Open Access. Powered by Scholars. Published by Universities.®

Social Control, Law, Crime, and Deviance Commons

Open Access. Powered by Scholars. Published by Universities.®

2,213 Full-Text Articles 2,602 Authors 3,047,373 Downloads 208 Institutions

All Articles in Social Control, Law, Crime, and Deviance

Faceted Search

2,213 full-text articles. Page 7 of 82.

Internal And External Challenges To Culpability, Stephen J. Morse 2022 University of Pennsylvania Carey Law School

Internal And External Challenges To Culpability, Stephen J. Morse

All Faculty Scholarship

This article was presented at “Guilty Minds: A Virtual Conference on Mens Rea and Criminal Justice Reform” at Arizona State University’s Sandra Day O’Connor College of Law. It is forthcoming in Arizona State Law Journal Volume 53, Issue 2.

The thesis of this article is simple: As long as we maintain the current folk psychological conception of ourselves as intentional and potentially rational creatures, as people and not simply as machines, mental states will inevitably remain central to ascriptions of culpability and responsibility more generally. It is also desirable. Nonetheless, we are in a condition of unprecedented internal challenges to …


Translatina Immigrant Mental Health Wellness: Suggestive Intervention Strategies The City Of San Francisco Should Consider Adopting, Valeria Vera 2022 The University of San Francisco

Translatina Immigrant Mental Health Wellness: Suggestive Intervention Strategies The City Of San Francisco Should Consider Adopting, Valeria Vera

Master's Theses

Translatina immigrants in the United States often suffer from intersectional traumas due to their race, gender, sexual orientation, religion, and immigration status — putting them in a vulnerable position socially, psychologically, economically, and medically. Due to their positionality in the intersections of migration, criminalization, cissexism, and mental health, they are often more marginalized and have greater needs than communities with privileged sociocultural identities. As a particularly vulnerable group, they need guaranteed access to gender-affirming healthcare that is inclusive of mental health services. Despite Translatinas’ need for mental health services, there exist many barriers making services inaccessible and insufficient in San …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk 2022 Edith Cowan University

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang 2022 School of Science, Edith Cowan University

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik 2022 Purdue University

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, PhD 2022 Bachelor of Information Security, MEPhI; Moscow, Russia

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan 2022 University of New Haven

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik 2022 Purdue University

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Insistence: The Active Quest Of Citizens For Achieving Their Health And Justice Rights In Mexico, Julia Hernández-Gutiérrez 2022 Université Catholique de Louvain, CriDIS

Insistence: The Active Quest Of Citizens For Achieving Their Health And Justice Rights In Mexico, Julia Hernández-Gutiérrez

The Journal of Sociology & Social Welfare

In Mexico’s public healthcare and justice institutions, where insufficient infrastructure, unnecessary, confusing procedures, and mistreatment are common obstacles to fundamental rights, insistence can be interpreted as an indicator of a citizen’s active quest to ensure their rights are respected. Even if citizen dependence on the State is reinforced on a daily basis within some public institutions, service users are not inactive patients or victims waiting for their turn, but rather are active agents claiming their rights, because access to healthcare and justice cannot be achieved in Mexico without the ability to cope with bureaucratic barriers and the despotic attitude of …


Wanderscaping: Stirring Agitated Reflections Into Our Home The Campus, K. Annie Bingham 2022 Sarah Lawrence College

Wanderscaping: Stirring Agitated Reflections Into Our Home The Campus, K. Annie Bingham

Selected Undergraduate Works

Wanderscaping is a two part project completed over the 2021-2022 school year. The first portion, "Wanderscaping Our Home The Campus" meanders through the physical space of Sarah Lawrence College, as a landscape and an institution, while the second, "Stirring An Agitated Reflection" floats that knowledge in the psychic space of an interconnected host of guides, through books, conversations, and other media. As a whole this project is a process-oriented wrangling of freedom, connection, and their borders. It has culminated in practices of public participatory performance, photography, mapping, iconography, audio recording, and writing. Wanderscaping aims to share a space to dream …


Findings And Implications From A Project On White Supremacist Entry And Exit Pathways, Matthew DeMichele, Wesley S. McCann, Kathleen Blee, Peter Simi 2022 RTI International

Findings And Implications From A Project On White Supremacist Entry And Exit Pathways, Matthew Demichele, Wesley S. Mccann, Kathleen Blee, Peter Simi

Sociology Faculty Articles and Research

This Research Note provides an overview of the main findings from a project on white supremacist pathways - or why some individuals join and leave white supremacist groups - with a specific focus on elucidating common themes, theoretical applications, main takeaways, and providing recommendations for academics and policymakers. One key lesson is that identity is central to entry and exit pathways.


Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff 2022 University of Arkansas, Fayetteville

Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff

Research Projects

In January 2022, the U.S. Department of Justice announced Seditious Conspiracy charges against members of the anti-government extremist group Oath Keepers in connection to the January 6th (2021) siege of the U.S. Capitol Building. Several have entered not guilty pleas and a trial is expected in July 2022.

To provide context, this brief offers an overview of 11 Seditious Conspiracy cases included in the American Terrorism Study (ATS) since 1980. In total, these cases involve nine groups (a.k.a."cells" or "plots") and 78 defendants charged with Seditious Conspiracy (18 USC§ 2384), a relatively rare charge that comprises less than one half …


"Taken In By The 'Man In A White Van' Story": The Digital Activism Efforts Of One Women's Civic Leadership Organization In Human Trafficking Awareness, Alex Rister 2022 University of Central Florida

"Taken In By The 'Man In A White Van' Story": The Digital Activism Efforts Of One Women's Civic Leadership Organization In Human Trafficking Awareness, Alex Rister

Electronic Theses and Dissertations, 2020-

Feminist activism in the digital age leverages technology to raise awareness of, and to mobilize support for, important issues and causes. Human trafficking is one such cause, and preventing it is included as a United Nations Sustainable Development Goal to achieve gender equality and empower women and girls. This study sought to understand the digital activism strategies of one women's civic leadership organization, the Junior League, for human trafficking awareness. In addition, this project analyzed how those digital activism strategies did or did not align with social justice approaches to human trafficking and how those digital activism strategies did or …


Using Simulation For Law Enforcement De-Escalation Training, Julie Kent 2022 University of Central Florida

Using Simulation For Law Enforcement De-Escalation Training, Julie Kent

Electronic Theses and Dissertations, 2020-

Law enforcement needs simulation practice tailored to de-escalation skills. Law enforcement officers spend most of their training time practicing how to use force appropriately and very little time practicing how to avoid using force. There is little research into the best ways for law enforcement to reduce their use of force and the best ways to provide training to individuals to coach them to avoid using force. There are many training programs promoting de-escalation techniques, but there is little research into the effectiveness of these programs beyond the ability of individuals to perform the skills that are trained. There is …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik 2022 Purdue University

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


The Impact Of Intimate Partner Violence On Women's Financial Wellbeing, Rowan Dunton 2022 San Jose State University

The Impact Of Intimate Partner Violence On Women's Financial Wellbeing, Rowan Dunton

Themis: Research Journal of Justice Studies and Forensic Science

Domestic violence and intimate partner violence against women affects all aspects of their health, including physical, mental, emotional, and economic health. When social programs, support networks, and better opportunities exist to improve the lives of female survivors, the financial impact of their abuse can be addressed and reduced in a significant, sustainable manner. Reviewing existing literature on this financial impact of abuse makes it apparent what women want and need to recover from their former, or even ongoing, situations. Effective preventative measures against financial harm include closing the gender wage gap and offering welfare programs for lower-income women to increase …


An Examination Of Three Transitional Events In The Substance Misuse Trajectories Of Women With Criminal Legal System Involvement, Martha Tillson 2022 University of Kentucky

An Examination Of Three Transitional Events In The Substance Misuse Trajectories Of Women With Criminal Legal System Involvement, Martha Tillson

Theses and Dissertations--Sociology

Research has consistently demonstrated that criminal legal system (CLS)-involved women are distinct from men in initiation and course of drug use, with important differences on biological, environmental, and sociocultural levels. Thus, the unique pathways and transitions into and out of drug use for women with CLS involvement are critical to consider from a research perspective, but also from a need to develop and support evidence-based, women-centered services in correctional contexts. This dissertation project uses a three-paper format to investigate three aims: (1) to understand CLS-involved women’s initiations to injection drug use and their experiences providing injection initiation assistance (IIA) to …


Criminal Law’S Core Principles, Paul H. Robinson 2022 University of Pennsylvania Carey Law School

Criminal Law’S Core Principles, Paul H. Robinson

All Faculty Scholarship

Modern criminal law scholars and policymakers assume they are free to construct criminal law rules by focusing exclusively on the criminal justice theory of the day. But this “blank slate” conception of criminal lawmaking is dangerously misguided. In fact, lawmakers are writing on a slate on which core principles are already indelibly written and realistically they are free only to add detail in the implementation of those principles and to add additional provisions not inconsistent with them. Attempts to do otherwise are destined to produce tragic results from both utilitarian and retributivist views.

Many writers dispute that such core principles …


Human Trafficking Of People With A Disability: An Analysis Of State And Federal Cases, Andrea Nichols, Erin Heil 2022 Washington University in St. Louis

Human Trafficking Of People With A Disability: An Analysis Of State And Federal Cases, Andrea Nichols, Erin Heil

Dignity: A Journal of Analysis of Exploitation and Violence

The current academic discourse examining human trafficking is lacking in focus on survivors with a disability. The increased likelihood of abuse experienced by people with a disability is well documented in the research literature, and a small body of research indicates heightened sex trafficking victimization of minor girls with a disability. Yet, very little research specifically examines sex and/or labor trafficking of people with a disability, and no systematic research analyzes prosecuted cases of trafficking with disability as the focal point of analysis. Drawing from a content analysis of 18 federal and 17 state cases of human trafficking, the current …


Polyamory, Gender, And Sexuality, Brooklyn Jennings 2022 University of Washington Tacoma

Polyamory, Gender, And Sexuality, Brooklyn Jennings

Sociology Student Work Collection

A newsletter style analysis of the contemporary mechanisms of polyamory in the U.S. This project briefly discusses polyamory in relation to gender and sexuality, relates larger systems of power to the functions of polyamory, questions the taboos of polyamory, and briefly addresses some of the limitations of academic research regarding polyamory.


Digital Commons powered by bepress