11 |
Classification of Toolmark Surfaces on Zipper TeethJacobsen, Dawn 12 1900 (has links)
This study proposes the classification of the toolmark under the heads of zipper teeth as a subclass characteristic as outlined by the Association of Firearm and Toolmark Examiners (AFTE). Two separate cases in which zipper teeth were found at crime scenes prompted this study. Brass zipper teeth manufactured by YKK were taken from 20 pairs of jeans and studied using a Reichert comparison microscope at 4X power. Photographs were taken and over 750 comparisons made. It was found that the toolmarks on each side on the 20 zippers were unique and independent of all other sides. The observations made in this study indicate that classifying zipper teeth toolmarks as a subclass characteristic is valid.
|
12 |
Is criminogenic risk assessment a prisoner of the proximate? Challenging the assumptions of an expanding paradigmPrins, Seth Jacob January 2016 (has links)
Criminogenic risk assessment, which was developed to predict recidivism, has risen to the status of “evidence-based practice” in corrections systems. As a result of its apparent success, proponents now claim that it captures the origins of criminal behavior, and can thus be leveraged to reduce correctional supervision rates and prevent crime. This dissertation investigates the validity of the these claims, by identifying and testing three assumptions requisite for the framework’s expansion: 1) the evidence base for the framework’s predictive performance is being interpreted correctly and appropriately, 2) the best causal models of recidivism are also the best causal models of the onset and duration of criminal behavior (and by extension, that interventions successful at reducing recidivism will be successful at reducing the onset, duration, and rate of criminal behavior); and 3) the causes of individual variation in criminal behavior are the same as causes of the population distribution, or incidence rate, of crime. This dissertation proceeds in three parts: a meta-review and critical analysis of the literature addresses the first assumption, and two empirical studies test the second and third assumptions, respectively. The meta-review determined that findings for the framework’s predictive performance are inconsistent, based on inadequate or insufficient statistical information, and often overstated. The first empirical study found that each arrest, and to a lesser extent conviction, an individual experienced increased their subsequent criminogenic risk levels, raising concerns about the framework’s applicability for crime prevention and etiology. The second empirical study found that criminogenic risks do not explain group differences in arrest and conviction rates, underscoring that researchers and policymakers should more cautiously communicate the scope of reform that the framework can deliver.
|
13 |
Images of legitimacy presentation of forensics programming in contemporary news publications /Justis, Gregory G. January 2006 (has links)
Thesis (M.S.)--Michigan State University. School of Criminal Justice , 2006. / Title from PDF t.p. (viewed on June 19, 2009) Includes bibliographical references (p. 42-45). Also issued in print.
|
14 |
I'd be helping if we weren't so committed the application of the investment model to the study of alibis /Jolly, Kevin Weston. January 2008 (has links)
Thesis (M.A.)--University of Texas at El Paso, 2008. / Title from title screen. Vita. CD-ROM. Includes bibliographical references. Also available online.
|
15 |
Constructing justice how the interactions between victims and detectives affect the quality of rape investigations /Patterson, Debra Ann. January 2008 (has links)
Thesis (Ph. D.)--Michigan State University. Dept. of Psychology, 2008. / Title from PDF t.p. (viewed on July 8, 2009) Includes bibliographical references (p. 143-148). Also issued in print.
|
16 |
Understanding perceptions of hypnotically recovered memories in a civil sexual abuse caseFusco, Samantha. January 2009 (has links)
Thesis (M. A.)--Roger Williams University, 2009. / Title from title page screen (viewed on Oct. 29, 2009) Includes bibliographical references.
|
17 |
A Web based forensic information management systemGovindarajulu, Sriram. January 2005 (has links)
Thesis (M.S.)--West Virginia University, 2005 / Title from document title page. Document formatted into pages; contains x, 128 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 127-128).
|
18 |
Forensic information management systemSrinivasan, Arunshankar. January 2004 (has links)
Thesis (M.S.)--West Virginia University, 2004. / Title from document title page. Document formatted into pages; contains xii, 88 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 87-88).
|
19 |
Web based forensic information management systemSingh, Parmjit, January 2006 (has links)
Thesis (M.S.)--West Virginia University, 2006. / Title from document title page. Document formatted into pages; contains xiii, 316 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 315-316).
|
20 |
A Framework for using Open Source intelligence as a Digital Forensic Investigative toolRule, Samantha Elizabeth January 2015 (has links)
The proliferation of the Internet has amplified the use of social networking sites by creating a platform that encourages individuals to share information. As a result there is a wealth of information that is publically and easily accessible. This research explores whether open source intelligence (OSINT), which is freely available, could be used as a digital forensic investigative tool. A survey was created and sent to digital forensic investigators to establish whether they currently use OSINT when performing investigations. The survey results confirm that OSINT is being used by digital forensic investigators when performing investigations but there are currently no guidelines or frameworks available to support the use thereof. Additionally, the survey results showed a belief amongst those surveyed that evidence gleaned from OSINT sources is considered supplementary rather than evidentiary. The findings of this research led to the development of a framework that identifies and recommends key processes to follow when conducting OSINT investigations. The framework can assist digital forensic investigators to follow a structured and rigorous process, which may lead to the unanimous acceptance of information obtained via OSINT sources as evidentiary rather than supplementary in the near future.
|
Page generated in 0.0257 seconds