Open Access. Powered by Scholars. Published by Universities.®

Criminology and Criminal Justice Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Criminology and Criminal Justice

The Promise Of A Network Approach For Policing Research, Marie Ouellet, Sadaf Hashimi, Jason Gravel, Dean Dabney Dec 2020

The Promise Of A Network Approach For Policing Research, Marie Ouellet, Sadaf Hashimi, Jason Gravel, Dean Dabney

CJC Publications

Considerable attention has been devoted to understanding police socialization and the resulting culture, yet only recently have scholars turned to a network approach to understand the social relationships between officers. We extend these efforts with results from a pilot study of officer networks in a large US police department. Network data are collected from 88 front-line officers to examine officers’ informal working relationships. Our findings shed light on the connected nature of officer relationships, showing how personal support networks intersect and diverge from more formal advice and mentorship networks. The study provides an alternative starting point for understanding socialization as …


Changing The Game: A Sociological Perspective On Police Reform, James Nolan, Joshua C. Hinkle, Zsolt Molnar Dec 2020

Changing The Game: A Sociological Perspective On Police Reform, James Nolan, Joshua C. Hinkle, Zsolt Molnar

CJC Publications

This chapter examines the sociological roots of the current problems in contemporary policing. Employing Pierre Bourdieu’s concepts of field, habitus, capital, and doxa the chapter begins by highlighting the cultural mechanisms that maintain and reproduce ineffective policing practices. In an example from Wilmington, Delaware in the United States, the authors show how the ‘game’ on the field of policing focusses primarily on law enforcement outputs. This game shapes the worldview and dispositions of officers (habitus). Police officers are recognised and rewarded (capital) for acting in ways that align with the game’s logic. This process creates the condition doxa, in which …


The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques Nov 2020

The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques

EBCS Articles

Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …


Development Of A Global Index Measuring National Policy Commitments To Hiv Prevention And Treatment Among People Who Inject Drugs, Eric L. Sevigny, Peter Meylakhs, Mohammad Javad Feizollahi, Mohamad Reza Amini Jul 2020

Development Of A Global Index Measuring National Policy Commitments To Hiv Prevention And Treatment Among People Who Inject Drugs, Eric L. Sevigny, Peter Meylakhs, Mohammad Javad Feizollahi, Mohamad Reza Amini

CJC Publications

Background: People who inject drugs (PWID) around the world are disproportionately affected by the HIV epidemic. National policy responses to the epidemic heavily influence risk factors for HIV acquisition among this key group. Prior efforts to monitor national policy responses to HIV/AIDS among PWID were limited both in scope and coverage. In this paper we develop and validate the HIV-PWID Policy Index (HPPI) to benchmark and monitor national commitments to HIV prevention and treatment among PWID.

Methods: Composite indicator was constructed employing fuzzy multilayer data envelopment analysis (FMLDEA). Model inputs based on data from 105 countries included 27 …


Amsterdam Coffeeshops, Victimization, And Police Mobilization, Kim Moeller, Scott Jacques Jun 2020

Amsterdam Coffeeshops, Victimization, And Police Mobilization, Kim Moeller, Scott Jacques

CJC Publications

Police mobilization is a first step in the judicial process and an important source of information on offending. Whether victims mobilize police is affected by their assessment of its utility. Victims who are criminals, such as drug dealers, are known to face a different cost-benefit scenario than law-abiding persons. Dutch ‘coffeeshops’ are a unique type of dealer. They operate in a grey area, allowed by the government to sell a prohibited drug, cannabis, so long as they comply with a set of regulations. Little is known about their mobilization of police in response to victimization, including how it is affected …


Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon Mar 2020

Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon

EBCS Articles

The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …


Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah Mar 2020

Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah

EBCS Articles

The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …