Open Access. Powered by Scholars. Published by Universities.®

Criminology and Criminal Justice Commons

Open Access. Powered by Scholars. Published by Universities.®

Georgia State University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 65

Full-Text Articles in Criminology and Criminal Justice

The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques Nov 2020

The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques

EBCS Articles

Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …


Development Of A Global Index Measuring National Policy Commitments To Hiv Prevention And Treatment Among People Who Inject Drugs, Eric L. Sevigny, Peter Meylakhs, Mohammad Javad Feizollahi, Mohamad Reza Amini Jul 2020

Development Of A Global Index Measuring National Policy Commitments To Hiv Prevention And Treatment Among People Who Inject Drugs, Eric L. Sevigny, Peter Meylakhs, Mohammad Javad Feizollahi, Mohamad Reza Amini

CJC Publications

Background: People who inject drugs (PWID) around the world are disproportionately affected by the HIV epidemic. National policy responses to the epidemic heavily influence risk factors for HIV acquisition among this key group. Prior efforts to monitor national policy responses to HIV/AIDS among PWID were limited both in scope and coverage. In this paper we develop and validate the HIV-PWID Policy Index (HPPI) to benchmark and monitor national commitments to HIV prevention and treatment among PWID.

Methods: Composite indicator was constructed employing fuzzy multilayer data envelopment analysis (FMLDEA). Model inputs based on data from 105 countries included 27 …


Amsterdam Coffeeshops, Victimization, And Police Mobilization, Kim Moeller, Scott Jacques Jun 2020

Amsterdam Coffeeshops, Victimization, And Police Mobilization, Kim Moeller, Scott Jacques

CJC Publications

Police mobilization is a first step in the judicial process and an important source of information on offending. Whether victims mobilize police is affected by their assessment of its utility. Victims who are criminals, such as drug dealers, are known to face a different cost-benefit scenario than law-abiding persons. Dutch ‘coffeeshops’ are a unique type of dealer. They operate in a grey area, allowed by the government to sell a prohibited drug, cannabis, so long as they comply with a set of regulations. Little is known about their mobilization of police in response to victimization, including how it is affected …


Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon Mar 2020

Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon

EBCS Articles

The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …


Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah Mar 2020

Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah

EBCS Articles

The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …


Lost In The Park: Learning To Navigate The Unpredictability Of Fieldwork, Elizabeth Bonomo, Scott Jacques Dec 2019

Lost In The Park: Learning To Navigate The Unpredictability Of Fieldwork, Elizabeth Bonomo, Scott Jacques

CJC Publications

No abstract provided.


Drug Sellers’ Neutralizations Of Guiltless Drug Sales And Avoidance Of “Drug Dealer” Identities, Timothy Dickinson, Scott Jacques Jan 2019

Drug Sellers’ Neutralizations Of Guiltless Drug Sales And Avoidance Of “Drug Dealer” Identities, Timothy Dickinson, Scott Jacques

CJC Publications

Background: Despite a wealth of empirical exploration on neutralization theory, several aspects of the theory remain underexplored. For instance, one task of neutralization research is to investigate whether and how neutralizations vary with offender characteristics. A second underexplored area is whether the neutralizations offenders present when directly asked about feelings of guilt are similar or dissimilar to those they have incorporated into their narrative identities described during interviews. A third underexplored issue is whether offenders that exhibit little guilt for committing mala prohibita crimes use neutralizations in a similar manner as those who do not express guilt for committing mala …


To Control Or Be Controlled: Predicting Types Of Offending In A Corporate Environment Using Control-Balance Theory, Donald E. Hunt, Volkan Topalli Jan 2019

To Control Or Be Controlled: Predicting Types Of Offending In A Corporate Environment Using Control-Balance Theory, Donald E. Hunt, Volkan Topalli

CJC Publications

Introduction: This study seeks to determine the extent to which Tittle’s control balance (CB) theory (CBT: 1995) accurately predicts different types of deviance within a corporate setting (in this case, a financial services corporation). CB theory contends that deviance is the result of a control imbalance between the amount of control a person exerts and the amount to which they are subject. Control deficits result in repressive deviance (including most types of predatory crime). Control surpluses result in autonomous deviance (including many types of white collar offending). Method: We exploit a unique dataset consisting of the internal investigations of fraud …


Network Exposure And Excessive Use Of Force: Investigating The Social Transmission Of Police Misconduct, Marie Ouellet, Sadaf Hashimi, Jason Gravel, Andrew V. Papachristos Jan 2019

Network Exposure And Excessive Use Of Force: Investigating The Social Transmission Of Police Misconduct, Marie Ouellet, Sadaf Hashimi, Jason Gravel, Andrew V. Papachristos

CJC Publications

Research Summary: In this study, we investigate how a police officer's exposure to peers accused of misconduct shapes his or her involvement in excessive use of force. By drawing from 8,642 Chicago police officers named in multiple complaints, we reconstruct police misconduct ego‐networks using complaint records. Our results show that officer involvement in excessive use of force complaints is predicted by having a greater proportion of co‐accused with a history of such behaviors.

Policy Implications: Our findings indicate officers’ peers may serve as social conduits through which misconduct may be learned and transmitted. Isolating officers that engage in improper use …


An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon Jan 2019

An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon

EBCS Presentations

No abstract provided.


Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani Jan 2019

Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani

EBCS Articles

Although a relatively simple form of hacking, website defacement can have severe consequences both for the websites that are attacked and the reputation of their owners. However, criminological research has yet to fully explore the causes and correlates of website defacement. We consider whether variables derived from routine activity theory can be applied to understanding website defacement. Specifically, using a sample of websites that were targeted by hackers in 2017 across the world, we examine the relationship between a country’s structural characteristics and the frequency of website defacement reported for the country. We find that website defacements are less likely …


Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo Jan 2019

Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo

EBCS Articles

The classical view of an information system is that it represents and reflects physical reality. We suggest this classical view is increasingly obsolete: digital technologies are now creating and shaping physical reality. We call this phenomenon the ontological reversal. The ontological reversal is where the digital version is created first, and the physical version second (if needed). This ontological reversal challenges us to think about the role of humans and technology in society. It also challenges us to think about our role as IS scholars in this digital world and what it means for our research agendas.


Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park Jan 2019

Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park

EBCS Articles

Adopting the criminal event perspective, we explore how online fraudsters make use of urgency cues in their interactions with potential victims throughout the progression of an online nonpayment fraud attempt. Integrating claims from the ‘Interpersonal-Deception Theory’ with situational explanations of crime, we investigate whether fraudsters’ presentations of verbal cues of urgency during the early stages of a criminal event are followed by a consistent presentation of verbal and non-verbal urgency cues. To answer this question, we posted a large number of ‘for-sale’ advertisements over a classified-ad website and interacted with online fraudsters and legitimate users who responded to our ads …


Which Source Possesses The Most And Highest Quality Data On The Empirical Aspects Of Criminal Events? A Theory Of Opportunity And Necessary Conditions, Scott Jacques Jan 2019

Which Source Possesses The Most And Highest Quality Data On The Empirical Aspects Of Criminal Events? A Theory Of Opportunity And Necessary Conditions, Scott Jacques

CJC Publications

Offenders and nonoffenders possess valuable information about crime. But which possesses the best data? This is a complex issue, so I narrow my focus to data on empirical aspects of criminal events. Drawing on the necessary conditions perspective, I theorize that a source’s possession 1) of data varies directly with its involvement in cases; 2) of representative data varies inversely with nonrandom involvement in cases and nonrandom siphoning off from the larger group to which it belongs; and, 3) of accurate data varies inversely with time since involvement in cases. Those general principles suggest that offenders, especially active ones, possess …


Criminal Group Dynamics And Network Methods, Marie Ouellet, Sadaf Hashimi Jan 2019

Criminal Group Dynamics And Network Methods, Marie Ouellet, Sadaf Hashimi

CJC Publications

Value – Network methods provide a means to revisit and extend theories of crime and delinquency with a focus on social structure. The unique affinity between group dynamics and network methods highlights immense opportunities for expanding the knowledge of collective trajectories.


The Cognitive, Affective, And Somatic Empathy Scales (Cases): Cross-Cultural Replication And Specificity To Different Forms Of Aggression And Victimization, Frances Chen, Annis Lai Chu Fung, Adrian Raine Jan 2019

The Cognitive, Affective, And Somatic Empathy Scales (Cases): Cross-Cultural Replication And Specificity To Different Forms Of Aggression And Victimization, Frances Chen, Annis Lai Chu Fung, Adrian Raine

CJC Publications

A psychometrically sound measure of empathy that captures its multifaceted nature is critical in furthering research on empathy. The only instrument that assesses three domains of empathy together with positive and negative valence empathy is the newly developed 30-item cognitive, affective, and somatic empathy scales (CASES). The current study examines the cross-culture generalizability of CASES in Hong Kong and explores links between empathy and different forms of aggression and peer victimization. A sample of 4,676 Hong Kong youth (62% male) completed CASES, alongside measures of reactive/proactive aggression and multidimensional peer victimization. A subsample of youth (n = 2,321–2,464) and …


Overestimating Self-Blame For Stressful Life Events And Adolescents’ Latent Trait Cortisol (Ltc): The Moderating Role Of Parental Warmth. Journal Of Youth And Adolescence, Catherine B. Stroud, Frances Chen, Blair E. Curzi, Douglas A. Granger, Leah D. Doane Jan 2019

Overestimating Self-Blame For Stressful Life Events And Adolescents’ Latent Trait Cortisol (Ltc): The Moderating Role Of Parental Warmth. Journal Of Youth And Adolescence, Catherine B. Stroud, Frances Chen, Blair E. Curzi, Douglas A. Granger, Leah D. Doane

CJC Publications

Cognitive interpretations of stressful events impact their implications for physiological stress processes. However, whether such interpretations are related to trait cortisol—an indicator of individual differences in stress physiology—is unknown. In 112 early adolescent girls (M age = 12.39 years), this study examined the association between self-blame estimates for past year events and latent trait cortisol, and whether maternal warmth moderated effects. Overestimating self-blame (versus objective indices) for independent (uncontrollable) events was associated with lower latent trait cortisol, and maternal warmth moderated the effect of self-blame estimates on latent trait cortisol for each dependent (at least partially controllable) and interpersonal …


One Gang Dies, Another Gains? The Network Dynamics Of Criminal Group Persistence, Marie Ouellet, Martin Bouchard, Yanick Charette Jan 2019

One Gang Dies, Another Gains? The Network Dynamics Of Criminal Group Persistence, Marie Ouellet, Martin Bouchard, Yanick Charette

CJC Publications

What leads a minority of criminal groups to persist over time? Although most criminal groups are characterized by short life spans, a subset manages to survive extended periods. Contemporary research on criminal groups has been primarily descriptive and static, leaving important questions on the correlates of group persistence unanswered. By drawing from competing perspectives on the relationship between cohesion and group persistence, we apply a longitudinal approach to examine the network dynamics influencing the life span of criminal groups. We use 9 years of official data on the criminal and social networks of gang associates in Montreal, Quebec, Canada, to …


Bentham, Not Epicurus: The Relevance Of Pleasure To Studies Of Drug-Involved Pain, Scott Jacques Jan 2019

Bentham, Not Epicurus: The Relevance Of Pleasure To Studies Of Drug-Involved Pain, Scott Jacques

CJC Publications

There is a disproportionate focus on pain over pleasure in policy-relevant research on drugs. This is unfortunate because theories of and findings on drug-involved pleasure can be used to inform knowledge of drug-involved pain. The cross-fertilization of theories and findings is bolstered by the availability of a conceptual framework that links drug-involved pain and pleasure in a comprehensive, powerful, simple, and instrumental manner. This article proposes such a framework. It consists of four types of drug-involved pain and pleasure: drug-specific corporal; drug-related corporal; economic; and, social. This quaternary scheme is illustrated with findings from four literatures, namely those on methamphetamine …


Microaggressions: An Introduction, Natasha N. Johnson, Thaddeus Johnson Jan 2019

Microaggressions: An Introduction, Natasha N. Johnson, Thaddeus Johnson

CJC Publications

Microaggressions are brief and commonplace daily verbal, behavioral, or environmental indignities, whether intentional or unintentional, that communicate hostile, derogatory, or negative slights and insults toward people who are not classified within the “normative” standard. Perpetrators of microaggressions are often unaware that they engage in such communications when they interact with people who differ from themselves. This review of microaggressions in its numerous forms seeks to address the current literature regarding aversive behavior and its impacts; this includes investigating the manifestation and influence of everyday “isms,” on the quality of life of those on the receiving end of these acts. Ensuing …


Creating Support Systems For Black Women In Nontraditional Stem Career Paths, Tokiwa T. Smith, Natasha N. Johnson Jan 2019

Creating Support Systems For Black Women In Nontraditional Stem Career Paths, Tokiwa T. Smith, Natasha N. Johnson

CJC Publications

Although careers in science, technology, engineering, and mathematics (STEM) fields are widely acknowledged as central to the future, women remain largely underrepresented in these spheres. This is particularly true for Black women, highlighting the necessity of support systems and resources designed to promote their success in STEM. Ideally, these supports should begin during the K-12 years and continue throughout the course of their educational journeys. Current research indicates that Black women in STEM achieve greater, lasting success when they have access to structured support systems. As the career paths of Black women in STEM continue to evolve, there remains a …


Are College-Educated Police Officers Different? A Study Of Stops, Searches, And Arrests, Richard Rosenfeld, Thaddeus L. Johnson, Richard Wright Jan 2018

Are College-Educated Police Officers Different? A Study Of Stops, Searches, And Arrests, Richard Rosenfeld, Thaddeus L. Johnson, Richard Wright

CJC Publications

A study of more than 60,000 police traffic stops found that college-educated officers were more likely than other officers to stop drivers for less serious violations, perform consent searches, and make arrests on discretionary grounds. These results are consistent with those of prior research indicating that college-educated officers are more achievement oriented and eager for advancement based on the traditional performance criteria of stops, searches, and arrests. The results raise questions regarding the recommendation of the President’s Task Force on 21st Century Policing (2015) to improve police-community relations by hiring more college-educated police officers, especially in urban communities where concerns …


Effectively Managing Bias In Teacher Preparation, Natasha Johnson Jan 2018

Effectively Managing Bias In Teacher Preparation, Natasha Johnson

CJC Publications

This is the call for teacher preparation programs to actively incorporate an emphasis on social justice education and the development of teachers committed to creating equitable schools. Education in today's multicultural, pluralistic society must be actively concentrated on and successful at creating more just and unbiased schools for underserved students. Similar to Ladson-Billings' argument for a redefining of ‘good teaching,' there must be a redefinition of that which constitutes social justice teaching. It is the role of today's teacher preparation programs to equip teachers with the essential skills necessary to develop students, manage bias, and create a culture of equity …


The Benefits Of Child Contact While In Prison On Educational Program Participation And Employment Outcomes, Déshané Velasquez Apr 2016

The Benefits Of Child Contact While In Prison On Educational Program Participation And Employment Outcomes, Déshané Velasquez

Georgia State Undergraduate Research Conference

No abstract provided.


Recidivism And The Convict Labor Market: A Cross-Country Comparison Of Recidivism Trends In For-Profit Prisons, Alex T. Basinger Feb 2016

Recidivism And The Convict Labor Market: A Cross-Country Comparison Of Recidivism Trends In For-Profit Prisons, Alex T. Basinger

DISCOVERY: Georgia State Honors College Undergraduate Research Journal

Throughout the United States, United Kingdom, China, Japan, Australia, and New Zealand, prisoners are employed for less than $1 per hour in agriculture, manufacturing, public works projects, and dozens of other industries. The privately owned prison companies Corrections Corporation of America, G4S, Sodexo Justice Services, and Serco vie for government contracts to build, staff, and regulate prisons and prisoners. Other entities, such as China’s Laogai and The USA’s Federal Prison Industries, are ingrained into the national government. Prisoner labor produces billions of dollars in goods and services every year. When crime and recidivism increase, for-profit prisons receive inexpensive laborers. This …


Learning From The Offenders' Perspective On Crime Prevention, Scott Jacques, Elizabeth Bonomo Jan 2016

Learning From The Offenders' Perspective On Crime Prevention, Scott Jacques, Elizabeth Bonomo

EBCS Articles

Criminals have a firsthand perspective on why and how to commit crime. In this chapter, we outline and illustrate five ways that offender-based research can be used to inform understanding of crime prevention, more specifically situational crime prevention: namely, (1) by directly determining what works to reduce crime; (2) generating findings that are suggestive of what prevention measures to invent and employ; (3) refining understanding of why a given prevention method reduces crime; (4) figuring out how offenders get around particular prevention measures; and, (5) gathering information on not only the positive but also the unintended, negative outcomes of prevention …


6th Amendment: Indigent Right To Counsel, Melissa Knott Apr 2015

6th Amendment: Indigent Right To Counsel, Melissa Knott

Georgia State Undergraduate Research Conference

No abstract provided.


Effects Of Physical Appearance On Police Decision Making, Victoria Cruz, Blanca Garcia, Ethan Hammock Apr 2015

Effects Of Physical Appearance On Police Decision Making, Victoria Cruz, Blanca Garcia, Ethan Hammock

Georgia State Undergraduate Research Conference

No abstract provided.


Recidivism And The Convict Labor Market, Alex Basinger Apr 2014

Recidivism And The Convict Labor Market, Alex Basinger

Georgia State Undergraduate Research Conference

No abstract provided.


Prosecution Of The Perpetrators Of Child Abuse Cases: Examination Of Focal Concerns Principles, Kerry F. Mcdonough Apr 2014

Prosecution Of The Perpetrators Of Child Abuse Cases: Examination Of Focal Concerns Principles, Kerry F. Mcdonough

Georgia State Undergraduate Research Conference

No abstract provided.