Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social Control, Law, Crime, and Deviance

2022

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Law

Press Freedom Under Threat In Europe: A Case Study Analysis Of The Increasing Threat To Press Freedom In Greece, Italy, And Hungary, Maya O'Leary-Cyr Dec 2022

Press Freedom Under Threat In Europe: A Case Study Analysis Of The Increasing Threat To Press Freedom In Greece, Italy, And Hungary, Maya O'Leary-Cyr

Undergraduate Honors Theses

This research critically examines the legal systems of European countries and their relationship to press freedom. This research focuses on the vexatious legal threats used by government officials and corporations to silence journalists. These legal threats are known as SLAPPs (strategic lawsuits against public participation) and their use has increased exponentially in the last decade. Considering the scope of the problem, this research analyzes the issue through the lens of European countries Greece, Italy, and Hungary. Being members of the European Union, each of these countries have an obligation to uphold the democratic standards put forth by the EU as …


The Fiscal Impact Of Marsy's Law: A Financial Analysis Of Victims' Rights Policy In Nevada, Elia Del Carmen Solano-Patricio Dec 2022

The Fiscal Impact Of Marsy's Law: A Financial Analysis Of Victims' Rights Policy In Nevada, Elia Del Carmen Solano-Patricio

Undergraduate Research Symposium Lightning Talks

Since 2008, the "Marsy's Law" campaign has sought to embed in state constitutions a specific and lengthy set of victims' rights. In 2018, voters ratified "Question 1" in Nevada which broaded the definition of the term victim to any person directly and 'proximately' harmed by a criminal offense. As a result, Marsy's Law opens the door to the interpretation of the word "crime" and the word "victim."


The Politics Of The Self: Psychedelic Assemblages, Psilocybin, And Subjectivity In The Anthropocene, Joshua Falcon Jun 2022

The Politics Of The Self: Psychedelic Assemblages, Psilocybin, And Subjectivity In The Anthropocene, Joshua Falcon

FIU Electronic Theses and Dissertations

This dissertation examines how psychedelic substances become drawn into particular sociohistorical and political arrangements, and how psychedelic experiences with psilocybin ‘magic mushrooms’ are used as tools of subjectivation. Guided by literatures in philosophy, critical theory, and the social sciences that focus on subjectivity, assemblage theory, and critical posthumanism, I argue that psychedelics are drawn into variegated assemblages, each of which conceptualizes the nature of psychedelics in highly specific ways that reflect implicit conceptions of the world and the self. In developing the concept of psychedelic assemblages, this research provides a window onto the politics of the self in the Anthropocene. …


Suspect Development Systems: Databasing Marginality And Enforcing Discipline, Rashida Richardson, Amba Kak Jun 2022

Suspect Development Systems: Databasing Marginality And Enforcing Discipline, Rashida Richardson, Amba Kak

University of Michigan Journal of Law Reform

Algorithmic accountability law—focused on the regulation of data-driven systems like artificial intelligence (AI) or automated decision-making (ADM) tools—is the subject of lively policy debates, heated advocacy, and mainstream media attention. Concerns have moved beyond data protection and individual due process to encompass a broader range of group-level harms such as discrimination and modes of democratic participation. While a welcome and long overdue shift, the current discourse ignores systems like databases, which are viewed as technically “rudimentary” and often siloed from regulatory scrutiny and public attention. Additionally, burgeoning regulatory proposals like algorithmic impact assessments are not structured to surface important –yet …


Police Frisks, David S. Abrams, Hanming Fang, Priyanka Goonetilleke May 2022

Police Frisks, David S. Abrams, Hanming Fang, Priyanka Goonetilleke

All Faculty Scholarship

The standard economic model of police stops implies that the contraband hit rate should rise when the number of stops falls, ceteris paribus. We provide empirical corroboration of such optimizing models of police behavior by examining changes in stops and frisks around two extraordinary events of 2020 - the pandemic onset and the nationwide protests following the killing of George Floyd. We find that hit rates from pedestrian and vehicle stops generally rose as stops and frisks fell dramatically. Using detailed data, we are able to rule out a number of alternative explanations, including changes in street population, crime, police …


Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk May 2022

Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk

Graduate Theses and Dissertations

Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …


Reformation Within The Nation: Adapting The Nordic Rehabilitation And Reintegration Model To Positively Recondition The United States Criminal Justice System, Jessica Cornell Apr 2022

Reformation Within The Nation: Adapting The Nordic Rehabilitation And Reintegration Model To Positively Recondition The United States Criminal Justice System, Jessica Cornell

Helm's School of Government Conference - American Revival: Citizenship & Virtue

An analytical and statistical based comparison of criminal sentencing, incarceration, rehabilitation and reintegration in the United States of America to those of the five countries which follows those of the Nordic Criminal Justice System.


Unofficial Torturers And Helpless Victims: Applying The Convention Against Torture To Organized Criminal Groups, Emmanuel Orozco Castellanos Apr 2022

Unofficial Torturers And Helpless Victims: Applying The Convention Against Torture To Organized Criminal Groups, Emmanuel Orozco Castellanos

Independent Study Project (ISP) Collection

Since its inception, the United Nations Convention Against Torture (UNCAT) conceived torture as a state crime. The Convention established a so-called “state-nexus” that effectively excludes torture committed by non-state actors. The Committee Against Torture as well as the world’s major anti-torture NGOs have almost exclusively focused on ill-treatment perpetrated by state entities. Yet, there have been efforts to extend the definition to private actors, including the “de facto authority” approach, and the due diligence doctrine. This article explores the effectiveness of these efforts to expand the scope of the UNCAT when applied to organized criminal organization such as gangs and …


Sticky Situations: Understanding The Law And Life, Krystal Banks Mar 2022

Sticky Situations: Understanding The Law And Life, Krystal Banks

National Youth Advocacy and Resilience Conference

Law and life go hand in hand. Understanding the law and how it connects to life can be an effective tool in teaching youth and adults the value of making good decisions when it comes to life and the law. Sticky Situations places real-world situations in the context of learning how to apply the law and effectively respond to life's sticky situations.


‘They Did Not Have To Burn My Sister Alive’: Causes And Distribution By State Of Dowry Murder In India, Peter Mayer Mar 2022

‘They Did Not Have To Burn My Sister Alive’: Causes And Distribution By State Of Dowry Murder In India, Peter Mayer

Dignity: A Journal of Analysis of Exploitation and Violence

Dowry, the money, goods, property, or gifts given by the bride’s family to the groom or his family at the time of marriage, is a common custom in South Asia. Although it is illegal to demand—or offer—a dowry in India, it is a nearly universal custom in many parts of the country. If, after marriage, a husband’s family feels that the wife’s dowry was insufficient, they may harass or inflict other forms of domestic violence on her to put pressure on her family to provide an additional dowry. At its most extreme, this violence may lead to the murder of …


Tax Evasion And Fraud In The United States Sex Market, Youngbee Dale Mar 2022

Tax Evasion And Fraud In The United States Sex Market, Youngbee Dale

Dignity: A Journal of Analysis of Exploitation and Violence

This study describes tax evasion or fraud in the United States sex market. Prior to this study, scholars have recognized the problem of tax evasion in the commercial sex market as an obstacle to national revenue collection. Tax violation and fraud investigations also are ways to combat the illegal commercial sex industry. However, no studies have focused on the problem in the United States sex market. Hence, this study aims to describe tax evasion or fraud methods used by the criminals operating in the United States sex market. This study relies on both quantitative and qualitative methods to examine the …


Remodeling Criminal Insanity: Exploring Philosophical, Legal, And Medical Premises Of The Medical Model Used In Norwegian Law, Linda Gröning, Unn K. Haukvik, Stephen J. Morse, Susanna Radovic Jan 2022

Remodeling Criminal Insanity: Exploring Philosophical, Legal, And Medical Premises Of The Medical Model Used In Norwegian Law, Linda Gröning, Unn K. Haukvik, Stephen J. Morse, Susanna Radovic

All Faculty Scholarship

This paper clarifies the conceptual space of discussion of legal insanity by considering the virtues of the ‘medical model’ model that has been used in Norway for almost a century. The medical model identifies insanity exclusively with mental disorder, and especially with psychosis, without any requirement that the disorder causally influenced the commission of the crime. We explore the medical model from a transdisciplinary perspective and show how it can be utilised to systematise and reconsider the central philosophical, legal and medical premises involved in the insanity debate. A key concern is how recent transdiagnostic and dimensional approaches to psychosis …


Internal And External Challenges To Culpability, Stephen J. Morse Jan 2022

Internal And External Challenges To Culpability, Stephen J. Morse

All Faculty Scholarship

This article was presented at “Guilty Minds: A Virtual Conference on Mens Rea and Criminal Justice Reform” at Arizona State University’s Sandra Day O’Connor College of Law. It is forthcoming in Arizona State Law Journal Volume 53, Issue 2.

The thesis of this article is simple: As long as we maintain the current folk psychological conception of ourselves as intentional and potentially rational creatures, as people and not simply as machines, mental states will inevitably remain central to ascriptions of culpability and responsibility more generally. It is also desirable. Nonetheless, we are in a condition of unprecedented internal challenges to …


Indicators Of Deception: Science Or Non-Science, Kristina Vasquez Jan 2022

Indicators Of Deception: Science Or Non-Science, Kristina Vasquez

Undergraduate Honors Theses

Deception detection is used by many law enforcement professionals who work in interviews and interrogations. The ability to detect deception or having knowledge on the signs of deception is very important in not only law enforcement, but in other careers and everyday life. The question remains: is deception detection a science or not a science? There are three areas where someone can learn how to detect deception and those are verbal communication, non-verbal communication, and paralanguage. The use of verbal communication looks at what the person is saying with their words. The use of non-verbal communication looks at what someone …


Fragments Of An Anarcha-Transfeminist Sociology Of Sex Work, Veronica Andrek Jan 2022

Fragments Of An Anarcha-Transfeminist Sociology Of Sex Work, Veronica Andrek

Senior Projects Spring 2022

The purpose of this study is to explore ways in which feminist and sociological theory can be expanded by looking at the experiences of transgender women who are engaged in sex work specifically with an eye for transfeminist and anarchist political theory. Based on qualitative interviews with five transfeminine sex workers, I found that transfeminine sex workers, while facing substantial obstacles such as criminalization, transmisogyny, and poverty, are capable of building communities and forging new meanings in their lives. Within sex work are opportunities by which to reimagine labor and its role in our lives, with the possibility of abolishing …


White Vigilantism And The Racism Of Race-Neutrality, Christian Sundquist Jan 2022

White Vigilantism And The Racism Of Race-Neutrality, Christian Sundquist

Articles

Race-neutrality has long been touted in American law as central to promoting racial equality while guarding against race-based discrimination. And yet the legal doctrine of race-neutrality has perversely operated to shield claims of racial discrimination from judicial review while protecting discriminators from liability and punishment. This Article critiques the doctrine of race-neutrality by examining the law’s response to white vigilantism in the much-publicized criminal trials of Kyle Rittenhouse and that of Ahmaud Arbery’s assailants.


Muslims In Prison: Advancing The Rule Of Law Through Litigation Praxis, Spearit Jan 2022

Muslims In Prison: Advancing The Rule Of Law Through Litigation Praxis, Spearit

Articles

Islamic ideas about justice and equality directly informed the development of prison law jurisprudence in the United States. Since the early 1960s, when federal courts began to hear claims by state prisoner-petitioners, Muslims began to look to courts to establish Islam in prison and inaugurated an ongoing campaign for civil rights. The trend is significant when considering Muslims represent a relatively small percentage of the American population. Decades of persistent litigation by Muslims in courts have been integral to developing the prisoners’ rights movement in America. The Muslim impact on prison law and culture is an underappreciated phenomenon that involves …


Human Trafficking Of People With A Disability: An Analysis Of State And Federal Cases, Andrea Nichols, Erin Heil Jan 2022

Human Trafficking Of People With A Disability: An Analysis Of State And Federal Cases, Andrea Nichols, Erin Heil

Dignity: A Journal of Analysis of Exploitation and Violence

The current academic discourse examining human trafficking is lacking in focus on survivors with a disability. The increased likelihood of abuse experienced by people with a disability is well documented in the research literature, and a small body of research indicates heightened sex trafficking victimization of minor girls with a disability. Yet, very little research specifically examines sex and/or labor trafficking of people with a disability, and no systematic research analyzes prosecuted cases of trafficking with disability as the focal point of analysis. Drawing from a content analysis of 18 federal and 17 state cases of human trafficking, the current …


Undemocratic Crimes, Paul H. Robinson, Jonathan C. Wilt Jan 2022

Undemocratic Crimes, Paul H. Robinson, Jonathan C. Wilt

All Faculty Scholarship

One might assume that in a working democracy the criminal law rules would reflect the community’s shared judgments regarding justice and punishment. This is especially true because social science research shows that lay people generally think about criminal liability and punishment in consistent ways: in terms of desert, doing justice and avoiding injustice. Moreover, there are compelling arguments for demanding consistency between community views and criminal law rules based upon the importance of democratic values, effective crime-control, and the deontological value of justice itself.

It may then come as a surprise, and a disappointment, that a wide range of common …


The Criminogenic Effects Of Damaging Criminal Law’S Moral Credibility, Paul H. Robinson, Lindsay Holcomb Jan 2022

The Criminogenic Effects Of Damaging Criminal Law’S Moral Credibility, Paul H. Robinson, Lindsay Holcomb

All Faculty Scholarship

The criminal justice system’s reputation with the community can have a significant effect on the extent to which people are willing to comply with its demands and internalize its norms. In the context of criminal law, the empirical studies suggest that ordinary people expect the criminal justice system to do justice and avoid injustice, as they perceive it – what has been called “empirical desert” to distinguish it from the “deontological desert” of moral philosophers. The empirical studies and many real-world natural experiments suggest that a criminal justice system that regularly deviates from empirical desert loses moral credibility and thereby …


Decarceration's Inside Partners, Seema Saifee Jan 2022

Decarceration's Inside Partners, Seema Saifee

All Faculty Scholarship

This Article examines a hidden phenomenon in criminal punishment. People in prison, during their incarceration, have made important—and sometimes extraordinary—strides toward reducing prison populations. In fact, stakeholders in many corners, from policy makers to researchers to abolitionists, have harnessed legal and conceptual strategies generated inside the walls to pursue decarceral strategies outside the walls. Despite this outside use of inside moves, legal scholarship has directed little attention to theorizing the potential of looking to people on the inside as partners in the long-term project of meaningfully reducing prison populations, or “decarceration.”

Building on the change-making agency and revolutionary ideation inside …


Criminal Law’S Core Principles, Paul H. Robinson Jan 2022

Criminal Law’S Core Principles, Paul H. Robinson

All Faculty Scholarship

Modern criminal law scholars and policymakers assume they are free to construct criminal law rules by focusing exclusively on the criminal justice theory of the day. But this “blank slate” conception of criminal lawmaking is dangerously misguided. In fact, lawmakers are writing on a slate on which core principles are already indelibly written and realistically they are free only to add detail in the implementation of those principles and to add additional provisions not inconsistent with them. Attempts to do otherwise are destined to produce tragic results from both utilitarian and retributivist views.

Many writers dispute that such core principles …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …