SCA Faculty Publications
Permanent URI for this collection
Browse
Recent Submissions
Item The impacts of COVID-19 on incarcerated people and their families(Wichita State University, 2020-09-15) Boppre, Breanna L.Breanna Boppre will discuss the implications of COVID-19 for correctional agencies nationwide and in Kansas. She will provide preliminary results from her ongoing mixed-methods study that examines families' experiences of having a loved one incarcerated during the pandemic.Item Social media intelligence: AI applications for criminal investigation and national security(IGI Global, 2023-02-01) Yu, Sz DeThis chapter aims at discussing how social media intelligence (SOCMINT) can be and has been applied to the field of criminal justice. SOCMINT is composed of a set of computer forensic techniques used for intelligence gathering on social media platforms. Through this chapter, readers will be able to better understand what SOCMINT is and how it may be helpful for criminal investigation and national security. Different aspects of SOCMINT are addressed, including application in criminal justice, intelligence gathering, monitoring, metadata, cyber profiling, social network analysis, tools, and privacy concerns. Further, the challenges and future research directions are discussed as well. This chapter is not meant to serve as a technical tutorial as the focus is on the concepts rather than the techniques.Item Cyber profiling in criminal investigation(IGI Global, 2021-01-01) Yu, Sz DeThe line between street crimes and cybercrimes has been increasingly blurry, given the prevalence of internet access. In all kinds of criminal investigations, digital information has become relevant and even crucial in most cases. Investigators are gradually relying on information retrieved from electronic platforms to find leads and evidence. When comprehensive information is not always attainable, the use of cyber profiling may provide further insight into crucial questions regarding identity, time, and location. Cyber profiling is essentially an analysis on the digital footprints associated with a person whose identity may or may not have been known. The purpose is to reveal information that is not readily visible in the digital footprints, such as personality, motives, and counter-forensic efforts. This chapter introduces what cyber profiling is and how it can help with criminal investigation.Item The gendered effects of a graduated sanctions model on probation outcomes in Kansas(SAGE Journals, 2022-02-27) Browne, George Ebo; Melander, Lisa; Boppre, Breanna L.; Edwards, Mari-EstherAlthough originally perceived as an evidence-based program, there has been a continual debate on the true effectiveness of the graduated sanctions model for probation. Nonetheless, what is missing in the literature is an examination of how this program may affect women under supervision differently than men. Utilizing probation violation hearing data from the Kansas Sentencing Commission (KSSC), this study examines the impact of Kansas’ 2013 House Bill 2170 (HB 2170) on probation outcomes across gender. Results indicate that the use of graduated sanctions scheme through HB 2170 is associated with a higher likelihood of receiving an imprisonment disposition for women probation technical violators than men. Major findings and policy implications will be discussed.Item Prevention and mitigation measures against phishing emails: A sequential schema model(Springer Nature, 2021-09-28) Suzuki, Yumi; Monroy, Sergio A.SalinasPhishing emails have permeated our digital communication, taking advantage of vulnerabilities that the information technology system poses to users. Given the potential for further cybersecurity incidents, theft of personally identifiable information, and damage to organizations’ assets, cybersecurity professionals have implemented various mitigation practices to combat phishing emails. This paper categorizes current mitigation practices in relation to a sequential schema adopted from the situational crime prevention approach, so as to enable a more organized and strategic assessment of human and environmental vulnerabilities. Our model could be useful for cybersecurity professionals to further advance mitigation measures as an incident progresses and for criminologists and other academic researchers to reduce the severity of subsequent criminal incidents.