Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Law
The Black And White Of Profiling: Sniping On The Sniper Case, Ibpp Editor
The Black And White Of Profiling: Sniping On The Sniper Case, Ibpp Editor
International Bulletin of Political Psychology
This article analyzes the construct of profiling in the aftermath of the arrest of two suspects in the recent sniper attacks perpetrated in the greater Washington, D.C. area.
Trends. Death Penalties For Purveyors Of Death? Not For Many Terrorists, Ibpp Editor
Trends. Death Penalties For Purveyors Of Death? Not For Many Terrorists, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the nuances surrounding the use of the death penalty in terrorism cases.
Competency To Stand Trial: An International Challenge, Ibpp Editor
Competency To Stand Trial: An International Challenge, Ibpp Editor
International Bulletin of Political Psychology
This article describes some of the difficulties in developing an international standard for competency to stand trial.
The Political Psychology Of Child Molestation: Import For The Rule Of Law, Ibpp Editor
The Political Psychology Of Child Molestation: Import For The Rule Of Law, Ibpp Editor
International Bulletin of Political Psychology
This article describes the problematic nature of child molestation for the rule of law.
Comments On Walzer's "Judgment Days": Public Accountability For The Egregious Behavior Of, Ibpp Editor
Comments On Walzer's "Judgment Days": Public Accountability For The Egregious Behavior Of, Ibpp Editor
International Bulletin of Political Psychology
This article provides commentary on Michael Walzer's "Judgment Days". Walzer's article was published in The New Republic, December 15, 1997, pp. 13-14.
Trends. Encrypting Encryption: Some Comments On S. 909, Secure Public Networks Act, Ibpp Editor
Trends. Encrypting Encryption: Some Comments On S. 909, Secure Public Networks Act, Ibpp Editor
International Bulletin of Political Psychology
The author discusses The use of technology and telecommunications being employed by people in the commission of crimes, viz., terrorism and organized crime.