Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Politics and Social Change (3)
- Psychology (3)
- Social Psychology (3)
- Sociology of Culture (3)
- Cognition and Perception (2)
-
- Cognitive Psychology (2)
- Other Psychology (2)
- Anthropology (1)
- Applied Behavior Analysis (1)
- Communication (1)
- Comparative Politics (1)
- Critical and Cultural Studies (1)
- International Relations (1)
- International and Area Studies (1)
- Interpersonal and Small Group Communication (1)
- Journalism Studies (1)
- Military and Veterans Studies (1)
- Other Political Science (1)
- Other Sociology (1)
- Personality and Social Contexts (1)
- Political Science (1)
- Political Theory (1)
- Public Affairs, Public Policy and Public Administration (1)
- Race and Ethnicity (1)
- Regional Sociology (1)
- Social Control, Law, Crime, and Deviance (1)
- Social Influence and Political Communication (1)
- Institution
- Publication
Articles 1 - 8 of 8
Full-Text Articles in Criminology
Criminal Profiling Methods, Wayne Petherick
Criminal Profiling Methods, Wayne Petherick
Wayne Petherick
Extract:As an investigative aid, criminal profiling has received a great deal of attention from academic audiences and popular culture (Petherick, 2003), and significant advances have been made in both practical and theoretical terms. Even though our collective knowledge about this area has grown, there is still much about the process that remains a mystery. For example, there is little acknowledgment or understanding of the logic or reasoning employed within the profiling process (see Chapter 2), or that there are indeed different methods employed within the profiling community. Of more concern is the fact that many practitioners continue to confuse these …
Criminal Profiling As Expert Evidence, Wayne Petherick, David Field, Andrew Lowe, Elizabeth Fry
Criminal Profiling As Expert Evidence, Wayne Petherick, David Field, Andrew Lowe, Elizabeth Fry
Wayne Petherick
Extract:
Profiling evidence has been accepted in courts in the United States in both trial and sentencing phases, but other jurisdictions have been more cautious in their acceptance. For example, courts in the United Kingdom and Australia have been reluctant to introduce profilers as experts, even though profiling has been given some exposure in courts operating at the lower end of the justice system. The reasons for this reluctance are varied but include a lack of uniformity processes and outcomes, fragmentation of methods, and conflict between profiling organizations and practitioners. In short, there are many methods of profiling, and not …
The Fallacy Of Accuracy In Criminal Profiling, Wayne Petherick
The Fallacy Of Accuracy In Criminal Profiling, Wayne Petherick
Wayne Petherick
Extract:
The defining criterion by which the utility of a particular tool is often judged is its accuracy or sensitivity of detection. We place little faith in that which is inaccurate or in those things that do not detect what they are meant to detect. Things are no different in the profiling community, and the most common measure by which a profiler claims utility is how close his or her approximations are to an offender, if one is caught. As will be shown in this chapter, with the craft being the way it is, this is probably the worst possible …
Metacognition In Criminal Profiling, Barry Woodhouse, Wayne Petherick
Metacognition In Criminal Profiling, Barry Woodhouse, Wayne Petherick
Wayne Petherick
Extract:
As with many professions, one of the more serious problems that confronts the profiling community is that of the inept examiner. Deliberately unethical behavior is one thing, but ongoing incompetence because of profiler ignorance is something else entirely. In some instances, ignorance is the result of a metacognitive deficit caused by a lack of study, a lack of training, or a general lack of mental dexterity. In such instances, the profiler will continually do the wrong thing, such as using flawed methods and erroneous logic, because he lacks the ability to recognize his own ineptitude; the profiler cannot perceive …
Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam
Allen Gnanam
Terrorism as a violent and destabilizing act performed by terrorists, meaning loyal followers of political or religious agendas who hold resent and animosity toward a certain authority/ government (Lin, Liou, & Wu, 2007, pg. 149), will be explored and analyzed through the utilization of the governmentality perspective. For the purposes of this paper terrorism governance will refer to the governance/ control/ influence exerted by terrorists and terrorism. The focus of this explorative and analysis paper will be to identify diverse terrorism oriented technologies of governance, and analyze the ways in which these technologies enable terrorist to exert governance both indirectly …
Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam
Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam
Allen Gnanam
This paper is theoretically grounded on the Ban opticon framework that is characterized by the use of exceptionalism, the normalization of imperative movement, and profiling for insecurity management purposes (Bigo, 2005). This framework will be utilized in order to expose and analyze the Ban optic governmentality of the private security industry. Secondly, the overall discussion and analysis of the private security industry- Ban opticon nexus will be discussed with specific reference to the private security operations of The New Commons. Thirdly, three private security intelligence networks identified by Lippert & O’Connor (2006) namely Disciplinary Networks, Private Justice Networks, and Multilateral …
Crime And Precaution, Allen Gnanam
Crime And Precaution, Allen Gnanam
Allen Gnanam
Precautionary logic and risk assessments can be associated with counter terrorism, criminal profiling, and the management of high risk individuals/ groups. Overall, risk precautionary logic and risk assessments can be framed using the Ban-opticon concept identified by Bigo, though panopitic elements do exist when discussing concepts of surveillance. The Ban opticon framework has 3 major concepts: (a) Criminal profiling, (b) the management of movement and (c) exceptionalism.
Both precautionary logic and risk assessments are associated with the profiling of harms and threats, the management of individual or group movement, and both are used to provide qualitative and quantitative rationale for …
Induction And Deduction In Criminal Profiling, Wayne Petherick
Induction And Deduction In Criminal Profiling, Wayne Petherick
Wayne Petherick
Extract:
Literature on criminal profiling has reached a considerable volume, including not only a quantity of true crime works but also numerous scholarly texts and articles. The casual reader will be familiar with some aspects of profiling, with the more discerning reader being familiar with the steps involved in the profiling process (Holmes & Holmes, 2002; Ressler, Burgess, & Douglas, 1988; Turvey, 2008), the so-called "inputs" and "outputs" of a criminal profile (Davis, 1999, Egger, 1999; Geberth, 1996; Ressler & Burgess, 1985; Ressler et al., 1988), and the personality and grandiosity of profilers (see a variety of memoirs, such as …