6 research outputs found

    Using Internet Artifacts to Profile a Child Pornography Suspect

    Get PDF
    Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; Gay Porn), the Internet history files were statistically analyzed to determine prevalence and trends in Internet browsing. First, a frequency analysis was used to determine a baseline of online behavior. Results showed 54% (n = 3205) of the URLs were classified as “neutral” and 38.8% (n = 2265) of the URLs were classified as a porn website. Only 10.8% of the URLs were classified as child pornography websites. However when the IE history file was analyzed by visit, or “hit,” count, the Pictures/Profiles (31.5%) category had the highest visit count followed by Neutral (19.3%), Gay Porn (17%), and Child Porn (16.6%). When comparing the frequency of URLs to the Hit Count for each pornography type, it was noted that the accused was accessing gay porn, child porn, chat rooms, and picture profiles (i.e., from Facebook) more often than adult porn and neutral websites. The authors concluded that the suspect in this case was in fact a child pornography user and not an ad hoc investigator, and the findings from the behavioral analysis were admitted as evidence in the sentencing hearing for this case. The authors believe this case study illustrates the ability to conduct a behavioral analysis of digital evidence. More work is required to further validate the behavioral analysis process described, but the ability to infer the predilection for being a consumer of child pornography based on Internet artifacts may prove to be a powerful tool for investigators

    Perpetrators, victims, bystanders and up standers: cyber bullying in a special school context.

    Get PDF
    This study offers a multi-dimensional analysis of ‘real world’ cyberbullying between members of a special school community. The purpose of this article is to analyse the social and educational contexts within which interactions of this nature are embedded.The interview both illuminated a number of themes pertinent to the current literature and extended those related to the call for further analysis of the contextual determinants of cyberbullying.The influence of the conditions experienced by the children involved (Attention Deficit Hyperactivity Disorder (ADHD) and Autistic Spectrum Condition (ASC)) is discussed and demonstrated. This use of natural observation provides a current and ‘real world’ illustration of teacher perceptions of the complex behaviours and interactions occurring in cyberspace, which hold potential for grave consequences. A hopeful tone is maintained as the potential for selfless upstander behaviour and resolution via the involvement of supportive and knowledgeable pastoral staff is realised in the article’s conclusion.<br/

    Dimensional personality traits and normative externalizing behavior in a college sample

    No full text
    This study aimed to determine personality traits that are associated with a variety of different problematic externalizing behaviors among college students versus personality traits that are selectively associated with one or more specific types of externalizing behavior. In order to do this, a wide range of personality traits and externalizing behaviors (e.g. alcohol and drug use, risky driving, aggressive acts, sexual promiscuity and relationship infidelity, academic misconduct, etc.) typical among an undergraduate population were examined in conjunction. Furthermore, this examination was conducted using the recently proposed personality model for the DSM-5, a model that aligns well with existing personality models but is in need of further research. The sample included 257 college undergraduates who responded to the Personality Inventory for the DSM-5, a self-report personality survey designed to be representative of the DSM-5 model, as well a variety of self-report inventories measuring externalizing behaviors. Results revealed that externalizing behavior is best associated with the domain level trait Antagonism and to a lesser degree Disinhibition. In addition certain facet level traits (i.e. Deceitfulness and Risk-taking) were also associated with a variety of externalizing criteria while a few facet level traits (i.e., Hostility) were associated primarily with a particular type of externalizing behavior. Implications are discussed. (Published By University of Alabama Libraries

    The Emperor Has No Clothes: A Review of the ‘Pornography Addiction’ Model

    No full text
    corecore