Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2012

Discipline
Keyword
Publication
File Type

Articles 1 - 30 of 58

Full-Text Articles in Criminology

Intentional Analysis In Psychological Research, Rodger E. Broome Phd Dec 2012

Intentional Analysis In Psychological Research, Rodger E. Broome Phd

Rodger E. Broome

http://phenomenologyblog.com/?p=878 Giorgi’s approach to psychological analysis is an analysis of intentionality at the psychological level rather than at the universal level of philosophy. In short, phenomenological research psychologists do not aim at finding universal a priori facts about mental life, but rather to illuminate the lived-experiences of people in various kinds of situations. The purpose of using a Husserlian approach to intentional analysis is to get at the mental acts to see how they are synthesized by the mind into personal meanings. With that in mind, the researcher examines the personal meanings and generates a unified and coherent whole from …


Juvenile Gangs In Schools: Characteristics, Causes, And Possible Solutions, Gordon A. Crews Dec 2012

Juvenile Gangs In Schools: Characteristics, Causes, And Possible Solutions, Gordon A. Crews

Gordon A Crews

The purpose of this seminar is to acquaint participants with the ever-changing characteristics, often conflicting issues of causation, and various proposed solutions to the myriad of problems associated with gangs in schools. Special attention is given to the evolving nature of gangs in K-12 educational institutions (e.g., new types of juvenile groups developing and their associated behavior). Traditional subjects such as gang recruitment, initiation, and criminal activity are examined by discussing the many ways they manifest themselves in the school setting. Finally, a conceptual framework is presented by which a school can identify, understand, and begin to address a potential …


Deadly Paradox Of Self-Defense, Rodger E. Broome Phd Dec 2012

Deadly Paradox Of Self-Defense, Rodger E. Broome Phd

Rodger E. Broome

Police deadly force is not intended to kill, but its purpose is to stop a violent person from hurting others. It is a desperate measure to bring someone physically under control, even at the risk of taking his or her life. In my research, the officers’ lived experience with shooting another person was paradoxical. Each shot fired by the officers was the most horrible thing they had ever done while being vital to surviving the encounters. Every bullet that hit its mark improved the likelihood that the officer would live while each bullet extinguished the life of the adversary. The …


Youth Involvement In Alternative Subcultures, Groups, Belief Systems, And Lifestyles: Examining International Police And Societal Response, Gordon A. Crews Dec 2012

Youth Involvement In Alternative Subcultures, Groups, Belief Systems, And Lifestyles: Examining International Police And Societal Response, Gordon A. Crews

Gordon A Crews

This presentation comparatively examines relationships in the United States, Eastern and Central Europe, Scandinavia, and parts of the Middle East among juvenile violence, "heavy metal" music, substance abuse, and participation in occult and "alternative" youth groups (e.g., Wicca, Satanism, vampirism, Goth). We trace the movement of certain groups, behaviors, and preferences and make a correlation between some of these movements and an increase in youth violence and substance abuse. The authors use results from surveys and participant observations in the U.S., Copenhagen, Germany, the Netherlands, & the Middle East (Egypt & Turkey) that indicate, however, that mere participation in these …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Existential Cycling, Rodger E. Broome Phd Nov 2012

Existential Cycling, Rodger E. Broome Phd

Rodger E. Broome

As I reflected on my thoughts, I reflected on my reflections while my body was hammering through the revolutions of the machine I was riding. I was feeling alive! Pulse racing, hard breathing, and beginning to sweat, I could feel myself cutting through the air as my race carved a rut through the light breeze. There is a transcendence that can be experienced when one is overcoming his or her normal human limitations. Driving power through this highly engineered piece of metal, carbon fiber, and rubber machinery to propel my body at 20 MPH down a city street is expansive …


United States: A Global Criminal, Adam Noxell Oct 2012

United States: A Global Criminal, Adam Noxell

Adam T Noxell

The paper was written to evaluate and discuss the crimes that the US committed during the decade long war on terrorism. It looked specifically at the US invasion of Iraq, the motives and the process leading up to the attack. The paper argues that the "super power" status that the US relishes in has allowed it to disregard domestic and international laws as well as human life to pursue its exploits in the middle east.


Toward An Agenda For Placing Migrant Hometown Associations (Htas) In Migration Policy-Making Discourse In Ghana, Thomas Antwi Bosiakoh Oct 2012

Toward An Agenda For Placing Migrant Hometown Associations (Htas) In Migration Policy-Making Discourse In Ghana, Thomas Antwi Bosiakoh

Dr Thomas ANTWI BOSIAKOH

Migrant hometown associations (HTAs) are arguably the most recognizable migrant institutions in migration destination countries. As institutions for the welfare of migrants and for the development of migrant home and destination countries, migrant HTAs have engaged the attention of migration scholars for a number of reasons. Their activities straddle across different spheres of endeavours, including adjustment and integration, development, promotion of peaceful co-existence, socio-cultural empowerment, and resolution of conflicts, among others. These activities of migrant HTAs are important in achieving co-development and therefore require policy focus. While it is important to commend Ghana for initiating a process for migration policy …


Review Of The Challenger Launch Decision: Risky Technology, Culture And Deviance At Nasa, Peter F. Meiksins Oct 2012

Review Of The Challenger Launch Decision: Risky Technology, Culture And Deviance At Nasa, Peter F. Meiksins

Peter Meiksins

Reviews the book "The Challenger Launch Decision: Risky Technology, Culture and Deviance at NASA," by Diane Vaughan.


Premises Liability, Wayne Petherick, Brent Turvey Oct 2012

Premises Liability, Wayne Petherick, Brent Turvey

Wayne Petherick

Forensic Criminology: the scientific study of crime and criminals for the purposes of addressing investigative and legal issues. It is a science, a behavioral science, and a forensic science. This text is intended to educate students in an applied fashion regarding the nature and extent of forensic casework that is supported by, dependent upon, and interactive with research, theory, and knowledge derived from criminology. It is also intended to act as a preliminary guide for practitioners working with and within related criminal justice professions. Particularly those involved with assisting investigations, administrative inquiries, legal proceedings or providing expert findings or testimony …


Fulfilling The Mission - Police Tactical Psychology Bulletin, Rodger E. Broome Phd Sep 2012

Fulfilling The Mission - Police Tactical Psychology Bulletin, Rodger E. Broome Phd

Rodger E. Broome

I don’t know if it is still a stock question in hiring and promotional processes or whether it is just to cliché to use, but “why do you what to be a…” is an important question when considering one’s job choice. In the beginning, aspiring police officers and rookies who are becoming cops are driven by a motivation to become a member of something bigger than themselves.


Durkheim And Foucault: The Social Functions Of Crime And Punishment., Sergio Tonkonoff Sep 2012

Durkheim And Foucault: The Social Functions Of Crime And Punishment., Sergio Tonkonoff

Sergio Tonkonoff

The aim of this article is to examine the positions of Durkheim and Foucault regarding crime. The author’s more general hypothesis is that both share the idea of a hidden functional nexus between criminal transgression, criminal punishment, and social order. Once established this agreement, he seeks to identify their main contrasts. Here, the hypothesis is that the two authors develop different modes of understanding the constitution and reproduction of a society, and, therefore, their interpretations of the history of punishment are different regarding both the importance and the role that they assign to the issue of crime in modern social …


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


What's The Problem? - Police Tactical Psychology Bulletin, Rodger E. Broome Phd Jul 2012

What's The Problem? - Police Tactical Psychology Bulletin, Rodger E. Broome Phd

Rodger E. Broome

An obvious fact is that police officers are problem solvers. Sometimes the most obvious things in life are also those we don’t spend much time reflecting upon.


Air Pollution, Economic Development Of Communities, And Health Status Among The Elderly In Urban China., Rongjun Sun, Danan Gu Jul 2012

Air Pollution, Economic Development Of Communities, And Health Status Among The Elderly In Urban China., Rongjun Sun, Danan Gu

Rongjun Sun

In Western societies, the impact of air pollution on residents' health is higher in less wealthy communities. However, it is not clear whether such an interaction effect applies to developing countries. The authors examine how the level of community development modifies the impact of air pollution on health outcomes of the Chinese elderly using data from the third wave of the Chinese Longitudinal Health Longevity Survey in 2002, which includes 7,358 elderly residents aged 65 or more years from 735 districts in 171 cities. The results show that, compared with a 1-point increase in the air pollution index in urban …


The Psychology Of "Othering" And The Fears Of Feminizing The Fire Services Through Gender Inclusiveness, Rodger E. Broome Phd Jul 2012

The Psychology Of "Othering" And The Fears Of Feminizing The Fire Services Through Gender Inclusiveness, Rodger E. Broome Phd

Rodger E. Broome

Editor’s Note: In searching for answers for the way things are – you sometimes have to look at things from a different viewpoint. iWomen thought that Dr. Broome has an interesting perspective as he does consider whether we contribute to our (all women in the fire service) own obstacles by not promoting


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Kicking To Death, Daniel H. Heinke Jun 2012

Kicking To Death, Daniel H. Heinke

Dr. Daniel H. Heinke

The Stockholm Criminology Symposium: Presentation on the medical, criminological, and legal aspects of assaults involving kicks against the head and Thorax.


A Helmet-Cam For Emergency Responders’ Experience, Rodger E. Broome Phd Jun 2012

A Helmet-Cam For Emergency Responders’ Experience, Rodger E. Broome Phd

Rodger E. Broome

http://phenomenologyblog.com/?p=341 I like to use the analogy of the “helmet cam” (helmet mounted video camera) to describe the Giorgi’s (2009) descriptive phenomenological method of psychology in its applications to police and public safety psychology. The helmet cam gives the viewer of the video a first-person (or subjective) viewpoint that is different than that of a third-party spectator or witness. Helmet cams have also become more popular in television sports coverage. This is because it can give a richer vicarious experience of having the experience. I use the helmet cam analogy because it presents the event’s perspective from the participant’s rather …


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Editorial: The Idio-Technopolis, Katina Michael May 2012

Editorial: The Idio-Technopolis, Katina Michael

Professor Katina Michael

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


'In Unity Lies Our Strength': Exploring The Benefits And Entitlements In Nigerian Migrant Associations In Accra, Ghana, Thomas Antwi Bosiakoh May 2012

'In Unity Lies Our Strength': Exploring The Benefits And Entitlements In Nigerian Migrant Associations In Accra, Ghana, Thomas Antwi Bosiakoh

Dr Thomas ANTWI BOSIAKOH

This paper explores the benefits and entitlements due to members of three Nigerian migrant associations in Accra, Ghana. In doing this, the paper first attempts (re)tracing Nigerian presence in Ghana, and then discusses recent developments in Nigerian migration to Ghana. In the discussion on Nigerian migrant associations in Accra, Ghana, two specific issues are highlighted, namely, the profiles/activities of the associations and the benefits and entitlements due to association members and leaders. The discussions on the benefits and entitlements are grounded within the social capital framework. A number of conclusions have been reached based on the evidence of the empirical …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


It's Not Personal, It's The Law - Police Tactical Psychology Bulletin, Rodger E. Broome Phd Apr 2012

It's Not Personal, It's The Law - Police Tactical Psychology Bulletin, Rodger E. Broome Phd

Rodger E. Broome

Meta-communication is the message behind the explicit message(s) in language. In other words, when we say something we always say more than what was there in the words and sentences. There are presumptions and hidden premises that are there which makes each verbal utterance “pregnant” with meaning of which even the speaker is not fully aware.


Victimology, Emily Adler Apr 2012

Victimology, Emily Adler

Emily S. Adler

Until recently, the family sociology literature has been characterized by a conspicuous absence of research on marital violence. Efforts to fill this gap are evidenced by a growing body of material in the area. It is in this context that Victimology's Special Issue on Spouse Abuse and Domestic Violence makes a worthwhile contribution to the effort to expose the problem and propose solutions.