Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Emergency Services Management and Leadership (7)
- Criminology (6)
- Psychology (6)
- Education (4)
- Location-Based Services (3)
-
- Aggression (2)
- Child Exploitation (2)
- Conflict (2)
- Consequences (2)
- Corrections (2)
- Emergency Management (2)
- ICT (2)
- Juvenile Delinquency (2)
- Juvenile delinquency (2)
- LBS (2)
- National Security (2)
- Negative (2)
- Provocation (2)
- Social Implications of ICT (2)
- Social Network Analysis (2)
- Social networks (2)
- Suicide (2)
- Surveillance (2)
- Technology (2)
- Web 2.0 (2)
- Academy (1)
- Acculturation (1)
- Alcohol (1)
- Articles (1)
- Australia (1)
- Publication
- File Type
Articles 1 - 30 of 41
Full-Text Articles in Social and Behavioral Sciences
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
Dr. Mutaz M. Al-Debei
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …
Predictors Of Fear And Risk Of Terrorism In A Rural State, David May, Joe Herbert, Kelly Cline, Ashley Nellis
Predictors Of Fear And Risk Of Terrorism In A Rural State, David May, Joe Herbert, Kelly Cline, Ashley Nellis
David May
This article examines attitudes about terrorism utilizing criminological literature about fear of crime and perceived risk of victimization and data from a statewide survey of 1,617 adults in Kentucky. Measures of both fear of terrorism and perceived risk of terrorism were geography based. The demographic variables had minimal impact on both perceived risk of terrorism and fear of terrorism, although gender was significantly related to both, suggesting a link based on socialization experiences of men and women. Although rural residence had a small but statistically significant relationship to perceived risk, it was not related to fear. The strongest predictor of …
The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael
The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael
Associate Professor Katina Michael
The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …
Descriptive Phenomenological Psychological Method: An Example Of A Methodology Section From Doctoral Dissertation, Rodger E. Broome
Descriptive Phenomenological Psychological Method: An Example Of A Methodology Section From Doctoral Dissertation, Rodger E. Broome
Rodger E. Broome
This paper is the methodology section of my doctoral dissertation that outlines the Descriptive Phenomenological Psychological Method of research as it has been taught to me by Amedeo P. Giorgi. Giorgi (2009) based his method on Husserl’s descriptive phenomenological philosophy as an alternative epistemology for human science research. This method section references Giorgi’s work and the phenomenological tradition of Husserl, Merleau-Ponty and others. Each step of Giorgi’s (2009) modified Husserlian method is described and explained in the context of doing psychological research on the lived-experience of the participants in my dissertation research. The steps are: (1) assume the phenomenological attitude, …
Nonsocial Versus Social Reinforcers Contrasting Theoretical Perspectives On Repetitive Serious Delinquency And Drug Use, David May, Jennifer Stevens, Nancy Rice, G. Jarjoura
Nonsocial Versus Social Reinforcers Contrasting Theoretical Perspectives On Repetitive Serious Delinquency And Drug Use, David May, Jennifer Stevens, Nancy Rice, G. Jarjoura
David May
A wide variety of theoretical perspectives demonstrate an association with delinquency. Recently, a number of researchers have sought to integrate these theories into developmental models by which they explain different types of delinquency at different phases in the life-course. Using data from approximately 800 delinquents incarcerated in a Midwestern state, the authors continue those efforts by examining the association between delinquency and both nonsocial and social reinforcers over time. Their findings suggest that youth may begin their involvement in delinquency in pursuit of intrinsic gratification but continue that involvement because of the external gratification they receive from their peers. Implications …
Collaborative Command, Rodger E. Broome
Collaborative Command, Rodger E. Broome
Rodger E. Broome
Utah Valley University teaches fire command facilitating a naturalistic and comparative models of decision making through collaborative command. Based on Gary Klein's (1998) monograph "Sources of Power: How People Make Decisions."
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Professor Katina Michael
Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
M. G. Michael
No abstract provided.
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
Professor Katina Michael
No abstract provided.
Education - "What's In It For Me?", Megan Stone, Rodger E. Broome
Education - "What's In It For Me?", Megan Stone, Rodger E. Broome
Rodger E. Broome
Personal and professional growth through college education for emergency services workers.
Ideas Turned Into Inactions, Rodger E. Broome
Ideas Turned Into Inactions, Rodger E. Broome
Rodger E. Broome
When sociopolitical and economic ideologies drive the decision to withhold services. Subscriptions for fire services not paid.
"Becoming" A Firefighter, Rodger E. Broome
"Becoming" A Firefighter, Rodger E. Broome
Rodger E. Broome
Knowledge and Lived-Action are what makes a firefighter an authentic firefighter.
Forensic Criminological Assessments, Wayne Petherick, Brent Turvey
Forensic Criminological Assessments, Wayne Petherick, Brent Turvey
Wayne Petherick
Forensic Criminology: the scientific study of crime and criminals for the purposes of addressing investigative and legal issues. It is a science, a behavioral science, and a forensic science. This text is intended to educate students in an applied fashion regarding the nature and extent of forensic casework that is supported by, dependent upon, and interactive with research, theory, and knowledge derived from criminology. It is also intended to act as a preliminary guide for practitioners working with and within related criminal justice professions. Particularly those involved with assisting investigations, administrative inquiries, legal proceedings or providing expert findings or …
Criminal Profiling, Wayne Petherick, Claire Ferguson
Criminal Profiling, Wayne Petherick, Claire Ferguson
Wayne Petherick
Forensic Criminology: the scientific study of crime and criminals for the purposes of addressing investigative and legal issues. It is a science, a behavioral science, and a forensic science. This text is intended to educate students in an applied fashion regarding the nature and extent of forensic casework that is supported by, dependent upon, and interactive with research, theory, and knowledge derived from criminology. It is also intended to act as a preliminary guide for practitioners working with and within related criminal justice professions. Particularly those involved with assisting investigations, administrative inquiries, legal proceedings or providing expert findings or testimony …
Cognitive Ethos Of The Forensic Examiner, Brent Turvey, Wayne Petherick
Cognitive Ethos Of The Forensic Examiner, Brent Turvey, Wayne Petherick
Wayne Petherick
Forensic Criminology: the scientific study of crime and criminals for the purposes of addressing investigative and legal issues. It is a science, a behavioral science, and a forensic science. This text is intended to educate students in an applied fashion regarding the nature and extent of forensic casework that is supported by, dependent upon, and interactive with research, theory, and knowledge derived from criminology. It is also intended to act as a preliminary guide for practitioners working with and within related criminal justice professions. Particularly those involved with assisting investigations, administrative inquiries, legal proceedings or providing expert findings or testimony …
An Introduction To Forensic Criminology, Brent Turvey, Wayne Petherick
An Introduction To Forensic Criminology, Brent Turvey, Wayne Petherick
Wayne Petherick
No abstract provided.
The Origins Of Forensic Criminology, Brent Turvey, Wayne Petherick
The Origins Of Forensic Criminology, Brent Turvey, Wayne Petherick
Wayne Petherick
No abstract provided.
Low Self-Control, Deviant Peer Associations, And Juvenile Cyberdeviance, David May, Adam Bossler, Thomas Holt
Low Self-Control, Deviant Peer Associations, And Juvenile Cyberdeviance, David May, Adam Bossler, Thomas Holt
David May
Gottfredson and Hirschi’s (1990) general theory of crime and Akers’ (1998) social learning theory have received strong empirical support for explaining crime in both the physical and cyberworlds. Most of the studies examining cybercrime, however, have only used college samples. In addition, the evidence on the interaction between low self-control and deviant peer associations is mixed. Therefore, this study examined whether low self-control and deviant peer associations explained various forms of cyberdeviance in a youth sample. We also tested whether associating with deviant peers mediated the effect of low self-control on cyberdeviance as well as whether it conditioned the effect. …
Predicting Online Harassment Victimization Among A Juvenile Population, David May, Adam Bossler, Thomas Holt
Predicting Online Harassment Victimization Among A Juvenile Population, David May, Adam Bossler, Thomas Holt
David May
Online harassment can consist of threatening, worrisome, emotionally hurtful, or sexual messages delivered via an electronic medium that can lead victims to feel fear or distress much like real-world harassment and stalking. This activity is especially prevalent among middle and high school populations who frequently use technology as a means to communicate with others. Little is known, however, whether factors linked to computer crime victimization in college samples have the same influence in juvenile populations. The article discusses a study conducted utilizing a routine-activities framework that explored the online harassment experiences among middle and high school students and recruited 434 …
Drug Use Trajectory Patterns Among Older Drug Users, Miriam W. Boeri, Thor Whalen, Benjamin Tyndall, Ellen Ballard
Drug Use Trajectory Patterns Among Older Drug Users, Miriam W. Boeri, Thor Whalen, Benjamin Tyndall, Ellen Ballard
Miriam W. Boeri
To better understand patterns of drug use trajectories over time, it is essential to have standard measures of change. Our goal here is to introduce measures we developed to quantify change in drug use behaviors. A secondary goal is to provide effective visualizations of these trajectories for applied use. We analyzed data from a sample of 92 older drug users (ages 45 to 65) to identify transition patterns in drug use trajectories across the life course. Data were collected for every year since birth using a mixed methods design. The community-drawn sample of active and former users were 40% female, …
Finding The Key Players In Online Child Exploitation Networks, Bryce Westlake, Martin Bouchard, Richard Frank
Finding The Key Players In Online Child Exploitation Networks, Bryce Westlake, Martin Bouchard, Richard Frank
Bryce Garreth Westlake
The growth of the Internet has been paralleled with a similar growth in online child exploitation. Since completely shutting down child exploitation websites is difficult (or arguably impossible), the goal must be to find the most efficient way of identifying the key targets and then to apprehend them. Traditionally, online investigations have been manual and centered on images. However, we argue that target prioritization needs to take more than just images into consideration, and that the investigating process needs to become more systematic. Drawing from a web crawler we specifically designed for extracting child exploitation website networks, this study 1) …
Responses To Scenarios That May Provoke Acts Of Conflict And Aggression Among The General Public: An Exploratory Study, David May, Nathan Lowe
Responses To Scenarios That May Provoke Acts Of Conflict And Aggression Among The General Public: An Exploratory Study, David May, Nathan Lowe
David May
The purpose of this article is to use empirical research and theory to investigate the context that may provoke individuals to engage in acts of conflict and aggression. A random sample of the general public from a midsouthern state was surveyed to explore this inquiry. Respondents were asked to indicate their level of reaction to a number of situations that often lead people to engage in conflict and/or aggression with other people. Several sociodemographic factors served as control variables in the study. The findings of the Pearson product—moment correlations suggest that respondents were more likely to report that they would …
"We Don't Need No Education!" Really?, Rodger E. Broome
"We Don't Need No Education!" Really?, Rodger E. Broome
Rodger E. Broome
Why fire service employees, fire departments, and communities benefit from college educated firefighters.
The (Twice) Failure Of The Wisconsin Risk Need Assessment In A Sample Of Probationers, Howard M. Henderson
The (Twice) Failure Of The Wisconsin Risk Need Assessment In A Sample Of Probationers, Howard M. Henderson
Howard M Henderson
Despite being created and validated in the 1970s and 1980s, and widely adopted by many agencies in the United States, including Texas, the Wisconsin Risk Need Assessment Instrument has yet to be examined with a contemporaneous Texas probationer sample. Due to the majority of previous research reporting poor utility, the instrument’s authors proposed a new scoring system for the risk portion of the instrument in 2009 in an attempt to increase the predictive utility. This study examines the original instrument and is the first to examine the proposed reweighted risk scale’s relationship to recidivism with an independent sample of 194 …
The Eleventh Circuit's Selective Assault On Sentencing Discretion, Adam Shajnfeld
The Eleventh Circuit's Selective Assault On Sentencing Discretion, Adam Shajnfeld
Adam Shajnfeld
Ever since the Supreme Court declared that the sentences which district courts impose on criminal defendants are to be reviewed on appeal for “unreasonableness,” the standard’s contours have remained elusive and mired in controversy, despite the Court’s repeated attempts at elucidation. In few instances is this confounding state of affairs more apparent and acute than in the Eleventh Circuit’s recent lengthy and factious en banc decision in United States v. Irey. This article explores Irey’s merits, mistakes, and lessons, trying to locate each within the broader context of the Eleventh Circuit’s sentencing jurisprudence. In doing so, the article advances three …
Utilizing The Past To Shape The Future: The Rehabilitation Of Child Soldiers In Darfur, Michael K. Marriott
Utilizing The Past To Shape The Future: The Rehabilitation Of Child Soldiers In Darfur, Michael K. Marriott
Michael K Marriott
Child soldiering, an unfortunate reality of war, has become increasingly common in modern warfare. With world attention focused on the genocide taking place in the Darfur region of Sudan, issues regarding the use of child soldiers in the conflict have come to light. By providing an overview of the use of child soldiers both globally and in Sudan, discussing the relevant legal norms theoretically governing the country and providing a case study on Sierra Leone, this paper ultimately provides an analysis and proposed framework for comprehensive programs that could be put into action after cessation of hostilities in an attempt …
Drug And Alcohol Policy Under New Labour: Pandering To Populism?, Julian Buchanan
Drug And Alcohol Policy Under New Labour: Pandering To Populism?, Julian Buchanan
Julian Buchanan
Coming to power with an overwhelming majority in 1997, New Labour had the opportunity to lead the world by adopting a much needed progressive, pragmatic and scientifically informed approach to the management of substance use and misuse in the twenty-first century: by some distance, they failed to deliver on the election promise of change. Instead, they mistakenly continued the pursuit of eradicating drugs through prohibition, perpetuated the misleading distinction between legal and illegal drugs, and failed to overhaul the much criticised and outdated Misuse of Drugs Act 1971, which continues to inform (or some would argue misinform) the public about …
Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake
Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake
Bryce Garreth Westlake
This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found that different attack strategies were warranted depending on the outcome measure and the network structure. Overall, hub attacks were most effective at reducing network density and clustering, whereas fragmentation attacks were most effective at reducing the network's distance-based cohesion and average path length. In certain …
'If I Wasn't Suicidal, That'll Drive You To It': Women, Jail And Mental Health, Angela Moe
'If I Wasn't Suicidal, That'll Drive You To It': Women, Jail And Mental Health, Angela Moe
Angela M. Moe
No abstract provided.
Examining The Effect Of Correctional Programming On Perceptions Of Likelihood Of Recidivism Among Incarcerated Prisoners, David May, Timequa Brown
Examining The Effect Of Correctional Programming On Perceptions Of Likelihood Of Recidivism Among Incarcerated Prisoners, David May, Timequa Brown
David May
For many years, policymakers and criminal justice scholars have debated the impact of correctional programming on recidivism. This debate is currently unresolved. Using data from 1,234 currently incarcerated inmates in a mid-Southern state, this study examines whether inmates who participate in correctional programming while incarcerated are less likely to feel that they will recidivate upon release from prison. The findings from this research suggest that program participation while in prison has little impact on the inmates’ perceived recidivism, although important programming effects may still occur. Policy implications and directions for future research are discussed.