between 20 visually similar light brown synthetic wig fibers was possible with the use of a microspectrophotometer (MSP). Visually similar fibers were chosen to display the power of the instrument over the human eye. An MSP is an instrument that has the ability to aid in the analysis of certain microscopical samples. With this particular instrument one is able to collect the absorption and fluorescence spectra of microscopical colored samples without destroying the piece of evidence itself. Prior to any analysis with the MSP, the material of the fibers was ...


Dna Recovery From Handwritten Documents Using A Novel Vacuum Technique, Patrick M. McLaughlin 2019 CUNY John Jay College

Dna Recovery From Handwritten Documents Using A Novel Vacuum Technique, Patrick M. Mclaughlin

Student Theses

Investigations of many crimes such as robberies, kidnappings, and terrorism are often associated with the recovery of a paper document which has been written by the perpetrator. Paper can provide a variety of forensic evidence such as DNA, latent fingermarks, and indented writing. The focus of this study was the collection of probative DNA profiles from the text region of a handwritten note through a vacuum suction device without altering or destroying the document. Collection of DNA evidence was carried out in two separate groups. The first group involved 11 volunteers providing a handwritten note sample with unwashed hands. The ...


Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh 2019 Library Assistant, Central Library, Central University of South Bihar (CUSB), Gaya (Bihar)

Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh

Library Philosophy and Practice (e-journal)

Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based ...


Ethical Implications Of Codis, Lucy Grogan 2019 Grand Valley State University

Ethical Implications Of Codis, Lucy Grogan

Masters Theses

CODIS stores and maintains numerous DNA profiles, and is used as a tool by the criminal justice system in order to help solve crime. Deoxyribonucleic Acid, or DNA for short, is the genetic material that an individual inherits from one’s parents (NIH, 2019). Certain portions of this genetic material are selected for use within the CODIS database due to their lack of medically relevant information. There is an immense amount of power associated with DNA and the CODIS database that it is held within, which allows for many ethical issues to arise. In order to create a usable and ...


The Development And Use Of Computational Tools In Forensic Science, Dennis E. Slice 2019 Florida State University, Tallahassee, USA; University of Vienna, Vienna, Austria

The Development And Use Of Computational Tools In Forensic Science, Dennis E. Slice

Human Biology Open Access Pre-Prints

Modern computational resources make available a rich toolkit of statistical methods that can be applied to forensic questions. This toolkit is built on the foundation of statistical developments dating back to the 19th century. To fully and effectively exploit these developments, both the makers and users of software must be keenly aware of the quality, i.e., the accuracy and precision, of the data being modeled or analyzed, and end-users must be sufficiently familiar with the underlying theory to understand the process and results of any analysis or software they use. This is especially important for medico-legal personnel who might ...


Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera 2019 CUNY John Jay College

Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera

Student Theses

In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on ...


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik 2019 Sam Houston State University

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what ...


Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister 2019 San Jose State University

Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister

Themis: Research Journal of Justice Studies and Forensic Science

Forensic analysis of questioned documents includes chemical analyses of paper and ink as well as handwriting comparisons. Several elements affect handwriting analyses, including the presence of discriminatory factors that can individualize a handwriting sample and whether the handwriting has been disguised. Five handwriting samples were gathered from six individuals comprising of one reference, three natural unknowns, and one disguised sample per person. A novice conducted analyses on every collected sample and conducted comparisons of the reference sample to the unknown and disguised samples in an attempt to correctly source the unknown and disguised samples. The novice showed a high level ...


Scientific Evidence Admissibility: Improving Judicial Proceedings To Decrease Erroneous Outcomes, Leica Kwong 2019 San Jose State University

Scientific Evidence Admissibility: Improving Judicial Proceedings To Decrease Erroneous Outcomes, Leica Kwong

Themis: Research Journal of Justice Studies and Forensic Science

In the United States, Federal Rules of Evidence 702, the Frye and Daubert standards govern the admissibility of scientific evidence in the courtroom. Some states adopted Frye while others adopted Daubert, causing varying judicial outcomes. The verdicts in some cases may be erroneous due to a nationally used standard. Frye has broad criteria of requiring scientific evidence to be generally accepted. While Daubert contains more requirements for the evidence to be admissible, such as peer review, publication, and scientific principles. Daubert, alongside FRE 702, provides a thorough guideline for trial judges who have the gatekeeping role to decide admissibility aiming ...


The Accumulation Of Wear On Footwear Pattern Analysis, Sarah Pawloski 2019 San Jose State University

The Accumulation Of Wear On Footwear Pattern Analysis, Sarah Pawloski

Themis: Research Journal of Justice Studies and Forensic Science

Wear is defined as the erosion of a shoe’s outsole or the loss of tread pattern, and it happens gradually over time with use. After a shoeprint is collected from a crime scene, it is questioned whether an individualization can be made if an exemplar is created after additional use of the shoe. The shoes of ten volunteers at San Jose State University were analyzed over a period of 40-45 days. Wear and Randomly Acquired Characteristics (RACs) were analyzed over time to determine if there were any observable changes or additions to the already present wear. It was hypothesized ...


Physical Match: Uniqueness Of Torn Paper, Marilyn Aguilar 2019 San Jose State University

Physical Match: Uniqueness Of Torn Paper, Marilyn Aguilar

Themis: Research Journal of Justice Studies and Forensic Science

In the forensic science field, it is generally accepted that all tears and fractures are unique; however, there is limited scientific evidence to support this. This study tests the claim that all tears are unique, focusing on paper. One-hundred Office Depot brand 3” x 5” blank, white index cards were torn in half by hand. Six halves were randomly removed; the remaining 94 halves were mixed and then matched by a novice using end-match analysis. The removal of the 6 random halves left 44 matching pairs. Of the remaining halves, all 44 pairs were correctly matched. The results show that ...


Decomposition Of Pig Carcasses At Varying Room Temperature, Jacqueline Abad Santos 2019 San Jose State University

Decomposition Of Pig Carcasses At Varying Room Temperature, Jacqueline Abad Santos

Themis: Research Journal of Justice Studies and Forensic Science

The goal of this study is to assess the qualitative scoring of decomposition scales with statistical analysis while also determining which indoor environment will decompose the fastest. When comparing the three indoor environments, water decomposition appears to be the fastest, but the method of analysis for this study determines that using decomposition scales to analyze such environments may produce statistically insignificant results. For this study, piglets were put in a dry steel tub, a water filled steel tub, and a suitcase. These were recorded using photographs for 25 days and then scored using decomposition scales. The total score was divided ...


Examining Witness Testimony In Domestic Homicides, Hana Chae 2019 City University of New York (CUNY)

Examining Witness Testimony In Domestic Homicides, Hana Chae

Student Theses

The present study investigated the effects of varying witness testimony on mock jurors’ perceptions of a case where a woman utilizes self-defense as a reason for killing her husband during a domestic dispute. A 3 (expert witness) x 3 (child witness) design was used to examine the effects of two different forms of expert testimony (Battered Woman Syndrome [BWS] & Social Agency [SA]) and its interaction with presence of child witness [age 5 & age 8]. Jury eligible participants (N = 245) were recruited from Amazon Mechanical Turk (MTurk). It was hypothesized that the presence of an expert witness would positively impact jurors ...


Analysis Of Error Within Forensic Measurements And Photogrammetry Programs, Amy Douglas 2019 University of Nebraska - Lincoln

Analysis Of Error Within Forensic Measurements And Photogrammetry Programs, Amy Douglas

Honors Theses, University of Nebraska-Lincoln

Digital images and photography have been considered commonplace in forensic science since the late 1990’s. Photogrammetry is a tool used in forensic science to measure objects within photographs that contain a scale or programs that are able to measure items in 3D images. Items at crime scenes often need to be measured and forensic scientists may not know what the best option is for their situation. This research will be conducted to show which type of measurement technique is most accurate, calculated against NIST traceable measurements, at various sizes of objects. The measurement techniques that will be tested are ...


Dna Methylation Methods For Donor Age Prediction Using Touch Dna, Emily Neverett 2019 University of New Haven

Dna Methylation Methods For Donor Age Prediction Using Touch Dna, Emily Neverett

Master's Theses

The International Labor Organization (ILO) estimated over 30 million individuals fall victim to human trafficking each year, of which, 50% are children below the age of 16. In 2012, the ILO reported there to be 168 million child laborers worldwide, with many trafficked into hazardous conditions to manufacture consumer products that are sold in developed countries. This is a modern form of slavery with poor working conditions, no access to education, and low wages. The hidden nature of this crime, however, makes it extremely difficult to identify and locate victims of forced child labor, and thus making it challenging to ...


Digital Commons powered by bepress