Mary Aiken

ORCID: 0000-0001-9800-3952
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cybercrime and Law Enforcement Studies
  • Advanced Malware Detection Techniques
  • Crime Patterns and Interventions
  • Information and Cyber Security
  • Impact of Technology on Adolescents
  • Misinformation and Its Impacts
  • Digital and Cyber Forensics
  • Empathy and Medical Education
  • Spam and Phishing Detection
  • Privacy, Security, and Data Protection
  • Crime, Deviance, and Social Control
  • Digital Games and Media
  • Gender, Feminism, and Media
  • Hate Speech and Cyberbullying Detection
  • Sexuality, Behavior, and Technology
  • Opinion Dynamics and Social Influence
  • Team Dynamics and Performance
  • Mental Health and Psychiatry
  • Aging, Elder Care, and Social Issues
  • Cultural Insights and Digital Impacts
  • Gothic Literature and Media Analysis
  • Behavioral Health and Interventions
  • Cultural Heritage Management and Preservation
  • Digital Mental Health Interventions
  • Stalking, Cyberstalking, and Harassment

Capitol Technology University
2023-2024

University of East London
2021-2024

European Investment Bank
2019

Royal College of Surgeons in Ireland
2012-2015

Cybercrime is becoming ever more pervasive and yet the lack of consensus surrounding what constitutes a cybercrime has significant impact on society, legal policy response, academic research. Difficulties in understanding begin with variability terminology consistency legislation across jurisdictions. In this review, using structured literature review methodology, key definitions, typologies taxonomies were identified range non-academic (grey literature) sources. The findings consolidated...

10.3390/forensicsci2020028 article EN cc-by Forensic Sciences 2022-04-16

The Internet is a source of valuable medical information, however the Web has potential to increase anxieties people with no training when employed as diagnostic procedure (White & Horvitz, 2009). Anxiety induced result health related search online an increasingly differentiated activity ( Fox et al., 2000; Feldman, Lewis, 2006; Belling, Ravdin, 2008; White 2009) and known in field cyberpsychology cyberchondria. This literature review aims research studies that have investigated information...

10.1186/1753-6561-6-s4-p30 article EN cc-by BMC Proceedings 2012-07-01

Visual and auditory information has dominated the field of virtual reality (VR). Evaluation role sensory stimulation in VR highlighted olfactory as a potentially powerful yet underutilized therapeutic tool. Early studies immersive environments, which were run experiments, incorporated smell experience; however, olfaction environment design development arguably failed to maintain position commensurate with its capacity, exemplified by paucity research possible application. A review literature...

10.1007/s10055-015-0260-x article EN cc-by Virtual Reality 2015-02-10

Adolescents are currently the most digitally connected generation in history. There is an ever-growing need to understand how typical adolescent risk-taking intersects with vastly criminogenic potential of digital technology. Criminal hacking older adolescents (16–19-year-olds) was assessed using adapted Theory Planned Behaviour (TPB) model, a cohesive theoretical framework that incorporates cognitive processes and human drivers (informed by psychology, cyberpsychology, criminology theory)....

10.3390/forensicsci4010003 article EN cc-by Forensic Sciences 2024-01-30

The Cyber Forensics Behavioral Analysis (CFBA) model merges Sciences and Digital to improve the prediction effectiveness of cyber threats from Autonomous System Numbers (ASNs). Traditional cybersecurity strategies, focused mainly on technical aspects, must be revised for complex threat landscape. This research proposes an approach combining expertise with cybercriminal behavior insights. study utilizes a mixed-methods integrates various disciplines, including digital forensics,...

10.3390/forensicsci4010008 article EN cc-by Forensic Sciences 2024-03-04

10.17265/2159-5542/2015.09.002 article EN cc-by-nc Journal of Psychology Research 2015-09-28

Contemporary news headlines seem to play regular host treatments of one form cybercrime or another, whether it be fraud, hacking, malware, piracy child abuse material online. In this paper, the meaning that term is unpacked, social impact considered and possible future developments are discussed. Given pervasive profound influence Internet, important acknowledge in terms criminology, what happens online can on real world vice versa. Consequently, real-world cyber impacts relation will examined.

10.1080/21582041.2015.1117648 article EN Contemporary Social Science 2015-12-10

Abstract Co-production across scientific and Indigenous knowledge systems has become a cornerstone of research to enhance knowledge, practice, ethics, foster sustainability transformations. However, the profound differences in world views complex contested histories nation-state colonisation on territories, highlight both opportunities risks for people when engaging with co-production. This paper investigates conditions under which co-production can lead improved adaptive environmental...

10.1007/s11625-021-00988-x article EN cc-by Sustainability Science 2021-07-29

Background: Over the course of last decade, cybercrime has become a significant global concern. A comprehensive approach to crimes that occur in cyber contexts needs address not only technological aspects but also human elements. Therefore, aim current research is twofold: first, gain an in-depth understanding pathways lead criminal hacking behavior through interviews with or former hackers, and second, explore how lived experiences these individuals fit within theoretical explanations...

10.3390/forensicsci4040045 article EN cc-by Forensic Sciences 2024-12-03

Information technology's potential for beneficial effect in healthcare is considerable, but has yet to be realised. While definitions of concepts this area vary, they are largely uniform their positivity. In paper, we outline some psychological issues with the use technology healthcare, including e-health, m-health, pervasive health, telehealth and related initiatives. Fundamentally, urge a more cyberpsychological approach healthcare. By illustrating regard phenomenon cyberchondria (anxiety...

10.1109/cit/iucc/dasc/picom.2015.212 article EN 2015-10-01

Purpose: Lens adapted smartphones are being used regularly instead of ophthalmoscopes. The most common causes preventable blindness in the world, which glaucoma and diabetic retinopathy, can develop asymptomatic changes to optic nerve head (ONH) especially developing world where there is a dire shortage ophthalmologists but ubiquitous mobile phones. We developed proof-of-concept ONH biometric (application [APP]) use as routine on phone. unique blood vessel pattern verified if it maps...

10.1167/tvst.10.8.1 article EN cc-by-nc-nd Translational Vision Science & Technology 2021-07-01

Recent controversies surrounding the ethics of research on social networks have come at a time when science itself is undergoing somewhat transformation process. In this paper we consider how changing technological environment has produced difficulties for lawmakers, and consequently moral decision-making. We attempt to differentiate between human machine data, furthermore situate researcher in cyberspace, context which necessarily both inter- trans-disciplinary. Fundamentally, our purpose...

10.2139/ssrn.2462700 article EN SSRN Electronic Journal 2014-01-01

A groundbreaking integrated predictive model, termed Cyber Forensics Behavioral Analysis (CFBA), has been developed in an environment characterized by rapidly evolving and increasingly sophisticated cyber threats. This model merges Sciences with Digital to enhance the prediction accuracy effectiveness of threats originating from specific Autonomous System Numbers (ASNs). It observed that traditional cybersecurity strategies, predominantly focused on technical aspects, must be improved...

10.20944/preprints202312.0770.v1 preprint EN 2023-12-12

Mary Aiken, cyberpsychologue specialiste de l’impact la technologie sur le comportement humain, attire notre attention l'importance cybersecurite : « Nous devons adopter une approche centree l’etre humain qui tienne compte l’usage reel qu’il fait des objets connectes et non suppositions ou attentes du secteur technologique a cet egard ». Il s’agit cinquieme essai serie Grandes idees » creee par Banque europeenne d’investissement.

10.2867/331797 article FR 2019-09-06

10.24251/hicss.2024.119 article EN Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2024-01-01

Advancing technologies afford new dimensionality to the modus operandi of cyber criminals, thereby – arguably - increasing sophistication that is required for investigation and profiling criminal populations in context. Online classified adult advertising websites are leveraged facilitate human trafficking. The problem trafficking not confined geographically with more than 20 million victims around world, it an issue global importance. present study, inspired by White House Tech. vs. Human...

10.4172/0976-4860.1000146 article EN International Journal of Advancements in Technology 2015-01-01

10.2307/802823 article EN The English Journal 1924-03-01

The purpose of this study is to offer some data answer the question who responds media requests for assistance help in solving major crimes, why do they, how opinionated are and useful process?Six one hour documentaries were commissioned by an Irish national television station presented Mary Aiken Mike Berry broadcasted as "Crime Mind" a prime time slot.Five cases identified analysis including case Annie McCarrick, American student, disappeared from Dublin.All cold where most avenues...

10.13189/ujp.2014.020107 article EN cc-by Universal Journal of Psychology 2014-01-01
Coming Soon ...