Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Legal Studies (14)
- Criminology and Criminal Justice (13)
- Psychology (13)
- Arts and Humanities (10)
- Gender and Sexuality (10)
-
- Political Science (10)
- Anthropology (9)
- Business (9)
- Computer Sciences (9)
- History (9)
- Information Security (9)
- Physical Sciences and Mathematics (9)
- Social Justice (9)
- Economics (8)
- Environmental Studies (8)
- Forensic Science and Technology (8)
- Geography (8)
- International and Area Studies (8)
- Public Affairs, Public Policy and Public Administration (8)
- Urban Studies and Planning (8)
- Social Control, Law, Crime, and Deviance (7)
- Law (5)
- Criminal Law (3)
- Law and Society (3)
- Medicine and Health Sciences (3)
- Public Policy (3)
- Quantitative, Qualitative, Comparative, and Historical Methodologies (3)
- Institution
- Keyword
-
- Accountability (2)
- Cybersecurity (2)
- Incarceration (2)
- Sentencing (2)
- Aboriginal and Torres Strait Islander young men (1)
-
- Abuse in care (1)
- Africa (1)
- Age Progression (1)
- Anime (1)
- Anonymity (1)
- Australia (1)
- Autoethnography (1)
- Canada (1)
- Child pornography (1)
- Child removal (1)
- Child sexual exploitation material (1)
- Children (1)
- Collaboration Network (1)
- College students (1)
- Colonisation (1)
- Craniofacial Growth (1)
- Crime (1)
- Criminal justice (1)
- Cultivation theory (1)
- Cyber Investigations (1)
- Cyberbullying (1)
- Cybercrime (1)
- Cybercrime; artificial intelligence; deepfake; social engineering; metaverse (1)
- Cybercriminal (1)
- Cyberdeviance (1)
- Publication
-
- International Journal of Cybersecurity Intelligence & Cybercrime (8)
- Midwest Social Sciences Journal (8)
- Dignity: A Journal of Analysis of Exploitation and Violence (4)
- International Journal on Responsibility (4)
- International Journal of Missing Persons (3)
-
- Culture, Society, and Praxis (1)
- Genocide Studies and Prevention: An International Journal (1)
- Journal of Cybersecurity Education, Research and Practice (1)
- Journal of the Australian Indigenous HealthInfoNet (1)
- Jurnal Sosial Humaniora Terapan (1)
- Secrecy and Society (1)
- The Qualitative Report (1)
- UNLV Gaming Research & Review Journal (1)
Articles 1 - 30 of 35
Full-Text Articles in Criminology
Urgensi Pemanfaatan Open Source Intelligent (Osint) Dalam Upaya Pencegahan Aksi Terorisme Di Indonesia, Nia Lavinia, Puspitasari Puspitasari
Urgensi Pemanfaatan Open Source Intelligent (Osint) Dalam Upaya Pencegahan Aksi Terorisme Di Indonesia, Nia Lavinia, Puspitasari Puspitasari
Jurnal Sosial Humaniora Terapan
The invention of increasingly sophisticated technology and an increasingly connected world has changed the nature of terror groups from "traditional terrorism" to "sophisticated terrorism". This change complicates the task of security forces because to be able to fight them, the authorities are required to be sophisticated as well. Starting from the concept of the "ring of security" information, which reveals that successful intelligence gathering will help prevent terrorism attacks. This research aims to illustrate the importance of utilizing Open Source Intelligence (OSINT) to raise the level of sophistication of the apparatus in intelligence gathering in countering terrorism. This research is …
Volume 6, Issue 1 (2023) Criminal Justice Agents And Responsibility, Colleen Berryessa, Elizabeth Griffiths, Kaitlen Hubbard, Deena A. Isom, Kateryna Kaplun, Hiuxuan Li, Siyu Liu, Esther Nir, Heather L. Scheuerman, Rachel Schumann, Sandy Xie, Carolyn Yule
Volume 6, Issue 1 (2023) Criminal Justice Agents And Responsibility, Colleen Berryessa, Elizabeth Griffiths, Kaitlen Hubbard, Deena A. Isom, Kateryna Kaplun, Hiuxuan Li, Siyu Liu, Esther Nir, Heather L. Scheuerman, Rachel Schumann, Sandy Xie, Carolyn Yule
International Journal on Responsibility
This special issue of the International Journal on Responsibility (IJR) advances scholarship on the various ways responsibility infuses the roles of criminal justice agents. As the inaugural issue of my tenure as Editor-in-Chief, Volume 6 deepens our understanding of responsibility in the context of the criminal justice system, thereby fulfilling IJR’s aim and scope. Specifically, the articles highlight issues of responsibility within each component of the criminal justice system: police, courts, and corrections.
Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun
Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun
International Journal on Responsibility
As new technologies emerge and are increasingly used to commit interpersonal cybercrimes like cyberstalking and cyberharassment, the legal system lags in assisting victims in obtaining justice in these types of experiences. This qualitative research study explores how attorney and advocate interviewees from Illinois, New Jersey, and New York view judges’ responsibility to the law in cyberstalking and cyberharassment cases. This study finds three themes: judges’ lack of understanding of technology and its harms, discretion, and law on the books versus law in action as important factors and frameworks that contribute to why judges do not consider the importance of technology …
The Influence Of Prior Legal Background On Judicial Sentencing Considerations, Esther Nir, Siyu Liu
The Influence Of Prior Legal Background On Judicial Sentencing Considerations, Esther Nir, Siyu Liu
International Journal on Responsibility
State court judges are influenced by a myriad of factors during criminal case processing. To study the influence of prior legal background on judicial decision-making at sentencing, we performed in-depth qualitative interviews of 39 trial court judges presiding over criminal cases in a Northeastern U.S. state. We find that judges are influenced by their former legal experiences and most judges are cognizant of this influence. While certain sentencing considerations are prioritized for almost all judges (e.g., criminal history, seriousness of the offense), prioritization and processing of many other sentencing criteria are correlated with prior legal background. Former defense attorneys tend …
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Midwest Social Sciences Journal
No abstract provided.
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Midwest Social Sciences Journal
No abstract provided.
Experiences Of Kinship And Connection To Family For Aboriginal And Torres Strait Islander Young Men With Histories Of Incarceration, Shelley Joy Walker, Michael Doyle, Mark Stoové Professor, Troy Combo, Mandy Wilson
Experiences Of Kinship And Connection To Family For Aboriginal And Torres Strait Islander Young Men With Histories Of Incarceration, Shelley Joy Walker, Michael Doyle, Mark Stoové Professor, Troy Combo, Mandy Wilson
Journal of the Australian Indigenous HealthInfoNet
Epidemiological approaches have brought important attention to the issues surrounding the over-incarceration of Aboriginal and Torres Strait Islander young people, and the enormous health and socio-economic disparities they face. An implicit discourse often exists within the construction of this “knowledge”, however, that situates Aboriginal and Torres Strait Islander young people in deficit terms.
Using narrative inquiry, a methodological approach congruent with Aboriginal and Torres Strait Islander culture and ways of knowing, we aim to challenge this dominant discourse, via an examination of the narratives of eight Aboriginal Torres Strait Islander young men (aged 19-24 years) involved in the criminal justice …
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
International Journal of Cybersecurity Intelligence & Cybercrime
The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …
Nonprofit Accountability: Effects Of Subsector On Online Accountability, Ibrahima F. Yaro, Trent A. Engbers
Nonprofit Accountability: Effects Of Subsector On Online Accountability, Ibrahima F. Yaro, Trent A. Engbers
Midwest Social Sciences Journal
Scandals within the nonprofit sector over compensation and management have increased calls for nonprofits to demonstrate accountability. Many organizations have responded by disclosing information online and providing tools that allow web-based interactions with stakeholders. The literature on nonprofits’ online accountability has found that the level of nonprofit online accountability is affected by their size, age, asset, revenue, and location, but hasn’t been examined in terms of how subsector influences online accountability. Through a web-content analysis of fifty-five nonprofits, this research investigated how subsector (arts and culture, education, health, and human services) influences online accountability using a framework of four types …
Examining Remorse In Attributions Of Focal Concerns During Sentencing: A Study Of Probation Officers, Colleen M. Berryessa
Examining Remorse In Attributions Of Focal Concerns During Sentencing: A Study Of Probation Officers, Colleen M. Berryessa
International Journal on Responsibility
This research, using interviews with probation officers in the United States (n = 151) and a constant comparative method for analysis, draws from the focal concerns framework to qualitatively model a process by which probation officers use a defendant’s remorse to attribute focal concerns in order to guide their sentencing recommendations in pre-sentencing reports. The model suggests that officers use expressions of remorse to make attributions about mitigated criminal intention (blameworthiness and notions of responsibility), reduced dangerousness and a high potential for reform (community protection), and organization-level effects for increasing caseload efficiency and using correctional resources (practical effects of …
Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival
Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival
Secrecy and Society
Prison data collection is a labyrinthine infrastructure. This article engages with debates around the political potentials and limitations of transparency as a form of “accountability,” specifically as it relates to carceral management and data gathering. We examine the use of OASys, a widely used risk assessment tool in the British prison system, in order to demonstrate how transparency operates as a means of legitimating prison data collection and ensuing penal management. Prisoner options to resist their file, or “data double,” in this context are considered and the decisive role of OASys as an immediately operationalized technical structure is outlined. We …
Aotearoa New Zealand, The Forcible Transfer Of Tamariki And Rangatahi Māori, And The Royal Commission On Abuse In Care, David B. Macdonald
Aotearoa New Zealand, The Forcible Transfer Of Tamariki And Rangatahi Māori, And The Royal Commission On Abuse In Care, David B. Macdonald
Genocide Studies and Prevention: An International Journal
This article investigates to what extent the forcible transfer of tamariki and rangatahi Māori (Indigenous children and youth) in Aotearoa New Zealand can be considered genocide. First, I begin by exploring contemporary genocide theory as it relates to dolus eventualis in settler colonial contexts, before engaging with precedents for recognizing Indigenous genocides established by truth commissions in Canada (2015; 2019) and Australia (1997). I then explore the history around Indigenous child removal in Aotearoa from the onset of colonization to the present day, attentive to ways in which the UN Convention can apply to the forced removal of Māori children. …
Anonymity And Gender Effects On Online Trolling And Cybervictimization, Gang Lee, Annalyssia Soonah
Anonymity And Gender Effects On Online Trolling And Cybervictimization, Gang Lee, Annalyssia Soonah
Journal of Cybersecurity Education, Research and Practice
The purpose of this study was to investigate the effects of the anonymity of the internet and gender differences in online trolling and cybervictimization. A sample of 151 college students attending a southeastern university completed a survey to assess their internet activities and online trolling and cybervictimization. Multivariate analyses of logistic regression and ordinary least squares regression were used to analyze online trolling and cybervictimization. The results indicated that the anonymity measure was not a significant predictor of online trolling and cybervictimization. Female students were less likely than male students to engage in online trolling, but there was no gender …
A Vicious Cycle: How Racialised Moral Panics Simultaneously Reproduce (And Are Reproduced By) Repressive Policing Practices, Oscar D. Sharples
A Vicious Cycle: How Racialised Moral Panics Simultaneously Reproduce (And Are Reproduced By) Repressive Policing Practices, Oscar D. Sharples
Culture, Society, and Praxis
Policing and moral panics exist in a mutually reinforcing, reciprocal relationship, the harmful outcomes of which are disproportionately directed towards poor communities of colour. This paper will draw on two examples of moral panics: those surrounding Islamic terrorism and Black crime, in order to illustrate the harm that this reinforcing relationship can cause. This harm manifests itself in increasingly restrictive antiterrorism laws, Prevent initiatives, racial profiling, and internal surveillance within the Muslim community; as well as the policies of Joint Enterprise, Knife Crime Prevention Orders (KCPOs), and the strengthening of the school-to-prison pipeline, which disproportionally target Black youth. With reference …
Understanding Involuntary Illegal Online Gamblers In The U.S.: Framing In Misleading Information By Online Casino Reviews, Sinyong Choi
Understanding Involuntary Illegal Online Gamblers In The U.S.: Framing In Misleading Information By Online Casino Reviews, Sinyong Choi
UNLV Gaming Research & Review Journal
Although there are many illegal online gamblers in the United States who use offshore gambling sites while falsely believing that their activity is legitimate, few studies have focused on the role of online casino reviews (OCR) who facilitate this activity. These reviews, for a variety of reasons, may present misleading information designed to encourage U.S. players to use offshore gambling sites. Using framing theory and neutralization techniques, we conducted a content analysis of multiple OCR to examine how they present information and justifications regarding the use of offshore gambling sites in the U.S. The findings indicate that many OCR positively …
Female Perpetrators Of Ritually Motivated Pedicide And Mutilation Of Children, Chima Agazue
Female Perpetrators Of Ritually Motivated Pedicide And Mutilation Of Children, Chima Agazue
Dignity: A Journal of Analysis of Exploitation and Violence
Ritually motivated pedicide is among contemporary Africa’s most severe crimes against children. Most of these crimes involve brutal acts of violence or mutilation of the victim. While men are most often the perpetrators of violent crimes, ritually motivated pedicide and mutilation equally attract women. The role of women in these crimes is not restricted to the less violent aspects of the crimes; instead, they also extend to the most brutal elements, often involving mutilation, decapitation or outright murder of the victim. This article explored the involvement of women in these crimes that target children for mutilation and pedicide. The article …
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
International Journal of Cybersecurity Intelligence & Cybercrime
This research aims to explore the influence of news media on the fear of cyberterrorism and how cyberterrorism is framed in the media. Using a mixed-method approach as a research strategy, this paper reports on two studies that explore the influence of news reading on the fear of cyberterrorism. The first study analyzed survey responses from 1,190 participants and found that increased exposure to reading news media was associated with increased fear of cyberterrorism. The second study, built on the first, sought to investigate how cyberterrorism is framed and constructed as a threat by the US local and national newspapers. …
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
International Journal of Cybersecurity Intelligence & Cybercrime
The difference in depression between non-cyberbullied and cyberbullied youth is not well understood. To describe the prevalence and trends in depression among cyberbullied adolescents. Using cross-sectional, nationally-representative data from the YRBS 2011 - 2019, we estimated the prevalence and trends of depression across the total years and within cyberbullied groups that include biological sex and race and ethnicity among adolescents. The results indicated the prevalence of depression was higher among those that were cyberbullied. Within the cyberbullied groups the total trend was higher than the non-cyberbullied, females had a higher prevalence of depression than males, and Hispanics had a higher …
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
International Journal of Cybersecurity Intelligence & Cybercrime
This editorial introduction will present an overview of the four articles contained in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The articles examine the profiling of hackers, the role of the media in shaping public perceptions of cyberterrorism, research trends in cybersecurity and cybercrime, as well as the impacts of cyberbullying.
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
International Journal of Cybersecurity Intelligence & Cybercrime
Studies on cybercrime and cybersecurity have expanded in both scope and breadth in recent years. This study offers a bibliometric review of research trends in cybercrime and cybersecurity over the past 26 years (1995-2021) based on Web of Science core collection database. Specifically, we examine the growth of scholarship and the expanded scope of subject categories and relevant journals. We also analyze the research collaboration network based on authors’ affiliated institutions and countries. Finally, we identify major topics within the fields, how each topic relates to – and diverges from – one another, and their evolution over time. Overall, we …
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
International Journal of Cybersecurity Intelligence & Cybercrime
Recently, it seems as if hacking-related stories can be found in the news every day. To study, and hopefully prevent, this new type of crime, the field of cyber criminology has emerged. This study adds to the existing cybercrime literature by examining hacking behavior specifically. It determines if there is a relationship between the age, gender, and nationality of hackers and characteristics of the cyberattacks that they perpetrate. To do this, this study analyzes 122 United States Department of Justice (USDOJ) press reports from January 2019 to December 2021. Some key results include the finding that older hackers and international …
The Superstition That Enslaves Virgin Girls In Ghana: An Exploration Of The Origins, Evolution, And Practice Of Trokosi, Emmanuel Sarpong Owusu
The Superstition That Enslaves Virgin Girls In Ghana: An Exploration Of The Origins, Evolution, And Practice Of Trokosi, Emmanuel Sarpong Owusu
Dignity: A Journal of Analysis of Exploitation and Violence
Trokosi is a religious practice in some parts of West Africa where young virgin girls are sent to fetish shrines to become sex slaves as part of rituals meant to prevent a communal calamity supposedly provoked by the transgressions of members of the girls’ family. This study offers additional insight into the concept, origins, evolution, and practice of trokosi, highlighting the cultural, socio-economic, and legal contexts of this practice in Ghana. This goal is achieved by reviewing pertinent literature and interviewing 10 participants: academics; activists; traditional leaders; and ordinary community members. The study establishes that trokosi, which is …
Exploring Facilitators, Barriers And Concerns Of Police Using Social Media When Investigating Missing Children, Eleanor Howlings, Reka Solymosi
Exploring Facilitators, Barriers And Concerns Of Police Using Social Media When Investigating Missing Children, Eleanor Howlings, Reka Solymosi
International Journal of Missing Persons
Missing person investigations involve the collection of information to ensure the person is located as fast as possible, minimising their exposure to harms. Social media is a valuable source of information in police investigations both to learn about the missing person, and to appeal for information to the public. To ensure social media is used safely and effectively, we must understand the concerns and experiences of investigating officers. In this pilot study, we analysed interviews from 8 experts who investigate missing children to identify the facilitators and barriers of using social media. We also identified concerns raised by officers around …