Open Access. Powered by Scholars. Published by Universities.®

Social Control, Law, Crime, and Deviance Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 121 - 150 of 2214

Full-Text Articles in Social Control, Law, Crime, and Deviance

‘They Did Not Have To Burn My Sister Alive’: Causes And Distribution By State Of Dowry Murder In India, Peter Mayer Mar 2022

‘They Did Not Have To Burn My Sister Alive’: Causes And Distribution By State Of Dowry Murder In India, Peter Mayer

Dignity: A Journal of Analysis of Exploitation and Violence

Dowry, the money, goods, property, or gifts given by the bride’s family to the groom or his family at the time of marriage, is a common custom in South Asia. Although it is illegal to demand—or offer—a dowry in India, it is a nearly universal custom in many parts of the country. If, after marriage, a husband’s family feels that the wife’s dowry was insufficient, they may harass or inflict other forms of domestic violence on her to put pressure on her family to provide an additional dowry. At its most extreme, this violence may lead to the murder of …


"Women And Crime" In Criminology Textbooks, Patricia Ann Wasely Lomire Feb 2022

"Women And Crime" In Criminology Textbooks, Patricia Ann Wasely Lomire

Great Plains Sociologist

The purpose of this research note is to encourage both students and faculty to critically evaluate assumptions regarding the limited coverage of "women and crime" topics in contemporary criminology textbooks. The specific objectives are 1) to briefly review the research findings of Richard A. Wright's 1987 article entitled "Are Sisters in Crime Finally Being Booked? The Coverage of Women and Crime in Journals and Textbooks"; 20 to evaluate the coverage of female related topics in 631 articles form Criminology: An Interdisciplinary Journal -- The Official Publication of the American Society of Criminology, (1970-1989); 3) to critique a variety of explanations …


Gender And Perceived Severity Of Informal Sanctions: A Case Study Of Convicted Dui Offenders In Cass County, North Dakota, Terry D. Stratton, James H. Larson Feb 2022

Gender And Perceived Severity Of Informal Sanctions: A Case Study Of Convicted Dui Offenders In Cass County, North Dakota, Terry D. Stratton, James H. Larson

Great Plains Sociologist

The use of informal sanctions as deterrents to socially undesirable behavior is not new. Particularly at a time when individuals (especially public figures) are subject to growing scrutinization, the breadth of public censure is expanding to envelop a seemingly wider array of moral and legal violations. Minor law-breakers, too, are being made increasingly aware of the public's social monitoring role a role which functions as a dynamic reference point by which individuals, on the basis of certain actions, are deemed to be "deviant" or "respectable" (Douglas, 1970). "What is relatively new, however, is the "formalization of the informal sanction"; that …


Remodelling Criminal Insanity: Exploring Philosophical, Legal, And Medical Premises Of The Medical Model Used In Norwegian Law, Linda Gröning, Unn K. Haukvik, Stephen J. Morse, Susanna Radovic Jan 2022

Remodelling Criminal Insanity: Exploring Philosophical, Legal, And Medical Premises Of The Medical Model Used In Norwegian Law, Linda Gröning, Unn K. Haukvik, Stephen J. Morse, Susanna Radovic

All Faculty Scholarship

This paper clarifies the conceptual space of discussion of legal insanity by considering the virtues of the ‘medical model’ model that has been used in Norway for almost a century. The medical model identifies insanity exclusively with mental disorder, and especially with psychosis, without any requirement that the disorder causally influenced the commission of the crime. We explore the medical model from a transdisciplinary perspective and show how it can be utilised to systematise and reconsider the central philosophical, legal and medical premises involved in the insanity debate. A key concern is how recent transdiagnostic and dimensional approaches to psychosis …


Internal And External Challenges To Culpability, Stephen J. Morse Jan 2022

Internal And External Challenges To Culpability, Stephen J. Morse

All Faculty Scholarship

This article was presented at “Guilty Minds: A Virtual Conference on Mens Rea and Criminal Justice Reform” at Arizona State University’s Sandra Day O’Connor College of Law. It is forthcoming in Arizona State Law Journal Volume 53, Issue 2.

The thesis of this article is simple: As long as we maintain the current folk psychological conception of ourselves as intentional and potentially rational creatures, as people and not simply as machines, mental states will inevitably remain central to ascriptions of culpability and responsibility more generally. It is also desirable. Nonetheless, we are in a condition of unprecedented internal challenges to …


Translatina Immigrant Mental Health Wellness: Suggestive Intervention Strategies The City Of San Francisco Should Consider Adopting, Valeria Vera Jan 2022

Translatina Immigrant Mental Health Wellness: Suggestive Intervention Strategies The City Of San Francisco Should Consider Adopting, Valeria Vera

Master's Theses

Translatina immigrants in the United States often suffer from intersectional traumas due to their race, gender, sexual orientation, religion, and immigration status — putting them in a vulnerable position socially, psychologically, economically, and medically. Due to their positionality in the intersections of migration, criminalization, cissexism, and mental health, they are often more marginalized and have greater needs than communities with privileged sociocultural identities. As a particularly vulnerable group, they need guaranteed access to gender-affirming healthcare that is inclusive of mental health services. Despite Translatinas’ need for mental health services, there exist many barriers making services inaccessible and insufficient in San …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Insistence: The Active Quest Of Citizens For Achieving Their Health And Justice Rights In Mexico, Julia Hernández-Gutiérrez Jan 2022

Insistence: The Active Quest Of Citizens For Achieving Their Health And Justice Rights In Mexico, Julia Hernández-Gutiérrez

The Journal of Sociology & Social Welfare

In Mexico’s public healthcare and justice institutions, where insufficient infrastructure, unnecessary, confusing procedures, and mistreatment are common obstacles to fundamental rights, insistence can be interpreted as an indicator of a citizen’s active quest to ensure their rights are respected. Even if citizen dependence on the State is reinforced on a daily basis within some public institutions, service users are not inactive patients or victims waiting for their turn, but rather are active agents claiming their rights, because access to healthcare and justice cannot be achieved in Mexico without the ability to cope with bureaucratic barriers and the despotic attitude of …


Wanderscaping: Stirring Agitated Reflections Into Our Home The Campus, K. Annie Bingham Jan 2022

Wanderscaping: Stirring Agitated Reflections Into Our Home The Campus, K. Annie Bingham

Selected Undergraduate Works

Wanderscaping is a two part project completed over the 2021-2022 school year. The first portion, "Wanderscaping Our Home The Campus" meanders through the physical space of Sarah Lawrence College, as a landscape and an institution, while the second, "Stirring An Agitated Reflection" floats that knowledge in the psychic space of an interconnected host of guides, through books, conversations, and other media. As a whole this project is a process-oriented wrangling of freedom, connection, and their borders. It has culminated in practices of public participatory performance, photography, mapping, iconography, audio recording, and writing. Wanderscaping aims to share a space to dream …


Findings And Implications From A Project On White Supremacist Entry And Exit Pathways, Matthew Demichele, Wesley S. Mccann, Kathleen Blee, Peter Simi Jan 2022

Findings And Implications From A Project On White Supremacist Entry And Exit Pathways, Matthew Demichele, Wesley S. Mccann, Kathleen Blee, Peter Simi

Sociology Faculty Articles and Research

This Research Note provides an overview of the main findings from a project on white supremacist pathways - or why some individuals join and leave white supremacist groups - with a specific focus on elucidating common themes, theoretical applications, main takeaways, and providing recommendations for academics and policymakers. One key lesson is that identity is central to entry and exit pathways.


Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff Jan 2022

Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff

Research Projects

In January 2022, the U.S. Department of Justice announced Seditious Conspiracy charges against members of the anti-government extremist group Oath Keepers in connection to the January 6th (2021) siege of the U.S. Capitol Building. Several have entered not guilty pleas and a trial is expected in July 2022.

To provide context, this brief offers an overview of 11 Seditious Conspiracy cases included in the American Terrorism Study (ATS) since 1980. In total, these cases involve nine groups (a.k.a."cells" or "plots") and 78 defendants charged with Seditious Conspiracy (18 USC§ 2384), a relatively rare charge that comprises less than one half …


"Taken In By The 'Man In A White Van' Story": The Digital Activism Efforts Of One Women's Civic Leadership Organization In Human Trafficking Awareness, Alex Rister Jan 2022

"Taken In By The 'Man In A White Van' Story": The Digital Activism Efforts Of One Women's Civic Leadership Organization In Human Trafficking Awareness, Alex Rister

Electronic Theses and Dissertations, 2020-

Feminist activism in the digital age leverages technology to raise awareness of, and to mobilize support for, important issues and causes. Human trafficking is one such cause, and preventing it is included as a United Nations Sustainable Development Goal to achieve gender equality and empower women and girls. This study sought to understand the digital activism strategies of one women's civic leadership organization, the Junior League, for human trafficking awareness. In addition, this project analyzed how those digital activism strategies did or did not align with social justice approaches to human trafficking and how those digital activism strategies did or …


Using Simulation For Law Enforcement De-Escalation Training, Julie Kent Jan 2022

Using Simulation For Law Enforcement De-Escalation Training, Julie Kent

Electronic Theses and Dissertations, 2020-

Law enforcement needs simulation practice tailored to de-escalation skills. Law enforcement officers spend most of their training time practicing how to use force appropriately and very little time practicing how to avoid using force. There is little research into the best ways for law enforcement to reduce their use of force and the best ways to provide training to individuals to coach them to avoid using force. There are many training programs promoting de-escalation techniques, but there is little research into the effectiveness of these programs beyond the ability of individuals to perform the skills that are trained. There is …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


The Impact Of Intimate Partner Violence On Women's Financial Wellbeing, Rowan Dunton Jan 2022

The Impact Of Intimate Partner Violence On Women's Financial Wellbeing, Rowan Dunton

Themis: Research Journal of Justice Studies and Forensic Science

Domestic violence and intimate partner violence against women affects all aspects of their health, including physical, mental, emotional, and economic health. When social programs, support networks, and better opportunities exist to improve the lives of female survivors, the financial impact of their abuse can be addressed and reduced in a significant, sustainable manner. Reviewing existing literature on this financial impact of abuse makes it apparent what women want and need to recover from their former, or even ongoing, situations. Effective preventative measures against financial harm include closing the gender wage gap and offering welfare programs for lower-income women to increase …


An Examination Of Three Transitional Events In The Substance Misuse Trajectories Of Women With Criminal Legal System Involvement, Martha Tillson Jan 2022

An Examination Of Three Transitional Events In The Substance Misuse Trajectories Of Women With Criminal Legal System Involvement, Martha Tillson

Theses and Dissertations--Sociology

Research has consistently demonstrated that criminal legal system (CLS)-involved women are distinct from men in initiation and course of drug use, with important differences on biological, environmental, and sociocultural levels. Thus, the unique pathways and transitions into and out of drug use for women with CLS involvement are critical to consider from a research perspective, but also from a need to develop and support evidence-based, women-centered services in correctional contexts. This dissertation project uses a three-paper format to investigate three aims: (1) to understand CLS-involved women’s initiations to injection drug use and their experiences providing injection initiation assistance (IIA) to …


Criminal Law’S Core Principles, Paul H. Robinson Jan 2022

Criminal Law’S Core Principles, Paul H. Robinson

All Faculty Scholarship

Modern criminal law scholars and policymakers assume they are free to construct criminal law rules by focusing exclusively on the criminal justice theory of the day. But this “blank slate” conception of criminal lawmaking is dangerously misguided. In fact, lawmakers are writing on a slate on which core principles are already indelibly written and realistically they are free only to add detail in the implementation of those principles and to add additional provisions not inconsistent with them. Attempts to do otherwise are destined to produce tragic results from both utilitarian and retributivist views.

Many writers dispute that such core principles …


Polyamory, Gender, And Sexuality, Brooklyn Jennings Jan 2022

Polyamory, Gender, And Sexuality, Brooklyn Jennings

Sociology Student Work Collection

A newsletter style analysis of the contemporary mechanisms of polyamory in the U.S. This project briefly discusses polyamory in relation to gender and sexuality, relates larger systems of power to the functions of polyamory, questions the taboos of polyamory, and briefly addresses some of the limitations of academic research regarding polyamory.


Indicators Of Deception: Science Or Non-Science, Kristina Vasquez Jan 2022

Indicators Of Deception: Science Or Non-Science, Kristina Vasquez

Undergraduate Honors Theses

Deception detection is used by many law enforcement professionals who work in interviews and interrogations. The ability to detect deception or having knowledge on the signs of deception is very important in not only law enforcement, but in other careers and everyday life. The question remains: is deception detection a science or not a science? There are three areas where someone can learn how to detect deception and those are verbal communication, non-verbal communication, and paralanguage. The use of verbal communication looks at what the person is saying with their words. The use of non-verbal communication looks at what someone …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


White Vigilantism And The Racism Of Race-Neutrality, Christian Sundquist Jan 2022

White Vigilantism And The Racism Of Race-Neutrality, Christian Sundquist

Articles

Race-neutrality has long been touted in American law as central to promoting racial equality while guarding against race-based discrimination. And yet the legal doctrine of race-neutrality has perversely operated to shield claims of racial discrimination from judicial review while protecting discriminators from liability and punishment. This Article critiques the doctrine of race-neutrality by examining the law’s response to white vigilantism in the much-publicized criminal trials of Kyle Rittenhouse and that of Ahmaud Arbery’s assailants.


Exclusionary Spillage: A Reckoning Of Belonging And Mass Incarceration, Valentina Flores Mayen Jan 2022

Exclusionary Spillage: A Reckoning Of Belonging And Mass Incarceration, Valentina Flores Mayen

Senior Projects Spring 2022

Senior Project submitted to The Division of Social Studies of Bard College.


Fragments Of An Anarcha-Transfeminist Sociology Of Sex Work, Veronica Andrek Jan 2022

Fragments Of An Anarcha-Transfeminist Sociology Of Sex Work, Veronica Andrek

Senior Projects Spring 2022

The purpose of this study is to explore ways in which feminist and sociological theory can be expanded by looking at the experiences of transgender women who are engaged in sex work specifically with an eye for transfeminist and anarchist political theory. Based on qualitative interviews with five transfeminine sex workers, I found that transfeminine sex workers, while facing substantial obstacles such as criminalization, transmisogyny, and poverty, are capable of building communities and forging new meanings in their lives. Within sex work are opportunities by which to reimagine labor and its role in our lives, with the possibility of abolishing …