A. L. Burton, F. Cullen, Justin T. Pickett, Velmer S. Burton, Angela J. Thielo
{"title":"Beyond the eternal criminal record: Public support for expungement","authors":"A. L. Burton, F. Cullen, Justin T. Pickett, Velmer S. Burton, Angela J. Thielo","doi":"10.1111/1745-9133.12531","DOIUrl":"https://doi.org/10.1111/1745-9133.12531","url":null,"abstract":"","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"119438305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial Introduction to the Special Issue on Policing","authors":"C. Koper, C. Lum","doi":"10.1111/1745-9133.12515","DOIUrl":"https://doi.org/10.1111/1745-9133.12515","url":null,"abstract":"","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120632197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Civil Commitment and Risk Assessment in Perspective","authors":"Jason Rydberg","doi":"10.1111/1745-9133.12318","DOIUrl":"https://doi.org/10.1111/1745-9133.12318","url":null,"abstract":"","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120504725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Illuminating the Black Box of Implementation in Crime Prevention","authors":"A. Fagan","doi":"10.1111/1745-9133.12300","DOIUrl":"https://doi.org/10.1111/1745-9133.12300","url":null,"abstract":"","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"119021196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Housing as the Tip of the Iceberg in Successfully Navigating Prisoner Reentry","authors":"Thomas P. Lebel","doi":"10.1111/1745-9133.12313","DOIUrl":"https://doi.org/10.1111/1745-9133.12313","url":null,"abstract":"","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118560375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Gill, E. Corner, M. Conway, A. Thornton, Mia M. Bloom, J. Horgan
{"title":"Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns and Processes","authors":"P. Gill, E. Corner, M. Conway, A. Thornton, Mia M. Bloom, J. Horgan","doi":"10.1111/1745-9133.12249","DOIUrl":"https://doi.org/10.1111/1745-9133.12249","url":null,"abstract":"Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commission of their crimes. As most samples of terrorist offenders vary in terms of capabilities (lone-actor vs. group offenders) and criminal sophistication (improvised explosive devices vs. stabbings), we tested whether the affordances they sought from the Internet significantly differed. The results suggest that extreme-right-wing individuals, those who planned an attack (as opposed to merely providing material support), conducted a lethal attack, committed an improvised explosive device (IED) attack, committed an armed assault, acted within a cell, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to learn online compared with those who did not engage in these behaviors. Those undertaking unarmed assaults were significantly less likely to display online learning. The results also suggested that extreme-right-wing individuals who perpetrated an IED attack, associated with a wider network, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to communicate online with co-ideologues.","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"358 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117417672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Police Bias, Use of Deadly Force, Public Outcry","authors":"Hyeyoung Lim","doi":"10.1111/1745-9133.12293","DOIUrl":"https://doi.org/10.1111/1745-9133.12293","url":null,"abstract":"","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"74 S1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117391609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Raising the Age","authors":"E. Cauffman, Sachiko Donley, A. Thomas","doi":"10.1111/1745-9133.12257","DOIUrl":"https://doi.org/10.1111/1745-9133.12257","url":null,"abstract":"","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"119986404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Offender Risk Assessment","authors":"J. Wormith","doi":"10.1111/1745-9133.12277","DOIUrl":"https://doi.org/10.1111/1745-9133.12277","url":null,"abstract":"","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"119675091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Morality, Efficacy, and Targeted Assassination as a Policy Tool","authors":"Joseph K. Young","doi":"10.1111/1745-9133.12276","DOIUrl":"https://doi.org/10.1111/1745-9133.12276","url":null,"abstract":"","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120628398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}