Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Social Control, Law, Crime, and Deviance

PDF

2014

Institution
Keyword
Publication
Publication Type

Articles 61 - 90 of 153

Full-Text Articles in Social and Behavioral Sciences

Toward A Biocommunicable Cartography Of Health Decision-Making In The Amazon Basin Of Ecuador, James Cartwright Jun 2014

Toward A Biocommunicable Cartography Of Health Decision-Making In The Amazon Basin Of Ecuador, James Cartwright

Lawrence University Honors Projects

This paper comprises a critical, ethnographic study of health communication in a rural community of Amazonian Ecuador. By synthesizing approaches from anthropology, discourse studies, and public health, the study explores how conversations influence health decisions, how communities understand health systems, and how macrostructural discourse changes the political economy of healthcare in Ecuador. My work draws on the recent theoretical development of ‘biocommunicability’ in anthropology as well as earlier sociological research on knowledge construction. Most importantly, this paper offers a critique of current interventions by NGOs in the region.


The Effect Of Victimization, Mental Health, And Protective Factors On Crime And Illicit Drug Use Among Homeless Young Adults, Kimberly A. Tyler, Lisa Kort-Butler, Alexis Swendener Jun 2014

The Effect Of Victimization, Mental Health, And Protective Factors On Crime And Illicit Drug Use Among Homeless Young Adults, Kimberly A. Tyler, Lisa Kort-Butler, Alexis Swendener

Department of Sociology: Faculty Publications

Although research has found high rates of child maltreatment, widespread victimization, and other negative outcomes among homeless youth and young adults, resiliency among this population has largely been understudied. Specifically, a gap remains in terms of how protective factors such as self-efficacy, low deviant beliefs, and religiosity operate among homeless youth and young adults. The purpose of the current study is to examine the relationship between various forms of victimization, mental health, and protective factors with property and violent crime and illicit drug use among homeless young adults. Results from regression analyses indicate that running away from home more frequently, …


A Stress Process Model Of Arrest Among Homeless Women: Exploring Risk And Protective Factors, Kari C. Gentzler Jun 2014

A Stress Process Model Of Arrest Among Homeless Women: Exploring Risk And Protective Factors, Kari C. Gentzler

Department of Sociology: Dissertations, Theses, and Student Research

Objective: Women constitute one of the fastest-growing segments of both the homeless and incarcerated populations. In addition, homeless women tend to have higher rates of victimization, mental illness, substance use, and criminal justice system involvement compared to non-homeless women, although this body of research is becoming dated. The current study situates homeless women’s involvement in the criminal justice system within the stress process model and proposes that these factors—childhood abuse, psychiatric disorders, and homelessness—act as stressors that increase their risk of arrest. In addition, social support and self-efficacy are examined as potential protective factors that may act as buffers against …


Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague May 2014

Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague

Annual ADFSL Conference on Digital Forensics, Security and Law

Email is the most common and comparatively the most efficient means of exchanging information in today's world. However, given the widespread use of emails in all sectors, they have been the target of spammers since the beginning. Filtering spam emails has now led to critical actions such as forensic activities based on mining spam email. The data mine for spam emails at the University of Alabama at Birmingham is considered to be one of the most prominent resources for mining and identifying spam sources. It is a widely researched repository used by researchers from different global organizations. The usual process …


Investigative Techniques Of N-Way Vendor Agreement And Network Analysis Demonstrated With Fake Antivirus, Gary Warner, Mike Nagy, Kyle Jones, Kevin Mitchem May 2014

Investigative Techniques Of N-Way Vendor Agreement And Network Analysis Demonstrated With Fake Antivirus, Gary Warner, Mike Nagy, Kyle Jones, Kevin Mitchem

Annual ADFSL Conference on Digital Forensics, Security and Law

Fake AntiVirus (FakeAV) malware experienced a resurgence in the fall of 2013 after falling out of favor after several high profile arrests. FakeAV presents two unique challenges to investigators. First, because each criminal organization running a FakeAV affiliate system regularly alters the appearance of their system, it is sometimes difficult to know whether an incoming criminal complaint or malware sample is related to one ring or the other. Secondly, because FakeAV is delivered in a “Pay Per Install” affiliate model, in addition to the ring-leaders of each major ring, there are many high-volume malware infection rings who are all using …


Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen May 2014

Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

There has been extensive work in crime scene reconstruction of physical locations, and much is known in terms of digital forensics of computing devices. However, the network has remained a nebulous combination of entities that are largely ignored during an investigation due to the transient nature of the data that flows through the networks. This paper introduces an architecture for network path reconstruction using the network layer reachability information shared via OSPF Link State Advertisements and the routines and functions of OSPF::rt_sched() as applied to the construction of identical Link State Databases for all routers within an Area.


Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake May 2014

Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake

Annual ADFSL Conference on Digital Forensics, Security and Law

Most of the Live Video Systems do not preserve the Confidentiality principle, and send all frames of the video without any protection, allowing an easy “man in the middle” attack. But when it does, it uses cryptographic techniques over streaming data or makes use of secure channel systems. This generates low frame rate and demands many processor resources. In fact native Live Video Streaming demands many resources of all System.

In this paper we propose a technique to preserve confidentiality in Video Live Streaming applying a confusing visual method making use of the Toral Automorphism Spatial Transformation over each frame. …


Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt May 2014

Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt

Annual ADFSL Conference on Digital Forensics, Security and Law

As cybercrime continues to increase, new cyber forensics techniques are needed to combat the constant challenge of Internet anonymity. In instant messaging (IM) communications, criminals use virtual identities to hide their true identity, which hinders social accountability and facilitates cybercrime. Current instant messaging products are not addressing the anonymity and ease of impersonation over instant messaging. It is necessary to have IM cyber forensics techniques to assist in identifying cyber criminals as part of the criminal investigation. Instant messaging behavioral biometrics include online writing habits, which may be used to create an author writeprint to assist in identifying an author …


Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack May 2014

Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack

Annual ADFSL Conference on Digital Forensics, Security and Law

Botnets are responsible for a large percentage of damages and criminal activity on the Internet. They have shifted attacks from push activities to pull techniques for the distribution of malwares and continue to provide economic advantages to the exploiters at the expense of other legitimate Internet service users. In our research we asked; what is the cost of the procedural steps for forensically investigating a Botnet attack? The research method applies investigation guidelines provided by other researchers and evaluates these guidelines in terms of the cost to a digital forensic investigator. We conclude that investigation of Botnet attacks is both …


Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang May 2014

Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang

Annual ADFSL Conference on Digital Forensics, Security and Law

The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …


Computer Forensics For Accountants, Grover S. Kearns May 2014

Computer Forensics For Accountants, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …


Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov May 2014

Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov

Annual ADFSL Conference on Digital Forensics, Security and Law

Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient to various anti-forensic techniques, and others that require a reboot or are highly platform dependent. New resilient tools have certain disadvantages such as low speed or vulnerability to rootkits which directly manipulate kernel structures, e.g., page tables. A new memory forensic system – Malware Analysis System for Hidden Knotty Anomalies (MASHKA) is described in this paper. It is resilient to popular …


The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha May 2014

The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha

Annual ADFSL Conference on Digital Forensics, Security and Law

Pre-trial discovery is perpetually controversial. Parties advantaged by strict privacy can often avoid justice when this is disadvantageous to their interests. Contrawise, parties advantaged by relaxed litigation privacy can achieve justice when all facts are accessible irrespective of their repositories, ownership or control. American-style pre-trial discovery in civil and regulatory enforcement is relatively rare around the world. U.S. discovery rules open nearly all relevant and non-privileged data for use by opposing parties. The traditional discovery process was costly and time consuming in the world of tangible paper data. However, these burdens have increased, rather than diminished as often predicted, as …


Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter May 2014

Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Existing digital forensic investigation process models have provided guidelines for identifying and preserving potential digital evidence captured from a crime scene. However, for any of the digital forensic investigation process models developed across the world to be adopted and fully applied by the scientific community, it has to be tested. For this reason, the Harmonized Digital Forensic Investigation Process (HDFIP) model, currently a working draft towards becoming an international standard for digital forensic investigations (ISO/IEC 27043), needs to be tested.

This paper, therefore, presents the findings of a case study used to test the HDFIP model implemented in the ISO/IEC …


Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf May 2014

Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf

Annual ADFSL Conference on Digital Forensics, Security and Law

An important area in digital forensics is images of hard disks. The correct production of the images as well as the integrity and authenticity of each hard disk image is essential for the probative force of the image to be used at court. Integrity and authenticity are under suspicion as digital evidence is stored and used by software based systems. Modifications to digital objects are hard or even impossible to track and can occur even accidentally. Even worse, vulnerabilities occur for all current computing systems. Therefore, it is difficult to guarantee a secure environment for forensic investigations. But intended deletions …


Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson May 2014

Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson

Annual ADFSL Conference on Digital Forensics, Security and Law

During the present age and time, it seems as though people in society have become addicted to nearly anything and everything, whether it be to a substance, an activity or an object. The Internet and pornography is no exception. While commonly thought of as a deviant behavior, many are displaying addictions towards the Internet and pornography. More alarming, however, are those who are viewing, downloading, or trading child pornography and displaying addictive Internet behaviors, for they are spending excessive amounts of time engaging in the proliferation of child pornographic materials. For this reason, addiction to the Internet and usage of …


Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar May 2014

Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …


Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore May 2014

Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence …


Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone May 2014

Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone

Annual ADFSL Conference on Digital Forensics, Security and Law

Penetration testing of networks is a process that is overused when demonstrating or evaluating the cyber security posture of an organisation. Most penetration testing is not aligned with the actual intent of the testing, but rather is driven by a management directive of wanting to be seen to be addressing the issue of cyber security. The use of penetration testing is commonly a reaction to an adverse audit outcome or as a result of being penetrated in the first place. Penetration testing used in this fashion delivers little or no value to the organisation being tested for a number of …


Awareness Of Scam E-Mails: An Exploratory Research Study, Tejashree D. Datar, Kelly A. Cole, Marcus K. Rogers May 2014

Awareness Of Scam E-Mails: An Exploratory Research Study, Tejashree D. Datar, Kelly A. Cole, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

The goal of this research was to find the factors that influence a user’s ability to identify e-mail scams. It also aimed to understand user’s awareness regarding e-mail scams and actions that need to be taken if and when victimized. This study was conducted on a university campus with 163 participants. This study presented the participants with two scam e-mails and two legitimate e-mails and asked the participants to correctly identify these e-mails as scam or legitimate. The study focused on the ability of people to differentiate between scam and legitimate e-mails. The study attempted to determine factors that influence …


Apologies Of The Rich And Famous: Cultural, Cognitive, And Social Explanations Of Why We Care And Why We Forgive, Janet M. Ruane, Karen Cerulo May 2014

Apologies Of The Rich And Famous: Cultural, Cognitive, And Social Explanations Of Why We Care And Why We Forgive, Janet M. Ruane, Karen Cerulo

Department of Sociology Faculty Scholarship and Creative Works

In recent years, U.S. and other Western media have inundated the public with celebrity apologies. The public (measured via representative opinion polls) then expresses clear ideas about who deserves forgiveness. Is forgiveness highly individualized or tied to broader social, cultural, and cognitive factors? To answer this question, we analyzed 183 celebrity apologies offered between October 1, 2000, and October 1, 2012. Results are twofold and based in both cultural and social psychological perspectives. First, we found that public forgiveness is systematically tied to discursive characteristics of apologies—particularly sequential structures. Certain sequences appear to cognitively prime the public, creating associative links …


Black And Blue And Read All Over: News Framing And The Coverage Of Crime, Kalistah Quilla Cosand May 2014

Black And Blue And Read All Over: News Framing And The Coverage Of Crime, Kalistah Quilla Cosand

Dissertations and Theses

This study explores the representation of crime in the news in relation to expressed emotion and intention for future action. Episodic and thematic framing (Iyengar, 1991) and narrative processing (Singer & Bluck, 2001) served as the theoretical foundations of this study and helped examine how scripted news stories involving crime influence levels of fear, anger, and empathy in individuals, and how these emotions subsequently affect behaviors. To measure these framing effects, an experimental manipulation was employed using three conceptually different news stories all involving gun-related crimes. One news story utilized an episodic format, while the other two stories used a …


Exploring Racial Disparities Of Victimization In Three Core Dimensions Of Stand Your Ground Law: The Case Of Florida, Toyin Isijola May 2014

Exploring Racial Disparities Of Victimization In Three Core Dimensions Of Stand Your Ground Law: The Case Of Florida, Toyin Isijola

Toyin Isijola

‘Stand Your Ground’ (SYG) laws continue to be a source of controversy, even more so after the shooting death of an unarmed black teen in Florida, Trayvon Martin. Upon abolishing the ‘duty to retreat,’ the law has been criticized for allowing ordinary citizens to carry out vigilante justice. The media has shed light on a few incidents which indicate that young black males may be vulnerable to SYG laws. Prior research on SYG laws have mostly focused on racial disparities in the outcomes of cases and deterrence effects of the law, but this research should contribute to the study of …


Correlates Of Gang Involvement And Health-Related Factors Among African American Females With A Detention History, Dexter R. Voisin May 2014

Correlates Of Gang Involvement And Health-Related Factors Among African American Females With A Detention History, Dexter R. Voisin

Faculty Scholarship

Background: Prior studies have assessed relationships between gang membership and health-related factors. However, the existing literature has largely failed to consider how individual and broader social contextual factors might be related to such gang involvement among African American females. Thus, the aim of the present study was to identify empirically driven correlates of gang involvement and then better understand the relationship between gang membership and health-related behaviors for African American females, after controlling for covariates of gang involvement. Methods: Data were collected from a convenience sample of detained African American adolescents females, between the ages of 13-17, currently incarcerated in …


Yakuza Past, Present And Future: The Changing Face Of Japan's Organized Crime Syndicates, Silke Higgins May 2014

Yakuza Past, Present And Future: The Changing Face Of Japan's Organized Crime Syndicates, Silke Higgins

Themis: Research Journal of Justice Studies and Forensic Science

While Japanese crime syndicates are deeply entrenched in the history and culture of Japan, much of what is known in the Western world about the Yakuza is primarily the result of stereotyping generated by media-driven sensationalism and lowbudget motion pictures. Judgment on the crime syndicates' continued existence, modes of operation, and relatively high visibility in Japan is oftentimes passed based on socio-cultural perceptions of deviance that differ from those in Japanese culture. Taking the form of a book review essay, this paper aims to re-introduce the reader to Japan's crime syndicates with the goal of replacing stereotypes and myths with …


Ethics And The Use Of Coercion In The Treatment Of Psychiatric Patients, Jen Rushforth May 2014

Ethics And The Use Of Coercion In The Treatment Of Psychiatric Patients, Jen Rushforth

Themis: Research Journal of Justice Studies and Forensic Science

Involuntary psychiatric treatment occurs under such conditions as the medicating or placing in treatment facilities of patients without their consent. Such involuntary treatment has been litigated in the Supreme Court; however, the Court’s rulings have been applied to incarcerated persons, with the notable exception of the 1975 ruling in O’Connor v. Donaldson, a case argued as a civil rights violation. Using O’Connor v. Donaldson as a framework, this paper argues that forcing non- violent psychiatric patients to take medication, or be otherwise treated against their will, is an unethical practice and must be discontinued. This practice of forcible treatment violates …


Rape Myths And Consent In College-Aged Southern Students, Amy Leanne Cofer May 2014

Rape Myths And Consent In College-Aged Southern Students, Amy Leanne Cofer

Graduate Theses and Dissertations

Rape and sexual assault are problematic issues for women on college campuses. Internal and external consent play a role in understanding sexual assault because sexual assault is defined as "nonconsensual sexual activity obtained through force, threats, intoxication, or intimidation." Factors related to understanding consent may include attitudes regarding sexual assault and rape, known as rape myths, which are defined as attitudes and false statements concerning rape that are widely known and accepted, mainly served to justify male sexual aggression towards women. The southeastern United States is known for being religiously and politically conservative, where gender roles are intertwined with a …


Trust In Government Versus Fear Of Crime As Predictors Of Support For Authoritarian Policies In Ecuador: A Cross-Sectional Study, Clímaco David Cañarte Gutiérrez May 2014

Trust In Government Versus Fear Of Crime As Predictors Of Support For Authoritarian Policies In Ecuador: A Cross-Sectional Study, Clímaco David Cañarte Gutiérrez

Electronic Theses and Dissertations

Individuals interacting in an environment that exacerbates fear of crime and general distrust may face erosion of democratic values and perceive authoritarian policies as a solution to restore order. In Latin America historical widespread distrust in the government apparatus as well as fear of crime, have always been a topic of interest, not only for sociologists but also for political scientists and lawmakers. This study uses the LAPOP wave 2012 (Latin American Public Opinion) survey to assess Ecuadorians’ perceptions about trust in the government and fear of crime as predictors of support for authoritarian policies (mano dura). Logistic regressions …


The Stigmatization Of Individuals Convicted Of Sex Offenses: Labeling Theory And The Sex Offense Registry, Carla Schultz May 2014

The Stigmatization Of Individuals Convicted Of Sex Offenses: Labeling Theory And The Sex Offense Registry, Carla Schultz

Themis: Research Journal of Justice Studies and Forensic Science

The sex offender registry currently lists over half a million U.S. citizens as sex offenders. Modern day legislation directed toward sex offenders was born in an era of public fear and rash decision-making. Terrible consequences have since been identified as resulting from the labeling of sex offenders via the registry. These unintended consequences socially, economically, and psychologically influence the lives of sex offenders. Labeling theory states that individuals who are given a label eventually subscribe to that label; in other words, it becomes a self-fulfilling prophecy. In the case of sex offenders, this can only mean more damage to society. …


"I Want To Be Brave": A Baseline Study On The Vulnerabilities Of Street-Working Boys In Sihanoukville, Cambodia, Jarrett Davis, Glenn Miles, M’Lop Tapang May 2014

"I Want To Be Brave": A Baseline Study On The Vulnerabilities Of Street-Working Boys In Sihanoukville, Cambodia, Jarrett Davis, Glenn Miles, M’Lop Tapang

Annual Interdisciplinary Conference on Human Trafficking: 6th (2014)

Focusing on street-working boys in Sihanoukville, this study partnered with social workers and child protection officers from M’lop Tapang (a key social service provider in Sihanoukville) to identify locations where young boys were known to be working along the beaches and within the town center. In recent years, Sihanoukville has become known as a rapidly developing commercial beach area, which has received increasing attention from foreign tourists, backpackers, and ex-patriots. Within this context, it has become a destination for migrant workers from surrounding provinces who have hopes of generating income through selling, begging, and other various means. The study conducted …