Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Social and Behavioral Sciences

Reimagining The Theory Of Necropolitics In A Modern Lens: Hate Crimes And Violence, Salma Ahmed Abdulmagied Gheita Jun 2023

Reimagining The Theory Of Necropolitics In A Modern Lens: Hate Crimes And Violence, Salma Ahmed Abdulmagied Gheita

Future Journal of Social Science

This research paper is testing the validity of the Necropolitics theory and how we can reintroduce its definitions in a modern lens. Though the theory of Necropolitics is extreme and historically was a terminology and paradigm that was used towards more catastrophic and traumatizing events. The main argument that this paper is discussing is how did the idea of Necropolitics evolved into a more institutional, systematic, and legalized manors of exclusion. This is made through critical discourse analysis of the text presented on the term Necropolitics to highlight on the history of this term and what it stood for in …


The Machines Aren’T Taking Over (Yet): An Empirical Comparison Of Traditional, Profiling, And Machine Learning Approaches To Criterion-Related Validation, Kristin S. Allen, Mathijs Affourtit, Craig M. Reddock Dec 2020

The Machines Aren’T Taking Over (Yet): An Empirical Comparison Of Traditional, Profiling, And Machine Learning Approaches To Criterion-Related Validation, Kristin S. Allen, Mathijs Affourtit, Craig M. Reddock

Personnel Assessment and Decisions

Criterion-related validation (CRV) studies are used to demonstrate the effectiveness of selection procedures. However, traditional CRV studies require significant investment of time and resources, as well as large sample sizes, which often create practical challenges. New techniques, which use machine learning to develop classification models from limited amounts of data, have emerged as a more efficient alternative. This study empirically investigates the effectiveness of traditional CRV with a variety of profiling approaches and machine learning techniques using repeated cross-validation. Results show that the traditional approach generally performs best both in terms of predicting performance and larger group differences between candidates …


Characteristics Of Fame-Seeking Individuals Who Completed Or Attempted Mass Murder In The United States, Angelica Wills Jan 2019

Characteristics Of Fame-Seeking Individuals Who Completed Or Attempted Mass Murder In The United States, Angelica Wills

Walden Dissertations and Doctoral Studies

Previous researchers have found mass murderers characterized as loners, victims of bullying, goths, and individuals who had a psychotic break. A gap in the literature that remained concerned the motive and mindset of mass murderers before their attack, particularly those who seek fame, and why they are motivated by such violent intentions. The purpose of this study was to provide a deeper analysis of the characteristics of fame-seeking individuals who have completed or attempted mass murder, as well as insight into their behavior on social media. The conceptual framework consisted of a constructivist model, which guided the exploration the purposeful …


Counterterrorist Profiling, The Self, And The Problem Of Open And Quiet Skies, Ibpp Editor Aug 2018

Counterterrorist Profiling, The Self, And The Problem Of Open And Quiet Skies, Ibpp Editor

International Bulletin of Political Psychology

Psychological profiling supporting counterterrorism may be based on an invalid presumption.


The Use Of Personality Profiling As A Means To Assess Person-Organizational Fit To Inform Personnel Decisions, Rebecca J. Early Jan 2016

The Use Of Personality Profiling As A Means To Assess Person-Organizational Fit To Inform Personnel Decisions, Rebecca J. Early

Wayne State University Dissertations

Profile matching refers to personnel selection based on candidate similarity to a pre-determined pattern. Although previous investigations support the use of personality data through univariate, linear-based selection methodologies, there is a paucity of research supporting the use of profile matching in a selection context, and very limited selection research has utilized a person-centered approach. Still, this support is necessary, given that a recent study estimated that the majority of consultative vendor organizations utilize some form of profile matching using personality patterns (Kulas, 2013). After generating profiles from the candidate pool, findings from the current study suggest that profiles have potential …


Using Internet Artifacts To Profile A Child Pornography Suspect, Kathryn C. Seigfried-Spellar, Marcus K. Rogers Jan 2014

Using Internet Artifacts To Profile A Child Pornography Suspect, Kathryn C. Seigfried-Spellar, Marcus K. Rogers

Faculty Publications

Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …


The Profiler's Story, Ibpp Editor Aug 2010

The Profiler's Story, Ibpp Editor

International Bulletin of Political Psychology

Courtesy of commercial television, we better be good. Or else the profilers will get us. It turns out that applied science and its sidekicks intuition and psychism (what psychics do) have our number. One step out of line and our number will be called, and we’ll be served our due comeuppance and just desserts. But is profiling more dessert or desert—or upon close inspection fated to desert us as a valuable tool in deterring or identifying perpetrators of egregious misbehavior? This article describes some implicit assumptions—as contradictory and interdependent as some may be—on which profiling often rests. For these purposes, …


Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor May 2010

Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor

International Bulletin of Political Psychology

The United States Government Accountability Office (GAO) has recently Issued Efforts to Validate TSA’s Passenger Screening Behavior Detection Program Underway, but Opportunities Exist to Strengthen Validation and Address Operational Problems (May 2010, GAO-10-763). This IBPP article will describe and comment on the main GAO findings and additional data on which the findings are based. The article will end with some basic challenges to behavior detection as a useful security measure.


Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam Jan 2010

Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam

Allen Gnanam

Terrorism as a violent and destabilizing act performed by terrorists, meaning loyal followers of political or religious agendas who hold resent and animosity toward a certain authority/ government (Lin, Liou, & Wu, 2007, pg. 149), will be explored and analyzed through the utilization of the governmentality perspective. For the purposes of this paper terrorism governance will refer to the governance/ control/ influence exerted by terrorists and terrorism. The focus of this explorative and analysis paper will be to identify diverse terrorism oriented technologies of governance, and analyze the ways in which these technologies enable terrorist to exert governance both indirectly …


Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam Jan 2009

Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam

Allen Gnanam

This paper is theoretically grounded on the Ban opticon framework that is characterized by the use of exceptionalism, the normalization of imperative movement, and profiling for insecurity management purposes (Bigo, 2005). This framework will be utilized in order to expose and analyze the Ban optic governmentality of the private security industry. Secondly, the overall discussion and analysis of the private security industry- Ban opticon nexus will be discussed with specific reference to the private security operations of The New Commons. Thirdly, three private security intelligence networks identified by Lippert & O’Connor (2006) namely Disciplinary Networks, Private Justice Networks, and Multilateral …


Crime And Precaution, Allen Gnanam Jan 2009

Crime And Precaution, Allen Gnanam

Allen Gnanam

Precautionary logic and risk assessments can be associated with counter terrorism, criminal profiling, and the management of high risk individuals/ groups. Overall, risk precautionary logic and risk assessments can be framed using the Ban-opticon concept identified by Bigo, though panopitic elements do exist when discussing concepts of surveillance. The Ban opticon framework has 3 major concepts: (a) Criminal profiling, (b) the management of movement and (c) exceptionalism.

Both precautionary logic and risk assessments are associated with the profiling of harms and threats, the management of individual or group movement, and both are used to provide qualitative and quantitative rationale for …


Psychology Of Terrorism, Randy Borum Jan 2004

Psychology Of Terrorism, Randy Borum

Mental Health Law & Policy Faculty Publications

No abstract provided.


Biometric, Psychometric, And Sociometric Profiling, Ibpp Editor Oct 2003

Biometric, Psychometric, And Sociometric Profiling, Ibpp Editor

International Bulletin of Political Psychology

This article articulates basic Issues in developing security-based profiling technologies.


Data Mining And Mining Disasters: Terrorism Information Awareness, Ibpp Editor Oct 2003

Data Mining And Mining Disasters: Terrorism Information Awareness, Ibpp Editor

International Bulletin of Political Psychology

This article identifies problems with data mining approaches to antiterrorism and counterterrorism.


Commentary On Department Of Energy Polygraph Policy, Ibpp Editor Sep 2003

Commentary On Department Of Energy Polygraph Policy, Ibpp Editor

International Bulletin of Political Psychology

This article provides commentary on recent revisions in the United States Department of Energy’s polygraph policy.


Cappsii: Caveats On Progress, Ibpp Editor Jun 2003

Cappsii: Caveats On Progress, Ibpp Editor

International Bulletin of Political Psychology

This article identifies potential security shortfalls even in the context of improvements in counterterrorist profiling.


A Profile Of National Leader Profiles And The Social Construction Of The Self: An Example Of Information Warfare, Ibpp Editor Mar 2003

A Profile Of National Leader Profiles And The Social Construction Of The Self: An Example Of Information Warfare, Ibpp Editor

International Bulletin of Political Psychology

This article hypothesizes some implications of the social construction of the self for the construction of personality profiles of national leaders and their employment in information warfare.


Trends. Terrorism, Behavioral Profiling, And Aviation Security, Ibpp Editor Mar 2003

Trends. Terrorism, Behavioral Profiling, And Aviation Security, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses the quest to improve aviation security by identifying behavioral indicators for terrorism.


Finding The Feathers In “Birds Of A Feather”: An Antiterrorist And Counterterrorist Dilemma In Profiling, Ibpp Editor Feb 2003

Finding The Feathers In “Birds Of A Feather”: An Antiterrorist And Counterterrorist Dilemma In Profiling, Ibpp Editor

International Bulletin of Political Psychology

This article describes a significant challenge for intelligence analysts attempting to identify individuals, groups, and organizations that have joined, are joining, or will join forces in terrorist enterprises.


Profiling Hazards: Profiling In Counterterrorism And Homeland Security, Randy Borum Jan 2003

Profiling Hazards: Profiling In Counterterrorism And Homeland Security, Randy Borum

Randy Borum

No abstract provided.


The Black And White Of Profiling: Sniping On The Sniper Case, Ibpp Editor Nov 2002

The Black And White Of Profiling: Sniping On The Sniper Case, Ibpp Editor

International Bulletin of Political Psychology

This article analyzes the construct of profiling in the aftermath of the arrest of two suspects in the recent sniper attacks perpetrated in the greater Washington, D.C. area.


Profiling Profiling And Suicidal Terrorism, Ibpp Editor Sep 2001

Profiling Profiling And Suicidal Terrorism, Ibpp Editor

International Bulletin of Political Psychology

This article describes chronic flaws in developing profiles that are intended to help prevent or minimize suicidal terrorism.


Personology, Profiling, And The Terrorist, Ibpp Editor Jun 2001

Personology, Profiling, And The Terrorist, Ibpp Editor

International Bulletin of Political Psychology

This article identifies problems in common approaches to capturing the psychological essence of the terrorist.


Trends. An Equal Opportunity For Atrocity, Ibpp Editor May 2001

Trends. An Equal Opportunity For Atrocity, Ibpp Editor

International Bulletin of Political Psychology

This article discusses the possibility of creating profiles for those who commit atrocities.


Trends. Profiles Of Terrorist Profiles: The Case Of Khalil Abu Elba, Ibpp Editor Feb 2001

Trends. Profiles Of Terrorist Profiles: The Case Of Khalil Abu Elba, Ibpp Editor

International Bulletin of Political Psychology

This article describes some of the complexities in developing profiles of actual and potential terrorists.