Open Access. Powered by Scholars. Published by Universities.®
Criminology and Criminal Justice Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Pace University (12)
- Montclair State University (11)
- Georgia State University (10)
- Western Kentucky University (5)
- College of Saint Benedict and Saint John's University (3)
-
- Embry-Riddle Aeronautical University (3)
- City University of New York (CUNY) (2)
- Selected Works (2)
- University of Arkansas, Fayetteville (2)
- Walden University (2)
- Bowdoin College (1)
- Cedarville University (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Gettysburg College (1)
- Institute of Business Administration (1)
- Kennesaw State University (1)
- Missouri State University (1)
- Murray State University (1)
- Sacred Heart University (1)
- SelectedWorks (1)
- St. Mary's University (1)
- Technological University Dublin (1)
- Universitas Indonesia (1)
- University of Kentucky (1)
- University of Nebraska - Lincoln (1)
- University of Nebraska at Omaha (1)
- University of New Hampshire (1)
- Keyword
-
- Terrorism (12)
- Homeland Security (5)
- Terrorists (5)
- Western Kentucky University (5)
- 9/11 terrorist attack (3)
-
- Al-Qaida leadership (3)
- Counterterrorism (3)
- Crime (3)
- Gender (3)
- Human rights (3)
- Justice (3)
- MIDC (3)
- Millon Inventory of Diagnostic Criteria (3)
- Personality assessment (3)
- Personality in politics (3)
- Personality profiling (3)
- Political psychology (3)
- Psychological assessment (3)
- Public Health (3)
- Racism (3)
- Theodore Millon (3)
- Torture (3)
- Afghanistan (2)
- Authority (2)
- COOP (2)
- Class (2)
- Communal obligations (2)
- Constitution (2)
- Continuity of Operations (2)
- Crime prevention (2)
- Publication Year
- Publication
-
- Master in Management for Public Safety and Homeland Security Professionals Master's Projects (12)
- Department of Justice Studies Faculty Scholarship and Creative Works (11)
- EBCS Articles (10)
- WKU Archives Records (5)
- International Bulletin of Political Psychology (3)
-
- Psychology Faculty Publications (3)
- Dissertations, Theses, and Capstone Projects (2)
- Graduate Theses and Dissertations (2)
- Australian Security and Intelligence Conference (1)
- Bernard Sama (1)
- CMC Senior Theses (1)
- Criminal Justice Faculty Publications (1)
- David J Brooks Dr. (1)
- Georgia Journal of Public Policy (1)
- Honors Projects (1)
- International Journal of Religious Tourism and Pilgrimage (1)
- Jeffrey Ian Ross Ph.D. (1)
- Journal of Sustainable Social Change (1)
- Journal of Terrorism Studies (1)
- Law Faculty Scholarship (1)
- MSJ Capstone Projects (1)
- MSU Graduate Theses (1)
- Posters-at-the-Capitol (1)
- SURGE (1)
- The Research and Scholarship Symposium (2013-2019) (1)
- The Scholar: St. Mary's Law Review on Race and Social Justice (1)
- Theses and Dissertations--Geography (1)
- Theses/Capstones/Creative Projects (1)
- University of Nebraska Public Policy Center: Publications (1)
- Walden Dissertations and Doctoral Studies (1)
- Publication Type
- File Type
Articles 1 - 30 of 70
Full-Text Articles in Criminology and Criminal Justice
A Comparison Between A Terrorist Leader And A Lone-Wolf Operative In Bangladesh, Fatema Islam
A Comparison Between A Terrorist Leader And A Lone-Wolf Operative In Bangladesh, Fatema Islam
Journal of Terrorism Studies
The article compares the biography and terrorist portrait of two terrorists of Bangladesh: Mufti Abdul Hannan, a pioneer leader of the prominent terrorist organization Huji-B, and a lone wolf operative named Faizul Hasan. The study reveals the existence of the multifaceted dynamics of the leader (Mufti) and lone wolf (Faizul) encompassing organizational affiliation, operational independence, radicalization processes, motivations, objectives, and the scale of their operations. The study also finds that the pattern of operation of a terrorist leader (Mufti) and the lone wolf terrorist (Faizul) differed significantly in terms of planning, execution, and level of organizational support. While the terrorist …
The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt
The Future Of Human Trafficking Legislation: A Policy Analysis, Zoe E. Hunt
Posters-at-the-Capitol
Current legislation and policies are not effective enough to fight human trafficking as it continues to change and evolve worldwide. Human trafficking is not just sex trafficking; labor trafficking, organ trafficking, people smuggling, and forced criminal activities. This evolving and changing global issue continues to grow into a highly profitable "business." Overseas, many countries struggle to handle this issue, and some countries do not handle it at all. The United States has a major human trafficking problem that will continue to worsen unless there is a change in the government. The U.S. Congress should be more focused on the growing …
Identifying The Main Causes For Support Of Crime Control Theater Forms, And Understanding How To Correct The Public’S Perception, Erisjames M. Elliott
Identifying The Main Causes For Support Of Crime Control Theater Forms, And Understanding How To Correct The Public’S Perception, Erisjames M. Elliott
CMC Senior Theses
Much research has been completed on the forms of crime control theater (CCT), and the impact that the existence of CCT laws have on society. Research on CCT laws has shown that they are definitively unsuccessful in providing the safety they were created to provide. This thesis will utilize completed research to explain the main psychological phenomena holding people back from decreasing their support for CCT laws. It will also describe proven methods of correcting misinformation in order to change the perceptions of people who support crime control theater laws, and provide suggestions for how research should be continued.
Exploring Change And Stability In Counterterrorism Policy, Prosecution, And Sentencing Of Terrorists In America Over The Last Three Decades In The United States, Georgianna Grace Bettis
Exploring Change And Stability In Counterterrorism Policy, Prosecution, And Sentencing Of Terrorists In America Over The Last Three Decades In The United States, Georgianna Grace Bettis
Graduate Theses and Dissertations
The purpose of the current study is to investigate the effects of legislation changes on how terrorists are adjudicated in American federal courts. The overarching question is: how have prosecutorial and sentencing outcomes changed in response to homeland security policy shifts over the last few decades? The project examines the impact of policy on changes to terrorists’ sentencing in three time periods, marked by three major events: The 1993 World Trade Center Attack, the 1995 Oklahoma City Bombing, and the attack on the Twin Towers (9/11/2001). In addition to terrorists’ demographic and background attributes (i.e., gender, age, terrorism category), the …
America: The World’S Police—How The Defund The Police Movement Frames An Analysis For Defunding The Military, Anya Kreider
America: The World’S Police—How The Defund The Police Movement Frames An Analysis For Defunding The Military, Anya Kreider
The Scholar: St. Mary's Law Review on Race and Social Justice
In this article, the author examines the tenets of the Defund the Police movement and applies them to the American military to make the argument that not only should the police be defunded, but so should the American military. The purpose of this piece is to push the conversation regarding policing beyond American borders to examine American influence internationally. The article incorporates various Critical Race Theories to explore the intersection of policing and the military. The Defund the Police Movement also provides a framework for critiquing the American military because the American police and military are inextricably connected. Part I …
Anger In The Overlooked: A Gendered Analysis Of The January 6, 2021 Capitol Hill Breach, Elizabeth Bender
Anger In The Overlooked: A Gendered Analysis Of The January 6, 2021 Capitol Hill Breach, Elizabeth Bender
Theses/Capstones/Creative Projects
The violence seen at the U.S. Capitol Building on January 6, 2021 has sparked concern at the threat of domestic violent extremism (DVE) within the United States. Over 700 individuals have been federally charged in connection with the events of January 6 including almost 100 women. Women’s involvement in DVE is underestimated and understudied. This project utilized a corpus of over 1,000 court documents to content code variables relating to violence and DVE affiliation for the individuals who have been federally charged in relation to January 6th. The results of the coding process were then used to compare the rates …
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …
Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison
Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison
EBCS Articles
Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username …
Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum
Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum
EBCS Articles
Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing environments may change computer users’ behaviors, this study tests the effectiveness of CPTED based approaches in mitigating system trespassing events. Findings from this randomized controlled field trial demonstrate that specific CPTED strategies can mitigate hacking events by: reducing the number of concurrent activities on the target computer, attenuating the number of commands typed in the attacked computer, and …
From The Legal Literature: Is Progressive Prosecution Possible?, Francesca Laguardia
From The Legal Literature: Is Progressive Prosecution Possible?, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.
Bio-Spatial Policing In Theory And Practice: Examining Impacts And Resistance Through Mobilities And Children's Everyday Life, Emily Kaufman
Bio-Spatial Policing In Theory And Practice: Examining Impacts And Resistance Through Mobilities And Children's Everyday Life, Emily Kaufman
Theses and Dissertations--Geography
Despite decades of reforms and technological innovations, increasing evidence shows that state securitization disproportionately harms already racially, spatially, and socio-economically marginalized communities. My research investigates uneven impacts of state securitization, from punitive welfare programs to school surveillance to policing. Across sites, I focus on scales, voices and the everyday lived experiences often left out of scholarly discourse and sensational media. In the current climate of growing awareness and scholarship on police violence, my dissertation addresses three less-studied areas: 1) the interplay between racial, gendered, spatial, and technified police practices; 2) how these practices impact the everyday lives of those racially …
The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques
The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques
EBCS Articles
Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …
Homicide And Drug Trafficking In Impoverished Communities In Brazil, Elenice De Souza De Souza Oliveira, Braulio Figueiredo Alves Da Silva, Flavio Luiz Sapori, Gabriela Gomes Cardoso
Homicide And Drug Trafficking In Impoverished Communities In Brazil, Elenice De Souza De Souza Oliveira, Braulio Figueiredo Alves Da Silva, Flavio Luiz Sapori, Gabriela Gomes Cardoso
Department of Justice Studies Faculty Scholarship and Creative Works
Many studies demonstrate that homicides are heavily concentrated in impoverished neighborhoods, but not all socially disadvantaged neighborhoods are hotbeds of violence. Conducted in Belo Horizonte, Brazil, this study hypothesizes that the association between high rates of homicide and impoverished areas is influenced by the emergence of a specific type of street drug-dealing common to favelas (slums). The study applies econometric techniques to police data on homicides and drug arrests from 2008 to 2011, as well as 2010 Census data, to test its hypothesis. The findings provide insight into the development of crime prevention policies in areas of high social vulnerability.
Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon
Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon
EBCS Articles
The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …
Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah
Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah
EBCS Articles
The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …
From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia
From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
From The Legal Literature: Automating Police, Francesca Laguardia
From The Legal Literature: Automating Police, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia
From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia
From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
Agony Of Delayed Justice, Ahmed Saeed
Agony Of Delayed Justice, Ahmed Saeed
MSJ Capstone Projects
Martin Luther King Jr in his famous letter from a Birmingham jail wrote that justice too long delayed is justice denied. King said so to highlight that justice for African-Americans had been delayed for far too long. (King, 1963) According to ancient Latin maxim, ‘to delay justice is injustice’ but in the land of pure, delayed justice is a new normal. Courts in Pakistan have a backlog of 1.9 million pending cases to be adjudicated. Some of these cases have been pending for three or four decades.
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
MSU Graduate Theses
This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.
Improving Information Sharing: Local Fusion Centers And Their Role In The Intelligence Cycle, Alexis Spall
Improving Information Sharing: Local Fusion Centers And Their Role In The Intelligence Cycle, Alexis Spall
Master in Management for Public Safety and Homeland Security Professionals Master's Projects
Abstract
My Master’s Project focuses on local fusion centers and the need for improved information sharing practices among law enforcement partners. After the tragic event of September 11th in 2001, the Department of Homeland Security and the Department of Justice recognized a communication gap between law enforcement agencies and a lack of effective information sharing efforts. Fusion centers play a significant role in supporting both criminal and terrorist investigations due to their ability to act as a conduit between various law enforcement partners. Due to their important responsibilities as information sharing hubs that provide valuable analysis and dissemination of …
Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani
Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani
EBCS Articles
Although a relatively simple form of hacking, website defacement can have severe consequences both for the websites that are attacked and the reputation of their owners. However, criminological research has yet to fully explore the causes and correlates of website defacement. We consider whether variables derived from routine activity theory can be applied to understanding website defacement. Specifically, using a sample of websites that were targeted by hackers in 2017 across the world, we examine the relationship between a country’s structural characteristics and the frequency of website defacement reported for the country. We find that website defacements are less likely …
Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo
Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo
EBCS Articles
The classical view of an information system is that it represents and reflects physical reality. We suggest this classical view is increasingly obsolete: digital technologies are now creating and shaping physical reality. We call this phenomenon the ontological reversal. The ontological reversal is where the digital version is created first, and the physical version second (if needed). This ontological reversal challenges us to think about the role of humans and technology in society. It also challenges us to think about our role as IS scholars in this digital world and what it means for our research agendas.
Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park
Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park
EBCS Articles
Adopting the criminal event perspective, we explore how online fraudsters make use of urgency cues in their interactions with potential victims throughout the progression of an online nonpayment fraud attempt. Integrating claims from the ‘Interpersonal-Deception Theory’ with situational explanations of crime, we investigate whether fraudsters’ presentations of verbal cues of urgency during the early stages of a criminal event are followed by a consistent presentation of verbal and non-verbal urgency cues. To answer this question, we posted a large number of ‘for-sale’ advertisements over a classified-ad website and interacted with online fraudsters and legitimate users who responded to our ads …
Terrorism In The Middle East: Implications On Egyptian Travel And Tourism, Tamer Z.F Mohamed, Tamer S. Elseyoufi
Terrorism In The Middle East: Implications On Egyptian Travel And Tourism, Tamer Z.F Mohamed, Tamer S. Elseyoufi
International Journal of Religious Tourism and Pilgrimage
This paper attempts to shed the light on challenging issues affecting travel and tourism industry especially in the Middle East such as political, socio-economic and security instability. Due to its geopolitical and historical importance, the paper focuses on the situation in Egypt as a descriptive case study. The methodology relies on historical review and impact assessment to understand the roots and extended branches of instability in the Middle East that led to the Arab Spring, by focusing on the Egyptian case in the last half century. The assessment explains the negative effect of Western and Egyptian policy on extending the …
United States Human Trafficking Task Force, Michael A. Palazzi Iv
United States Human Trafficking Task Force, Michael A. Palazzi Iv
Master in Management for Public Safety and Homeland Security Professionals Master's Projects
Human Trafficking is a multi-billion-dollar industry which is both a domestic and foreign issue for the United States government. The purpose of this paper is to address the issues such as: lack of a centralized task force, lack of funding and an introduction of a new method of investigation which utilizes intelligence to fight human trafficking. The results found through research and interviews with federal agents have shown that a federal task force utilizing federal, state, and local law enforcement along with nongovernmental organizations (NGO’s) and government would have a positive, profound effect against human trafficking. It is recommended that …
The New American Slavery: Capitalism And The Ghettoization Of American Prisons As A Profitable Corporate Business, David A. Liburd
The New American Slavery: Capitalism And The Ghettoization Of American Prisons As A Profitable Corporate Business, David A. Liburd
Dissertations, Theses, and Capstone Projects
The labor of enslaved Africans and Black Americans played a large part in the history of colonial America, with the American plantation being the epicenter for all that was to be produced. While the two have never been completely tied together, capitalism and modern day slavery have been linked with one another. Some analysis sees slavery as a remote form of capitalism, a substitute, to an antiquated form of labor in the modern world.
Slave plantations adopted a new concentration in size and management, referred to by W.E. DuBois as a change "from a family institution to an industrial system."1 …