• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 17
  • 13
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 44
  • 44
  • 36
  • 22
  • 20
  • 13
  • 11
  • 10
  • 10
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

AN EXPLORATORY STUDY OF INCAPACITATED PERSONS WITH CRIMINAL BEHAVIORS SERVED BY KENTUCKY’S PUBLIC GUARDIANSHIP PROGRAM

Martin, Karen 01 January 2017 (has links)
State run public guardianship programs are legally mandated to provide custodial care for persons deemed incapacitated by the courts. Historically, the majority of state wards were elderly women residing in skilled nursing facilities. Today, those demographics are rapidly changing. This new incapacitated cohort has become less institutionalized, with a rising number of persons who have entered the program with criminal records and who continue to commit crimes. This exploratory study focuses on incapacitated persons (IP) with criminal behaviors in order to seek what intervention(s) might reduce their criminal activity. Relying on routine activity theory, differing levels of supervision were compared to those persons institutionalized 24 hours per day. The results of the study indicated that as levels of residential supervision decrease, criminal activities significantly increase. This study can assist administrators of public guardianship programs better understanding the supervisory needs of their incapacitated citizens as well as improve safety precautions for their respective communities.
12

THE PREVENTION OF ONLINE INCEL RADICALIZATION : A SYSTEMATIC REVIEW

Kejser, Rikke January 2022 (has links)
In recent years, have the focus on Incels increased due to various deadly attacks that have been associated with extreme misogynistic content. This study aims to discuss current online prevention methods’ applicability with respect to Incels and to comprehend if online prevention methods can mitigate future attacks in Nordic countries. To provide knowledge of current online prevention methods a systematic literature review in accordance with the PRISMA was conducted. Several databases e.g., Google Scholar and PsycINFO were searched for articles published in peer-reviewed international journals. Ten articles which included online moderation measures regarding extremist content and Incels were admitted. Additionally, a non-systematic review was conducted in relation to reports regarding Incels published by Nordic organizations. Four reports were found. The Routine Activity Theory was then applied to the results from the papers found in the systematic and the non-systematic review. One limitation of the review is that only a few articles have been included which makes generalizability difficult. Numerous methods can be applied regarding Incels when it comes to online prevention measures. However, current methods seem to consist of a duplexity, where the moderation methods influence different SoMe platforms, but also create echo chambers on encrypted platforms where an increase of Incel radicalization materializes. To mitigate future attacks the use of proactive online prevention methods, e.g., detection tools and connectivity tools should be used by different platforms and law enforcement, as the capable guardian, to allocate imminent threats from Incels.
13

Self-Control and Youth Victimization in Saudi Arabia: A Test of the Generality Thesis

Chamberlin, Victoria A. 01 October 2019 (has links)
No description available.
14

How Central Business Districts Manage Crime and Disorder: A Case Study in the Processes of Place Management in Downtown Cincinnati

Monk, Khadija M. January 2012 (has links)
No description available.
15

Hot Spots of Robberies in the City of Malmö: A Qualitative Study of Five Hot Spots, Using the Routine Activity Theory, and Crime Pattern Theory

Dymne, Carl January 2017 (has links)
Studies about hot spots of crimes have found that crimes are clustered; few places have many crimes. There is a consensus among criminologists that opportunities for crimes are important when explaining hot spots, at some places, there are more opportunities than at other places. The same applies for hot spots of robberies. Most studies done on the subject are quantitative, relatively little is done using a qualitative approach. Furthermore, little research is done in a Swedish or Scandinavian context. To fill these research gaps this study use participant observations to research five hot spots of robberies in Malmö. The research will try to answer which characteristics are important to explain why the places are hot spots and what the similarities and differences there between the places are. This will be analyzed using the Routine Activity Theory and the Crime Pattern Theory. The findings suggest that place-specific things are important to explain why the places are hot spots, but when using the theories several places are similar.
16

Firearm Lethality In Drug Market Contexts

McCutcheon, James 01 January 2013 (has links)
The current study examines firearms’ impact on the relationship between illegal drug markets and homicide. At the county-level, Iowa and Virginia are analyzed using crime data from the National Incident Based Reporting System. More specifically, gun availability is tested as a mediator for county drug crime rates and homicide counts. Variable selection and prediction is based on routine activity and social disorganization theories. I argue that social disorganization allows the context for which criminal opportunity presents itself through routine activities. I posit gun availability mediates a positive relationship between illegal drug markets and homicide, with differences between urban and rural communities
17

The American Serial Rapist: 1940-2010

Wright, Lauren E. 12 June 2014 (has links)
No description available.
18

A View from the Top: Managers’ Perspectives on the Problem of Employee Theft in Small Businesses

Kennedy, Jay P. 18 September 2014 (has links)
No description available.
19

Spatial Adaptive Crime Event Simulation With RA/CA/ABM Computational Laboratory

Wang, Xuguang 31 May 2005 (has links)
No description available.
20

Vulnerability, Victimization and VIVA: A Cluster Analysis of Cross-National Human Trafficking Victims

Kidd, Rachel Marie 11 May 2021 (has links)
Human trafficking, the cruel and inhumane crime that it is, exploits the lives of millions of people around the world. My study explores the common vulnerabilities that exist for victims of cross-national human trafficking. First, I analyze literature discussing individual and country- level victim demographics to identify characteristics that predict recruitment or abduction into human trafficking. Using the 2017 Counter Trafficking Data Collaborative, I demonstrate the applicability of Cohen and Felson's 1979 Routine Activity Theory (RAT) to explain the vulnerabilities to victimization further. More specifically, I use VIVA to assess the methods of control and types of exploitation utilized by domestic and international traffickers. A sociological study that combines the work of RAT and VIVA in relation to human trafficking victimization is yet to exist, therefore I am seeking to fill this research gap. The overarching goal of this study is to form a victim profile through cluster analysis and logistic regression in order to locate the unique patterns of victimization. My findings demonstrate that there is a significant relationship between the three clusters formed, the methods of control used by the perpetrator (physical, psychological, and economic abuse), and the types of exploitation suffered by the victim (sexual and labor exploitation). / Master of Science / Human trafficking is the abduction and exploitation of individuals, in which victims are manipulated into sex or labor trafficking in unfamiliar environments without compensation. Trafficking occurs beyond national borders, therefore I look at victims originating from all over the globe. The literature I utilize looks at individual-level demographics and national-level characteristics. I then use a database to link certain social and theoretical elements of these demographics and characteristics to the methods of control and types of exploitation traffickers enforce upon their victims. Overall, this study forms a victim profile and locates the unique patterns of trafficking victimization through multiple data applications. My thesis concludes with findings on clusters that combine age, gender, recruiter relations, literacy rates, and trafficking laws and regressions that link these clusters to physical, psychological, and economic control as well as sexual and labor exploitation.

Page generated in 0.083 seconds