Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Criminology

Cultivation Theory: Media Effects Toward Consumer Evaluations Of The Criminal Courts, Lindsey Dale Elliott Jan 2021

Cultivation Theory: Media Effects Toward Consumer Evaluations Of The Criminal Courts, Lindsey Dale Elliott

Murray State Theses and Dissertations

A substantial body of literature connects media effects to consumer perceptions of the criminal justice system. Research on the topic of cultivation theory has highlighted that an increased fear of crime within the general populace, due to an exaggeration of violence and criminal activity in the mass media, has spurred increased support for punitive policing, harsher sentencing, and positive feelings toward capital punishment. However, no research exists to explicate the cultivation of consumer perceptions toward the criminal courts. This study examines the impact of media consumption through television, the internet, and social media on consumer evaluations of the criminal courts. …


Re-Spatializing Gangs: An Exponential Random Graph Model Of Twitter Data To Analyze The Geospatial Distribution Of Gang Member Connections, Ryan J. Roberts Jan 2021

Re-Spatializing Gangs: An Exponential Random Graph Model Of Twitter Data To Analyze The Geospatial Distribution Of Gang Member Connections, Ryan J. Roberts

Political Science & Geography Faculty Publications

Gang studies often use location-based approaches to explain gang members’ interconnectedness. Although this perspective remains consistent with the proximity principle that the smaller the geographic space, the greater the likelihood of observing connections between individuals, location-based studies limit our understanding of gang member connections to narrowly defined geographic spaces at specific points in time. The advent of social media has re-spatialized gang member interconnectedness to unbounded geographic spaces, where the preservation of online activity can extend indefinitely. Despite having an online presence, most research examining the digital footprint of gangs tends to be descriptive. This study collects Twitter data to …


Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu Jan 2021

Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Digital image forensics is a key branch of digital forensics that based on forensic analysis of image authenticity and image content. The advances in new techniques, such as smart devices, Internet of Things (IoT), artificial images, and social networks, make forensic image analysis play an increasing role in a wide range of criminal case investigation. This work focuses on image source identification by analysing both the fingerprints of digital devices and images in IoT environment. A new convolutional neural network (CNN) method is proposed to identify the source devices that token an image in social IoT environment. The experimental results …


Going Viral: Youth And Sexual Assault In The Digital Age, Anna Gjika Jun 2020

Going Viral: Youth And Sexual Assault In The Digital Age, Anna Gjika

Dissertations, Theses, and Capstone Projects

This dissertation examines the growing phenomenon of using digital media technologies to capture and perpetuate sexual abuse. Focusing on instances of high-profile juvenile sexual assault, I use case studies, interviews, focus groups, and thematic media analysis to investigate (a) how crime, gender, status and technology intersect for young people growing up digital, and (b) the ways technology intersections with sexual abuse to create new forms of crime, new ways to victimize and perpetuate harm, as well as new opportunities to investigate and address sexual violence both through the criminal justice system and in the public. I argue that young people …


Graduate Keynote. The Online Predator: Cyberbullies As The Hunters Of The Online World, Molly-Gloria R. Harper Mar 2019

Graduate Keynote. The Online Predator: Cyberbullies As The Hunters Of The Online World, Molly-Gloria R. Harper

Western Research Forum

Abstract: Seeking out prey, laying traps, targeting the ‘weak’, and being proud of their ‘latest kill’ are some of the behaviours that are often associated with hunters. However, through this research, it can be argued there is a new type of predatorthat society, mainly youth, ought to consider – the cyberbully. Cyberbullies are a distinct subculture associated with the youth phenomenon of cyberbullying. Through this research, cyberbullying is constructed as a deviant youth internet phenomenon that emerges and affects youth as a result of increased usage and reliance on social media platforms, technology, and the Internet. As a result …


Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi Aug 2018

Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi

International Journal of Cybersecurity Intelligence & Cybercrime

In order to test whether and how violence is exacerbated in online social networking sites, we utilized the BryantSmith Aggression Scale (Bryant & Smith, 2001), and included examples in the questionnaire offering solutions for 7 different hypothetical cases occurring online (Kiss, 2017). The questionnaire was sent to social work and law school students in Hungary. Prevalence and levels of aggression and its manifestation as violence online proved to be not more severe than in offline social relations. Law students were more aware than students of social work that online hostile acts are discrediting. Students of social work were significantly more …


Introduction To Dignity Special Issue: Freedom From Sexploitation, Lisa L. Thompson, Donna M. Hughes Jul 2017

Introduction To Dignity Special Issue: Freedom From Sexploitation, Lisa L. Thompson, Donna M. Hughes

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins Jul 2017

It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Welcome To Dignity, Donna M. Hughes Nov 2016

Welcome To Dignity, Donna M. Hughes

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Factors Influencing Young Bystanders' Decisions To Intervene When Witnessing Cyber-Aggression: A Mixed Methods Exploration, Lisa Jodi Patterson Jan 2016

Factors Influencing Young Bystanders' Decisions To Intervene When Witnessing Cyber-Aggression: A Mixed Methods Exploration, Lisa Jodi Patterson

Theses: Doctorates and Masters

With the modern proliferation of computers, the Internet and smart phones, adolescents are at increased risk of cyber-aggression: negative, harmful behaviour expressed through electronic means and aimed at an individual (or group of individuals). Cyber-aggression can have serious consequences for the social, emotional and physical health of both targets and perpetrators. Some experts recommend tackling cyberaggression using the strategies applied to face-to-face forms of aggression and bullying in school environments. One such strategy is to encourage peer bystanders to intervene in a positive way, which has been demonstrated to influence both the duration and severity of bullying episodes in the …