Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (19)
- University of Wollongong (9)
- University of Pennsylvania Carey Law School (7)
- Salve Regina University (2)
- University of Southern Maine (2)
-
- Montclair State University (1)
- Northwestern Pritzker School of Law (1)
- Old Dominion University (1)
- Rhode Island College (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas (1)
- University of Texas at El Paso (1)
- Western Kentucky University (1)
- Western Michigan University (1)
- Western University (1)
- Keyword
-
- Emerging Technologies (9)
- Security (7)
- Privacy (6)
- Social Implications of ICT (6)
- Uberveillance (6)
-
- Crime (5)
- National Security (5)
- Policing (5)
- Surveillance (5)
- Global Positioning Systems (3)
- Information Security (3)
- Location-Based Services (3)
- Technology (3)
- Challenges (2)
- Criminal law and procedure (2)
- Emergency Management (2)
- Ethics (2)
- Information Systems (2)
- Interception (2)
- Law (2)
- Location-based services (2)
- M-Business (2)
- Monitoring (2)
- Police (2)
- Prison (2)
- SSIT (2)
- Sentencing (2)
- Social Media (2)
- Social networking (2)
- Solutions (2)
- Publication
-
- Professor Katina Michael (16)
- Associate Professor Katina Michael (9)
- All Faculty Scholarship (7)
- Justice Policy (2)
- Pell Scholars and Senior Theses (2)
-
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Department of Psychology: Faculty Publications (1)
- Dissertations (1)
- Dr. Daniel H. Heinke (1)
- Electronic Thesis and Dissertation Repository (1)
- Gordon A Crews (1)
- Honors Projects (1)
- Nick J. Sciullo (1)
- Northwestern Journal of Law & Social Policy (1)
- Open Access Theses & Dissertations (1)
- Sociology & Criminal Justice Theses & Dissertations (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
- WKU Archives Records (1)
- Publication Type
- File Type
Articles 1 - 30 of 49
Full-Text Articles in Criminology
Youth Involvement In Alternative Subcultures, Groups, Belief Systems, And Lifestyles: Examining International Police And Societal Response, Gordon A. Crews
Youth Involvement In Alternative Subcultures, Groups, Belief Systems, And Lifestyles: Examining International Police And Societal Response, Gordon A. Crews
Gordon A Crews
This presentation comparatively examines relationships in the United States, Eastern and Central Europe, Scandinavia, and parts of the Middle East among juvenile violence, "heavy metal" music, substance abuse, and participation in occult and "alternative" youth groups (e.g., Wicca, Satanism, vampirism, Goth). We trace the movement of certain groups, behaviors, and preferences and make a correlation between some of these movements and an increase in youth violence and substance abuse. The authors use results from surveys and participant observations in the U.S., Copenhagen, Germany, the Netherlands, & the Middle East (Egypt & Turkey) that indicate, however, that mere participation in these …
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Professor Katina Michael
This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Professor Katina Michael
Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices
End Of The Line: Tracking The Commodity Chain Of The Electronic Waste Industry, Jacquelynn A. Doyon
End Of The Line: Tracking The Commodity Chain Of The Electronic Waste Industry, Jacquelynn A. Doyon
Dissertations
This study examines the transfer of electronic waste (e-waste) from core to peripheral nations, specifically coastal nations in Africa. The theoretical perspective marries green criminology with world systems theory in examining the ways in which marginalized populations bear the burden of hazardous waste disposal across the globe. The study is comparative, looking at legislation in the United States as well as international legislation and enforcement, and also employs case study methodology, contrasting e-waste disposal in Nigeria and Ghana. The final intent of this research is to determine whether or not the violation of national and/or international legislation regarding the transfer …
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
The Effect Of Private Police On Crime: Evidence From A Geographic Regression Discontinuity Design, John M. Macdonald, Jonathan Klick, Ben Grunwald
The Effect Of Private Police On Crime: Evidence From A Geographic Regression Discontinuity Design, John M. Macdonald, Jonathan Klick, Ben Grunwald
All Faculty Scholarship
Research demonstrates that police reduce crime. The implication of this research for investment in a particular form of extra police services, those provided by private institutions, has not been rigorously examined. We capitalize on the discontinuity in police force size at the geographic boundary of a private university police department to estimate the effect of the extra police services on crime. Extra police provided by the university generate approximately 45-60 percent fewer crimes in the surrounding neighborhood. These effects appear to be similar to other estimates in the literature.
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Associate Professor Katina Michael
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
Juvenile Delinquency: An Investigation Of Risk Factors And Solutions., Lauren Cardoso
Juvenile Delinquency: An Investigation Of Risk Factors And Solutions., Lauren Cardoso
Pell Scholars and Senior Theses
This article proposes that educational and community based programs can help juveniles stay away from crime and prevent recidivism. A presentation of federal and state statistics, along with an analysis of the risk factors for delinquency, will be provided in order to illustrate the important areas that should be addressed in successful programs. Testimonies, including personal interviews with those who have experience working at the RI Training School, DCYF, Boys' Town, Child and Family Services will be shared as evidence of the research found. Finally, recommendations based on the findings will be proposed.
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei
Associate Professor Katina Michael
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …
Satisfaction With Police: Explaining Variation By Race, Megan N. Centeno
Satisfaction With Police: Explaining Variation By Race, Megan N. Centeno
Sociology & Criminal Justice Theses & Dissertations
Past research has shown that race is an important factor in predicting satisfaction with the police. Past research, however, has been inconclusive as to why this is such a significant variable. This study is designed to see if quality of life and fear of crime differences by race help explain the race and police satisfaction relationship. Data for this study comes from the "Criminal Victimization" Survey (Smith, S. K., Steadman, G.W., Minton, T. D., & Townsend, M. and 1999). The results conclude that quality of life, physical disorder and fear of crime help mediate the relationship between race and satisfaction …
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Professor Katina Michael
Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …
Communicating Crimes: Covering Gangs In Contemporary Canadian Journalism, Chris Richardson
Communicating Crimes: Covering Gangs In Contemporary Canadian Journalism, Chris Richardson
Electronic Thesis and Dissertation Repository
In this integrated-article dissertation, I examine representations of gangs in Canadian journalism, focusing primarily on contemporary newspaper reporting. While the term “gang” often refers to violent groups of young urban males, it can also signify outlaw bikers, organized crime, terrorist cells, non-criminal social groups, and a wide array of other collectives. I build on Pierre Bourdieu’s theoretical framework to probe this ambiguity, seeking to provide context and critical assessments that will improve crime reporting and its reception. In the course of my work, I examine how popular films like West Side Story inform journalists’ descriptions of gangs. Though reporters have …
Kicking To Death, Daniel H. Heinke
Kicking To Death, Daniel H. Heinke
Dr. Daniel H. Heinke
Life Without Parole Under Modern Theories Of Punishment, Paul H. Robinson
Life Without Parole Under Modern Theories Of Punishment, Paul H. Robinson
All Faculty Scholarship
Life without parole seems an attractive and logical punishment under the modern coercive crime-control principles of general deterrence and incapacitation, a point reinforced by its common use under habitual offender statutes like "three strikes." Yet, there is increasing evidence to doubt the efficacy of using such principles to distributive punishment. The prerequisite conditions for effective general deterrence are the exception rather than the rule. Moreover, effective and fair preventive detention is difficult when attempted through the criminal justice system. If we really are committed to preventive detention, it is better for both society and potential detainees that it be done …
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Editorial: The Idio-Technopolis, Katina Michael
Editorial: The Idio-Technopolis, Katina Michael
Professor Katina Michael
The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.
Recidivism Rates Of Committed Youth, 2006 - 2009, Becky Noreus, Robyn Dumont
Recidivism Rates Of Committed Youth, 2006 - 2009, Becky Noreus, Robyn Dumont
Justice Policy
The Maine Department of Corrections (MDOC) Division of Juvenile Services (DJS) collaborates with the Muskie School of Public Service in a state‐university partnership to analyze juvenile recidivism rates. DJS measures juvenile justice outcomes to guide policy and program development geared toward recidivism reduction. Reduction of youth recidivism in Maine increases public safety.
This report uses multiple recidivism measures: re‐arrest, re‐adjudication/conviction, and recommitment. To be consistent with other reports, most analysis focuses on re‐adjudication/conviction.
This report measures DJS impact on youth who have been committed to a MDOC facility by examining rates of recidivism.
A Failing Correctional System: State Prison Overcrowding In The United States, Susan M. Campers
A Failing Correctional System: State Prison Overcrowding In The United States, Susan M. Campers
Pell Scholars and Senior Theses
State prison overcrowding has grown into a detrimental problem within our American penal system, such that after decades of being ignored by politicians, media outlets, and the lower court system, it has resulted in an ineffective and overcrowded correctional system that craves reformation.
Formal, Bounded, And "Hyper" Rationality In Police Processing Of Sexual Assualt Claims: Case Dispositions And Ucr Reporting, Brooke M. Wagner
Formal, Bounded, And "Hyper" Rationality In Police Processing Of Sexual Assualt Claims: Case Dispositions And Ucr Reporting, Brooke M. Wagner
UNLV Theses, Dissertations, Professional Papers, and Capstones
Over the past three decades, many scholars have examined the prevalence, consequences, and official sanctions of sexual violence. The following study builds on past research by quantitatively examining police and crime analyst discretion in sexual assault claims. Using recently accessed data from the Las Vegas Metropolitan Police Department from 2008 through 2010 and utilizing labeling theory, rape myth literature, and the theoretical perspectives of justice processing outcomes, I assess the extent to which police officers and crime analysts are influenced by extralegal variables like victim and offender's race, victim's age, the location of assault, incident characteristics, and victim's background. I …
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Associate Professor Katina Michael
In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.
Perceived Job Readiness Among The Previously Incarcerated, Amy Audet
Perceived Job Readiness Among The Previously Incarcerated, Amy Audet
Honors Projects
This study aims to determine the primary factor in employment readiness for previously incarcerated individuals. Ex offenders were were surveyed for job readiness using a scale developed in the studies' literature review. This scale emcompasses factors such as skills, knowledge, confidence and goals. Surveys were also done according to age, age of first incarceration, incarceration history and job training history. Because this population is marginalized, this study may bring new awareness about the effects of employer discrimination and the need for future programs to increase job readiness among the previously incarcerated individuals.
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Associate Professor Katina Michael
With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael
In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael
Associate Professor Katina Michael
Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …