Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kathryn C. Seigfried-Spellar is active.

Publication


Featured researches published by Kathryn C. Seigfried-Spellar.


Computers in Human Behavior | 2014

Peer attachment, sexual experiences, and risky online behaviors as predictors of sexting behaviors among undergraduate students

Danielle M. Crimmins; Kathryn C. Seigfried-Spellar

The current study created a predictive risk model for sexting behaviors based on prior sexual experiences, online environments, and peer attachment styles (trust, alienation, and ambivalence). Eighty-eight undergraduate students completed an anonymous online survey regarding their sexting behaviors, sexual experiences, Internet usage, and peer attachment styles. 61% Of the sample reported sexting. The final predictive model for sexting behavior included the following variables: ambivalence, unprotected sex, Internet adult pornography use, and web-based video chatting with strangers. In terms of individual relationships, unprotected sex, adult pornography use, and web-based chatting with strangers were significantly related to sexting (see Table 5). Individuals who have had unprotected sex were 4.5 times more likely to sext, and individuals who viewed adult pornography were 4 times more likely to sext. Finally, individuals who had engaged in web-based video chatting with strangers were 2.4 times more likely to sext. Future research suggestions and study limitations are discussed.


Computers in Human Behavior | 2013

Does deviant pornography use follow a Guttman-like progression?

Kathryn C. Seigfried-Spellar; Marcus K. Rogers

Abstract This study investigated whether deviant pornography use followed a Guttman-like progression in that a person transitions from being a nondeviant to deviant pornography user. In order to observe this progression, 630 respondents from Survey Sampling International’s (SSI) panel Internet sample completed an online survey assessing adult-only, bestiality, and child pornography consumption. Respondents’ “age of onset” for adult pornography use was measured to determine if desensitization occurred in that individuals who engaged in adult pornography at a younger age were more likely to transition into deviant pornography use. Two hundred and 54 respondents reported the use of nondeviant adult pornography, 54 reported using animal pornography, and 33 reported using child pornography. The child pornography users were more likely to consume both adult and animal pornography, rather than just solely consuming child pornography. Results suggested deviant pornography use followed a Guttman-like progression in that individuals with a younger “age of onset” for adult pornography use were more likely to engage in deviant pornography (bestiality or child) compared to those with a later “age of onset”. Limitations and future research suggestions are discussed.


Deviant Behavior | 2014

Differentiating Hackers, Identity Thieves, Cyberbullies, and Virus Writers by College Major and Individual Differences

Kathryn C. Seigfried-Spellar; Kellin N. Treadway

This study examined the personality characteristics of 296 self-reported computer deviants and non-computer deviants with different college majors. Results indicated hackers majoring in the Arts were more hedonistic compared to the hackers majoring in Business. The identity thieves majoring in Business were more extraverted and open to experiences compared to the identity thieves majoring in “Both.” The virus writers majoring in the Arts were more likely to make moral decisions based on hedonistic, social, and internal moral values compared to the virus writers majoring in Business. There were no significant differences in the personality characteristics of cyberbullies with different majors.


Cyberpsychology, Behavior, and Social Networking | 2010

Low neuroticism and high hedonistic traits for female internet child pornography consumers

Kathryn C. Seigfried-Spellar; Marcus K. Rogers

Limited research has attempted to identify and understand the personality characteristics of female consumers of Internet child pornography (ICP). In the current study, female respondents (N = 162) from the Seigfried et al. study were analyzed to determine if personality characteristics differed between female users (n = 10, 6.2%) and female non-users (n = 152, 93.8%) of ICP. An exploratory backward stepwise (Wald) logistic regression revealed a predictive model, with female ICP consumers scoring: low on neuroticism, high on moral choice hedonism, and self-reporting a non-white racial identity. The relationship between female ICP consumption, neuroticism, hedonism, and race are discussed, along with the studys limitations and future research suggestions in the area of computer deviance.


The Journal of Digital Forensics, Security and Law | 2014

Using Internet Artifacts to Profile a Child Pornography Suspect

Marcus K. Rogers; Kathryn C. Seigfried-Spellar

Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; Gay Porn), the Internet history files were statistically analyzed to determine prevalence and trends in Internet browsing. First, a frequency analysis was used to determine a baseline of online behavior. Results showed 54% ( n = 3205) of the URLs were classified as “neutral” and 38.8% ( n = 2265) of the URLs were classified as a porn website. Only 10.8% of the URLs were classified as child pornography websites. However when the IE history file was analyzed by visit, or “hit,” count, the Pictures/Profiles (31.5%) category had the highest visit count followed by Neutral (19.3%), Gay Porn (17%), and Child Porn (16.6%). When comparing the frequency of URLs to the Hit Count for each pornography type, it was noted that the accused was accessing gay porn, child porn, chat rooms, and picture profiles (i.e., from Facebook) more often than adult porn and neutral websites. The authors concluded that the suspect in this case was in fact a child pornography user and not an ad hoc investigator, and the findings from the behavioral analysis were admitted as evidence in the sentencing hearing for this case. The authors believe this case study illustrates the ability to conduct a behavioral analysis of digital evidence. More work is required to further validate the behavioral analysis process described, but the ability to infer the predilection for being a consumer of child pornography based on Internet artifacts may prove to be a powerful tool for investigators.


Criminal Justice Studies | 2016

Why digital forensics is not a profession and how it can become one

Michael Losavio; Kathryn C. Seigfried-Spellar; John J. Sloan

ABSTRACT Digital forensics (DF) has existed since the 1970s when industry and government first began developing tools to investigate end users engaging in Web-enabled financial fraud. Over the next 40 years, DF evolved until, in 2010, the National Research Council ‘officially’ recognized DF as a forensic discipline. Over its evolution, DF developed some of the traits of a profession, which sociologists suggest include the following: (1) specialized knowledge; (2) specialized training; (3) work that is of great value; (4) credat emptor (‘let the buyer trust’) relations with clients; (5) a code of professional ethics; (6) cooperative relations with other members; (7) high levels of autonomy; and (8) self-regulation. This paper reviews the development of DF and argues that despite making strides, DF has not yet achieved the status of a profession as described by social scientists, and that it will not achieve that status until it remedies several deficiencies and addresses impediments preventing it from attaining that status, including the perceived low social status of the field’s clientele and an inability of the field to convince the public it occupies a unique place within the larger division of labor in society.


Digital Forensics#R##N#Threatscape and Best Practices | 2016

The intersection between social media, crime, and digital forensics: #WhoDunIt?

Kathryn C. Seigfried-Spellar; Sean C. Leshney

This chapter opens with a discussion on the prevalence and different types of social media, such as social networking sites, blogs, virtual social worlds, collaborative projects, content communities, and virtual game worlds. Next, the authors review the potential evidentiary value that social media may have in criminal cases. Specifically, social media may yield digital evidence of the planning, commission, or aftermath of a crime. Finally, this chapter provides an overview on the location of social media evidence on the network and physical device, as well as the most common digital forensic tools that extract and analyze social media artifacts. Overall, not only are almost all criminal investigations involving at least one form of digital evidence, it is plausible that the majority of them will also involve a form of social media as well. Thus, it is necessary for law enforcement to stay up-to-date on the latest social media trends in order to identify the most effective tool for extracting and analyzing social media evidence.


international conference on digital forensics | 2015

Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives

Kathryn C. Seigfried-Spellar; Ben M. Flores; Darrin J. Griffin

Cyber(terrorism) threats posted via social media are capable of devastating, real-world effects, including miscommunication and rumors, panic, and financial loss. This manuscript details a case study of the cyber(terrorism) threat that occurred at The University of Alabama on September 21, 2014, referred to as the Authur Pendragon incident. The Authur Pendragon threat led to a week of fear, social media hyperactivity, and the propagation of rumors, all of which reached beyond The University of Alabama campus. A timeline of the event, which includes social media posts, official University responses, and mass media coverage, are presented followed by an analysis of the case from both a socio-psychological and communications perspective. Recommendations for managing cyber threats and rumor mongering are provided as well as future research suggestions.


international conference on digital forensics | 2011

Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers

Kathryn C. Seigfried-Spellar; Gary R. Bertoline; Marcus K. Rogers

The following review will provide a historical recap of the United States response to child pornography as it relates to the ever-evolving technological world. Specifically, a review of the child pornography laws, at the federal level, as well as the sentencing guidelines will reveal the delicate balance between criminalizing child pornography and upholding the United States’ constitution. In addition, discussing the role of Internet Service Providers will expose a trend toward using the same technology, which has proliferated the child pornography industry, to identify and censor the illegal content on the Internet. Finally, the strengths and weaknesses of the current laws and regulation tactics, as well as, the suggested amendments will be discussed.


Archive | 2015

Cybercrime and Digital Forensics: An Introduction

Thomas J. Holt; Adam M. Bossler; Kathryn C. Seigfried-Spellar

Collaboration


Dive into the Kathryn C. Seigfried-Spellar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Adam M. Bossler

Georgia Southern University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge