Criminology & Public Policy最新文献

筛选
英文 中文
Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers 为什么年轻人开始并继续进行道德黑客攻击?道德黑客生活中个人和社会方面的定性研究
IF 4.6 1区 社会学
Criminology & Public Policy Pub Date : 2023-10-11 DOI: 10.1111/1745-9133.12650
Judith E. Noordegraaf, Marleen Weulen Kranenbarg
{"title":"Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers","authors":"Judith E. Noordegraaf,&nbsp;Marleen Weulen Kranenbarg","doi":"10.1111/1745-9133.12650","DOIUrl":"10.1111/1745-9133.12650","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This qualitative interview study examined individual and social aspects in the lives of 15 hackers who started with ethical hacking before the age of 18. We examined what motivated and stimulated them to start with ethical hacking and how and why they continued. Results show that individual aspects, such as an early interest in ICT (Information and Communication Technology), the motivation to make systems more secure, and thinking of reporting vulnerabilities as a moral duty, contribute to the initiation of ethical hacking. Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers. Similarly, positive reactions from public and private system owners can further stimulate the development and self-image of ethical hackers.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>In contrast to criminal hackers, ethical hackers improve cybersecurity, for example, by reporting weaknesses or errors in computer systems. Nowadays, an increasing number of public and private organizations around the world are creating cybersecurity policies and practices around ethical hacking. The interest in hacking usually arises at an early age, making it important to gain knowledge about what stimulates and motivates young people to start and continue with ethical hacking, to inform these policies and practices. Our results show that recognition and reactions from system owners are important in the ethical hacking career. Our recommendations based on these results could stimulate more young people to take the ethical path. Simultaneously, this increases the security of public and private organizations, reducing opportunities for criminal hackers.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"803-824"},"PeriodicalIF":4.6,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“I knew it was a scam”: Understanding the triggers for recognizing romance fraud “我知道这是一个骗局”:了解识别浪漫骗局的诱因
IF 4.6 1区 社会学
Criminology & Public Policy Pub Date : 2023-10-06 DOI: 10.1111/1745-9133.12645
Cassandra Cross
{"title":"“I knew it was a scam”: Understanding the triggers for recognizing romance fraud","authors":"Cassandra Cross","doi":"10.1111/1745-9133.12645","DOIUrl":"10.1111/1745-9133.12645","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This article investigates the contributing factors (or triggers) to a realization of romance fraud victimization, based on 1015 reports lodged with Scamwatch (Australian online reporting portal for fraud) between July 2018 and July 2019 (inclusive). The article examines the free text narrative of each report to propose five discernible trigger categories: further requests for money; characteristics of communications; verification checks; an offender's action(s); and being told by a third party.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Based on a comprehensive understanding of these five categories, the article advocates for broader messaging approaches to encompass financial literacy and well-being, cyberliteracy and critical thinking skills, cybersecurity practices, and respectful and healthy relationships. Leveraging the use of these wider education and awareness campaigns could improve recognition of romance fraud. Importantly, it is suggested that banks and other financial institutions are in a strong position to focus their efforts on some of these broader messages to effect positive change.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"613-637"},"PeriodicalIF":4.6,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12645","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing nation-state-sponsored cyberattacks using aspects of Situational Crime Prevention 利用情景犯罪预防的各个方面评估国家支持的网络攻击
IF 4.6 1区 社会学
Criminology & Public Policy Pub Date : 2023-10-04 DOI: 10.1111/1745-9133.12646
Thomas J. Holt, Mae Griffith, Noah Turner, Emily Greene-Colozzi, Steven Chermak, Joshua D. Freilich
{"title":"Assessing nation-state-sponsored cyberattacks using aspects of Situational Crime Prevention","authors":"Thomas J. Holt,&nbsp;Mae Griffith,&nbsp;Noah Turner,&nbsp;Emily Greene-Colozzi,&nbsp;Steven Chermak,&nbsp;Joshua D. Freilich","doi":"10.1111/1745-9133.12646","DOIUrl":"10.1111/1745-9133.12646","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This study utilized a quantitative analysis of 246 cyberattack incidents reported in the Extremist CyberCrime Database to identify significant predictors of nation-state-sponsored cyberattacks relative to those performed by non-nation-state-sponsored ideological actors. Clarke and Newman's Situational Crime Prevention framework for terrorism was used to identify differential opportunities to successfully affect targets on the basis of tools, weapons, and the ability to access targets in online settings. The analysis noted nation-state-sponsored attacks were less likely to use high-visibility attack methods and more likely to utilize attack methods leading to data breaches. In addition, they were more likely to target state governments and military entities relative to ideological actors.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Nation-state attacks are more difficult to identify or mitigate while in process, requiring a more robust national cybersecurity policy framework to be implemented that moves beyond current practices. There is a need to better utilize all aspects of government, from legislation to grant funding, in order to deter cyberattacks from continuing into the future.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"825-848"},"PeriodicalIF":4.6,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12646","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Like aspirin for arthritis”: A qualitative study of conditional cyber-deterrence associated with police crackdowns on the dark web “就像阿司匹林治疗关节炎”:与警方打击暗网相关的条件网络威慑的定性研究
IF 4.6 1区 社会学
Criminology & Public Policy Pub Date : 2023-09-27 DOI: 10.1111/1745-9133.12642
David Décary-Hétu, Camille Faubert, Julien Chopin, Aili Malm, Jerry Ratcliffe, Benoît Dupont
{"title":"“Like aspirin for arthritis”: A qualitative study of conditional cyber-deterrence associated with police crackdowns on the dark web","authors":"David Décary-Hétu,&nbsp;Camille Faubert,&nbsp;Julien Chopin,&nbsp;Aili Malm,&nbsp;Jerry Ratcliffe,&nbsp;Benoît Dupont","doi":"10.1111/1745-9133.12642","DOIUrl":"10.1111/1745-9133.12642","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research summary</h3>\u0000 \u0000 <p>Crackdowns are law enforcement strategies based on the principles of deterrence theory, which stipulates that offenders are rational actors who will refrain from crime if perceived risks are higher than perceived benefits. Studies have shown that the effects of police street drug crackdowns are mostly short termed and followed by considerable displacement. In the early 2010s, an important part of illicit drug trades moved online to cryptomarkets, and law enforcement agencies have responded by engaging in online drug crackdowns. In this study, we focus on the perceptions of dark web users in order to determine, from a qualitative “data-driven” perspective, whether police online crackdowns may have a cyber-deterrent effect by analyzing 1796 forum posts. Our results show that these events trigger psychological and practical consequences that participants claim to have a conditional, although minor, deterrent effect. In the majority of cases, dark web users claimed to engage in several forms of spatial and tactical displacement.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy implications</h3>\u0000 \u0000 <p>Our study suggests that police crackdowns on the dark web have limited, short-term effectiveness in curbing illicit activities. It proposes that innovative policing approaches such as problem-oriented policing and “pulling levers/focused deterrence” strategies, which involve identifying key actors and engaging with them, be potentially extended to the dark web. While this approach is promising, it emphasizes the need for further research to assess its efficacy in the online realm, as it is a largely uncharted territory for law enforcement.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"639-664"},"PeriodicalIF":4.6,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12642","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does scientific research change minds? Linking criminology and public perceptions of policing 科学研究会改变人们的想法吗?将犯罪学与公众对警务的看法联系起来
IF 4.6 1区 社会学
Criminology & Public Policy Pub Date : 2023-09-24 DOI: 10.1111/1745-9133.12644
Hunter M. Boehme, Ian T. Adams, Christi Metcalfe, Peter Leasure, Melissa S. Nolan
{"title":"Does scientific research change minds? Linking criminology and public perceptions of policing","authors":"Hunter M. Boehme,&nbsp;Ian T. Adams,&nbsp;Christi Metcalfe,&nbsp;Peter Leasure,&nbsp;Melissa S. Nolan","doi":"10.1111/1745-9133.12644","DOIUrl":"10.1111/1745-9133.12644","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research summary</h3>\u0000 \u0000 <p>This study investigates the impact of scientific research findings on public views of policing topics. Specifically, we conducted an original survey experiment to determine whether research information treatments influence respondents’ views on the effectiveness of the police in reducing crime, defunding and refunding police budgets, and use of body-worn cameras. Our results indicated that presenting confirmatory research information had a significant positive impact on perceptions of police effectiveness in reducing crime and use of body-worn cameras compared to comparison groups. Conversely, presenting “negative” research information had a significant negative effect on these perceptions. Interestingly, neither positive nor negative research information treatments related to defunding versus refunding the police had a statistically significant impact on respondents compared to comparison groups, suggesting that research findings have limited effects on more ideologically complex policing topics.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy implications</h3>\u0000 \u0000 <p>Scientific research can effectively shape public perceptions of police effectiveness in reducing crime and the use of body-worn cameras, but it has limited effects on politically charged issues, such as defunding and refunding the police. To enhance the impact of evidence-based policing, we suggest that police administrators collaborate with researchers to evaluate new policies and disseminate these findings widely to the public. Additionally, researchers should strive to make their research more accessible to the general public, beyond academic journals, scientific conferences, and paywalls. We recommend using open-access platforms, social media, and other media outlets to disseminate unbiased, evidence-based research on policing that is digestible to the public.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 1","pages":"201-224"},"PeriodicalIF":4.6,"publicationDate":"2023-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12644","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effects of confessions on misconduct and guilty pleas in exonerations: Implications for discovery policies 供词对无罪释放中不当行为和认罪的影响:对发现政策的启示
IF 4.6 1区 社会学
Criminology & Public Policy Pub Date : 2023-09-20 DOI: 10.1111/1745-9133.12643
Talley Bettens, Allison D. Redlich
{"title":"The effects of confessions on misconduct and guilty pleas in exonerations: Implications for discovery policies","authors":"Talley Bettens,&nbsp;Allison D. Redlich","doi":"10.1111/1745-9133.12643","DOIUrl":"10.1111/1745-9133.12643","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>Using data from the National Registry of Exonerations, we examined how the presence of confession evidence impacts prosecutors’ tendency in order to (1) commit misconduct in any form (e.g., permitting perjury and witness tampering) and (2) specifically withhold exculpatory evidence (i.e., evidence favorable to the defense). We assess these relationships particularly in the context of wrongful convictions by guilty plea from an innocent individual (i.e., false guilty plea [FGP]) or guilty verdict at trial. We show the presence of false confessions increased the likelihood of (1) prosecutors engaging in misconduct generally and (2) prosecutors withholding exculpatory evidence specifically. However, the presence of prosecutorial misconduct and withholding evidence decreased the odds of a wrongful conviction via an FGP compared to wrongful conviction via guilty verdict.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Policies encouraging prosecutorial transparency and accountability are needed in order to better identify misconduct when it occurs, particularly in the context of guilty pleas. Open-file discovery policies, which aim to provide full transparency, may prevent prosecutors from intentionally or unintentionally withholding evidence when faced with strong evidence like a confession, which could ultimately decrease the potential of wrongful conviction.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 1","pages":"179-199"},"PeriodicalIF":4.6,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12643","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deregulation of public civilian gun carrying and violent crimes: A longitudinal analysis 1981–2019 放松对公众携带枪支和暴力犯罪的管制:1981年至2019年的纵向分析
IF 3.5 1区 社会学
Criminology & Public Policy Pub Date : 2023-09-19 DOI: 10.1111/1745-9133.12638
Mitchell L. Doucette, Cassandra K. Crifasi, Alex D. McCourt, Julie A. Ward, Rebecca L. Fix, Daniel W. Webster
{"title":"Deregulation of public civilian gun carrying and violent crimes: A longitudinal analysis 1981–2019","authors":"Mitchell L. Doucette,&nbsp;Cassandra K. Crifasi,&nbsp;Alex D. McCourt,&nbsp;Julie A. Ward,&nbsp;Rebecca L. Fix,&nbsp;Daniel W. Webster","doi":"10.1111/1745-9133.12638","DOIUrl":"10.1111/1745-9133.12638","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>We utilized the synthetic difference-in-difference method to estimate the impact of adopting a <i>permitless</i> concealed carry weapons (CCW) law on rates of assaults, robberies, and homicides committed with a firearm and by other means, as well as weapons arrests, from 1981 to 2019. We stratified <i>permitless</i> CCW laws by whether they previously prohibited violent misdemeanants from obtaining a CCW permit or previously required live firearm training to obtain a permit prior to law adoption. Findings robust to sensitivity analyses suggest that states that lost a training requirement to obtain a CCW permit had 21 additional gun assaults per 100,000 population (SE = 5.2) (32% increase).</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>In the wake of the Supreme Court's decision in <i>New York State Rifle &amp; Pistol Association, Inc. v. Bruen</i>, states should implement CCW permitting law provisions that may reduce the risk of firearm violence. Requiring live firearm training prior to carry a concealed weapon may attenuate negative health impacts of deregulation associated with <i>permitless</i> CCW laws.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 4","pages":"833-861"},"PeriodicalIF":3.5,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12638","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory 是什么促使用户采用网络安全做法?保护动机理论评估的调查实验
IF 4.6 1区 社会学
Criminology & Public Policy Pub Date : 2023-09-11 DOI: 10.1111/1745-9133.12641
Cassandra E. Dodge, Nathan Fisk, George W. Burruss, Richard K. Moule Jr., Chae M. Jaynes
{"title":"What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory","authors":"Cassandra E. Dodge,&nbsp;Nathan Fisk,&nbsp;George W. Burruss,&nbsp;Richard K. Moule Jr.,&nbsp;Chae M. Jaynes","doi":"10.1111/1745-9133.12641","DOIUrl":"10.1111/1745-9133.12641","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users’ self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"849-868"},"PeriodicalIF":4.6,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12641","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Firearm restrictions in domestic violence protection orders: Implementation, vetting, compliance, and enforcement 家庭暴力保护令中的火器限制:实施、审查、遵守和执行
IF 3.5 1区 社会学
Criminology & Public Policy Pub Date : 2023-09-06 DOI: 10.1111/1745-9133.12639
Alice M. Ellyson, Avanti Adhia, Sandra Shanahan, Aisha Alsinai, Lisa DiMascolo, Maxmilliaan Reygers, Deirdre Bowen, Ali Rowhani-Rahbar
{"title":"Firearm restrictions in domestic violence protection orders: Implementation, vetting, compliance, and enforcement","authors":"Alice M. Ellyson,&nbsp;Avanti Adhia,&nbsp;Sandra Shanahan,&nbsp;Aisha Alsinai,&nbsp;Lisa DiMascolo,&nbsp;Maxmilliaan Reygers,&nbsp;Deirdre Bowen,&nbsp;Ali Rowhani-Rahbar","doi":"10.1111/1745-9133.12639","DOIUrl":"10.1111/1745-9133.12639","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>We quantified the implementation of WA state's domestic violence (DV)-related firearm prohibitions (RCW9.41.800) by the courts and the Regional Domestic Violence Firearms Enforcement Unit (RDVFEU), a regional approach to compliance promotion. We measured implementation, vetting, compliance, and enforcement of firearm prohibitions before (2014–2016) and after (2018–2020) the RDVFEU was implemented using a 55% random sample of granted domestic violence protection orders (DVPOs) in King County, WA (<i>n</i> = 3543). We evaluated differences in judicial orders to surrender firearms and other dangerous weapons (OTSWs), respondent documented compliance, and respondent weapon and/or firearm relinquishment before and after implementation. Compared to DVPOs granted prior to RDVFEU implementation, granted DVPOs after RDVFEU implementation were at least 4.5 times more likely to include an OTSW. RDVFEU implementation was also associated with at least 3.4 times the odds of respondent documented compliance and at least 3.3 times the odds of respondent relinquishment of at least one firearm and/or other dangerous weapon. These findings demonstrate RDVFEU implementation was associated with benefits at each stage of the protection order process with improvements in both judicial enforcement and respondent compliance. Overall, RDVFEU implementation was associated with improvements in granted orders to surrender weapons, respondent compliance, and relinquishment.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>DV-related firearm prohibitions can be supported by interdisciplinary teams within the legal system to promote respondent compliance and enhance safety planning for DV victim–survivors.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 4","pages":"803-832"},"PeriodicalIF":3.5,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12639","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining the prevalence of experiencing sexual misconduct and reporting to Title IX and counseling services across student race/ethnicity: Findings from the 2019 Association of American Universities survey 调查学生种族/族裔的性行为不端、向第九章报告和咨询服务的发生率:2019年美国大学协会调查结果
IF 4.6 1区 社会学
Criminology & Public Policy Pub Date : 2023-08-30 DOI: 10.1111/1745-9133.12640
Tara N. Richards, Brittany E. Hayes
{"title":"Examining the prevalence of experiencing sexual misconduct and reporting to Title IX and counseling services across student race/ethnicity: Findings from the 2019 Association of American Universities survey","authors":"Tara N. Richards,&nbsp;Brittany E. Hayes","doi":"10.1111/1745-9133.12640","DOIUrl":"10.1111/1745-9133.12640","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>We examined the prevalence of experiencing sexual misconduct—rape, contact sexual violence, sexual harassment—in college and whether students reported to Title IX coordinators or campus counseling services by students’ race/ethnicity. Data from the 2019 Association of American Universities survey (unweighted <i>N</i> = 160,387) were used to estimate multilevel logistic regression models. Across this sample, 44.70% of students experienced sexual misconduct victimization; among victim-survivors who contacted a program, 19.85% reported to Title IX and 45.63% contacted campus counseling services. Black students did not significantly differ from White students in their experiences with sexual misconduct, yet Asian students were significantly less likely than White students to experience all types of sexual misconduct. Black and Asian students had lower odds of reporting sexual misconduct to Title IX (though results vary by type of misconduct), but Black students had higher odds of reporting to campus counseling services across all types of sexual misconduct.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Sexual misconduct victimization is a common experience for American college students. In response, decades of changes to federal and state laws and policies have focused on increasing reporting to campus Title IX coordinators; however, reporting to Title IX remains a rare occurrence. Reporting barriers are greatest among Black and Asian students. Campuses must address barriers in reporting to Title IX and do so in ways that are equitable for all students. Further, campuses must review their current and planned investment in counseling services and culturally centered services to ensure that they have the appropriate resources to serve students.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 1","pages":"153-177"},"PeriodicalIF":4.6,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12640","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信