Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in diversity
Girlfighting: Betrayal and Rejection among Girls

BY Lyn Mikel Brown

For some time, reality TV, talk shows, soap-operas, and sitcoms have turned their spotlights on women and girls who thrive on competition and nastiness. Few fairytales lack the evil stepmother, wicked witch, or jealous sister. Even cartoons feature mean and sassy girls who only become sweet and innocent when adults appear. And recently, popular books and magazines have turned their gaze away from ways of positively influencing girls' independence and self-esteem and towards the topic of girls' meanness to other girls. What does this say about the way our culture views girlhood? How much do these portrayals affect the way girls view themselves?

In Girlfighting, psychologist and educator Lyn Mikel Brown scrutinizes the way our culture nurtures and reinforces this sort of meanness in girls. She argues that the old adage “girls will be girls”—gossipy, competitive, cliquish, backstabbing— and the idea that fighting is part of a developmental stage or a rite-of-passage, are not acceptable explanations. Instead, she asserts, girls are discouraged from expressing strong feelings and are pressured to fulfill unrealistic expectations, to be popular, and struggle to find their way in a society that still reinforces gender stereotypes and places greater value on boys. Under such pressure, in their frustration and anger, girls (often unconsciously) find it less risky to take out their fears and anxieties on other girls instead of challenging the ways boys treat them, the way the media represents them, or the way the culture at large supports sexist practices.

Girlfighting traces the changes in girls' thoughts, actions and feelings from childhood into young adulthood, providing the developmental understanding and theoretical explanation often lacking in other conversations. Through interviews with over 400 girls of diverse racial, economic, and geographic backgrounds, Brown chronicles the labyrinthine journey girls take from direct and outspoken children who like and trust other girls, to distrusting and competitive young women. She argues that this familiar pathway can and should be interrupted and provides ways to move beyond girlfighting to build girl allies and to support coalitions among girls.

By allowing the voices of girls to be heard, Brown demonstrates the complex and often contradictory realities girls face, helping us to better understand and critique the socializing forces in their lives and challenging us to rethink the messages we send them.

New York; London: NYU Press, 2003. 259p.

download
Why Girls Fight: Female Youth Violence in the Inner City

By Cindy D. Ness

In low-income U.S. cities, street fights between teenage girls are common. These fights take place at school, on street corners, or in parks, when one girl provokes another to the point that she must either “step up” or be labeled a “punk.” Typically, when girls engage in violence that is not strictly self-defense, they are labeled “delinquent,” their actions taken as a sign of emotional pathology. However, in Why Girls Fight, Cindy D. Ness demonstrates that in poor urban areas this kind of street fighting is seen as a normal part of girlhood and a necessary way to earn respect among peers, as well as a way for girls to attain a sense of mastery and self-esteem in a social setting where legal opportunities for achievement are not otherwise easily available.
Ness spent almost two years in west and northeast Philadelphia to get a sense of how teenage girls experience inflicting physical harm and the meanings they assign to it. While most existing work on girls’ violence deals exclusively with gangs, Ness sheds new light on the everyday street fighting of urban girls, arguing that different cultural standards associated with race and class influence the relationship that girls have to physical aggression.

New York; London: NYU Press, 2010. 198p.

download
Breaking the Devil's Pact: The Battle to Free the Teamsters from the Mob

By  James B. Jacobs and Kerry T. Cooperman

In 1988, Manhattan U.S. Attorney Rudy Giuliani brought a massive civil racketeering suit against the leadership of the International Brotherhood of Teamsters (IBT), at the time possibly the most corrupt union in the world. The lawsuit charged that the mafia had operated the IBT as a racketeering enterprise for decades, systematically violating the rights of members and furthering the interests of organized crime. On the eve of trial, the parties settled the case, and twenty years later, the trustees are still on the job.

Breaking the Devil’s Pact is an in-depth study of the U.S. v. IBT, beginning with Giuliani’s lawsuit and the politics surrounding it, and continuing with an incisive analysis of the controversial nature of the ongoing trusteeship. James B. Jacobs and Kerry T. Cooperman address the larger question of the limits of legal reform in the American labor movement and the appropriate level of government involvement.

New York; London: NYU Press, 2011. 320p.

download
A New Nonmandated Program for People Who Cause Intimate Partner Violence: Subtitle Findings from an Implementation Assessment in New York City

By Storm ErvinSusan NembhardClaudia Nmai

In 2020, the New York City Mayor’s Office for Economic Opportunity, the New York City Human Resources Administration, and the Mayor’s Office to End Domestic and Gender-Based Violence funded the Urban Institute to conduct an implementation assessment of the Respect and Responsibility (R&R) demonstration project, a free nonmandated program for people who cause intimate partner violence (IPV). The majority of intervention programs for people who cause IPV—batterer intervention programs, also called abusive partner intervention programs—are court-mandated and for people who are in the criminal legal system as a result. The challenge with mandating IPV intervention programs for harm doers is that IPV needs to be reported to law enforcement in order for a court mandate to occur and, often, IPV goes unreported. To date, the Respect and Responsibility demonstration project is the first program in New York City to operate as a non mandated intervention program for those who have caused harm or are causing harm in their intimate relationships.

Washington, DC: Urban Institute. 2024, 44pg

download
The Sex Offender Housing Dilemma: Community Activism, Safety, and Social Justice

By Monica Williams

The controversy surrounding community responses to housing for sexually violent predators When a South Carolina couple killed a registered sex offender and his wife after they moved into their neighborhood in 2013, the story exposed an extreme and relatively rare instance of violence against sex offenders. While media accounts would have us believe that vigilantes across the country lie in wait for predators who move into their neighborhoods, responses to sex offenders more often involve collective campaigns that direct outrage toward political and criminal justice systems. No community wants a sex offender in its midst, but instead of vigilantism, Monica Williams argues, citizens often leverage moral, political, and/or legal authority to keep these offenders out of local neighborhoods. Her book, the culmination of four years of research, 70 in-depth interviews, participant observations, and studies of numerous media sources, reveals the origins and characteristics of community responses to sexually violent predators (SVP) in the U.S. Specifically, The Sex Offender Housing Dilemma examines the placement process for released SVPs in California and the communities’ responses to those placements. Taking the reader into the center of these related issues, Monica Williams provokes debate on the role of communities in the execution of criminal justice policies, while also addressing the responsibility of government institutions to both groups of citizens. The Sex Offender Housing Dilemma is sure to promote increased civic engagement to help strengthen communities, increase public safety, and ensure government accountability.

New York; London: New York University Press, 2018. 288p.

download
Homicide among Indigenous females in North Carolina: a comparison of publicly generated data and violent death reporting system

By Muhammad Hudhud, Scott Proescholdbell, Tammy Norwood, Crystal Cavalier-Keck, Ronny A Bel

Like other minoritized populations, American Indian/Alaska Native (AI/AN) females experience disparate morbidity and mortality outcomes to that of the general US population. This study identified discrepancies in reporting of AI/AN female decedents between the North Carolina Violent Death Reporting System (NC-VDRS) and an online, user-generated database. Female AI/AN decedent data of all ages were collected from the NC-VDRS and compared against that of the publicly available North Carolina Missing and Murdered Indigenous Women (MMIW NC) database for the study period, 2004–2019. Twenty-four of the 72 cases matched between data systems (33.3%). Substantive differences between the NC-VDRS and the MMIW NC database were found. Future efforts should be directed towards supporting Indigenous communities with the comprehensive data the NC-VDRS can provide. This paper highlights statewide public health systems like the NC-VDRS supporting community efforts to understand, advocate for, and disseminate information on MMIW.

Forensic Sciences Research, Volume 9, Issue 1. March 2024, 3pg

download
The “Webification” of Jihadism: Trends in the Use of Online Platforms, Before and After Attacks by Violent Extremists in Nigeria

By Folahanmi Aina and John Sunday Ojo

Violent extremist organisations (VEOs) use social media platforms to promote extremist content and coordinate agendas.  The use of digital platforms to disseminate information and coordinate activities by VEOs in Nigeria has grown considerably in recent years. This report analyses the adoption of social media before and after attacks by Boko Haram, Islamic State of West Africa Province (ISWAP) and Ansaru. In the post-attack environment, Boko Haram, ISWAP and Ansaru use platforms to claim responsibility and display their strengths against the state’s security forces. By demonstrating their capacity to attack state security forces, the three groups aim to erode the public’s confidence in the state military’s capacity to safeguard national security. The key findings of this report are as follows: Boko Haram, ISWAP and Ansaru previously leveraged popular social media platforms, including YouTube, Facebook, Telegram and Instagram. These platforms were used to promote propaganda and create awareness regarding upcoming attacks. However, all three groups have now had their use of these platforms restricted or banned. ISWAP has switched to using WhatsApp as a secure platform for communication before, during and after attacks. Rocket.Chat and Telegram have also been instrumental in ISWAP’s information dissemination. Boko Haram uses Telegram to share its activities in the pre-attack and post-attack environments. Ansaru has yet to appear on social media platforms due to its underground activities, which are hard to monitor. The recent acquisition of high-speed satellite internet has enhanced ISWAP’s communication with its audience and enabled coordinated attacks. Combating the exploitation of social media platform by VEOs requires a multidimensional approach. Effective collaboration with technology companies becomes imperative to identify extremist content. Building technological infrastructure for the state requires synergistic collaboration with the military and intelligence agencies to enable the removal of extremism from social media platforms. Devising multilingual and specialised algorithms to detect coded extremism messages and audio-visual content is essential for effective counter-extremism digital architecture. Investing in current technology through research and algorithm development must be prioritised to identify violent extremist content in Nigeria and beyond.

London: Global Network on Extremism & Technology, 2023. 30p.

download
Whose History? How Textbooks Can Erase the Truth and Legacy of Racism

By Jakiyah Bradley

In recognition of Black History Month, this TMI brief examines the ramifications of attempts by anti-truth groups to remove or whitewash our nation’s history and legacy of racism from K-12 public school classrooms. The Legal Defense Fund (LDF) fights tirelessly for safe, inclusive, and high-quality education, and we believe that proper education requires an honest, accurate, and comprehensive understanding of our past to create a more just and inclusive future. The current efforts to silence discussions on race and its intersections with inequalities based on sexuality and gender are not the first attempts to distort and erase U.S. history. This is a centuries old war on truth that continues to evolve. Today’s attacks on truth are born out of a broader history where a small minority tries to use their power and privilege to eclipse racial justice progress. One way in which truth is attacked is through controlling the narratives told in children’s history textbooks, a practice dating back to the U.S. Civil War.

New York: NAACP Legal Defense Fund , Thurgood Marshall Institute, 2023, 12p

download
Bullied: The Story of an Abuse

By Jonathan Alexander

"What happens when the defining moment of your life might be a figment of your imagination? How do you understand — and live with — definitive feelings of having been abused when the origin of those feelings won’t adhere to a singular event but are rather diffused across years of experience? In Bullied: The Story of an Abuse, Jonathan Alexander meditates on how, as a young man, he struggled with the realization that the story he’d been telling himself about being abused by a favorite uncle as a child might actually just have been a “story” — a story he told himself and others to justify both his lifelong struggle with anxiety and to explain his attraction to other men. Story though it was, Alexander maintains that some form of abuse did occur. In writing that is at turns reflective, analytic, and hallucinatory, Alexander traces what it means to suffer homophobic abuse when such is diffused across multiple actors and locales, implicating a family, a school, a culture, and a politics — as opposed to a singular individual who just happened to be the only openly gay man in young Alexander’s life. Along the way, Alexander reflects on Jussie Smollett, drug abuse, MAGA-capped boys, sadomasochism, Catholic priests, cruising, teaching young adult fiction about rape, and a host of other oddly but intimately related topics."

Brooklyn, NY: punctum books, 2021. 182p.

Download
Exploring Data Augmentation for Gender-Based Hate Speech Detection

By Muhammad Amien Ibrahim, Samsul Arifin and Eko Setyo Purwanto

Social media moderation is a crucial component to establish healthy online communities and ensuring online safety from hate speech and offensive language. In many cases, hate speech may be targeted at specific gender which could be expressed in many different languages on social media platforms such as Indonesian Twitter. However, difficulties such as data scarcity and the imbalanced gender-based hate speech dataset in Indonesian tweets have slowed the development and implementation of automatic social media moderation. Obtaining more data to increase the number of samples may be costly in terms of resources required to gather and annotate the data. This study looks at the usage of data augmentation methods to increase the amount of textual dataset while keeping the quality of the augmented data. Three augmentation strategies are explored in this study: Random insertion, back translation, and a sequential combination of back translation and random insertion. Additionally, the study examines the preservation of the increased data labels. The performance result demonstrates that classification models trained with augmented data generated from random insertion strategy outperform the other approaches. In terms of label preservation, the three augmentation approaches have been shown to offer enough label preservation without compromising the meaning of the augmented data. The findings imply that by increasing the amount of the dataset while preserving the original label, data augmentation could be utilized to solve issues such as data scarcity and dataset imbalance.

United States, Journal Of Computer Science. 2023, 9pg

download
Futureproof: Security Aesthetics and the Management of Life

Editor(s): D. Asher Ghertner, Hudson McFann, Daniel M. Goldstein

Security is a defining characteristic of our age and the driving force behind the management of collective political, economic, and social life. Directed at safeguarding society against future peril, security is often thought of as the hard infrastructures and invisible technologies assumed to deliver it: walls, turnstiles, CCTV cameras, digital encryption, and the like. The contributors to Futureproof redirect this focus, showing how security is a sensory domain shaped by affect and image as much as rules and rationalities. They examine security as it is lived and felt in domains as varied as real estate listings, active-shooter drills, border crossings, landslide maps, gang graffiti, and museum exhibits to theorize how security regimes are expressed through aesthetic forms. Taking a global perspective with studies ranging from Jamaica to Jakarta and Colombia to the U.S.-Mexico border ;Futureproof expands our understanding of the security practices, infrastructures, and technologies that pervade everyday life.

Contributors: Victoria Bernal, Jon Horne Carter, Alexandra Demshock, Zaire Z. Dinzey-Flores, Didier Fassin, D. Asher Ghertner, Daniel M. Goldstein, Rachel Hall, Rivke Jaffe, Ieva Jusionyte, Catherine Lutz, Alejandra Leal Martínez, Hudson McFann, Limor Samimian-Darash, AbdouMaliq Simone, Austin Zeiderman

Durham, NC: Duke University Press, 2020. 312p.

Download
Justice and Human Rights in the African Imagination: We, Too, Are Humans

By Chielozona Eze

Justice and Human Rights in the African Imagination is an interdisciplinary reading of justice in literary texts and memoirs, films, and social anthropological texts in postcolonial Africa.  Inspired by Nelson Mandela and South Africa’s robust achievements in human rights, this book argues that the notion of restorative justice is integral to the proper functioning of participatory democracy and belongs to the moral architecture of any decent society. Focusing on the efforts by African writers, scholars, artists, and activists to build flourishing communities, the author discusses various quests for justice such as environmental justice, social justice, intimate justice, and restorative justice. It discusses in particular ecological violence, human rights abuses such as witchcraft accusations, the plight of people affected by disability, homophobia, misogyny, and sex trafficking, and forgiveness.  This book will be of interest to scholars of African literature and films, literature and human rights, and literature and the environment.

Abington, Oxon, UK: New York: Routledge,    185p.

download
Male witches in early modern Europe

 By Lara Apps and Andrew Gow  

Gender at stake critiques historians' assumptions about witch-hunting as well as their explanations for this complex and perplexing phenomenon. The authors insist on the centrality of gender, tradition and ideas about witches in the construction of the witch as a dangerous figure. They challenge the marginalisation of male witches by feminist and other historians. The book shows that large numbers of men were accused of witchcraft in their own right, in some regions, more men were accused than women. The authors analyse ideas about witches and witch prosecution as gendered artefacts of patriarchal societies under which both women and men suffered. They challenge recent arguments and current orthodoxies by applying crucial insights from feminist scholarship on gender to a selection of statistical arguments, social-historical explanations, traditional feminist history and primary sources, including trial records and demonological literature. The authors assessment of current orthodoxies concerning the causes and origins of witch-hunting will be of particular interest to scholars and students in undergraduate and graduate courses in early modern history, religion, culture, gender studies and methodology.

Manchester, UK: Manchester University Press, 2003. 201p

download
Fantasies of Gender and the Witch in Feminist Theory and Literature

By Justyna Sempruch

In Fantasies of Gender and the Witch in Feminist Theory and Literature, Justyna Sempruch analyzes contemporary representations of the “witch” as a locus for the cultural negotiation of genders. Sempruch revisits some of the most prominent traits in past and current perceptions in feminist scholarship of exclusion and difference. She examines a selection of twentieth-century US American, Canadian, and European narratives to reveal the continued political relevance of metaphors sustained in the archetype of the “witch” widely thought to belong to pop-cultural or folkloristic formulations of the past. Through a critical rereading of the feminist texts engaging with these metaphors, Sempruch develops a new concept of the witch, one that challenges traditional gender-biased theories linking it either to a malevolent “hag” on the margins of culture or to unrestrained “feminine” sexual desire. Sempruch turns, instead, to the causes for radical feminist critique of “feminine” sexuality as a fabrication of logocentric thinking and shows that the problematic conversion of the “hag” into a “superwoman” can be interpreted today as a therapeutic performance translating fixed identity into a site of continuous negotiation of the subject in process. Tracing the development of feminist constructs of the witch from 1970s radical texts to the present, Sempruch explores the early psycho-analytical writings of Cixous, Kristeva, and Irigaray, and feminist reformulations of identity by Butler and Braidotti, with fictional texts from different political and cultural contexts.

West Lafayette, IN: Purdue University Press, 2008. 198p.

download
One in Five Racial Disparity in Imprisonment— Causes and Remedies

By Nazgol Ghandnoosh, Celeste Barry and Luke Trinka

The United States experienced a 25% decline in its prison population between 2009, its peak year, and 2021. While all major racial and ethnic groups experienced decarceration, the Black prison population has downsized the most. But with the prison population in 2021 nearly six times as large as 50 years ago and Black Americans still imprisoned at five times the rate of whites, the crisis of mass incarceration and its racial injustice remain undeniable. What’s more, the progress made so far is at risk of stalling or being reversed.

Washington, DC, Sentencing Project. 2023, 34pg

download
Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties

By: Ksenia Ermoshina and Francesca Musiani

Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties sets out to explore one of the core battlegrounds of Internet governance: the encryption of online communications. Current debates around encryption have fundamental implications for our individual liberties and collective presence on the Internet. Encryption of communications at scale and in increasingly usable ways has become a matter of public concern, especially since Edward Snowden’s 2013 revelations. A new cryptographic imaginary is taking hold, which sees encryption as a necessary precondition for the formation of networked publics. At the same time, there have been major evolutions and accelerations in the field of secure communications, prompted in part by the cryptography community’s renewed efforts to create next-generation secure messaging protocols and applications. It is vital that we unveil the very recent, and sometimes less recent history of these protocols and their key applications. The book takes on this task, in order to show how the opportunities and constraints they provide to Internet users came about, and how both developer communities and institutions are working towards making them available for the largest possible audience. It explores how efforts towards this goal are built upon interwoven stories about technical development and architectural choices, about community-building – and about Internet governance and politics. In doing so, the book focuses on the experience of encryption in a wide variety of contemporary secure messaging protocols and tools, and looks at the implications of these endeavors for the “making of” digital liberties on the Internet. Concealing for Freedom provides two key empirical and theoretical contributions. Firstly, it enriches a social sciences-informed understanding of encryption. It does so by examining how different solutions of cryptography for secure communications are created, developed, enacted, and governed, and what this diverse experience of encryption, operating across many different sites, means for online civil liberties. Secondly, it contributes to understanding the social and political implications of particular design choices when it comes to the technical architecture of digital networks, in particular their degree of (de-)centralization. The book explores developers’ actions and their interactions with other stakeholders, for instance users, security trainers, standardising bodies, and funding organizations. It also examines their interactions with the technical artifacts they develop, in which a core common objective is to create tools that “conceal for freedom” even as how this objective is met differs according to technical architectures, the user publics being targeted and the tools’ underlying values and business models.

Manchester, UK: Mattering Press, 2022. 274p.

Download
Addressing Illicit Financial Flows in East and Southern Africa

By Michael McLaggan

Prominent throughout the world, illicit financial flows (IFFs) not only undermine the ability of states to collect revenue, but they also pose challenges to governance and the rule of law and provide avenues for the funding of further illicit activity. Although a global occurrence, IFFs may manifest differently at the regional level, making a uniform approach difficult. This calls for a model that is more inclusive of different types of flows than traditional understandings of IFFs, which tend to focus on financial flows within the formal system. In regions such as East and southern Africa, where informality is much higher than in the developed nations of the ‘global north’, the greater focus on formal systems does not find the same degree of applicability. This is not to downplay the necessity of observing and countering formal financial flows of an illicit nature but rather to emphasise the need to pay greater attention to informal and trade flows, which are prolific in less developed regions. This paper draws on extensive research by the Global Initiative against Transnational Organized Crime (GI-TOC) – in particular, the Observatory of Illicit Economies in East and Southern Africa – in addition to research by other international organisations, to analyse whether the ‘IFFs pyramid’ proposed by the GI-TOC (Reitano, 2022) is applicable to and useful for researchers seeking to understanding illicit financial flows in various settings around the world but especially in regions where greater levels of informality exists, such as East and southern Africa. The paper finds that the pervasive informality of markets in the East and southern African region, and their abuse by criminal actors, means that greater attention to IFFs is necessary in this sphere. Common also is the use of illicitly acquired, or otherwise illicitly traded commodities, in barter (that is, goods for goods) markets. Identified as particularly relevant is the pernicious influence of state-embedded actors, who often play substantial roles in the facilitation of IFFs and act as obstacles to policies to address them. Furthermore, vested interests of criminal actors in keeping certain industries and markets informal serve as barriers to formalisation and highlight the greater need to pay attention to informal financial flows especially. The due consideration to trade and informal flows is what makes the IFFs pyramid a useful model for understanding these flows in both global and regional settings. At the very least, the pyramid model highlights the need for holistic approaches and policy reform when considering IFFs in less developed regions.  

Birmingham, UK: University of Birmingham. 2024, 33pg

download
Michigan State Police Traffic Enforcement: An Assessment of Policies, Training, and Operations

By Thomas Christoff, Benjamin Carleton, Margarita Parker, Kaitlin Moloney, Alexa Blondin, and Bill Taylor

Traffic enforcement encounters represent one of the most common interactions that the public has with law enforcement, with more than 20 million people pulled over for a traffic stop in the US each year (Baumgartner et al., 2021). Police officers make at least three important decisions during a traffic stop encounter, including whether to initiate a traffic stop, whether to conduct a search of persons or the vehicle, and how the officer will sanction the driver (Schafer et al., 2006). Similarly, traffic enforcement is also one of the primary responsibilities of the Michigan State Police (MSP), with MSP having conducted 287,065 traffic stops in 2022.1 In January of 2021, MSP took proactive steps to begin a partnership with researchers from the School of Criminal Justice at Michigan State University (MSU) to understand whether racial/ethnic disparities exist in traffic stop behavior by MSP patrol members. As part of MSP’s partnership with MSU, MSU researchers examined data for MSP traffic stops conducted during the year 2020. Overall, MSU’s analysis found that “African-American drivers experienced significant disparities with respect to MSP traffic stops.” In addition, MSU’s analysis found that “Hispanic drivers were significantly more likely than White drivers to be searched or arrested after traffic stops.” MSU conducted a second round of traffic stop data analysis using MSP data for traffic stops conducted during 2021. In this second round, MSU added a Post-by-Post analysis, which revealed that “a small proportion of MSP posts accounted for the racial and ethnic disparities observed statewide.” The analysis also revealed disparities in traffic stops for African-American drivers in Secure Cities Partnership (SCP) locations. Upon receiving MSU’s initial findings, MSP leadership responded in January 2022 with the unveiling of a multifaceted Five-Point Plan intended to address racial disparities in traffic enforcement. The five points focused on understanding the contributors to disparities in traffic stops and exploring ways in which MSP could effectively reduce such disparities. The point most relevant to this assessment is the first one, which involves the hiring of an independent consulting firm to review MSP policies and make recommendations that will address racial disparities. MSP issued a request for proposals in March 2022 seeking an independent consulting firm to conduct this work, and the CNA Corporation (CNA) was awarded the contract to assess MSP traffic enforcement policies and program initiatives over the course of 18 months, starting in June 2022. CNA’s approach to this assessment focused on the full lifecycle of a trooper, including how MSP recruits and hires its troopers, instructs and trains its troopers, and supervises its troopers. We also considered organizational factors that are relevant to traffic enforcement and equitable policing. To assess MSP’s traffic enforcement policies and program initiatives, we used a variety of sources, including document review, targeted interviews, focus groups, ride-alongs, and quantitative data analysis. This report details the findings and recommendations of this focused assessment and consists of the following five main sections: 1. Methodology and Approach 2. Recruitment and Hiring Policies, Trainings, and Practices 3. Trooper Policies, Trainings, and Practices 4. Supervisor Policies, Trainings, and Practices 5. Organizational Processes and Initiatives   

Arlington VA: CNA, 2023. 95p.

download
Homelessness, Offending, Victimization, and Criminal Legal System Contact   

By Bill McCarthy and John Hagan

There is now a sizable literature on connections between homelessness, crime, and criminal legal system contact. We review studies on these relationships, focusing mostly on links between the adversity that often characterizes homelessness—the need for shelter, food, and income—and offending, victimization, and involvement with the criminal legal system. We concentrate on multivariate studies from the United States and Canada and consider research on youth and adults. We begin with a short discussion of some of the challenges of studying these relationships. We follow our review of research on homeless conditions with a summary of research that has used data from homeless samples to advance a broad array of explanations of crime; a collection that includes strain, routine activities and lifestyle exposure, differential association, social control, rational choice, life course, and criminal capital theories.

Annual Review of Criminology, Volume 7, Page 257 - 281

download
Ethical Journalism: Adopting the Ethics of Care

By Joe Mathewson

This book makes the case for the news media to take the lead in combatting key  threats to American society including racial injustice, economic disparity and climate change by adopting an “ethics of care” in reporting practices. Examining how traditional news coverage of race, economics and climate change has been dedicated to straightforward facts, the author asserts that journalism should now respond to societal needs by adopting a moral philosophy of the “ethics of care,” opening the door to empathetic yet factual and fair coverage of news events, with a goal to move public opinion to the point that politicians are persuaded to take effective action. The book charts a clear path for how this style of ethics can be applied by today’s journalists, tracing the emergence of this empathy-based ethics from feminist philosophy in the 1980s. It ultimately urges ethical news organizations to adopt the ethics of care, based on the human emotion prioritized by Scottish Enlightenment philosopher David Hume, and to pursue a more proactive, solutions-seeking coverage of current events.  

Abingdon, OXON, UK: New York: Routledge, 2022.199p.

DOWNLOAD