Open Access. Powered by Scholars. Published by Universities.®

Social Control, Law, Crime, and Deviance Commons

Open Access. Powered by Scholars. Published by Universities.®

1,540 Full-Text Articles 1,643 Authors 728,992 Downloads 156 Institutions

All Articles in Social Control, Law, Crime, and Deviance

Faceted Search

1,540 full-text articles. Page 1 of 48.

Social Problems (Ksu), Evelina Sterling, Daniel Farr 2018 Kennesaw State University

Social Problems (Ksu), Evelina Sterling, Daniel Farr

Psychology, Sociology, Anthropology, and Social Work Grants Collections

This Grants Collection for Social Problems was created under a Round Nine ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Islamic Terrorism In The United States – The Association Of Religious Fundamentalism With Social Isolation & Paths Leading To Extreme Violence Through Processes Of Radicalization., Shay Shiran 2018 Shay Shiran

Islamic Terrorism In The United States – The Association Of Religious Fundamentalism With Social Isolation & Paths Leading To Extreme Violence Through Processes Of Radicalization., Shay Shiran

Student Theses

This exploratory study focuses on identifying motivations for religious terrorism and Islamic terrorism in the United States in particular. Terrorism is a crime of extreme violence with the end purpose of political influence. This crime is challenging to encounter for its multi-faced characteristics, the unusual motivations of its actors, and their semi-militant conduct. The hypothesis of this study asserts that religious terrorists are radicalized by passing from fundamental to extreme devout agendas, caused by isolation from the dominant society, and resulted in high potential to impose those agendas by extreme violence. Under the theoretical framework of subculture in criminology, this ...


Bait Questions As Source Of Misinformation In Police Interviews: Does Race Or Age Of The Suspect Increase Jurors' Memory Errors?, Matilde Ascheri 2018 CUNY John Jay College

Bait Questions As Source Of Misinformation In Police Interviews: Does Race Or Age Of The Suspect Increase Jurors' Memory Errors?, Matilde Ascheri

Student Theses

Bait questions—hypothetical questions about evidence, often used by detectives during interrogations—can activate the misinformation effect and alter jurors’ perceptions of the evidence of a case. Here, we were interested in investigating whether mock jurors’ implicit biases could amplify the magnitude of the misinformation effect. We accomplished this by manipulating the age and race of the suspect being interrogated. As an extension of Luke et al. (2017), we had participants read a police report describing evidence found at a crime scene, then read a transcript of a police interrogation where the detective used bait questions to introduce new evidence ...


Social Work Students’ Attitudes And Beliefs About Mental Health Courts, Nicholas Bettosini, Conrad Paul Akins-Johnson 2018 California State University, San Bernardino

Social Work Students’ Attitudes And Beliefs About Mental Health Courts, Nicholas Bettosini, Conrad Paul Akins-Johnson

Electronic Theses, Projects, and Dissertations

Mental Health Courts (MHCs) are a diversion program for mentally ill offenders in lieu of incarceration. The Substance Abuse and Mental Services Administration (SAMHSA) developed these specialized court programs in the 1990’s to assist mentally ill offenders in overcoming barriers to treatment. While new laws have begun to change the way mentally ill offenders are viewed from a law enforcement standpoint, social workers’ attitudes and beliefs about these programs have not been studied. This quantitative study’s purpose was to examine Master of Social Work (MSW) Graduate students’ attitudes and beliefs of mentally ill offenders and MHCs. Social work ...


An Analysis Of Self-Reported Suicide Attempts And Ideation In A National Sample Of Incarcerated Sex Offenders, Kseniya Katsman 2018 CUNY John Jay College

An Analysis Of Self-Reported Suicide Attempts And Ideation In A National Sample Of Incarcerated Sex Offenders, Kseniya Katsman

Student Theses

Suicide is the leading cause of preventable death in US jails and prisons, with rates three to nine times higher than those of the general population. Although suicide in correctional settings has been recognized as a serious problem, the research on suicide among incarcerated individuals remains limited. While the majority of suicide risk factors may be common across all offender types, sex offenders may be at a particularly elevated risk. Specifically, sex offenders have been found to report high rates of hopelessness and depressive mood, which are known predictors of suicidal behavior, and approximately 14% of incarcerated sex offenders have ...


Does Mental Illness Affect Societal Perception Of Sex Offenders?, Keely A. Bartram 2018 CUNY John Jay College

Does Mental Illness Affect Societal Perception Of Sex Offenders?, Keely A. Bartram

Student Theses

Although mental illness is common in the sex offender population, it has never been examined how evidence of such may influence societal perception. In comparison to the non-sex offender population, it was hypothesized that participants would consider mental illness less mitigating for sex offenders, would be less likely to support the mental health treatment of sex offenders while incarcerated, and would consider certain mental illnesses (schizophrenia and substance abuse disorders) as particularly aggravating for this group of offenders. Respondents were asked to read a short vignette and then respond to a series of questions about culpability, sentencing decisions, and mental ...


If You Experience Sexual Harassment You Must Report It... Right?, Alejandra M. Rosales 2018 University of New Mexico

If You Experience Sexual Harassment You Must Report It... Right?, Alejandra M. Rosales

Intersections: Critical Issues in Education

No abstract provided.


Contents, ADFSL 2018 Embry-Riddle Aeronautical University

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth 2018 Technology Research Centre, DPG

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang 2018 Embry-Riddle Aeronautical University

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua MacMonagle 2018 East Central University, Ada Oklahoma

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical ...


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba 2018 Embry-Riddle Aeronautical University

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D 2018 GJ Software Forensics

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues ...


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac 2018 University of Texas at San Antonio

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed ...


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik 2018 Sam Houston State University

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence ...


Violence In Prostitution, Serena Maszak 2018 CUNY John Jay College

Violence In Prostitution, Serena Maszak

Student Theses

It is estimated that the majority of prostitutes are victims of violence, including rape and homicide. Some research has suggested that the clients of sex workers perpetrate most of these acts of violence. While several qualitative studies have examined specific incidents of violence, the prevalence and causes of violence in prostitution remain largely unaddressed by the existing literature. This study compares attitudes towards sexual violence and prostitution between men who have purchased sexual services and those who have not. Participants were 170 men recruited online, with 35 (20.6%) participants self-identifying as those who had previously purchased sex. Overall, a ...


The Effects Of Media Exposure On Perceptions Of Residence Restrictions, Stephanie Simeone 2018 CUNY John Jay College

The Effects Of Media Exposure On Perceptions Of Residence Restrictions, Stephanie Simeone

Student Theses

Public perceptions impact the formation of sex offender policy, yet much of what the public knows about sex crimes is based in stereotypical narratives provided by the media. The present study investigated the effects of media exposure on perceptions of sexual offending and the efficacy of residence restrictions. Participants were randomly assigned to one of three media exposure groups and then asked about their opinions about sexual offending and residence restrictions. Results indicated that participants who viewed sensationalized media reports were more likely than individuals who viewed informed media and no media to endorse more stereotypical views of individuals convicted ...


If It Looks Like It, Moves Like It, And Sounds Like It, Then It Probably Is Contemporary Colonization .Pdf, Denzel Munroe 2018 Trinity College

If It Looks Like It, Moves Like It, And Sounds Like It, Then It Probably Is Contemporary Colonization .Pdf, Denzel Munroe

Denzel Munroe

No abstract provided.


Interethnic Marriages In The United States: An In-Depth Look At Marital Challenges, Spring C. Miles 2018 University of South Carolina

Interethnic Marriages In The United States: An In-Depth Look At Marital Challenges, Spring C. Miles

Senior Theses

As ethnic diversity increases in the United States, interethnic marriages are becoming increasingly prevalent. Despite their increasing rates, interethnic unions experience lower levels of relationship quality and are at a higher risk of divorce than same-ethnic unions. Other factors that influence marital outcomes include age at marriage, education, religion, and parental divorce. However, factors that influence specifically interethnic marriages include internal stressors, such as conflicting values and relationship expectations, and external stressors, such as a lack of social support and/or legal barriers. The best theoretical framework for studying interethnic unions is interdependence theory because it analyzes these factors and ...


Digital Commons powered by bepress