Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Journal of Digital Forensics, Security and Law
When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as a …
The Political Psychology Of Cybersexuality: The Example Of Child Pornography, Ibpp Editor
The Political Psychology Of Cybersexuality: The Example Of Child Pornography, Ibpp Editor
International Bulletin of Political Psychology
This article analyzes rationales behind legislation banning certain aspects of cybersexuality.
Racial Profiling In The Persian Gulf: Ethical, Moral, And Legal Implications, Ibpp Editor
Racial Profiling In The Persian Gulf: Ethical, Moral, And Legal Implications, Ibpp Editor
International Bulletin of Political Psychology
This article describes attributions about race and ethnicity that color the discourse on the ethics, morality, and legality of profiling.
The Internet And Political Campaigns: Some Early Considerations, Ibpp Editor
The Internet And Political Campaigns: Some Early Considerations, Ibpp Editor
International Bulletin of Political Psychology
This article provides hypotheses on the effects of the Internet on political campaigns. The IBPP staff hopes that researchers among its readers will attempt to evaluate these hypotheses through combinations of empiricism, rationalism, and other epistemological approaches.