Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Legal Studies (6498)
- Criminology and Criminal Justice (6493)
- Law (6477)
- Criminal Law (6452)
- Social Work (117)
-
- Psychology (113)
- Gender and Sexuality (108)
- Social Control, Law, Crime, and Deviance (104)
- Arts and Humanities (101)
- Political Science (85)
- International and Area Studies (78)
- History (75)
- Anthropology (73)
- Economics (70)
- Business (69)
- Geography (67)
- Urban Studies and Planning (66)
- Environmental Studies (63)
- Physical Sciences and Mathematics (61)
- Computer Sciences (59)
- Information Security (58)
- Forensic Science and Technology (51)
- Inequality and Stratification (48)
- Domestic and Intimate Partner Violence (42)
- Politics and Social Change (42)
- Public Affairs, Public Policy and Public Administration (41)
- Race and Ethnicity (31)
- Institution
-
- Northwestern Pritzker School of Law (6410)
- Western Michigan University (78)
- Bridgewater State University (65)
- Valparaiso University (64)
- University of Rhode Island (56)
-
- San Jose State University (17)
- University of South Florida (11)
- Nova Southeastern University (10)
- James Madison University (8)
- Lincoln Memorial University (8)
- Cleveland State University (7)
- Virginia Commonwealth University (6)
- St. Mary's University (5)
- University of Nebraska at Omaha (4)
- Walden University (4)
- Embry-Riddle Aeronautical University (3)
- Penn State Dickinson Law (3)
- Technological University Dublin (3)
- Universitas Indonesia (3)
- Clark University (2)
- College of Saint Benedict and Saint John's University (2)
- George Fox University (2)
- Illinois Wesleyan University (2)
- Kennesaw State University (2)
- Maurer School of Law: Indiana University (2)
- Minnesota State University, Mankato (2)
- St. John's University School of Law (2)
- University of Denver (2)
- University of Tennessee, Knoxville (2)
- Abilene Christian University (1)
- Keyword
-
- Prostitution (25)
- Sex trafficking (19)
- Violence (16)
- Cybercrime (15)
- Incarceration (12)
-
- Criminology (11)
- Cyberbullying (11)
- Cybersecurity (11)
- Prison (11)
- Sexual exploitation (11)
- Crime (10)
- Recidivism (10)
- Rape (9)
- Decriminalization (8)
- United States (8)
- Women (8)
- Democrats (7)
- Human trafficking (7)
- Law enforcement (7)
- Murder (7)
- Republicans (7)
- Sexual assault (7)
- Abuse (6)
- Genocide (6)
- High School Students (6)
- Internet (6)
- Mass incarceration (6)
- Political Party (6)
- Pornography (6)
- Sex trade (6)
- Publication Year
- Publication
-
- Journal of Criminal Law and Criminology (6409)
- The Journal of Sociology & Social Welfare (72)
- Midwest Social Sciences Journal (64)
- International Journal of Cybersecurity Intelligence & Cybercrime (58)
- Dignity: A Journal of Analysis of Exploitation and Violence (56)
-
- Themis: Research Journal of Justice Studies and Forensic Science (13)
- Genocide Studies and Prevention: An International Journal (10)
- The Qualitative Report (9)
- Lincoln Memorial University Journal of Humanities and Social Sciences (8)
- Journal of Prison Education and Reentry (2014-2023) (6)
- The Downtown Review (6)
- International Journal on Responsibility (5)
- The Hilltop Review (5)
- The Scholar: St. Mary's Law Review on Race and Social Justice (5)
- Bridgewater Review (4)
- Journal of Religion & Film (4)
- Dickinson Law Review (2017-Present) (3)
- International Journal of Missing Persons (3)
- The ITB Journal (3)
- DU Undergraduate Research Journal Archive (2)
- IUSTITIA (2)
- Journal of Cybersecurity Education, Research and Practice (2)
- Journal of Digital Forensics, Security and Law (2)
- Journal of Social, Behavioral, and Health Sciences (2)
- Journal of Undergraduate Research at Minnesota State University, Mankato (2)
- Jurnal Sosial Humaniora Terapan (2)
- Scholarly Undergraduate Research Journal at Clark (SURJ) (2)
- The Christian Librarian (2)
- The Journal of Social Encounters (2)
- Undergraduate Review (2)
Articles 31 - 60 of 6828
Full-Text Articles in Criminology
Understanding Involuntary Illegal Online Gamblers In The U.S.: Framing In Misleading Information By Online Casino Reviews, Sinyong Choi
Understanding Involuntary Illegal Online Gamblers In The U.S.: Framing In Misleading Information By Online Casino Reviews, Sinyong Choi
UNLV Gaming Research & Review Journal
Although there are many illegal online gamblers in the United States who use offshore gambling sites while falsely believing that their activity is legitimate, few studies have focused on the role of online casino reviews (OCR) who facilitate this activity. These reviews, for a variety of reasons, may present misleading information designed to encourage U.S. players to use offshore gambling sites. Using framing theory and neutralization techniques, we conducted a content analysis of multiple OCR to examine how they present information and justifications regarding the use of offshore gambling sites in the U.S. The findings indicate that many OCR positively …
Female Perpetrators Of Ritually Motivated Pedicide And Mutilation Of Children, Chima Agazue
Female Perpetrators Of Ritually Motivated Pedicide And Mutilation Of Children, Chima Agazue
Dignity: A Journal of Analysis of Exploitation and Violence
Ritually motivated pedicide is among contemporary Africa’s most severe crimes against children. Most of these crimes involve brutal acts of violence or mutilation of the victim. While men are most often the perpetrators of violent crimes, ritually motivated pedicide and mutilation equally attract women. The role of women in these crimes is not restricted to the less violent aspects of the crimes; instead, they also extend to the most brutal elements, often involving mutilation, decapitation or outright murder of the victim. This article explored the involvement of women in these crimes that target children for mutilation and pedicide. The article …
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
International Journal of Cybersecurity Intelligence & Cybercrime
This research aims to explore the influence of news media on the fear of cyberterrorism and how cyberterrorism is framed in the media. Using a mixed-method approach as a research strategy, this paper reports on two studies that explore the influence of news reading on the fear of cyberterrorism. The first study analyzed survey responses from 1,190 participants and found that increased exposure to reading news media was associated with increased fear of cyberterrorism. The second study, built on the first, sought to investigate how cyberterrorism is framed and constructed as a threat by the US local and national newspapers. …
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
International Journal of Cybersecurity Intelligence & Cybercrime
The difference in depression between non-cyberbullied and cyberbullied youth is not well understood. To describe the prevalence and trends in depression among cyberbullied adolescents. Using cross-sectional, nationally-representative data from the YRBS 2011 - 2019, we estimated the prevalence and trends of depression across the total years and within cyberbullied groups that include biological sex and race and ethnicity among adolescents. The results indicated the prevalence of depression was higher among those that were cyberbullied. Within the cyberbullied groups the total trend was higher than the non-cyberbullied, females had a higher prevalence of depression than males, and Hispanics had a higher …
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
International Journal of Cybersecurity Intelligence & Cybercrime
This editorial introduction will present an overview of the four articles contained in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The articles examine the profiling of hackers, the role of the media in shaping public perceptions of cyberterrorism, research trends in cybersecurity and cybercrime, as well as the impacts of cyberbullying.
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
International Journal of Cybersecurity Intelligence & Cybercrime
Studies on cybercrime and cybersecurity have expanded in both scope and breadth in recent years. This study offers a bibliometric review of research trends in cybercrime and cybersecurity over the past 26 years (1995-2021) based on Web of Science core collection database. Specifically, we examine the growth of scholarship and the expanded scope of subject categories and relevant journals. We also analyze the research collaboration network based on authors’ affiliated institutions and countries. Finally, we identify major topics within the fields, how each topic relates to – and diverges from – one another, and their evolution over time. Overall, we …
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
International Journal of Cybersecurity Intelligence & Cybercrime
Recently, it seems as if hacking-related stories can be found in the news every day. To study, and hopefully prevent, this new type of crime, the field of cyber criminology has emerged. This study adds to the existing cybercrime literature by examining hacking behavior specifically. It determines if there is a relationship between the age, gender, and nationality of hackers and characteristics of the cyberattacks that they perpetrate. To do this, this study analyzes 122 United States Department of Justice (USDOJ) press reports from January 2019 to December 2021. Some key results include the finding that older hackers and international …
The Superstition That Enslaves Virgin Girls In Ghana: An Exploration Of The Origins, Evolution, And Practice Of Trokosi, Emmanuel Sarpong Owusu
The Superstition That Enslaves Virgin Girls In Ghana: An Exploration Of The Origins, Evolution, And Practice Of Trokosi, Emmanuel Sarpong Owusu
Dignity: A Journal of Analysis of Exploitation and Violence
Trokosi is a religious practice in some parts of West Africa where young virgin girls are sent to fetish shrines to become sex slaves as part of rituals meant to prevent a communal calamity supposedly provoked by the transgressions of members of the girls’ family. This study offers additional insight into the concept, origins, evolution, and practice of trokosi, highlighting the cultural, socio-economic, and legal contexts of this practice in Ghana. This goal is achieved by reviewing pertinent literature and interviewing 10 participants: academics; activists; traditional leaders; and ordinary community members. The study establishes that trokosi, which is …
Exploring Facilitators, Barriers And Concerns Of Police Using Social Media When Investigating Missing Children, Eleanor Howlings, Reka Solymosi
Exploring Facilitators, Barriers And Concerns Of Police Using Social Media When Investigating Missing Children, Eleanor Howlings, Reka Solymosi
International Journal of Missing Persons
Missing person investigations involve the collection of information to ensure the person is located as fast as possible, minimising their exposure to harms. Social media is a valuable source of information in police investigations both to learn about the missing person, and to appeal for information to the public. To ensure social media is used safely and effectively, we must understand the concerns and experiences of investigating officers. In this pilot study, we analysed interviews from 8 experts who investigate missing children to identify the facilitators and barriers of using social media. We also identified concerns raised by officers around …
Can Undergraduate Artists With No Training In Forensic Art Produce Accurate Age Progressions?, William B. Erickson, James Lampinen, Charlie Frowd, Gregory Mahoney
Can Undergraduate Artists With No Training In Forensic Art Produce Accurate Age Progressions?, William B. Erickson, James Lampinen, Charlie Frowd, Gregory Mahoney
International Journal of Missing Persons
When children go missing and remain missing for long periods of time, authorities sometimes retain forensic artists to age progress the last known picture to provide an estimate of the current appearance. In the present research, undergraduate artists with no training in forensic art were asked to age progress images of children to an adult appearance. Similarity of age progressions produced by undergraduate artists were as similar to the corresponding targets as were age progressions produced by practicing forensic artists. However, age progressions produced by undergraduate artists were rated as being more similar to description matched foils than were the …
Incarcerated Bodies – Embodied Autoethnography In Prison, Shulamit Kitzis
Incarcerated Bodies – Embodied Autoethnography In Prison, Shulamit Kitzis
The Qualitative Report
Prison is a study field in which everyone – inmates, guards, and prison researchers – experiences powerful sensory stimuli comprised of sounds, sights, and smells in a crowded, closed space. Yet traditional academic research has socialized researchers to “wash away” their physical and emotional feelings for fear they would jeopardize the scientific nature and validity of their studies. Nevertheless, at times in a prison setting, the researchers’ bodies are the only tool that enables them to document what goes on; so much so that ignoring their bodies and emotions leads to a loss of valuable information. Using embodied autoethnography (EA), …
Shared Responsibility: Conceptualising How A Public Health Approach May Enhance Police Response To Missing Persons, Katie Gambier-Ross, Joe Apps Dr, Sarah Wayland Dr
Shared Responsibility: Conceptualising How A Public Health Approach May Enhance Police Response To Missing Persons, Katie Gambier-Ross, Joe Apps Dr, Sarah Wayland Dr
International Journal of Missing Persons
When a person is reported missing there are substantial costs for the individual, their family and society. This paper conceptualises the experience of missing persons episodes, through a public health approach. This then allows police, stakeholders and the community to engage in discussions about who is vulnerable to going missing by intervening in a way that addresses risk. Historically, a missing persons episode involves an absence, typically followed by police involvement in consultation with next of kin with establishing the whereabouts of the missing person being the primary focus. Yet, the risk factors of going missing relate more to the …
The Process Of Sexual Misconduct By Male Teachers And Staff In K-12 Institutions, Mollee Steely Smith
The Process Of Sexual Misconduct By Male Teachers And Staff In K-12 Institutions, Mollee Steely Smith
Dignity: A Journal of Analysis of Exploitation and Violence
Despite the increased media attention of teachers who engage in sexual misconduct with their students, research on such incidents remains limited, specifically on how these incidents are initiated and evolve. The purpose of the current study was to examine the nature of sexual abuse incidents by K-12 teachers who engaged in sexual misconduct with students by focusing on the onset, progression, and conclusion of these cases. Data included 10 secondary narrative interviews with male sex offenders who used their position as school employees to target and engage in sexual misconduct with their students in 2014 in a southern state. All …
Hentai And The Pornification Of Childhood: How The Porn Industry Just Made The Case For Regulation, Gail Dines, Mandy Sanchez
Hentai And The Pornification Of Childhood: How The Porn Industry Just Made The Case For Regulation, Gail Dines, Mandy Sanchez
Dignity: A Journal of Analysis of Exploitation and Violence
One of the most popular genres of online pornography today is hentai, sexualized animation, and cartoons in the style of Japanese anime. Data from Pornhub, the world’s best-known pornography website, as well as a recent report from a British regulatory agency and our research, show that much of hentai appeals to children and depicts child-like characters engaged in sexual violence. In almost every instance, this violence targets female characters. Hentai, we show, encourages adults to see minors, especially girls, as legitimate targets of sexual violence. Until the day when these depictions of sexual violence are eradicated, we call for three …
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Midwest Social Sciences Journal
No abstract provided.
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Midwest Social Sciences Journal
No abstract provided.
Of Movements And Markets: Religious Competition And The Problem Of Black Church Relevance, Omar M. Mcroberts
Of Movements And Markets: Religious Competition And The Problem Of Black Church Relevance, Omar M. Mcroberts
Midwest Social Sciences Journal
Why do cross-denominational public religious movements such as the Southern Christian Leadership Conference appear, despite the market-like competitive behavior of churches? Religious economy theory offers one set of explanations, based on a supply-side approach to the dynamics of numeric religious growth and decline. Namely, ecumenical movements are engaged by denominations, or religious firms, in membership decline. The history of national Black ecumenical movements, however, points to ways that religious economic theorizing fails to account for the multiple modes of social consciousness regarding church survival that motivate institutional religious activity. Black churches have existed not merely as a market but as …
Gender And Corporate Crime: Do Women On The Board Of Directors Reduce Corporate Bad Behavior?, Ido Baum, Dalit Gafni, Ruthy Lowenstein Lazar
Gender And Corporate Crime: Do Women On The Board Of Directors Reduce Corporate Bad Behavior?, Ido Baum, Dalit Gafni, Ruthy Lowenstein Lazar
Michigan Journal of Gender & Law
Public debate on mandating gender representation on boards of directors in the United States is close to a boiling point. California introduced a mandatory quota in 2018 only to see it constitutionally disqualified in 2022, and the Nasdaq Stock Market followed suit with new diversity rules in 2021 for all corporations listed on the exchange. While public discourse focuses on corporate performance, not much is known about the link between gender diversity and corporate normative obedience.
In this study we explore the relationship between boardroom gender representation and corporate compliance with the law. We examine the impact of gender diversity …
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
International Journal of Cybersecurity Intelligence & Cybercrime
Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
International Journal of Cybersecurity Intelligence & Cybercrime
Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …
“Elder Scam” Risk Profiles: Individual And Situational Factors Of Younger And Older Age Groups’ Fraud Victimization, Katalin Parti
“Elder Scam” Risk Profiles: Individual And Situational Factors Of Younger And Older Age Groups’ Fraud Victimization, Katalin Parti
International Journal of Cybersecurity Intelligence & Cybercrime
In an attempt to understand how differently fraud works depending on a victim’s age, we have examined the effects of situational (lifestyle-routine activities), self-control, and sociodemographic variables on scam victimization across age groups. The analysis was carried out on a national sample of 2,558 Americans, representative by age, sex, and race, and includes additional factors such as their education, living arrangement, employment, and propensity for reporting a crime or asking for help. The results substantiate research findings of the contribution of self-control and LRAT in predicting victimization in general but could not identify major situational and individual differences between older …
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
International Journal of Cybersecurity Intelligence & Cybercrime
The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …
Book Review: Digital Forensics And Cyber Investigation
Book Review: Digital Forensics And Cyber Investigation
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Event-Related Potentials Of Individuals With Attention-Deficit/Hyperactivity Disorder Performing The Attention Network Task, P. Dennis Rodriguez, Justin E. Stauffacher
Event-Related Potentials Of Individuals With Attention-Deficit/Hyperactivity Disorder Performing The Attention Network Task, P. Dennis Rodriguez, Justin E. Stauffacher
Midwest Social Sciences Journal
The current study sought to investigate the neural basis of attention-deficit/hyperactivity disorder (ADHD) by examining the performance of individuals with ADHD on the Attentional Networks Test (ANT) by Fan, McCandliss, Sommer, Raz, and Posner (2002), while recording electroencephalography (EEG) utilizing event-related potentials (ERP) methodology. Fifty-seven university students were divided into three groups: control, ADHD-inattentive subtype (ADHD-IA), and ADHD-combined/hyperactive impulsive subtype (ADHD-C/HI). The average peak amplitudes of the P300 waveform for each group were compared and analyzed for performance on each attention network measured by the ANT: the alerting network, the orienting network, and the executive control network. The average P3 …
Different Maternal Responses And Cognitions In Hypothetical Power Bouts: Relations To Parenting Styles, Kathy L. Ritchie
Different Maternal Responses And Cognitions In Hypothetical Power Bouts: Relations To Parenting Styles, Kathy L. Ritchie
Midwest Social Sciences Journal
In order to explore how parental styles and maternal cognitions interacted with difficult extended discipline episodes called power bouts, 88 mothers were categorized as either Authoritative, Authoritarian, Permissive, or Uninvolved. Mothers then read six hypothetical vignettes about a 4-year-old child misbehaving and were asked how they would respond to the child and how they would respond a second time if the child did not behave. These open-ended responses were coded on a scale of increasing power assertiveness with 0 being giving in and 5 indicating using punishment through spanking, removal of privilege, or time out. Using Bell and Chapman’s (1986) …