Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

10,348 Full-Text Articles 7,277 Authors 16,527,733 Downloads 216 Institutions

All Articles in Criminology

Faceted Search

10,348 full-text articles. Page 140 of 158.

The Correlation Between The Three Reading Fluency Subskills And Reading Comprehension In At-Risk Adolescent Readers, Craig Courbron 2012 Liberty University

The Correlation Between The Three Reading Fluency Subskills And Reading Comprehension In At-Risk Adolescent Readers, Craig Courbron

Doctoral Dissertations and Projects

The purpose of this study was to determine which of the three reading fluency subskills were most strongly correlated with reading comprehension in adolescent at-risk readers. The participants were 82 adolescent males (ages 13-19) who had been committed to a juvenile detention facility. Archival data from a two-year period was collected from a maximum security juvenile detention facility in a rural section of the Northeastern United States. The Measures of Academic Progress test was used to collect reading comprehension data; the Qualitative Reading Inventory-4 test was used to collect reading speed and reading accuracy data; the Multidimensional Fluency Scale was …


Deliver Us From Evil - Police Tactical Psychology Bulletin, Rodger E. Broome PhD 2012 Utah Valley University

Deliver Us From Evil - Police Tactical Psychology Bulletin, Rodger E. Broome Phd

Rodger E. Broome

There is no hero or protector without a menace from which to protect or save others. Therefore, it is essential to understanding our adversaries better so that we may better appreciate our service to our citizens


Assessment Of Firesetters, Rebekah Doley, Bruce Watt 2012 Bond University

Assessment Of Firesetters, Rebekah Doley, Bruce Watt

Bruce Watt

Extract This chapter will equip readers with the information required to screen and assess arsonists effectively using a number of modalities. The appropriate tools are presented and discussed, along with the evidence base underlying them. The focus of the discussion is on risk assessment, recidivism and dangerousness. In particular, these issues are discussed with reference to mental health and psychiatric patients as arsonists. The terms ’arson’ and ’firesetting’ will be used interchangeably throughout this chapter; the term ‘arson’ is commonly acknowledged to have a legal definition, while firesetting describes the behaviour itself.


Assessment Of Firesetters, Rebekah Doley, Bruce Watt 2012 Bond University

Assessment Of Firesetters, Rebekah Doley, Bruce Watt

Rebekah Doley

Extract This chapter will equip readers with the information required to screen and assess arsonists effectively using a number of modalities. The appropriate tools are presented and discussed, along with the evidence base underlying them. The focus of the discussion is on risk assessment, recidivism and dangerousness. In particular, these issues are discussed with reference to mental health and psychiatric patients as arsonists. The terms ’arson’ and ’firesetting’ will be used interchangeably throughout this chapter; the term ‘arson’ is commonly acknowledged to have a legal definition, while firesetting describes the behaviour itself.


Power And Excitement In Arson: The Case Of Firefighter Arson, Rebekah Doley, Kenneth Fineman 2012 Bond University

Power And Excitement In Arson: The Case Of Firefighter Arson, Rebekah Doley, Kenneth Fineman

Rebekah Doley

Extract Perhaps more than most crimes, the crime of arson is often shrouded in anecdotal descriptions concerning what actually motivates the offender. Arson in any form is repugnant, but even more so when the individual involved is a serving member of the fire service. Fire department personnel and the community alike abhor incidents of this nature. Although the incidence of fire-fighter arson is low in comparison with the total number of currently serving fire-fighters, the impact on community faith and fire service morale is disproportionately great. The integrity of the service is demonstrated in the performance of its personnel. While …


Bushfire And Wildfire Arson: Arson Risk Assessment In The Australian Context, Troy McEwan, Rebekah Doley, Mairead Dolan 2012 Bond University

Bushfire And Wildfire Arson: Arson Risk Assessment In The Australian Context, Troy Mcewan, Rebekah Doley, Mairead Dolan

Rebekah Doley

Extract Deliberately lit vegetation fires have the greatest destructive potential of any intentionally lit blaze. The ’Black Saturday’ bushfires of 7 February 2009 in Victoria, Australia, killed 173 people, injured 414 and destroyed 3500 buildings, including two entire towns (Teagne et al, 2010). Even before the fires had abated police and fire-fighters revealed that several had been deliberately lit (Silvester, 2009). The subsequent Royal Commission attributed four of the large fires to arson. These four fires caused 52 deaths and burnt approximately 2000 km2 of land, an area slightly larger than that of Greater London (Teague et aI, 2010). The …


The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael 2012 University of Wollongong

The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael

Professor Katina Michael

Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …


Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker 2012 University of Wollongong

Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker

Professor Katina Michael

Most leading organizations, in all sectors of industry, commerce and government are dependent upon

ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its

impact on the entire firm’s performance the IT literature has been in the large part silent on the nature

of the ERP investment decision. This study is the first of its kind to determine the preference structure

of senior managers around the organizational benefits and risks of adopting ERP. We present the

results which provide interesting insights into how managers’ perceive the benefit and risk factors

salient to the …


Occupational Therapy In Criminal Justice, Jane Dressler 2012 Department of Occupational Therapy, Dominican University of Calfornia

Occupational Therapy In Criminal Justice, Jane Dressler

Jane Dressler

Designed to provide readers with the most up-to-date information on the clinical applications of psychosocial occupational therapy, the thoroughly revised Third Edition of PSYCHOSOCIAL OCCUPATIONAL THERAPY: AN EVOLVING PRACTICE is an important addition to any occupational therapy library. With a novice friendly approach focusing on diagnosis, this book is filled with case illustrations to demonstrate therapy in clinical practice so that readers are prepared for working with actual clients in real-life contexts. Seven new chapters have been added to the third edition and cover topics such as recovery perspectives, mental health research in occupational therapy, mental health of infants, managing …


The Criminalization Of Immigration: Value Conflicts For The Social Work Profession, Rich Furman, Alissa R. Ackerman, Melody Loya, Susanna Jones, Nalini Negi 2012 University of Washington, Tacoma

The Criminalization Of Immigration: Value Conflicts For The Social Work Profession, Rich Furman, Alissa R. Ackerman, Melody Loya, Susanna Jones, Nalini Negi

The Journal of Sociology & Social Welfare

This article examines the impact of the criminalization of immigration on non-documented immigrants and the profession of social work. To meet its aims, the article explores the new realities for undocumented immigrants within the context of globalization. It then assesses the criminal justice and homeland security responses to undocumented immigrants, also referred to as the criminalization of immigration. It subsequently explores the ethical dilemmas and value discrepancies for social workers that are implicated in some of these responses. Finally, it presents implications for social workers and the social work profession.


The Social Contagion Of Violence; A Theoretical Exploration Of The Nature Of Violence In Society, Kayla Kirkpatrick 2012 California Polytechnic State University - San Luis Obispo

The Social Contagion Of Violence; A Theoretical Exploration Of The Nature Of Violence In Society, Kayla Kirkpatrick

Social Sciences

No abstract provided.


Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt 2012 University of Wollongong

Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt

Professor Katina Michael

Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.


Editorial: "You Talkin' To Me?", Katina Michael 2012 University of Wollongong

Editorial: "You Talkin' To Me?", Katina Michael

Professor Katina Michael

Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …


A Rose By Any Other Name: State Criminality And The Limits Of Social Learning Theory, Elizabeth A. Bradshaw 2012 Western Michigan University

A Rose By Any Other Name: State Criminality And The Limits Of Social Learning Theory, Elizabeth A. Bradshaw

The Hilltop Review

Over the past thirty years, social learning theory has emerged as one of the top criminological theories of the time. Capitalizing on Edwin Sutherland’s differential association theory, social learning theory provided the means for a quantitative assessment of Sutherland’s propositions. Advanced largely by Ronald Akers, the vast majority of research conducted on social learning theory has been limited to self-report studies of adolescents and college students, largely due to convenience. The limitations of the methods developed to empirically test social learning theory combined with the difficulty of gaining access to people in positions of power, has been the primary impediment …


Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael 2012 University of Wollongong

Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael

Associate Professor Katina Michael

Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks …


Family Systems - Police Tactical Psychology Bulletin, Rodger E. Broome PhD 2012 Utah Valley University

Family Systems - Police Tactical Psychology Bulletin, Rodger E. Broome Phd

Rodger E. Broome

In the criminal justice system, we deal with people in terms of their individual rights and actions. But often times, police officers are called to deal with families in conflict or turmoil. In these situations, police have to work within the framework of individual rights, responsibilities, and duties, but often are frustrated, confounded or inhibited by complex family dynamics.


Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael 2012 University of Wollongong

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …


Extralegal Punishment Factors: A Study Of Forgiveness, Hardship, Good-Deeds, Apology, Remorse, And Other Such Discretionary Factors In Assessing Criminal Punishment, Paul H. Robinson, Sean Jackowitz, Daniel M. Bartels 2012 University of Pennsylvania Carey Law School

Extralegal Punishment Factors: A Study Of Forgiveness, Hardship, Good-Deeds, Apology, Remorse, And Other Such Discretionary Factors In Assessing Criminal Punishment, Paul H. Robinson, Sean Jackowitz, Daniel M. Bartels

All Faculty Scholarship

The criminal law's formal criteria for assessing punishment are typically contained in criminal codes, the rules of which fix an offender's liability and the grade of the offense. A look at how the punishment decision-making process actually works, however, suggests that courts and other decisionmakers frequently go beyond the formal legal factors and take account of what might be called "extralegal punishment factors" (XPFs).

XPFs, the subject of this Article, include matters as diverse as an offender's apology, remorse, history of good or bad deeds, public acknowledgment of guilt, special talents, old age, extralegal suffering from the offense, as well …


Juvenile Injustice: Disproportionate Minority Contact In Oklahoma's Juvenile Justice System, Patrick M. Polasek 2012 Loyola University Chicago

Juvenile Injustice: Disproportionate Minority Contact In Oklahoma's Juvenile Justice System, Patrick M. Polasek

Dissertations

Statistics show that minority overrepresentation in the juvenile justice system is not a new phenomenon. The problem, however, is not going away and might even be getting worse. In 2008, the FBI's Uniform Crime Report showed that 52% of juvenile Violent Crime Index arrests, and 33% of juvenile Property Crime Index arrests, are black youths. This occurring while black youth only accounted for 16% of the youth population. These statistics illustrate disproportionate minority contact. The question is whether disproportionate minority contact has improved, and what is influencing minority overrepresentation.

In this dissertation, I examine whether minorities are overrepresented in Oklahoma's …


Family In Context: (Re)Entry Narratives Of Formerly Incarcerated Individuals, Jennifer Elena Cossyleon 2012 Loyola University Chicago

Family In Context: (Re)Entry Narratives Of Formerly Incarcerated Individuals, Jennifer Elena Cossyleon

Master's Theses

The current study is informed by narrative accounts of 39 released prisoners, who provide day-to-day understandings of how they have experienced and continue to experience community reintegration. This study digs deeper into the intricacies of returning to free society, one that often disenfranchises and labels ex-offenders, and attempts to reveal how released prisoners themselves see family as pertinent in their reentry experiences. Respondents' stories are telling of the resources they draw upon, and in particular how their families are involved in that process. Findings suggest that families at times provide material and emotional support, but may also facilitate drug use …


Digital Commons powered by bepress