23 research outputs found

    Differentiating cyberbullies and Internet trolls by personality characteristics and self-esteem

    Get PDF
    Cyberbullying and internet trolling are both forms of online aggression or cyberharassment; however. research has yet to assess the prevalence of these behaviors in relationship to one another. In addition, the current study was the first to investigate whether individual differences and self-esteeem discerned between self reported cyberbullies and/or internet trolls ( i.e. Never engaged in either, Cyberbully-only, Troll-Only, Both Cyberbully and Troll). Of 308 respondents solicited from Mechanical Turk, 70 engaged in cyberbullying behaviors, 20 engaged in onlt trolling behaviors, 129 self-reported both behaviors, and 89 self-reported neither behavior. Results yielded low self-esteem, low conscientiousness, and low internal moral values for both cyberbullying and trolling behaviors. However, there were differentiating factors between individuals who only engaged in cyberbullyinh behaviors (high on neuroticism) vs. trolling-only behaviors (high on openness to experience). Individuals who engaged in both behaviors scored higher on extraversion, lower on agreeableness, and lower on self-esteem compared to individuals who engaged in neither behavior

    Forensic Discoverability of iOS Vault Applications

    Get PDF
    Vault Applications are used to store potentially sensitive information on a smartphone; and are available on Android and iOS. The purpose of using these applications could be used to hide potential evidence or illicit photos. After comparing five different iOS photo vaults, each vault left evidence and photos behind. However, of the three forensic toolkits used, each produced different results in their scans of the phone. The media left behind was due to the photo vaults not protecting their information as claimed, and using basic obfuscation techniques in place of security controls. Future research will look at how newer security controls are implemented, and if they are easily discoverable as well

    Using Internet Artifacts to Profile a Child Pornography Suspect

    Get PDF
    Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; Gay Porn), the Internet history files were statistically analyzed to determine prevalence and trends in Internet browsing. First, a frequency analysis was used to determine a baseline of online behavior. Results showed 54% (n = 3205) of the URLs were classified as “neutral” and 38.8% (n = 2265) of the URLs were classified as a porn website. Only 10.8% of the URLs were classified as child pornography websites. However when the IE history file was analyzed by visit, or “hit,” count, the Pictures/Profiles (31.5%) category had the highest visit count followed by Neutral (19.3%), Gay Porn (17%), and Child Porn (16.6%). When comparing the frequency of URLs to the Hit Count for each pornography type, it was noted that the accused was accessing gay porn, child porn, chat rooms, and picture profiles (i.e., from Facebook) more often than adult porn and neutral websites. The authors concluded that the suspect in this case was in fact a child pornography user and not an ad hoc investigator, and the findings from the behavioral analysis were admitted as evidence in the sentencing hearing for this case. The authors believe this case study illustrates the ability to conduct a behavioral analysis of digital evidence. More work is required to further validate the behavioral analysis process described, but the ability to infer the predilection for being a consumer of child pornography based on Internet artifacts may prove to be a powerful tool for investigators

    Human Trafficking and Air Transportation

    Get PDF
    Human trafficking may seem like something that only happens somewhere far away, but it happens right here in Indiana and elsewhere in the Midwest. Human trafficking is different from smuggling (moving people) because trafficking involves exploitation. Come learn more about human trafficking and what airports can do to help stop it

    Development of A Professional Code of Ethics in Digital Forensics

    Get PDF
    Academics, government officials, and practitioners suggest the field of digital forensics is in need of a professional code of ethics. In response to this need, the authors developed and proposed a professional code of ethics in digital forensics. The current paper will discuss the process of developing the professional code of ethics, which included four sets of revisions based on feedback and suggestions provided by members of the digital forensic community. The final version of the Professional Code of Ethics in Digital Forensics includes eight statements, and we hope this is a step toward unifying the field of digital forensics as a profession

    Integrating a Human-Centered Design Approach in a Human Trafficking Hackathon

    Get PDF
    Human trafficking is a global epidemic that results in grave violations of human rights for approximately 24.9 million people worldwide. The National Academy of Engineering states human-centered design is appropriate for addressing Grand Challenges; thus, the fact that human trafficking intersects with multiple UN agencies and sustainable development goals signifies the need for holistic, interdisciplinary approaches to this global epidemic. Design thinking supports the development of diverse ideas, which are critical for innovation. In this paper, we describe a university-wide event that applied a human-centered design approach to the problem of human trafficking. In this paper, we describe a human to develop potential solutions in mitigating/ending the crime of human trafficking. We organized a university event, inviting experts, faculty, students, staff, and the interested local community to demonstrate that higher education institutions can have an impactful role on human trafficking and potentially effect change. While previous hackathons utilize existing datasets, this was a novel approach in that no data was formally provided to the student teams. The human-centered design approach was successful in facilitating innovation. In addition, the diversity of majors and student team mentors were important in the variety of socio-technical solutions developed by the student teams

    Analyzing the Ashley Madison Dataset?

    No full text
    Ashley Madison is an online dating website for individuals who are married or in a committed relationship and are interested in having an affair; their slogan is “Life is short – Have an affair.” In August 2015, the Ashley Madison website was hacked and customer information was publically posted on the Internet for the world to see. Journalists, researchers and bloggers began downloading and analyzing the breached data, but for some, ethical concerns were raised. By viewing the Ashley Madison dataset, are we legitimizing the manner in which the dataset was obtained, and are we as a society encouraging future data exploits

    The role of individual differences in predicting the type of images collected by internet child pornography consumers

    No full text
    The current study was the first to analyze the relationship among psychological characteristics, personality, and the types of images preferred or collected by self-reported consumers of Internet child pornography. This study had 4 specific aims: (1) to explore the personality differences between self-reported consumers and non-consumers of Internet child pornography, (2) to examine whether the self-reported male and female consumers of Internet child pornography exhibit different personality characteristics and traits from the non-consumers, (3) to assess the types of images preferred by the self-reported consumers of Internet child pornography, and (4) to determine whether or not there was a predictive relationship between the personality characteristics and the types of images preferred by the self-reported child pornography consumers. This study was conducted electronically using an Internet-based survey, which targeted respondents from the United States, United Kingdom, Australia, and Canada. By targeting current permanent residents from these countries, the study ensured the respondents were from countries where the possession, distribution, and production of Internet child pornography was illegal. Results suggested the self-reported child pornography users in this sample were more trusting (less suspicious) and compliant (less oppositional) whereas the respondents who did not self-report child pornography use were more suspicious (less trusting) and oppositional (less compliant). Second, the male consumers of child pornography were less likely to make moral decisions based on social values (e.g., societal norms, laws) compared to the female consumers of Internet-child pornography. Third, those individuals who engaged in more Internet child pornography behaviors were more social, unconventional, and followed a different moral compass (i.e., do not make decisions based on moral beliefs). Finally, with regard to image content, the results suggested the self-reported child pornography users in this sample might prefer different types of child pornography. Overall, Internet-based research designs assessing the relationship between psychology constructs and Internet child pornography use was possible, but this type of research was not without limitations

    Witnessing a Rise of Uninhabited Bridges - Meet the Internet Troll

    No full text
    Not too long ago, trolls only existed in folklore as supernatural beings described as grotesque and ill-mannered and often dwelling under bridges in fairy tales. However, trolls are no longer a creature of myth that is scarcely seen or heard from; instead, they have abandoned bridges for a new home – the Internet. This talk will introduce the audience to the Internet Troll – a subculture of the Internet that is “turning the web into a cesspool of aggression and violence” (Stein, 2016)
    corecore