Sharon S. Oselin, Justine G. M. Ross, Qingfang Wang, Wei Kang
{"title":"Fair Chance Act failures? Employers’ hiring of people with criminal records","authors":"Sharon S. Oselin, Justine G. M. Ross, Qingfang Wang, Wei Kang","doi":"10.1111/1745-9133.12655","DOIUrl":"10.1111/1745-9133.12655","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research summary</h3>\u0000 \u0000 <p>We examine the efficacy of the California Fair Chance Act (CFCA) policy—legislative stipulations regarding employers’ hiring of individuals with criminal records—on practices and outcomes in two Southern California counties during 2021. We rely on survey and experiment data with 542 hiring decision makers to investigate employer and personal compliance with the CFCA, whether applicant appeals affect employers’ willingness to hire them, and heterogeneity in treatment effects across firms and industries. Close to 80% of hiring decision makers violate the CFCA by obtaining background information before they extend an offer, appeals have a minimal impact on hiring outcomes, and firm-level characteristics continue to shape hiring practices to some extent.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy implications</h3>\u0000 \u0000 <p>Although certain firms comply with the relatively new CFCA, most employers violate it by seeking applicant criminal background information, a practice that has profound consequences for those with criminal records as well as other disadvantaged groups. This finding underscores the discrepancy between de jure and de facto policy practices. Better statewide enforcement of the CFCA coupled with increased employer educational training could help reform it and improve policy adherence. Given it is a young policy, future research should continue to assess the CFCA's efficacy over time.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 2","pages":"361-390"},"PeriodicalIF":4.6,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12655","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138442790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eric L. Piza, David N. Hatten, George O. Mohler, Jeremy G. Carter, Jisoo Cho
{"title":"Gunshot detection technology effect on gun violence in Kansas City, Missouri: A microsynthetic control evaluation","authors":"Eric L. Piza, David N. Hatten, George O. Mohler, Jeremy G. Carter, Jisoo Cho","doi":"10.1111/1745-9133.12648","DOIUrl":"10.1111/1745-9133.12648","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>We apply the microsynthetic control method to evaluate the gun violence prevention effect of gunshot detection technology (GDT) in Kansas City, MO. We measure the influence of GDT on process measures (ballistic evidence collection and gun recoveries) and outcome measures (shots fired calls for service, non-fatal shootings, fatal shootings, and aggravated assaults and robberies committed with a firearm). The GDT system was associated with higher levels of ballistic evidence collection in the GDT target area and surrounding catchment area, higher levels of gun recoveries in the surrounding catchment area, and lower levels of shots fired calls for service in the GDT target area. The GDT system did not influence any of the gun violence categories involving confirmed victims (non-fatal shootings, fatal shootings, and aggravated assaults and robberies committed with a firearm).</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Agencies that highly prioritize increasing evidence collection and reducing unauthorized firearm discharges may consider dedicating necessary resources to acquire GDT. Agencies that prioritize the reduction of gun violence victimization, however, should consider whether resources are better used for solutions other than GDT. Moving forward, violence prevention scholars should strive to identify contextual factors that facilitate or mitigate the GDT system effect, in an attempt to better understand how to deploy GDT in a manner that maximizes the likelihood of success. This would provide additional guidance to public safety agencies looking to maximize return on investment. Continued adoption of GDT should perhaps be contingent upon the development of such research, given the high cost of the technology.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 4","pages":"863-892"},"PeriodicalIF":3.5,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12648","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138442842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On guard but not sworn: The relationship between school security guards, school resource officers, and student behavior, discipline, and arrests","authors":"Keenen Vernon, F. Chris Curran","doi":"10.1111/1745-9133.12653","DOIUrl":"10.1111/1745-9133.12653","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>The increasing presence of armed security personnel in schools has led to concerns about the criminalization of students. While many schools use sworn law enforcement (e.g. school resource officers or SROs), many schools also use security guards who are not sworn law enforcement. Recent policy changes in a number of states and political pressures resulting from acts of mass school violence have led policymakers to face decisions between the use of SROs and security guards. This study informs this policy debate by empirically examining the relationships between security guards and SROs with rates of student behavior, discipline, and arrest using nationally representative data from the Civil Rights Data Collection. Controlling for observable covariates and school district fixed effects, we find that, in contrast to SROs, the use of security guards in schools is not systematically related to student arrest or suspension rates. The findings suggest that non-sworn security guards may provide a form of security personnel that minimizes the criminalization of students relative to SROs.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>As school districts nationwide grapple with how to respond to school shootings and other acts of school violence, policymakers have frequently turned to the use of school security personnel, including SROs and security guards, as a response. Doing so, however, has been contentious given concerns about the overcriminalization of students. This study provides evidence to inform these policy debates by demonstrating the relationships between security guards and SROs and a number of outcomes. The results suggest that the use of security guards as a policy response may minimize arrests and exclusionary discipline relative to the use of SROs.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 2","pages":"327-360"},"PeriodicalIF":4.6,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138442789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effect of online ad campaigns on DDoS-attacks: A cross-national difference-in-differences quasi-experiment","authors":"Asier Moneva, Rutger Leukfeldt","doi":"10.1111/1745-9133.12649","DOIUrl":"10.1111/1745-9133.12649","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>European law enforcement agencies have begun to use targeted online ad campaigns to raise cybercrime awareness among at-risk populations. Despite their rapid proliferation, there is little research to support their efficacy and effectiveness. This study uses a quasi-experimental difference-in-differences design to evaluate the effect of seven campaigns deployed in 2021 and 2022 on the volume of (distributed) denial-of-service or (D)DoS-attacks recorded in six European countries: Denmark, Finland, the Netherlands, Norway, Sweden, and Portugal. The results show mixed effects, suggesting that the campaigns are not clearly effective in reducing DDoS-attacks in the short term.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Law enforcement has partly justified the use of targeted online ad campaigns on the premise that they reduce DDoS-attacks. However, this study shows that the evidence in this regard is inconclusive. If public support for the use of such campaigns is to be secured in the long term, law enforcement will likely need to rely on stronger arguments. The effect of this type of campaigns needs to be further investigated.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"869-894"},"PeriodicalIF":4.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12649","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Priyanka Goonetilleke, Alex Knorre, Artem Kuriksha
{"title":"Hydra: Lessons from the world's largest darknet market","authors":"Priyanka Goonetilleke, Alex Knorre, Artem Kuriksha","doi":"10.1111/1745-9133.12647","DOIUrl":"10.1111/1745-9133.12647","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>We present a comprehensive description of Hydra, the largest darknet marketplace in the world until its shutdown in April 2022. We document the main features of Hydra such as dead-drop delivery, feedback and reputation system, escrow, and dispute resolution. Using data scraped from the platform, we quantitatively examine the scale and the structure of the marketplace. We find that it has been highly competitive, geographically covering at least 69% of the Russian population and trading a wide variety of drugs, while also allowing the wholesale trade of drugs and precursors. The dead-drop delivery system used on Hydra was expensive, as the courier costs comprised a substantial proportion of the sale price of drugs on Hydra. We contribute to the research on drug cryptomarkets by studying an unprecedentedly large non-Western marketplace that existed substantially longer than any other known darknet market.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>The phenomenon of Hydra shows that shut-down policies applied to darknet marketplaces have a large effect and implicitly shape the whole drug market. Without these policies, a pervasive digitalization of the drug trade can occur. The major cost of allowing marketplaces to grow is the probable increase in the consumption of illegal drugs due to convenience for consumers and facilitated cooperation between suppliers. This cost must be weighed against the potential benefits, including a higher quality of drugs, a decrease in potential violence, and the incentives for a large marketplace to self-regulate. The case of Hydra also suggests the relevance of financial regulation to limit the growth of darknet marketplaces.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"735-777"},"PeriodicalIF":4.6,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12647","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cynthia Lum, Christopher S. Koper, Jin R. Lee, Thomas J. Holt
{"title":"","authors":"Cynthia Lum, Christopher S. Koper, Jin R. Lee, Thomas J. Holt","doi":"10.1111/1745-9133.12654","DOIUrl":"https://doi.org/10.1111/1745-9133.12654","url":null,"abstract":"","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"589-590"},"PeriodicalIF":4.6,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"109171869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An examination of harm reduction strategies in Oxycodone and Adderall buyer feedback on AlphaBay","authors":"Kenji Logie, Katheryne Pugliese, Alexis Acevedo","doi":"10.1111/1745-9133.12652","DOIUrl":"10.1111/1745-9133.12652","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research summary</h3>\u0000 \u0000 <p>Darknet marketplaces (DNMs) are global digital marketplaces used primarily to buy and sell illicit drugs online. High rates of adulterated substances have contributed to the creation of harm reduction policies by DNM administrators to address growing rates of overdose worldwide. This paper explores the extent to which harm reduction occurs in buyer feedback of Adderall and Oxycodone purchased on AlphaBay and how these comments are impacted by AlphaBay's administrator-led “harm reduction” policy. This study finds that harm reduction strategies are present in buyer feedback of Oxycodone and Adderall pills, but AlphaBay's policy has very little impact on the preexisting harm reduction communication within buyer feedback.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy implications</h3>\u0000 \u0000 <p>International policy proposals have placed emphasis on addressing the overdose crisis through harm reduction programs that provide people who use drugs with the necessary services and resources to buy and use drugs safely. There have been very few proposals that have considered how these programs can address the unique setting of buying and using drugs purchased on DNMs. Communication occurring among DNM buyers reveals how harm reduction strategies are being employed by users purchasing drugs from DNMs. In particular, these findings offer insight into the shared experiences of drug buyers in anonymous settings and the strategies they are using to protect one another from overdose and other unwanted side effects often caused by adulterated substances. Understanding these strategies highlights the ways in which street-based harm reduction programs can extend their services to online environments to assist buyers with making safe and informed decisions when using substances purchased online.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"695-733"},"PeriodicalIF":4.6,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12652","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding markers of trust within the online stolen data market: An examination of vendors’ signaling behaviors relative to product price point","authors":"Jin R. Lee","doi":"10.1111/1745-9133.12651","DOIUrl":"10.1111/1745-9133.12651","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>The current study examined 1055 stolen data products across 40 vendors on the Open and Dark Web to determine whether different product- and vendor-level behaviors predicted vendors’ trustworthiness as reflected in their product price point. Understanding the mechanisms that convey trust in the underground marketplace is crucial as it could help law enforcement target serious actors and disrupt the larger marketplace. Findings suggest the online stolen data market may resemble an uninformative cost condition where buyers are unable to accurately differentiate credible sellers due to the obscure nature of signaling behaviors.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Law enforcement would benefit from designing fake shops and deceptive forum posts that transmit mixed signals to complicate market participants’ process of interpreting trust signals as intended. These interventions would generate high levels of risk that encourage both buyers and sellers to exit the online illicit marketplace without needing law enforcement arrests. Law enforcement could also target prominent market facilitators to generate a larger disruption that prevents actors from continuing their illicit behavior.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"665-693"},"PeriodicalIF":4.6,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12651","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers","authors":"Judith E. Noordegraaf, Marleen Weulen Kranenbarg","doi":"10.1111/1745-9133.12650","DOIUrl":"10.1111/1745-9133.12650","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This qualitative interview study examined individual and social aspects in the lives of 15 hackers who started with ethical hacking before the age of 18. We examined what motivated and stimulated them to start with ethical hacking and how and why they continued. Results show that individual aspects, such as an early interest in ICT (Information and Communication Technology), the motivation to make systems more secure, and thinking of reporting vulnerabilities as a moral duty, contribute to the initiation of ethical hacking. Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers. Similarly, positive reactions from public and private system owners can further stimulate the development and self-image of ethical hackers.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>In contrast to criminal hackers, ethical hackers improve cybersecurity, for example, by reporting weaknesses or errors in computer systems. Nowadays, an increasing number of public and private organizations around the world are creating cybersecurity policies and practices around ethical hacking. The interest in hacking usually arises at an early age, making it important to gain knowledge about what stimulates and motivates young people to start and continue with ethical hacking, to inform these policies and practices. Our results show that recognition and reactions from system owners are important in the ethical hacking career. Our recommendations based on these results could stimulate more young people to take the ethical path. Simultaneously, this increases the security of public and private organizations, reducing opportunities for criminal hackers.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"803-824"},"PeriodicalIF":4.6,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“I knew it was a scam”: Understanding the triggers for recognizing romance fraud","authors":"Cassandra Cross","doi":"10.1111/1745-9133.12645","DOIUrl":"10.1111/1745-9133.12645","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This article investigates the contributing factors (or triggers) to a realization of romance fraud victimization, based on 1015 reports lodged with Scamwatch (Australian online reporting portal for fraud) between July 2018 and July 2019 (inclusive). The article examines the free text narrative of each report to propose five discernible trigger categories: further requests for money; characteristics of communications; verification checks; an offender's action(s); and being told by a third party.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Based on a comprehensive understanding of these five categories, the article advocates for broader messaging approaches to encompass financial literacy and well-being, cyberliteracy and critical thinking skills, cybersecurity practices, and respectful and healthy relationships. Leveraging the use of these wider education and awareness campaigns could improve recognition of romance fraud. Importantly, it is suggested that banks and other financial institutions are in a strong position to focus their efforts on some of these broader messages to effect positive change.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"613-637"},"PeriodicalIF":4.6,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12645","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}