{"title":"What Do Murderers Think About the Effectiveness of CCTV?","authors":"M. Gill, A. Spriggs, Ross Little, Kate Collins","doi":"10.1300/J460V02N01_02","DOIUrl":"https://doi.org/10.1300/J460V02N01_02","url":null,"abstract":"Abstract The recent London bomb attacks have highlighted the value of CCTV as a post-event investigation tool, although clearly the cameras did not stop the attacks taking place. Research on the effectiveness of CCTV is mixed, especially in terms of its impact in reducing crime rates. Recent independent evidence in the UK suggests that while the public still support CCTV, offenders do not appear to be deterred by CCTV alone. Clearly this is an area where more research is needed. This paper reports on a study assessing convicted murderers' views of CCTV and the findings may help to explain why it has limits as a crime prevention method and perhaps greater potential as a method of facilitating post-event investigation.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128764299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case Study","authors":"Janet McClellan","doi":"10.1300/J460v02n01_03","DOIUrl":"https://doi.org/10.1300/J460v02n01_03","url":null,"abstract":"Abstract The case study of Theodore Bundy compares his personal characteristics and criminal behavior with the contemporary violent sexual murder typologies. The Theodore (Ted) Bundy case study exemplifies violent sexual homicide offense characteristics. The case study will illustrate that Ted Bundy, as a single case, is the prototypical violent sexual murderer. Moreover, the Ted Bundy case study provides a unique validation of violent sexual homicide classification theories by presenting a best fit in the classifications described as predatory.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hurricane Katrina","authors":"J. McClellan","doi":"10.1300/J460V01N04_03","DOIUrl":"https://doi.org/10.1300/J460V01N04_03","url":null,"abstract":"Abstract The paper presents an overview of higher education response to the training and educational needs of the emerging field of emergency and disaster management by exploring the deepening associations between FEMA and higher education, the recent lessons of the Katrina hurricane disaster and a general discussion of a “full measure” of the philosophy of higher education in action via the development of emergency and disaster educational programs. As a central fundamentally involved social vehicle and having a critical role in the development of citizens and leaders at all levels of private and government organizations, higher education must rise to the needs and challenges of its responsibility to educate, train, and support the first duty in emergency and disaster response. It's not just about tactics; it's about values through performance.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research Directions in Terrorism, Disaster, and Urban Security","authors":"E. Sternberg","doi":"10.1300/J460v01n04_05","DOIUrl":"https://doi.org/10.1300/J460v01n04_05","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117112417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interview with Robert A. Hair","authors":"John Kostanoski","doi":"10.1300/J460V01N04_04","DOIUrl":"https://doi.org/10.1300/J460V01N04_04","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125541938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Psychological Approaches to Understanding and Preventing Terrorism","authors":"A. Lemieux","doi":"10.1300/J460v01n04_07","DOIUrl":"https://doi.org/10.1300/J460v01n04_07","url":null,"abstract":"Abstract Although social psychologists have had a long-standing interest in intergroup relations and aggression, the attacks of September 11, 2001, and the ongoing threat of terrorism have prompted an exponential increase in the volume and breadth of related scholarship. Over the past several years, a distinct body of research has emerged to address the central questions of (1) who becomes a terrorist, (2) what motivates individuals to engage in terrorism, (3) responses to terrorism, and (4) steps to reduce the threat of terrorism in the future. Recent scholarship has started to adopt an increasingly interdisciplinary perspective, providing a more comprehensive frame of analysis including social, political, historical, cultural, and economic factors.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123064998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Codes","authors":"R. Theckethil","doi":"10.1300/J460v01n04_09","DOIUrl":"https://doi.org/10.1300/J460v01n04_09","url":null,"abstract":"Abstract Disaster management policies, often technocratic in scope and imagination, are characterized by a strong emphasis on physical vulnerability reduction through the adoption of stronger building codes, development regulations and land use planning methods like zoning and subdivision regulations. However, effectiveness of such measures in reducing disaster vulnerability depends on both the enforcement mechanism and the social, economic, political and cultural contexts within which such measures are operationalized. Through a detailed analysis of one such regulatory measure, building codes, this paper suggests that despite the criticisms of increased costs, prescriptive nature, non-participatory code-making process and other administrative hurdles associated with building codes, they could be modified to address such issues in innovative ways. This requires further exploration of performance-based building codes, institutional framework to ensure democratic and participatory code-making process and above all conscious efforts at the policy level to bridge the gap between technical expertise and experiential knowledge in order to enhance the role of building codes in reducing the vulnerability of urban areas.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"65 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129853693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systems Approach to Long-Term Urban Disaster Recovery","authors":"J. Steele, N. Verma","doi":"10.1300/J460v01n04_13","DOIUrl":"https://doi.org/10.1300/J460v01n04_13","url":null,"abstract":"Abstract This paper explores how a city can assess its disaster-prone nature and what it can do with the information it gathers. The authors propose three principles. These are: (1) Focusing on consequences rather than causes of disasters, (2) learning from similarities between disasters, and (3) taking a systems approach to recovery. A case study of disaster management in the city of Los Angeles illustrates the discussion.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128301959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Researching Terrorist Networks","authors":"Victor Asal, R. Rethemeyer","doi":"10.1300/J460v01n04_06","DOIUrl":"https://doi.org/10.1300/J460v01n04_06","url":null,"abstract":"Abstract While there has been a great deal of work on networks and their impact on governance, government and social movements, until the attacks against the United States in 2001 very few studies focused on what Raab and Milward call “Dark Networks” (2003). The attack on the United States illustrated how effectively tactical and strategic networks can exploit modern technology for violence. Since 2001, there has been a growing interest in the role that networks play in facilitating terrorist tactical and strategic behavior. Much of the network literature on terrorism has focused on the tactical importance of networks. Strategic terrorist networks (i.e., the relationships between and among terrorist organizations and the states that sponsor terrorism) are rarely, if ever, studied. In this paper, we give an overview of why terrorist networks are important, the major areas of investigation, and possible future areas of exploration.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security on Buses and Trains","authors":"D. B. Hess","doi":"10.1300/J460v01n04_11","DOIUrl":"https://doi.org/10.1300/J460v01n04_11","url":null,"abstract":"Abstract Public transit systems in the United States facilitate trade, business, and tourism, and buses and trains provide transportation for about 30 million riders each workday in large metropolitan areas, small cities, and rural places. For transit dependents, older adults, and those with mobility limitations, public transit provides a critical lifeline to work, shopping, healthcare, and socialization. Unlike aviation security, which was subject to mandated federal reform following the terrorist attacks of September 11, 2001, security reforms on public transit have been ad hoc, as the nation's several hundred transit systems are locally owned and controlled and subject only to federal oversight. During the last two years, the U.S. Department of Homeland Security and the FBI have issued warnings that extremists may attack public transit in the U.S. like they did on buses and tubes in London in July, 2005. Public transit is attractive to extremists for terror attacks—between 1991 and 2001, 42 percent of terror attacks worldwide were made on rail systems or buses—because the systems are located in central places, attract large crowds, and provide unrestricted access to all. To date, most of the federal antiterror funding for public transit has been spent on security awareness for front-line employees and first responders and incident management training. This article performs a literature review of past research and provides recommendations on needed research on technological innovations to prevent and thwart attacks, particularly those that begin to physically and technologically “close” public transit systems and reduce unrestricted access.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122542974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}