Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Criminology and Criminal Justice (2)
- Law (2)
- Legal Studies (2)
- Social Control, Law, Crime, and Deviance (2)
- Anthropology (1)
-
- Cognition and Perception (1)
- Cognitive Psychology (1)
- Communication (1)
- Comparative Politics (1)
- Criminal Law (1)
- Critical and Cultural Studies (1)
- International Relations (1)
- International and Area Studies (1)
- Interpersonal and Small Group Communication (1)
- Journalism Studies (1)
- Juvenile Law (1)
- Law and Gender (1)
- Military and Veterans Studies (1)
- Other Political Science (1)
- Other Psychology (1)
- Other Sociology (1)
- Political Science (1)
- Political Theory (1)
- Politics and Social Change (1)
- Psychology (1)
- Public Affairs, Public Policy and Public Administration (1)
- Regional Sociology (1)
- Keyword
-
- Afghanistan (1)
- Agenda (1)
- Awakai (1)
- Biometric (1)
- Bombings (1)
-
- Brainwashing (1)
- Car bombings (1)
- Civilians (1)
- Correctional Culture (1)
- Counter terrorism (1)
- Destabilizing (1)
- Domestic Violence, Witness Tampering (1)
- Education (1)
- Elections (1)
- Fear (1)
- Governance (1)
- Indoctrination (1)
- Instability (1)
- Insurgency (1)
- Iraq (1)
- Manipulation (1)
- Metric (1)
- Mullah Omar (1)
- Nawzot Kot (1)
- Pakistan (1)
- Political (1)
- Preemption (1)
- Proactive (1)
- Procedural justice; measurement validity; corrections (1)
- Profiling (1)
Articles 1 - 4 of 4
Full-Text Articles in Criminology
Putting Forfeiture To Work, Sarah M. Buel
Putting Forfeiture To Work, Sarah M. Buel
SARAH M BUEL
Intimate partner violence (“IPV”) victims are increasingly turning to the courts for help, too often with poor results. Successful witness tampering by offenders sabotages the court system by silencing victims through an array of unlawful conduct, including coercion and violence. The doctrine of forfeiture by wrongdoing should afford a viable solution, but several obstacles constrain its efficacy. Much confusion exists regarding witness tampering and forfeiture law as a result of the recent trilogy of the Crawford, Davis, and Giles Supreme Court decisions. Their cumulative effect is decreased doctrinal uniformity within a perplexing scheme that is difficult to implement. The resulting …
Softe Praat, Efficiënte Remedies, Jenneke Christiaens
Softe Praat, Efficiënte Remedies, Jenneke Christiaens
Jenneke Christiaens
No abstract provided.
Evaluating The Measurement Properties Of Procedural Justice In A Correctional Setting, Howard M. Henderson
Evaluating The Measurement Properties Of Procedural Justice In A Correctional Setting, Howard M. Henderson
Howard M Henderson
Research and theory on the effects of fair procedures has gained popularity over the past decade. This is understandable given the inherent appeal of these ideas and the supporting evidence. Research suggests that authorities are able to secure compliance from subordinates when they use fair procedures and when they are viewed as legitimate. Unfortunately, empirical studies of procedural justice and legitimacy are hampered by weak measures of key theoretical constructs. The purpose of this study is to examine the measurement properties of procedural justice in a sample of inmates. Results show that a one-factor model of procedural justice fits the …
Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam
Allen Gnanam
Terrorism as a violent and destabilizing act performed by terrorists, meaning loyal followers of political or religious agendas who hold resent and animosity toward a certain authority/ government (Lin, Liou, & Wu, 2007, pg. 149), will be explored and analyzed through the utilization of the governmentality perspective. For the purposes of this paper terrorism governance will refer to the governance/ control/ influence exerted by terrorists and terrorism. The focus of this explorative and analysis paper will be to identify diverse terrorism oriented technologies of governance, and analyze the ways in which these technologies enable terrorist to exert governance both indirectly …