Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

2012

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 49

Full-Text Articles in Criminology

Youth Involvement In Alternative Subcultures, Groups, Belief Systems, And Lifestyles: Examining International Police And Societal Response, Gordon A. Crews Dec 2012

Youth Involvement In Alternative Subcultures, Groups, Belief Systems, And Lifestyles: Examining International Police And Societal Response, Gordon A. Crews

Gordon A Crews

This presentation comparatively examines relationships in the United States, Eastern and Central Europe, Scandinavia, and parts of the Middle East among juvenile violence, "heavy metal" music, substance abuse, and participation in occult and "alternative" youth groups (e.g., Wicca, Satanism, vampirism, Goth). We trace the movement of certain groups, behaviors, and preferences and make a correlation between some of these movements and an increase in youth violence and substance abuse. The authors use results from surveys and participant observations in the U.S., Copenhagen, Germany, the Netherlands, & the Middle East (Egypt & Turkey) that indicate, however, that mere participation in these …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


End Of The Line: Tracking The Commodity Chain Of The Electronic Waste Industry, Jacquelynn A. Doyon Dec 2012

End Of The Line: Tracking The Commodity Chain Of The Electronic Waste Industry, Jacquelynn A. Doyon

Dissertations

This study examines the transfer of electronic waste (e-waste) from core to peripheral nations, specifically coastal nations in Africa. The theoretical perspective marries green criminology with world systems theory in examining the ways in which marginalized populations bear the burden of hazardous waste disposal across the globe. The study is comparative, looking at legislation in the United States as well as international legislation and enforcement, and also employs case study methodology, contrasting e-waste disposal in Nigeria and Ghana. The final intent of this research is to determine whether or not the violation of national and/or international legislation regarding the transfer …


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


The Effect Of Private Police On Crime: Evidence From A Geographic Regression Discontinuity Design, John M. Macdonald, Jonathan Klick, Ben Grunwald Nov 2012

The Effect Of Private Police On Crime: Evidence From A Geographic Regression Discontinuity Design, John M. Macdonald, Jonathan Klick, Ben Grunwald

All Faculty Scholarship

Research demonstrates that police reduce crime. The implication of this research for investment in a particular form of extra police services, those provided by private institutions, has not been rigorously examined. We capitalize on the discontinuity in police force size at the geographic boundary of a private university police department to estimate the effect of the extra police services on crime. Extra police provided by the university generate approximately 45-60 percent fewer crimes in the surrounding neighborhood. These effects appear to be similar to other estimates in the literature.


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


Juvenile Delinquency: An Investigation Of Risk Factors And Solutions., Lauren Cardoso Aug 2012

Juvenile Delinquency: An Investigation Of Risk Factors And Solutions., Lauren Cardoso

Pell Scholars and Senior Theses

This article proposes that educational and community based programs can help juveniles stay away from crime and prevent recidivism. A presentation of federal and state statistics, along with an analysis of the risk factors for delinquency, will be provided in order to illustrate the important areas that should be addressed in successful programs. Testimonies, including personal interviews with those who have experience working at the RI Training School, DCYF, Boys' Town, Child and Family Services will be shared as evidence of the research found. Finally, recommendations based on the findings will be proposed.


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Satisfaction With Police: Explaining Variation By Race, Megan N. Centeno Jul 2012

Satisfaction With Police: Explaining Variation By Race, Megan N. Centeno

Sociology & Criminal Justice Theses & Dissertations

Past research has shown that race is an important factor in predicting satisfaction with the police. Past research, however, has been inconclusive as to why this is such a significant variable. This study is designed to see if quality of life and fear of crime differences by race help explain the race and police satisfaction relationship. Data for this study comes from the "Criminal Victimization" Survey (Smith, S. K., Steadman, G.W., Minton, T. D., & Townsend, M. and 1999). The results conclude that quality of life, physical disorder and fear of crime help mediate the relationship between race and satisfaction …


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Communicating Crimes: Covering Gangs In Contemporary Canadian Journalism, Chris Richardson Jun 2012

Communicating Crimes: Covering Gangs In Contemporary Canadian Journalism, Chris Richardson

Electronic Thesis and Dissertation Repository

In this integrated-article dissertation, I examine representations of gangs in Canadian journalism, focusing primarily on contemporary newspaper reporting. While the term “gang” often refers to violent groups of young urban males, it can also signify outlaw bikers, organized crime, terrorist cells, non-criminal social groups, and a wide array of other collectives. I build on Pierre Bourdieu’s theoretical framework to probe this ambiguity, seeking to provide context and critical assessments that will improve crime reporting and its reception. In the course of my work, I examine how popular films like West Side Story inform journalists’ descriptions of gangs. Though reporters have …


Kicking To Death, Daniel H. Heinke Jun 2012

Kicking To Death, Daniel H. Heinke

Dr. Daniel H. Heinke

The Stockholm Criminology Symposium: Presentation on the medical, criminological, and legal aspects of assaults involving kicks against the head and Thorax.


Life Without Parole Under Modern Theories Of Punishment, Paul H. Robinson Jun 2012

Life Without Parole Under Modern Theories Of Punishment, Paul H. Robinson

All Faculty Scholarship

Life without parole seems an attractive and logical punishment under the modern coercive crime-control principles of general deterrence and incapacitation, a point reinforced by its common use under habitual offender statutes like "three strikes." Yet, there is increasing evidence to doubt the efficacy of using such principles to distributive punishment. The prerequisite conditions for effective general deterrence are the exception rather than the rule. Moreover, effective and fair preventive detention is difficult when attempted through the criminal justice system. If we really are committed to preventive detention, it is better for both society and potential detainees that it be done …


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Editorial: The Idio-Technopolis, Katina Michael May 2012

Editorial: The Idio-Technopolis, Katina Michael

Professor Katina Michael

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Recidivism Rates Of Committed Youth, 2006 - 2009, Becky Noreus, Robyn Dumont May 2012

Recidivism Rates Of Committed Youth, 2006 - 2009, Becky Noreus, Robyn Dumont

Justice Policy

The Maine Department of Corrections (MDOC) Division of Juvenile Services (DJS) collaborates with the Muskie School of Public Service in a state‐university partnership to analyze juvenile recidivism rates. DJS measures juvenile justice outcomes to guide policy and program development geared toward recidivism reduction. Reduction of youth recidivism in Maine increases public safety.

This report uses multiple recidivism measures: re‐arrest, re‐adjudication/conviction, and recommitment. To be consistent with other reports, most analysis focuses on re‐adjudication/conviction.

This report measures DJS impact on youth who have been committed to a MDOC facility by examining rates of recidivism.


A Failing Correctional System: State Prison Overcrowding In The United States, Susan M. Campers May 2012

A Failing Correctional System: State Prison Overcrowding In The United States, Susan M. Campers

Pell Scholars and Senior Theses

State prison overcrowding has grown into a detrimental problem within our American penal system, such that after decades of being ignored by politicians, media outlets, and the lower court system, it has resulted in an ineffective and overcrowded correctional system that craves reformation.


Formal, Bounded, And "Hyper" Rationality In Police Processing Of Sexual Assualt Claims: Case Dispositions And Ucr Reporting, Brooke M. Wagner May 2012

Formal, Bounded, And "Hyper" Rationality In Police Processing Of Sexual Assualt Claims: Case Dispositions And Ucr Reporting, Brooke M. Wagner

UNLV Theses, Dissertations, Professional Papers, and Capstones

Over the past three decades, many scholars have examined the prevalence, consequences, and official sanctions of sexual violence. The following study builds on past research by quantitatively examining police and crime analyst discretion in sexual assault claims. Using recently accessed data from the Las Vegas Metropolitan Police Department from 2008 through 2010 and utilizing labeling theory, rape myth literature, and the theoretical perspectives of justice processing outcomes, I assess the extent to which police officers and crime analysts are influenced by extralegal variables like victim and offender's race, victim's age, the location of assault, incident characteristics, and victim's background. I …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael Apr 2012

Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael

Associate Professor Katina Michael

In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.


Perceived Job Readiness Among The Previously Incarcerated, Amy Audet Apr 2012

Perceived Job Readiness Among The Previously Incarcerated, Amy Audet

Honors Projects

This study aims to determine the primary factor in employment readiness for previously incarcerated individuals. Ex offenders were were surveyed for job readiness using a scale developed in the studies' literature review. This scale emcompasses factors such as skills, knowledge, confidence and goals. Surveys were also done according to age, age of first incarceration, incarceration history and job training history. Because this population is marginalized, this study may bring new awareness about the effects of employer discrimination and the need for future programs to increase job readiness among the previously incarcerated individuals.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael Apr 2012

In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael

Associate Professor Katina Michael

Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …