Open Access. Powered by Scholars. Published by Universities.®
Criminology and Criminal Justice Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Public Affairs, Public Policy and Public Administration (12)
- Computer Sciences (11)
- Education (11)
- Information Security (11)
- Physical Sciences and Mathematics (11)
-
- Defense and Security Studies (10)
- Educational Leadership (4)
- Higher Education (4)
- Teacher Education and Professional Development (4)
- Economics (3)
- Labor Economics (2)
- Medicine and Health Sciences (2)
- Psychology (2)
- Public Health (2)
- Sociology (2)
- Communication (1)
- Criminology (1)
- Economic Policy (1)
- Income Distribution (1)
- Law (1)
- Other Economics (1)
- Other Public Affairs, Public Policy and Public Administration (1)
- Other Social and Behavioral Sciences (1)
- Policy Design, Analysis, and Evaluation (1)
- Political Science (1)
- Public Economics (1)
- Public Policy (1)
- Keyword
-
- Equity (7)
- Victimization (4)
- Black women educational leaders (3)
- Educational leadership (3)
- Belonging (2)
-
- Coffeeshops (2)
- Crime (2)
- Cybercrime (2)
- Diversity (2)
- Equality (2)
- Identity (2)
- Implicit Bias (2)
- Inclusion (2)
- Intersectionality (2)
- Microaffirmations (2)
- Microaggressions (2)
- Microassaults (2)
- Microinequities (2)
- Microinvalidations (2)
- Police reform (2)
- Policy (2)
- Qualitative (2)
- Race-gender intersectionality (2)
- Recidivism (2)
- Survey (2)
- Toleration (2)
- Use of force (2)
- Adult Protective Services (APS) (1)
- Affective (1)
- Alcohol Initiation (1)
- Publication Year
- Publication
- Publication Type
Articles 31 - 60 of 65
Full-Text Articles in Criminology and Criminal Justice
The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques
The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques
EBCS Articles
Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …
Development Of A Global Index Measuring National Policy Commitments To Hiv Prevention And Treatment Among People Who Inject Drugs, Eric L. Sevigny, Peter Meylakhs, Mohammad Javad Feizollahi, Mohamad Reza Amini
Development Of A Global Index Measuring National Policy Commitments To Hiv Prevention And Treatment Among People Who Inject Drugs, Eric L. Sevigny, Peter Meylakhs, Mohammad Javad Feizollahi, Mohamad Reza Amini
CJC Publications
Background: People who inject drugs (PWID) around the world are disproportionately affected by the HIV epidemic. National policy responses to the epidemic heavily influence risk factors for HIV acquisition among this key group. Prior efforts to monitor national policy responses to HIV/AIDS among PWID were limited both in scope and coverage. In this paper we develop and validate the HIV-PWID Policy Index (HPPI) to benchmark and monitor national commitments to HIV prevention and treatment among PWID.
Methods: Composite indicator was constructed employing fuzzy multilayer data envelopment analysis (FMLDEA). Model inputs based on data from 105 countries included 27 …
Amsterdam Coffeeshops, Victimization, And Police Mobilization, Kim Moeller, Scott Jacques
Amsterdam Coffeeshops, Victimization, And Police Mobilization, Kim Moeller, Scott Jacques
CJC Publications
Police mobilization is a first step in the judicial process and an important source of information on offending. Whether victims mobilize police is affected by their assessment of its utility. Victims who are criminals, such as drug dealers, are known to face a different cost-benefit scenario than law-abiding persons. Dutch ‘coffeeshops’ are a unique type of dealer. They operate in a grey area, allowed by the government to sell a prohibited drug, cannabis, so long as they comply with a set of regulations. Little is known about their mobilization of police in response to victimization, including how it is affected …
Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon
Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon
EBCS Articles
The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …
Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah
Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah
EBCS Articles
The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …
Lost In The Park: Learning To Navigate The Unpredictability Of Fieldwork, Elizabeth Bonomo, Scott Jacques
Lost In The Park: Learning To Navigate The Unpredictability Of Fieldwork, Elizabeth Bonomo, Scott Jacques
CJC Publications
No abstract provided.
Drug Sellers’ Neutralizations Of Guiltless Drug Sales And Avoidance Of “Drug Dealer” Identities, Timothy Dickinson, Scott Jacques
Drug Sellers’ Neutralizations Of Guiltless Drug Sales And Avoidance Of “Drug Dealer” Identities, Timothy Dickinson, Scott Jacques
CJC Publications
Background: Despite a wealth of empirical exploration on neutralization theory, several aspects of the theory remain underexplored. For instance, one task of neutralization research is to investigate whether and how neutralizations vary with offender characteristics. A second underexplored area is whether the neutralizations offenders present when directly asked about feelings of guilt are similar or dissimilar to those they have incorporated into their narrative identities described during interviews. A third underexplored issue is whether offenders that exhibit little guilt for committing mala prohibita crimes use neutralizations in a similar manner as those who do not express guilt for committing mala …
To Control Or Be Controlled: Predicting Types Of Offending In A Corporate Environment Using Control-Balance Theory, Donald E. Hunt, Volkan Topalli
To Control Or Be Controlled: Predicting Types Of Offending In A Corporate Environment Using Control-Balance Theory, Donald E. Hunt, Volkan Topalli
CJC Publications
Introduction: This study seeks to determine the extent to which Tittle’s control balance (CB) theory (CBT: 1995) accurately predicts different types of deviance within a corporate setting (in this case, a financial services corporation). CB theory contends that deviance is the result of a control imbalance between the amount of control a person exerts and the amount to which they are subject. Control deficits result in repressive deviance (including most types of predatory crime). Control surpluses result in autonomous deviance (including many types of white collar offending). Method: We exploit a unique dataset consisting of the internal investigations of fraud …
Network Exposure And Excessive Use Of Force: Investigating The Social Transmission Of Police Misconduct, Marie Ouellet, Sadaf Hashimi, Jason Gravel, Andrew V. Papachristos
Network Exposure And Excessive Use Of Force: Investigating The Social Transmission Of Police Misconduct, Marie Ouellet, Sadaf Hashimi, Jason Gravel, Andrew V. Papachristos
CJC Publications
Research Summary: In this study, we investigate how a police officer's exposure to peers accused of misconduct shapes his or her involvement in excessive use of force. By drawing from 8,642 Chicago police officers named in multiple complaints, we reconstruct police misconduct ego‐networks using complaint records. Our results show that officer involvement in excessive use of force complaints is predicted by having a greater proportion of co‐accused with a history of such behaviors.
Policy Implications: Our findings indicate officers’ peers may serve as social conduits through which misconduct may be learned and transmitted. Isolating officers that engage in improper use …
An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon
An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon
EBCS Presentations
No abstract provided.
Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani
Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani
EBCS Articles
Although a relatively simple form of hacking, website defacement can have severe consequences both for the websites that are attacked and the reputation of their owners. However, criminological research has yet to fully explore the causes and correlates of website defacement. We consider whether variables derived from routine activity theory can be applied to understanding website defacement. Specifically, using a sample of websites that were targeted by hackers in 2017 across the world, we examine the relationship between a country’s structural characteristics and the frequency of website defacement reported for the country. We find that website defacements are less likely …
Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo
Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo
EBCS Articles
The classical view of an information system is that it represents and reflects physical reality. We suggest this classical view is increasingly obsolete: digital technologies are now creating and shaping physical reality. We call this phenomenon the ontological reversal. The ontological reversal is where the digital version is created first, and the physical version second (if needed). This ontological reversal challenges us to think about the role of humans and technology in society. It also challenges us to think about our role as IS scholars in this digital world and what it means for our research agendas.
Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park
Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park
EBCS Articles
Adopting the criminal event perspective, we explore how online fraudsters make use of urgency cues in their interactions with potential victims throughout the progression of an online nonpayment fraud attempt. Integrating claims from the ‘Interpersonal-Deception Theory’ with situational explanations of crime, we investigate whether fraudsters’ presentations of verbal cues of urgency during the early stages of a criminal event are followed by a consistent presentation of verbal and non-verbal urgency cues. To answer this question, we posted a large number of ‘for-sale’ advertisements over a classified-ad website and interacted with online fraudsters and legitimate users who responded to our ads …
Which Source Possesses The Most And Highest Quality Data On The Empirical Aspects Of Criminal Events? A Theory Of Opportunity And Necessary Conditions, Scott Jacques
CJC Publications
Offenders and nonoffenders possess valuable information about crime. But which possesses the best data? This is a complex issue, so I narrow my focus to data on empirical aspects of criminal events. Drawing on the necessary conditions perspective, I theorize that a source’s possession 1) of data varies directly with its involvement in cases; 2) of representative data varies inversely with nonrandom involvement in cases and nonrandom siphoning off from the larger group to which it belongs; and, 3) of accurate data varies inversely with time since involvement in cases. Those general principles suggest that offenders, especially active ones, possess …
Criminal Group Dynamics And Network Methods, Marie Ouellet, Sadaf Hashimi
Criminal Group Dynamics And Network Methods, Marie Ouellet, Sadaf Hashimi
CJC Publications
Value – Network methods provide a means to revisit and extend theories of crime and delinquency with a focus on social structure. The unique affinity between group dynamics and network methods highlights immense opportunities for expanding the knowledge of collective trajectories.
The Cognitive, Affective, And Somatic Empathy Scales (Cases): Cross-Cultural Replication And Specificity To Different Forms Of Aggression And Victimization, Frances Chen, Annis Lai Chu Fung, Adrian Raine
The Cognitive, Affective, And Somatic Empathy Scales (Cases): Cross-Cultural Replication And Specificity To Different Forms Of Aggression And Victimization, Frances Chen, Annis Lai Chu Fung, Adrian Raine
CJC Publications
A psychometrically sound measure of empathy that captures its multifaceted nature is critical in furthering research on empathy. The only instrument that assesses three domains of empathy together with positive and negative valence empathy is the newly developed 30-item cognitive, affective, and somatic empathy scales (CASES). The current study examines the cross-culture generalizability of CASES in Hong Kong and explores links between empathy and different forms of aggression and peer victimization. A sample of 4,676 Hong Kong youth (62% male) completed CASES, alongside measures of reactive/proactive aggression and multidimensional peer victimization. A subsample of youth (n = 2,321–2,464) and …
Overestimating Self-Blame For Stressful Life Events And Adolescents’ Latent Trait Cortisol (Ltc): The Moderating Role Of Parental Warmth. Journal Of Youth And Adolescence, Catherine B. Stroud, Frances Chen, Blair E. Curzi, Douglas A. Granger, Leah D. Doane
Overestimating Self-Blame For Stressful Life Events And Adolescents’ Latent Trait Cortisol (Ltc): The Moderating Role Of Parental Warmth. Journal Of Youth And Adolescence, Catherine B. Stroud, Frances Chen, Blair E. Curzi, Douglas A. Granger, Leah D. Doane
CJC Publications
Cognitive interpretations of stressful events impact their implications for physiological stress processes. However, whether such interpretations are related to trait cortisol—an indicator of individual differences in stress physiology—is unknown. In 112 early adolescent girls (M age = 12.39 years), this study examined the association between self-blame estimates for past year events and latent trait cortisol, and whether maternal warmth moderated effects. Overestimating self-blame (versus objective indices) for independent (uncontrollable) events was associated with lower latent trait cortisol, and maternal warmth moderated the effect of self-blame estimates on latent trait cortisol for each dependent (at least partially controllable) and interpersonal …
One Gang Dies, Another Gains? The Network Dynamics Of Criminal Group Persistence, Marie Ouellet, Martin Bouchard, Yanick Charette
One Gang Dies, Another Gains? The Network Dynamics Of Criminal Group Persistence, Marie Ouellet, Martin Bouchard, Yanick Charette
CJC Publications
What leads a minority of criminal groups to persist over time? Although most criminal groups are characterized by short life spans, a subset manages to survive extended periods. Contemporary research on criminal groups has been primarily descriptive and static, leaving important questions on the correlates of group persistence unanswered. By drawing from competing perspectives on the relationship between cohesion and group persistence, we apply a longitudinal approach to examine the network dynamics influencing the life span of criminal groups. We use 9 years of official data on the criminal and social networks of gang associates in Montreal, Quebec, Canada, to …
Bentham, Not Epicurus: The Relevance Of Pleasure To Studies Of Drug-Involved Pain, Scott Jacques
Bentham, Not Epicurus: The Relevance Of Pleasure To Studies Of Drug-Involved Pain, Scott Jacques
CJC Publications
There is a disproportionate focus on pain over pleasure in policy-relevant research on drugs. This is unfortunate because theories of and findings on drug-involved pleasure can be used to inform knowledge of drug-involved pain. The cross-fertilization of theories and findings is bolstered by the availability of a conceptual framework that links drug-involved pain and pleasure in a comprehensive, powerful, simple, and instrumental manner. This article proposes such a framework. It consists of four types of drug-involved pain and pleasure: drug-specific corporal; drug-related corporal; economic; and, social. This quaternary scheme is illustrated with findings from four literatures, namely those on methamphetamine …
Microaggressions: An Introduction, Natasha N. Johnson, Thaddeus Johnson
Microaggressions: An Introduction, Natasha N. Johnson, Thaddeus Johnson
CJC Publications
Microaggressions are brief and commonplace daily verbal, behavioral, or environmental indignities, whether intentional or unintentional, that communicate hostile, derogatory, or negative slights and insults toward people who are not classified within the “normative” standard. Perpetrators of microaggressions are often unaware that they engage in such communications when they interact with people who differ from themselves. This review of microaggressions in its numerous forms seeks to address the current literature regarding aversive behavior and its impacts; this includes investigating the manifestation and influence of everyday “isms,” on the quality of life of those on the receiving end of these acts. Ensuing …
Creating Support Systems For Black Women In Nontraditional Stem Career Paths, Tokiwa T. Smith, Natasha N. Johnson
Creating Support Systems For Black Women In Nontraditional Stem Career Paths, Tokiwa T. Smith, Natasha N. Johnson
CJC Publications
Although careers in science, technology, engineering, and mathematics (STEM) fields are widely acknowledged as central to the future, women remain largely underrepresented in these spheres. This is particularly true for Black women, highlighting the necessity of support systems and resources designed to promote their success in STEM. Ideally, these supports should begin during the K-12 years and continue throughout the course of their educational journeys. Current research indicates that Black women in STEM achieve greater, lasting success when they have access to structured support systems. As the career paths of Black women in STEM continue to evolve, there remains a …
Are College-Educated Police Officers Different? A Study Of Stops, Searches, And Arrests, Richard Rosenfeld, Thaddeus L. Johnson, Richard Wright
Are College-Educated Police Officers Different? A Study Of Stops, Searches, And Arrests, Richard Rosenfeld, Thaddeus L. Johnson, Richard Wright
CJC Publications
A study of more than 60,000 police traffic stops found that college-educated officers were more likely than other officers to stop drivers for less serious violations, perform consent searches, and make arrests on discretionary grounds. These results are consistent with those of prior research indicating that college-educated officers are more achievement oriented and eager for advancement based on the traditional performance criteria of stops, searches, and arrests. The results raise questions regarding the recommendation of the President’s Task Force on 21st Century Policing (2015) to improve police-community relations by hiring more college-educated police officers, especially in urban communities where concerns …
Effectively Managing Bias In Teacher Preparation, Natasha Johnson
Effectively Managing Bias In Teacher Preparation, Natasha Johnson
CJC Publications
This is the call for teacher preparation programs to actively incorporate an emphasis on social justice education and the development of teachers committed to creating equitable schools. Education in today's multicultural, pluralistic society must be actively concentrated on and successful at creating more just and unbiased schools for underserved students. Similar to Ladson-Billings' argument for a redefining of ‘good teaching,' there must be a redefinition of that which constitutes social justice teaching. It is the role of today's teacher preparation programs to equip teachers with the essential skills necessary to develop students, manage bias, and create a culture of equity …
The Benefits Of Child Contact While In Prison On Educational Program Participation And Employment Outcomes, Déshané Velasquez
The Benefits Of Child Contact While In Prison On Educational Program Participation And Employment Outcomes, Déshané Velasquez
Georgia State Undergraduate Research Conference
No abstract provided.
Recidivism And The Convict Labor Market: A Cross-Country Comparison Of Recidivism Trends In For-Profit Prisons, Alex T. Basinger
Recidivism And The Convict Labor Market: A Cross-Country Comparison Of Recidivism Trends In For-Profit Prisons, Alex T. Basinger
DISCOVERY: Georgia State Honors College Undergraduate Research Journal
Throughout the United States, United Kingdom, China, Japan, Australia, and New Zealand, prisoners are employed for less than $1 per hour in agriculture, manufacturing, public works projects, and dozens of other industries. The privately owned prison companies Corrections Corporation of America, G4S, Sodexo Justice Services, and Serco vie for government contracts to build, staff, and regulate prisons and prisoners. Other entities, such as China’s Laogai and The USA’s Federal Prison Industries, are ingrained into the national government. Prisoner labor produces billions of dollars in goods and services every year. When crime and recidivism increase, for-profit prisons receive inexpensive laborers. This …
Learning From The Offenders' Perspective On Crime Prevention, Scott Jacques, Elizabeth Bonomo
Learning From The Offenders' Perspective On Crime Prevention, Scott Jacques, Elizabeth Bonomo
EBCS Articles
Criminals have a firsthand perspective on why and how to commit crime. In this chapter, we outline and illustrate five ways that offender-based research can be used to inform understanding of crime prevention, more specifically situational crime prevention: namely, (1) by directly determining what works to reduce crime; (2) generating findings that are suggestive of what prevention measures to invent and employ; (3) refining understanding of why a given prevention method reduces crime; (4) figuring out how offenders get around particular prevention measures; and, (5) gathering information on not only the positive but also the unintended, negative outcomes of prevention …
6th Amendment: Indigent Right To Counsel, Melissa Knott
6th Amendment: Indigent Right To Counsel, Melissa Knott
Georgia State Undergraduate Research Conference
No abstract provided.
Effects Of Physical Appearance On Police Decision Making, Victoria Cruz, Blanca Garcia, Ethan Hammock
Effects Of Physical Appearance On Police Decision Making, Victoria Cruz, Blanca Garcia, Ethan Hammock
Georgia State Undergraduate Research Conference
No abstract provided.
Recidivism And The Convict Labor Market, Alex Basinger
Recidivism And The Convict Labor Market, Alex Basinger
Georgia State Undergraduate Research Conference
No abstract provided.
Prosecution Of The Perpetrators Of Child Abuse Cases: Examination Of Focal Concerns Principles, Kerry F. Mcdonough
Prosecution Of The Perpetrators Of Child Abuse Cases: Examination Of Focal Concerns Principles, Kerry F. Mcdonough
Georgia State Undergraduate Research Conference
No abstract provided.