Open Access. Powered by Scholars. Published by Universities.®

Criminology and Criminal Justice Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Criminology and Criminal Justice

The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques Nov 2020

The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques

EBCS Articles

Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …


Homicide And Drug Trafficking In Impoverished Communities In Brazil, Elenice De Souza De Souza Oliveira, Braulio Figueiredo Alves Da Silva, Flavio Luiz Sapori, Gabriela Gomes Cardoso Sep 2020

Homicide And Drug Trafficking In Impoverished Communities In Brazil, Elenice De Souza De Souza Oliveira, Braulio Figueiredo Alves Da Silva, Flavio Luiz Sapori, Gabriela Gomes Cardoso

Department of Justice Studies Faculty Scholarship and Creative Works

Many studies demonstrate that homicides are heavily concentrated in impoverished neighborhoods, but not all socially disadvantaged neighborhoods are hotbeds of violence. Conducted in Belo Horizonte, Brazil, this study hypothesizes that the association between high rates of homicide and impoverished areas is influenced by the emergence of a specific type of street drug-dealing common to favelas (slums). The study applies econometric techniques to police data on homicides and drug arrests from 2008 to 2011, as well as 2010 Census data, to test its hypothesis. The findings provide insight into the development of crime prevention policies in areas of high social vulnerability.


Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon Mar 2020

Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon

EBCS Articles

The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …


Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah Mar 2020

Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah

EBCS Articles

The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …


From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia Jan 2020

From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


From The Legal Literature: Automating Police, Francesca Laguardia Jan 2020

From The Legal Literature: Automating Police, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia Jan 2020

From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia Jan 2020

From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.