Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Northwestern Pritzker School of Law (6410)
- Western Michigan University (78)
- Bridgewater State University (65)
- Valparaiso University (64)
- University of Rhode Island (56)
-
- San Jose State University (17)
- University of South Florida (11)
- Nova Southeastern University (10)
- James Madison University (9)
- Lincoln Memorial University (8)
- Cleveland State University (7)
- Virginia Commonwealth University (6)
- St. Mary's University (5)
- University of Nebraska at Omaha (4)
- Walden University (4)
- Embry-Riddle Aeronautical University (3)
- Penn State Dickinson Law (3)
- Technological University Dublin (3)
- Universitas Indonesia (3)
- Clark University (2)
- College of Saint Benedict and Saint John's University (2)
- George Fox University (2)
- Illinois Wesleyan University (2)
- Kennesaw State University (2)
- Maurer School of Law: Indiana University (2)
- Minnesota State University, Mankato (2)
- St. John's University School of Law (2)
- University of Denver (2)
- University of Tennessee, Knoxville (2)
- Abilene Christian University (1)
- Keyword
-
- Prostitution (25)
- Sex trafficking (19)
- Violence (16)
- Cybercrime (15)
- Incarceration (12)
-
- Criminology (11)
- Cyberbullying (11)
- Cybersecurity (11)
- Prison (11)
- Sexual exploitation (11)
- Crime (10)
- Recidivism (10)
- Rape (9)
- Decriminalization (8)
- United States (8)
- Women (8)
- Democrats (7)
- Human trafficking (7)
- Law enforcement (7)
- Murder (7)
- Republicans (7)
- Sexual assault (7)
- Abuse (6)
- Genocide (6)
- High School Students (6)
- Internet (6)
- Mass incarceration (6)
- Political Party (6)
- Pornography (6)
- Sex trade (6)
- Publication Year
- Publication
-
- Journal of Criminal Law and Criminology (6409)
- The Journal of Sociology & Social Welfare (72)
- Midwest Social Sciences Journal (64)
- International Journal of Cybersecurity Intelligence & Cybercrime (58)
- Dignity: A Journal of Analysis of Exploitation and Violence (56)
-
- Themis: Research Journal of Justice Studies and Forensic Science (13)
- Genocide Studies and Prevention: An International Journal (10)
- The Qualitative Report (9)
- Lincoln Memorial University Journal of Humanities and Social Sciences (8)
- Journal of Prison Education and Reentry (2014-2023) (6)
- The Downtown Review (6)
- International Journal on Responsibility (5)
- The Hilltop Review (5)
- The Scholar: St. Mary's Law Review on Race and Social Justice (5)
- Bridgewater Review (4)
- Journal of Religion & Film (4)
- Dickinson Law Review (2017-Present) (3)
- International Journal of Missing Persons (3)
- The ITB Journal (3)
- DU Undergraduate Research Journal Archive (2)
- IUSTITIA (2)
- James Madison Undergraduate Research Journal (JMURJ) (2)
- Journal of Cybersecurity Education, Research and Practice (2)
- Journal of Digital Forensics, Security and Law (2)
- Journal of Social, Behavioral, and Health Sciences (2)
- Journal of Undergraduate Research at Minnesota State University, Mankato (2)
- Jurnal Sosial Humaniora Terapan (2)
- Scholarly Undergraduate Research Journal at Clark (SURJ) (2)
- The Christian Librarian (2)
- The Journal of Social Encounters (2)
Articles 1 - 30 of 6829
Full-Text Articles in Social and Behavioral Sciences
Competency To Stand Trial Evaluations: Using Vignettes With Patients Who Lack Insight, Katelyn Fuller
Competency To Stand Trial Evaluations: Using Vignettes With Patients Who Lack Insight, Katelyn Fuller
James Madison Undergraduate Research Journal (JMURJ)
In the United States, an attorney may request a competency to stand trial evaluation if they are concerned that their client is not mentally fit to adequately participate in their case and defense. Patients found incompetent must undergo treatment for restoration of competency, regardless of their willingness. Clinicians and psychiatrists may use vignettes, or hypothetical scenarios, to help restore competency if the patient lacks insight into their mental illness. While vignettes have been well documented in studying attitudes and awareness, decision making, and identifying mental illness, there is little to no research into their use in psychiatric hospitals due to …
Review Of The Violence Project: How To Stop A Mass Shooting Epidemic, Chris Hausmann
Review Of The Violence Project: How To Stop A Mass Shooting Epidemic, Chris Hausmann
The Journal of Social Encounters
No abstract provided.
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz
International Journal of Cybersecurity Intelligence & Cybercrime
According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …
Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler
Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler
International Journal of Cybersecurity Intelligence & Cybercrime
One tell-tale sign of the impact of the COVID-19 pandemic is the heavy reliance on electronic devices. Young adults in particular have indicated a greater presence on social media and high levels of loneliness during the pandemic. This trend has raised concerns about increased feelings of social isolation and reliance on technology, which could lead to more internet or computer crimes—including cyberbullying. Despite a growing body of literature, little is known about the association between cyberbullying victimization and social isolation among young adults— with even less known about this phenomenon in the context of the ongoing pandemic. Drawing on survey …
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones
International Journal of Cybersecurity Intelligence & Cybercrime
Doubleday released Andy Greenberg’s Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency in November 2022. Through vivid case studies of global criminal investigations, the book dispels myths about the anonymizing power of cryptocurrency. The book details how the ability to identify cryptocurrency users and payment methods successfully brought down several large criminal empires, while also highlighting the continuous cat-and-mouse game between law enforcement officials and criminal actors using cryptocurrency. The book is an excellent resource for law enforcement officials, academics, and general cybersecurity practitioners interested in cryptocurrency-related criminal activities and law enforcement techniques.
Strategi Internal Lapas Dalam Mendukung Reintegrasi Warga Binaan Pemasyarakatan Terhadap Paparan Sentimen Media, Imam Suyudi
Strategi Internal Lapas Dalam Mendukung Reintegrasi Warga Binaan Pemasyarakatan Terhadap Paparan Sentimen Media, Imam Suyudi
Jurnal Sosial Humaniora Terapan
Online media plays a crucial role in shaping public perceptions of social and political issues, including the assimilation program for inmates. This program aims to rehabilitate prisoners with the goal of reintegrating them into society equipped with mental, physical, skill-based, financial, and material resources. Negative media constructions can place incarcerated individuals in challenging conditions, hindering the program's intended objectives. This research aims to deepen our understanding of how online media constructs negative narratives related to assimilation programs. Utilizing qualitative research methods, particularly digital ethnography, the data reveals that mainstream media competes to flood algorithms and public feeds with similar content …
“He’S In Jail Now And I Don’T Feel Bad”: Analyzing Sureties’ Decisions To Report Bail Violations, Rachel Schumann, Carolyn Yule
“He’S In Jail Now And I Don’T Feel Bad”: Analyzing Sureties’ Decisions To Report Bail Violations, Rachel Schumann, Carolyn Yule
International Journal on Responsibility
The control, supervision, and rehabilitation of criminalized people often falls on the shoulders of non-state agents and organizations. Surety bail releases are a clear embodiment of this trend, as the courts call upon relatives, friends, and employers to supervise the pre-conviction activity of people accused of a crime. According to the law, sureties must report all bail violations to the police; the resulting diffusion of responsibility is said to increase the penal state’s power and control over criminal justice-involved individuals while minimizing reputational risks. Yet how sureties carry out this role in the community remains unexplored. Using data from 36 …
Punishment, Rubina Ramji
Punishment, Rubina Ramji
Journal of Religion & Film
This is a film review of Punishment (2024), directed by Øystein Mamen.
Sujo, Christopher R. Deacy
Sujo, Christopher R. Deacy
Journal of Religion & Film
This is a film review of Sujo (2024), directed by Astrid Rondero and Fernanda Valadez.
Urgensi Pemanfaatan Open Source Intelligent (Osint) Dalam Upaya Pencegahan Aksi Terorisme Di Indonesia, Nia Lavinia, Puspitasari Puspitasari
Urgensi Pemanfaatan Open Source Intelligent (Osint) Dalam Upaya Pencegahan Aksi Terorisme Di Indonesia, Nia Lavinia, Puspitasari Puspitasari
Jurnal Sosial Humaniora Terapan
The invention of increasingly sophisticated technology and an increasingly connected world has changed the nature of terror groups from "traditional terrorism" to "sophisticated terrorism". This change complicates the task of security forces because to be able to fight them, the authorities are required to be sophisticated as well. Starting from the concept of the "ring of security" information, which reveals that successful intelligence gathering will help prevent terrorism attacks. This research aims to illustrate the importance of utilizing Open Source Intelligence (OSINT) to raise the level of sophistication of the apparatus in intelligence gathering in countering terrorism. This research is …
Volume 6, Issue 1 (2023) Criminal Justice Agents And Responsibility, Colleen Berryessa, Elizabeth Griffiths, Kaitlen Hubbard, Deena A. Isom, Kateryna Kaplun, Hiuxuan Li, Siyu Liu, Esther Nir, Heather L. Scheuerman, Rachel Schumann, Sandy Xie, Carolyn Yule
Volume 6, Issue 1 (2023) Criminal Justice Agents And Responsibility, Colleen Berryessa, Elizabeth Griffiths, Kaitlen Hubbard, Deena A. Isom, Kateryna Kaplun, Hiuxuan Li, Siyu Liu, Esther Nir, Heather L. Scheuerman, Rachel Schumann, Sandy Xie, Carolyn Yule
International Journal on Responsibility
This special issue of the International Journal on Responsibility (IJR) advances scholarship on the various ways responsibility infuses the roles of criminal justice agents. As the inaugural issue of my tenure as Editor-in-Chief, Volume 6 deepens our understanding of responsibility in the context of the criminal justice system, thereby fulfilling IJR’s aim and scope. Specifically, the articles highlight issues of responsibility within each component of the criminal justice system: police, courts, and corrections.
Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun
Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun
International Journal on Responsibility
As new technologies emerge and are increasingly used to commit interpersonal cybercrimes like cyberstalking and cyberharassment, the legal system lags in assisting victims in obtaining justice in these types of experiences. This qualitative research study explores how attorney and advocate interviewees from Illinois, New Jersey, and New York view judges’ responsibility to the law in cyberstalking and cyberharassment cases. This study finds three themes: judges’ lack of understanding of technology and its harms, discretion, and law on the books versus law in action as important factors and frameworks that contribute to why judges do not consider the importance of technology …
The Influence Of Prior Legal Background On Judicial Sentencing Considerations, Esther Nir, Siyu Liu
The Influence Of Prior Legal Background On Judicial Sentencing Considerations, Esther Nir, Siyu Liu
International Journal on Responsibility
State court judges are influenced by a myriad of factors during criminal case processing. To study the influence of prior legal background on judicial decision-making at sentencing, we performed in-depth qualitative interviews of 39 trial court judges presiding over criminal cases in a Northeastern U.S. state. We find that judges are influenced by their former legal experiences and most judges are cognizant of this influence. While certain sentencing considerations are prioritized for almost all judges (e.g., criminal history, seriousness of the offense), prioritization and processing of many other sentencing criteria are correlated with prior legal background. Former defense attorneys tend …
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Editors' Note, Nirupama Devaraj, Bharath Ganesh Babu
Midwest Social Sciences Journal
No abstract provided.
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Statement From The Indiana Academy Of The Social Sciences And Board Of Directors
Midwest Social Sciences Journal
No abstract provided.
Experiences Of Kinship And Connection To Family For Aboriginal And Torres Strait Islander Young Men With Histories Of Incarceration, Shelley Joy Walker, Michael Doyle, Mark Stoové Professor, Troy Combo, Mandy Wilson
Experiences Of Kinship And Connection To Family For Aboriginal And Torres Strait Islander Young Men With Histories Of Incarceration, Shelley Joy Walker, Michael Doyle, Mark Stoové Professor, Troy Combo, Mandy Wilson
Journal of the Australian Indigenous HealthInfoNet
Epidemiological approaches have brought important attention to the issues surrounding the over-incarceration of Aboriginal and Torres Strait Islander young people, and the enormous health and socio-economic disparities they face. An implicit discourse often exists within the construction of this “knowledge”, however, that situates Aboriginal and Torres Strait Islander young people in deficit terms.
Using narrative inquiry, a methodological approach congruent with Aboriginal and Torres Strait Islander culture and ways of knowing, we aim to challenge this dominant discourse, via an examination of the narratives of eight Aboriginal Torres Strait Islander young men (aged 19-24 years) involved in the criminal justice …
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
International Journal of Cybersecurity Intelligence & Cybercrime
The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …
Nonprofit Accountability: Effects Of Subsector On Online Accountability, Ibrahima F. Yaro, Trent A. Engbers
Nonprofit Accountability: Effects Of Subsector On Online Accountability, Ibrahima F. Yaro, Trent A. Engbers
Midwest Social Sciences Journal
Scandals within the nonprofit sector over compensation and management have increased calls for nonprofits to demonstrate accountability. Many organizations have responded by disclosing information online and providing tools that allow web-based interactions with stakeholders. The literature on nonprofits’ online accountability has found that the level of nonprofit online accountability is affected by their size, age, asset, revenue, and location, but hasn’t been examined in terms of how subsector influences online accountability. Through a web-content analysis of fifty-five nonprofits, this research investigated how subsector (arts and culture, education, health, and human services) influences online accountability using a framework of four types …
Examining Remorse In Attributions Of Focal Concerns During Sentencing: A Study Of Probation Officers, Colleen M. Berryessa
Examining Remorse In Attributions Of Focal Concerns During Sentencing: A Study Of Probation Officers, Colleen M. Berryessa
International Journal on Responsibility
This research, using interviews with probation officers in the United States (n = 151) and a constant comparative method for analysis, draws from the focal concerns framework to qualitatively model a process by which probation officers use a defendant’s remorse to attribute focal concerns in order to guide their sentencing recommendations in pre-sentencing reports. The model suggests that officers use expressions of remorse to make attributions about mitigated criminal intention (blameworthiness and notions of responsibility), reduced dangerousness and a high potential for reform (community protection), and organization-level effects for increasing caseload efficiency and using correctional resources (practical effects of …
Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival
Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival
Secrecy and Society
Prison data collection is a labyrinthine infrastructure. This article engages with debates around the political potentials and limitations of transparency as a form of “accountability,” specifically as it relates to carceral management and data gathering. We examine the use of OASys, a widely used risk assessment tool in the British prison system, in order to demonstrate how transparency operates as a means of legitimating prison data collection and ensuing penal management. Prisoner options to resist their file, or “data double,” in this context are considered and the decisive role of OASys as an immediately operationalized technical structure is outlined. We …
Aotearoa New Zealand, The Forcible Transfer Of Tamariki And Rangatahi Māori, And The Royal Commission On Abuse In Care, David B. Macdonald
Aotearoa New Zealand, The Forcible Transfer Of Tamariki And Rangatahi Māori, And The Royal Commission On Abuse In Care, David B. Macdonald
Genocide Studies and Prevention: An International Journal
This article investigates to what extent the forcible transfer of tamariki and rangatahi Māori (Indigenous children and youth) in Aotearoa New Zealand can be considered genocide. First, I begin by exploring contemporary genocide theory as it relates to dolus eventualis in settler colonial contexts, before engaging with precedents for recognizing Indigenous genocides established by truth commissions in Canada (2015; 2019) and Australia (1997). I then explore the history around Indigenous child removal in Aotearoa from the onset of colonization to the present day, attentive to ways in which the UN Convention can apply to the forced removal of Māori children. …
Anonymity And Gender Effects On Online Trolling And Cybervictimization, Gang Lee, Annalyssia Soonah
Anonymity And Gender Effects On Online Trolling And Cybervictimization, Gang Lee, Annalyssia Soonah
Journal of Cybersecurity Education, Research and Practice
The purpose of this study was to investigate the effects of the anonymity of the internet and gender differences in online trolling and cybervictimization. A sample of 151 college students attending a southeastern university completed a survey to assess their internet activities and online trolling and cybervictimization. Multivariate analyses of logistic regression and ordinary least squares regression were used to analyze online trolling and cybervictimization. The results indicated that the anonymity measure was not a significant predictor of online trolling and cybervictimization. Female students were less likely than male students to engage in online trolling, but there was no gender …