首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
There have been periodic electronic news media reports of potential bioterrorism-related incidents involving unknown substances (often referred to as “white powder”) since the 2001 intentional dissemination of Bacillus anthracis through the U.S. Postal System. This study reviewed the number of unknown “white powder” incidents reported online by the electronic news media and compared them with unknown “white powder” incidents reported to the U.S. Centers for Disease Control and Prevention (CDC) and the U.S. Federal Bureau of Investigation (FBI) during a 2-year period from June 1, 2009 and May 31, 2011. Results identified 297 electronic news media reports, 538 CDC reports, and 384 FBI reports of unknown “white powder.” This study showed different unknown “white powder” incidents captured by each of the three sources. However, the authors could not determine the public health implications of this discordance.  相似文献   

2.
Performing a digital forensic investigation (DFI) requires a standardized and formalized process. There is currently neither an international standard nor does a global, harmonized DFI process (DFIP) exist. The authors studied existing state-of-the-art DFIP models and concluded that there are significant disparities pertaining to the number of processes, the scope, the hierarchical levels, and concepts applied. This paper proposes a comprehensive model that harmonizes existing models. An effort was made to incorporate all types of processes proposed by the existing models, including those aimed at achieving digital forensic readiness. The authors introduce a novel class of processes called concurrent processes. This is a novel contribution that should, together with the rest of the model, enable more efficient and effective DFI, while ensuring admissibility of digital evidence. Ultimately, the proposed model is intended to be used for different types of DFI and should lead to standardization.  相似文献   

3.
Smart cities are comprised of diverse and interconnected components constantly exchanging data and facilitating improved living for a nation's population. Our view of a typical smart city consists of four key components, namely, Smart Grids, Building Automation Systems (BAS), Unmanned Aerial Vehicles (UAVs), Smart Vehicles; with enabling Internet of Things (IoT) sensors and the Cloud platform. The adversarial threats and criminal misuses in a smart city are increasingly heterogenous and significant, with provisioning of resilient and end-to-end security being a daunting task. When a cyber incident involving critical components of the smart city infrastructure occurs, appropriate measures can be taken to identify and enumerate concrete evidence to facilitate the forensic investigation process. Forensic preparedness and lessons learned from past forensic analysis can help protect the smart city against future incidents. This paper presents a holistic view of the security landscape of a smart city, identifying security threats and providing deep insight into digital investigation in the context of the smart city.  相似文献   

4.
The aims of this study are threefold: (1) to illustrate an institutionalization process of hegemonic masculinity, (2) to show how this process can be applied to rape incidents in South Korea, and (3) to suggest what needs to be done in the future. Based on previous studies of hegemonic masculinity, this study first sets the stage by illustrating how the isomorphism with hegemonic masculinity is achieved and maintained through culturalization and institutionalization among male soldiers. Based on this theoretical framework, this study shows limitations in the traditional approach to military crime, and then applies the current framework to explain higher rate of rape incidents committed by United States Army personnel stationed in South Korea. Finally, this study suggests what needs to be done in terms of empirical investigation of military rape in different countries. This study concludes that the institutionalized hegemonic masculinity and the reproduction of masculine organizations are possible major contributing factors to the higher rate of rape incidents.  相似文献   

5.
There are an abundance of measures available to the standard digital device users which provide the opportunity to act in an anti-forensic manner and conceal any potential digital evidence denoting a criminal act. Whilst there is a lack of empirical evidence which evaluates the scale of this threat to digital forensic investigations leaving the true extent of engagement with such tools unknown, arguably the field should take proactive steps to examine and record the capabilities of these measures. Whilst forensic science has long accepted the concept of toolmark analysis as part of criminal investigations, ‘digital tool marks’ (DTMs) are a notion rarely acknowledged and considered in digital investigations. DTMs are the traces left behind by a tool or process on a suspect system which can help to determine what malicious behaviour has occurred on a device. This article discusses and champions the need for DTM research in digital forensics highlighting the benefits of doing so.  相似文献   

6.
Recent Supreme Court decisions have signaled the need for sound empirical studies of the secondary effects of adult businesses on the surrounding areas for use in conjunction with local zoning restrictions. This study seeks to determine whether a relationship exists between adult erotic dance clubs and negative secondary effects in the form of increased numbers of crimes reported in the areas surrounding the adult businesses, in Charlotte, North Carolina. For each of 20 businesses, a control site (matched on the basis of demographic characteristics related to crime risk) is compared for crime events over the period of three years (1998–2000) using data on crime incidents reported to the police. We find that the presence of an adult nightclub does not increase the number of crime incidents reported in localized areas surrounding the club (defined by circular areas of 500- and 1,000-foot radii) as compared to the number of crime incidents reported in comparable localized areas that do not contain such an adult business. Indeed, the analyses imply the opposite, namely, that the nearby areas surrounding the adult business sites have smaller numbers of reported crime incidents than do corresponding areas surrounding the three control sites studied. These findings are interpreted in terms of the business mandates of profitability and continuity of existence of the businesses.  相似文献   

7.
Over the last decades digital technologies have penetrated our daily lives affecting all aspects of our societal and economic activities. Even though the benefits of relying on information systems to run everyday tasks, organise one's business, interact with each other or enjoy public services are undisputable, the increasing use of digital technologies comes with a price: the growing exposure to cyber risks. This new type of threat has been in the center of the EU agenda for over 15 years during which a solid legislative framework for the protection S of network and information systems against cyber incidents has been developed. However, security and resilience of infrastructures and networks is one parameter of the challenge. Dealing with the financial risk emerging from a cyber incident, is another, equally important one. The need to mitigate these risks led to the emergence of a new insurance market, the cyber insurance market. Despite though the constantly growing demand for this type of insurance coverage, the market is still under development. The fast-evolving nature of cyber threats, the lack of a common language as regards risks, losses and coverages and the lack of historical data on cyber incidents are listed among the factors that slow down the market's growth. Currently, all involved stakeholders in the insurance field are considering specific initiatives that would accelerate the process of turning the EU market more competitive and efficient against its many challenges. The example of the US cyber insurance market, with its shortcomings and know-how, could also contribute to this effort, as an example of a market that has been intensively facing these challenges for almost twenty years.  相似文献   

8.
Event reconstruction plays a critical role in solving physical crimes by explaining why a piece of physical evidence has certain characteristics. With digital crimes, the current focus has been on the recognition and identification of digital evidence using an object's characteristics, but not on the identification of the events that caused the characteristics. This paper examines digital event reconstruction and proposes a process model and procedure that can be used for a digital crime scene. The model has been designed so that it can apply to physical crime scenes, can support the unique aspects of a digital crime scene, and can be implemented in software to automate part of the process. We also examine the differences between physical event reconstruction and digital event reconstruction.  相似文献   

9.
《Justice Quarterly》2012,29(4):561-593
This study investigates the situational characteristics that determine the presence and severity of injury in incidents of assaultive violence. The analysis uses merged data from the National Crime Victimization Survey and the Supplementary Homicide Reports for the years 1992-2008, in order to model the determinants of victim injury. The analysis includes all incidents of attempted or completed, non-sexual assault against victims 12?years of age or older. Injury severity is classified into one of four possible levels: no injury, minor injury, serious injury (requiring doctor, hospital, or emergency room care), and lethal injury. Special attention is given to the way in which gender modifies the influence of situational elements on the presence and degree of victim injury. While the results suggest that the situational determinants of injury are by and large uniform for male and female victims, important gender differences are observed in the salience of relational distance.  相似文献   

10.
Dental identification of unknown human remains continues to be a relevant and reliable adjunct to forensic investigations. The advent of genomic and mitochondrial DNA procedures has not displaced the practical use of dental and related osseous structures remaining after destructive incidents that can render human remains unrecognizable, severely burned, and fragmented. The ability to conclusively identify victims of accident and homicide is based on the availability of antemortem records containing substantial and unambiguous proof of dental and related osseous characteristics. This case report documents the use of digital comparative analysis of antemortem dental models and postmortem dentition, to determine a dental identification. Images of dental models were digitally analyzed using Adobe PhotoshopTM software. Individual tooth anatomy was compared between the antemortem and postmortem images. Digital superimposition techniques were also used for the comparison. With the absence of antemortem radiographs, this method proved useful to reach a positive identification in this case.  相似文献   

11.
Digital piracy is a global concern for society. Although adolescents’ digital piracy in South Korea is pervasive, its cause has rarely been examined. Using data collected by the Korean Institute of Criminology (KIC) in 2009, this study conducted structural equation modeling to determine if low self-control and social learning theory accounted for digital piracy. This study found that parental indifference increased adolescents’ digital piracy through low self-control and misconception about digital piracy. However, there were no direct effects of parental indifference on the digital piracy behaviors. In particular, the mediation effect in the model combining low self-control and misconception was greater compared to other models. Overall, the combination of low self-control and social learning theory provided a more meaningful framework to explain adolescents’ digital piracy. Results of this study can offer ways to aid in the examination and remediation of this particular form of deviant behaviors on the Internet by adolescents.  相似文献   

12.
This study evaluated the frequency of coarrest in female victims who utilized 911 for intimate partner violence (IPV) and any patterns or circumstances that increased the likelihood of coarrest. All cases of police-documented IPV where a female IPV victim was arrested in conjunction with the perpetrator were included. Each incident report was reviewed to determine demographic characteristics of the victim, weapon and substance involvement, presence of children, and violence severity. Of IPV victims, 9% (131 of 1,489) were arrested. Having a weapon, alcohol use, not being married, and older age were associated with increased likelihood of arrest (p < .001). The presence of a child decreased the likelihood of victim arrest (p < .001). Race, prior incidents of IPV, offender restraining order, and incident severity were not significantly associated with coarrest. Although coarrest occurred in a minority of cases, it may deter victims from contacting police for future incidents of police.  相似文献   

13.
0.22 caliber rimfire ammunition is commonly encountered in firearms incidents in Australia. This paper reports on work which has confirmed the nonhomogeneous nature of gunshot residue (GSR) particles and that the lead and barium distribution within particles varies significantly with the particle size and structure. The outcome has been an improved understanding of how the particle formation influences the ability to determine the origin of GSR derived specifically from 0.22 caliber rim fire ammunition.  相似文献   

14.
The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital forensic tools have been developed to assist investigators in conducting a proper investigation into digital crimes. In general, the bulk of the digital forensic tools available on the market permit investigators to analyse data that has been gathered from a computer system. However, current state-of-the-art digital forensic tools simply cannot handle large volumes of data in an efficient manner. With the advent of the Internet, many employees have been given access to new and more interesting possibilities via their desktop. Consequently, excessive Internet usage for non-job purposes and even blatant misuse of the Internet have become a problem in many organisations. Since storage media are steadily growing in size, the process of analysing multiple computer systems during a digital investigation can easily consume an enormous amount of time. Identifying a single suspicious computer from a set of candidates can therefore reduce human processing time and monetary costs involved in gathering evidence. The focus of this paper is to demonstrate how, in a digital investigation, digital forensic tools and the self-organising map (SOM)--an unsupervised neural network model--can aid investigators to determine anomalous behaviours (or activities) among employees (or computer systems) in a far more efficient manner. By analysing the different SOMs (one for each computer system), anomalous behaviours are identified and investigators are assisted to conduct the analysis more efficiently. The paper will demonstrate how the easy visualisation of the SOM enhances the ability of the investigators to interpret and explore the data generated by digital forensic tools so as to determine anomalous behaviours.  相似文献   

15.
This project took advantage of an opportunity to test the comparability of two different methods for collecting self-reports of violent incidents. Using a life events calendar (LEC) approach, we collected data from individuals about violent incidents that occurred within a 1–3-year prior time period. These individuals had been research participants in a previous study that collected information about violent incidents using prospective, weekly interviews. Results using the LEC method were compared with the weekly self-reports of violence for an overlapping recall period. This allowed us to see how well the recall of violent incidents at a later date mapped onto reports obtained within seven days of any incidents. Overall results show a significant amount of under-reporting using the life-event calendar methodology compared to the weekly interview approach, but some higher concordance of reporting was found for serious rather than minor violence.  相似文献   

16.
17.
A large body of research has identified strong and consistent correlates of aggregated intimate homicide incidents; however, the bulk of these studies focuses on the influence of either case or neighborhood characteristics on homicide types, but not both. This study examines data collected from 739 homicides in two distinct metropolitan cities to determine which factors differentiate intimate and non-intimate homicide. Findings reveal that intimate partner homicides (IPH) are more likely to involve females both as victims and offenders when compared to non-IPH incidents. In addition, IPH homicides are more likely to be committed with weapons than non-IPH, but this finding only appears in Indianapolis homicides. Indeed, one of the stark contrasts between Indianapolis and Newark was the much greater prevalence of firearms involved in IPH homicides in Indianapolis. This suggests the need for future research that sorts out patterns of household gun possession, factors influencing community levels of household gun possession, and the use of legally- or illegally-possessed firearms in IPH homicide.  相似文献   

18.
This study explores the clinical epidemiology of children's exposure to violence as addressed by a program in which mental health clinicians work with law-enforcement agents in 10 U.S. cities. Data were collected on all participants contacted by the Child Development Community Policing Program (N = 7,313 individuals involved in 2,466 community incidents). Multivariate regression was used to examine sociodemographic and clinical correlates of the role of participants (victim, offender, or witness), location, and type of incident. The majority of incidents occurred in participants' homes. Adolescents were at a higher risk than children of being: (a) victimized, (b) involved in incidents outside their home, (c) experiencing a threat to their lives, and (d) suffering physical injuries. Males were more likely to be offenders than females, and to be subjected to physical injuries or involved in incidents that imposed a threat to their life. Females were significantly more likely to be victimized.  相似文献   

19.
Are racially-motivated hate crimes, non-criminal bias incidents, and general forms of crime associated with the same structural factors? If so, then social disorganization, a powerful structural correlate of general crime, should predict rates of hate incidents. However, tests of social disorganization’s effects on racially-motivated hate crime yield inconsistent results. This study uses data from the Pennsylvania Human Relations Commission (PHRC) to explore such inconsistencies. Specifically, we assess the effects of social disorganization across contexts and types of bias motivation using bias incidents over 12 years. The results suggest that (a) social disorganization, particularly residential instability, is robustly correlated with rates of both hate crime and other prejudicial conduct, and that (b) the interactive effects of social disorganization help explain variations in incident rates by motivation type. Specifically, anti-black incidents are most frequent in unstable, homogeneous (i.e. white) and advantaged communities, while anti-white incidents are most frequent in unstable, disadvantaged communities.  相似文献   

20.
环境群体性事件一直秉持"污染侵害--群体施压"的逻辑框架,但与之相关的研究进路却忽略了对群体事件参与者内部动员、组织、集结及消解过程的分析。本文通过对大连"7·l6"海洋溢油事故后引发的渔民群体维权事件进行扎根分析发现,群体行动诱因、权变因素、群体行动共识形成、村庄网络化动员、集体行动生成、内部组织消解的核心范畴对环境群体性事件生成及消解有着显著影响,进而建构包含上述核心范畴的环境群体性事件参与者内部集结及消解路径模型,并阐释了模型中各因素内涵的相互关系。旨在研究结论对地方政府科学应对环境群体性事件具有一定的参考价值。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号