Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in social sciences
Examining Fifty Cases of Convicted Online Romance Fraud Offenders

By Adebayo Benedict Soares and Suleman Lazarus

This article examines fifty case files of cybercriminals that the Economicand Financial Crimes Commission (EFCC) convicted for online romance fraud. It profiles offenders and explores the value of the SpaceTransition Theory in understanding digital crimes. Through documentary analysis, the study identifies key patterns in victim demographics, fraudsters’ operational strategies, and offenders’ socioeconomic back-grounds. Findings reveal a high concentration of U.S. victims (56%) and a preference among offenders for Apple’s iPhone (58%). Most offenders presented themselves as Caucasian American males (46%) or military personnel (12%), with some adopting Caucasian European male identities (10%). Victim demographics show a pronounced gender disparity: 70% of offenders primarily targeted female victims, 14% targeted male victims, 10% reached both genders, and 6% did not specify the victims’ gender. The analysis also indicates that most offenders were university students (74%), with Facebook (46%) identified as the primary platform for these fraudulent activities. The study emphasizes the need for prevention strategies that genuinely consider the socioeconomic and political conditions that may make online fraud an appealing career option.

Criminal Justice Studies : A Critical Journal of Crime, Law and Society, 2024, 25p.

download
Illicit Redwood Theft in a California State Park: A Crime Script Analysis Approach

By Stephen F Pires and Nerea Marteache

Empirical studies on flora poaching are scarce, and the few that exist tend to focus on the study of illegal logging. The goal of this paper is to provide a deeper understanding of the issue of timber theft in protected parks, as well as to identify potential avenues for detection and prevention of this criminal behavior, using the case study of split-rail theft at Humboldt Redwoods State Park in California (USA). We utilize script analysis to offer a detailed description of the crime-commission process and the procedural requirements to carry out this type of crime. To do so, we used a mixed methods design that included incident data collection, field observations, and informal interviews with park rangers. Interventions that could potentially disrupt the chain of events, based on Situational Crime Prevention, are identified, and discussed.

Journal of Contemporary Criminal Justice 36, March 2020, 12p.

download
Detection of Illegally Manufactured Fentanyls and Carfentanil in Drug Overdose Deaths — United States, 2021–2024

By Lauren J. Tanz; Andrea Stewart, R. Matt Gladden,; Jean Y. Ko, Lauren Owens, Julie O’Donnell

During 2023, approximately 72,000, or nearly seven in 10, drug overdose deaths in the United States were estimated to involve illegally manufactured fentanyls (IMFs). Carfentanil, a fentanyl analog 100 times more potent than fentanyl, has reemerged in the U.S. drug supply. Using CDC’s State Unintentional Drug Overdose Reporting System data, this report describes trends in overdose deaths during January 2021– June 2024, overall and with IMFs detected, by U.S. Census Bureau region, and in deaths with carfentanil detected, in 45 states and the District of Columbia (DC). Numbers of deaths with carfentanil detected by state during January 2023–June 2024 in 49 states and DC are also reported. The number of overdose deaths with IMFs detected declined from 2022 to 2023 in the Northeast (3.2% decline), Midwest (7.8%), and South (2.8%) regions; deaths in the West increased 33.9%. The percentage of deaths with IMFs detected was steady at approximately 70%–80% in the Northeast, Midwest, and South. In contrast, the percentage of deaths with IMFs detected in the West increased from 48.5% during January–March 2021 to 66.5% during April–June 2024. Overdose deaths with carfentanil detected increased approximately sevenfold, from 29 during January–June 2023 to 238 during January–June 2024; during January 2023–June 2024, overdose deaths with carfentanil detected were reported in 37 states. Overdose prevention efforts that address the widespread presence of IMFs, including carfentanil, and can rapidly adapt to other potent opioids in the drug supply might result in lasting reductions in overdose deaths across the entire United States

MMWR | December 5, 2024 | Vol. 73 | No. 48, 7p.

download
Using Crime Script Analysis to Understand the Illegal Harvesting of Live Corals: Case Studies From Indonesia and Fiji

By Monique C. Sosnowski msosnowski@jjay.cuny.edu, Judith S. Weis, and Gohar A. Petrossian

Imported to adorn tanks of marine aquarium hobbyists, the trade in live corals poses a significant risk to species that concurrently face threats from rising global temperatures, pollution, and destructive fishing practices. To better understand the live coral trade, we employed a crime script framework to analyze the process by which corals are harvested in two of the world’s major exporting countries—Indonesia and Fiji. We demonstrate that coral harvesting and export are complex activities that require a specific set of skills and tools. As such, various intervention strategies are proposed to address illegal coral harvesting at different stages of the crime script.

Journal of Contemporary Criminal Justice · March 2020, 20p.

download
Off the Hook 2: An Assessment Update on the Need for Transparency and Better Criminal Justice in Tackling Wildlife Crime

By The Environmental Investigation Agency UK (EIA UK).

In 2021, EIA’s report Off the Hook – The need for transparency and accountability in tackling wildlife crime advocated for better access to information and justice, stronger anti-corruption measures, increased international collaboration and more frequent evaluations of key indicators to improve transparency and criminal justice in the fight against wildlife crime.

Since then, EIA has continued to campaign for stronger responses to wildlife crime. Our research from 2024 highlights that significant concerns remain regarding transparency, information sharing and criminal justice in the global fight against wildlife crime.

This report is part of EIA’s regular assessment and focuses on four themes, which build upon the findings of the previous report.

London: by the Environmental Investigation Agency UK (EIA UK). 2024.. 22p

download
Dirty Deals - Part One. Evidencing Illegalities in the Global Plastic Waste Trade

By The Environmental Investigation Agency (EIA UK)

Your old wheelie bin might be funding organised crime and fuelling environmental injustice and human rights violations around the globe.

In the shadows of the global economy, an ominous trade flourishes. The latest investigation by the Environmental Investigation Agency (EIA) uncovers shocking evidence of how bad actors exploit regulatory weaknesses, legal loopholes and outdated practices in the global plastic waste trade, fuelling a thriving illegal market. This trade, characterised by its complexity and global reach, involves a multitude of actors, regulatory codes, transportation methods and market dynamics that create an ideal environment for illicit activities.

In the first of this two-part report, we reveal the latest scam: exploiting the UK‘s Extended Producer Responsibility (EPR) scheme for packaging recycling with discarded wheelie bins. Despite the efforts of law enforcement agencies to track and dismantle illegal operations, the ongoing consequences of illegal trade inflicts devastating harm to human health and the environment.

London: The Environmental Investigation Agency (EIA UK) , 2024. 28p.

download
Roadmap to Closing Captive Tiger Facilities of Concern

By The Environmental Investigation Agency (EIA UK)

Current estimates indicate there are at least 8,900 tigers being held in more than 300 facilities in East and South-East Asia. More than 6,000 of these tigers are located in China, with the remaining animals found almost exclusively in Thailand (approx.1,635), Laos (451) and Vietnam (395).

These numbers are estimates based on the best available information and, particularly in South-East Asia, can rapidly shift. The rate at which tigers are bred, traded from one facility to another and slaughtered for illegal trade is not known but is believed to be high, accounting for the rapid shifts in captive tiger estimates.

Additionally, there are significant concerns around captive tiger facilities and their role in the tiger trade in Myanmar, South Africa and some EU Member States, as well as the large captive tiger population in the United States.

London: by the Environmental Investigation Agency (EIA UK) 2024. 16p.

Donwload
Cyberviolence Against Women in the EU

By Ionel Zamfir and Colin Murphy

The rise of digital technologies represents a double-edged sword for women's rights. On the one hand, the digital environment has enabled women to build networks and spread awareness about the abuse they suffer, such as through the #Metoo movement. On the other, it has provided abusers and misogynists with new tools with which they can spread their harmful content on an unprecedented scale. With the development of artificial intelligence, these trends, both positive and negative, are expected to continue. Against this backdrop, it has become clear that digital violence is as harmful as offline violence and needs to be tackled with the full force of the law, as well as through other non-legislative measures. Moreover, the digital content causing the harm – images, messages, etc. – needs to be erased. This is particularly important, as the impact on victims is profound and long-lasting. The European Union has adopted several pieces of legislation that aim to make a difference in this respect. The directive on combating violence against women, to be implemented at the latest by June 2027, sets minimum EU standards for criminalising several serious forms of cyberviolence and enhances the protection of and access to justice for victims. EU legislation on the protection of privacy is also having an impact on cyberviolence. For example, the new Digital Services Act imposes an obligation on big digital platforms in the EU to remove harmful content from their websites. This is instrumental in removing intimate or manipulated images that are disseminated on the internet without the person's consent; almost all such images portray women, according to existing data. Member States use a multiplicity of legal approaches to tackle this issue, combining criminalisation of specific cyber offences with the use of general criminal law. In some Member States, an explicit gender dimension is also included.

Brussels: EPRS | European Parliamentary Research Service, 2024. 11p

download
Who has Access to Positive Activities, Youth Clubs and Trusted Adults? Children, Violence and Vulnerability

By Cassandra Popham, Ellie Taylor and William Teager.. et al

The Youth Endowment Fund surveyed over 10,000 teenage children (aged 13-17) in England and Wales about their experiences of violence. The findings are detailed across five reports, each focusing on a different aspect. In this report, we explore children’s access to positive activities, youth clubs and trusted adult figures. Here’s what we found. Most children do positive activities. Activities such as sports programmes, arts and volunteering can provide children with safe spaces, support, educational opportunities and a sense of community. They can also provide ‘hooks’ to engage them in other services and support. The majority of teenage children (95%) have access to these sorts of activities locally, with 84% participating in at least one activity once a month or more. Team and individual sports are the most common, with 72% of 13-17-year-olds having access to team sports and 42% regularly participating. Similarly, 62% have access to individual sports, with 35% participating. Gender differences are notable: 88% of boys engage in positive activities compared to 80% of girls. Boys are far more involved in team sports (54% of boys vs 30% of girls), while girls participate more in arts (27% of girls vs 13% of boys) and part-time work (15% of girls vs 11% of boys). Among 17-year-olds, 34% of girls take up part-time work, compared to 25% of boys. Interestingly, children directly affected by violence as victims (88%) and perpetrators (90%) are more likely to take part in positive activities than children who haven’t been victims of or perpetrated violence (83%). They are less likely to do activities such as team sports, but are more likely to do volunteering, wilderness activities and combat sports. Vulnerable children are the most likely to attend youth clubs. Youth clubs are places that provide children and young people access to activities, support and community. They also provide opportunities or ‘hooks’ to engage children with other services and forms of support. While 70% of 13-17-year-olds report having access to a youth club in their area, 40% attend one at least once a month. School-based youth clubs are the most commonly attended (35% have access and 17% attend), followed by those in youth or community centres (37% have access and 12% attend). A third (33%) of teenage children who don’t currently attend a youth club would like to. It seems that youth clubs manage to reach those who most need them. Children who’ve been directly affected by violence are twice as likely to regularly go to a youth club – 60% of victims and 65% of those who’ve perpetrated violence, compared to 31% who haven’t been victims or perpetrators of violence. Youth clubs, especially those based in schools, are generally viewed as safe spaces. For children who’ve been victims of violence, online youth clubs1 are considered safer, with 14% attending them compared to 7% of their peers. Most children, including those most affected by violence, have a trusted adult outside the home. When a child or young person is vulnerable and in need of support, having an adult in their life who they can turn to can make a big difference. For some, this might be a family member, but others might feel more comfortable seeking help from someone outside their family or friends – for example, a youth worker, sports coach or more formal mentor. While 82% of teenage children have a trusted adult outside their family, 18% do not. School staff are the most trusted adults (58%), but children who’ve been suspended, excluded or face greater risks of violence —such as drug use, exploitation or involvement with the police – are more likely than others to turn to adults outside of school settings, such as sports coaches, mentors, doctors or youth workers. Boys, in particular, are more likely to trust a sports coach (24% of boys vs 12% of girls), while girls tend to rely more on school staff (60% of girls vs 56% of boys). These findings highlight the importance of supporting and facilitating these trusted relationships to help vulnerable children navigate their challenges.

London: Youth Endowment Fund, 2024 Report No. 5, 2024. 37p.

download
Financial Abuse: An Insidious Form of Domestic Violence

By Australia Parliamentary Joint Committee on Corporations and Financial Services

This report examining financial abuse in Australia provides a comprehensive analysis of the issue, identifies key challenges within legislation, regulation, and financial institutions, and puts forward 61 recommendations to prevent and mitigate financial abuse.

The report highlights that financial abuse is a widespread issue with a direct cost to victims estimated at $5.7 billion—a figure higher than Australia's total scam losses in 2023.

It calls for legislative amendments, enhanced support services for victims, improved identification and response mechanisms within financial institutions, and greater collaboration between government agencies and stakeholders.

Key findings

Financial abuse is a prevalent issue in Australia, often occurring alongside other forms of domestic and family violence.

The financial toll on victims of financial abuse is estimated at $5.7 billion.

Current legislative and regulatory frameworks have significant gaps.

Financial institutions have made some progress in implementing measures to address financial abuse but require further action to provide comprehensive support for victims.

The rise of online financial platforms presents both opportunities and challenges in tackling financial abuse.

Vulnerable groups, including older Australians, people from culturally and linguistically diverse backgrounds, and those in regional and remote areas, face unique challenges and barriers in accessing support and protection from financial abuse.

Key recommendations

Establish a mechanism for co-design with victim-survivors of financial abuse in developing reforms to mitigate the prevalence and impact of financial abuse.

Amend the National Consumer Credit Protection Act 2009 to recognise the unique threats posed by financial abuse and strengthen protections for victims.

Review the intersection between financial abuse and the superannuation system.

Implement a mandatory requirement for providers of financial services, products, and government agencies to include a "quick exit" button on webpages.

Co-design standard operating guidelines for the referral of reasonably suspected financial abuse to financial institutions.

Amend the Social Security Act 1991 to remove the requirement for victims to have left their home to qualify for crisis support payments, lengthen the application time frame for crisis payments, and ensure access to "special circumstances" waivers for victims subjected to perpetrator manipulation.

e Senate Printing Unit, Parliament House, Canberra, 2024, 230p.

download
Understanding Adult Sexual Assault Matters: Insights from Research and Practice: An Educational Resource for the Justice Sector

By Nina Hudson, Rachel Moody, Heather McKay, Rae Kaspiew

The guide presents research-based insights that challenge common stereotypes, highlighting the diverse experiences of victims and survivors and offering practical examples and approaches for professionals to implement in their practice. It is intended for use by professionals within the Australian justice sector, specifically police, lawyers, and judicial officers.

This resource aims to support a more trauma-informed, victim-centred approach within the Australian justice system, ultimately fostering a greater understanding of the complexities of sexual assault. It was developed in response to calls for improvements in the justice system's handling of sexual assault cases and draws on research from over 100 Australian and international sources.

Australian Institute of Family Studies, 2024. 83p.

download
A Study on Organized Retail Theft in Texas

By The Texas Organized Retail Theft Task Force

Organized Retail Theft (ORT), the large-scale theft and reselling of merchandise, is a growing problem, according to Texas retailers. In 2023, the Texas Legislature created a special task force led by Texas Comptroller of Public Accounts Glenn Hegar to analyze and develop strategies for combatting ORT. The ORT Task Force, which includes law enforcement, retailers and policy experts, conducted research, listened to expert testimony and conducted site visits as part of its study. The following report represents the findings of the Task Force and offers recommendations for further action. Summary of Findings and Recommendations As the Task Force listened to expert testimony and Comptroller staff visited retailer sites, ORT Task Force members noted three recurrent themes: a lack of ORT data, a need for coordination among ORT stakeholders and a need for consistency in the application of ORT laws. Finding 1 Statewide data relating specifically to ORT are not collected in Texas, which makes it difficult to quantify the extent and cost of ORT, pinpoint where crimes are happening and dedicate sufficient resources to combat ORT. Retailers are reluctant to share certain proprietary data with their competitors. Recommendations • Develop a statewide repository to collect ORT data that can be aggregated and analyzed. • Work with retailers to categorize and mask their confidential data in a manner that doesn’t expose proprietary information while still allowing analysts to estimate the cost of ORT and detect trends. • If ORT trends indicate a need, consider creating an organization to combat ORT modeled after or housed under the Texas Financial Crimes Intelligence Center. Finding 2 Thefts conducted by perpetrators who target multiple types of merchandise or who operate in more than one law enforcement jurisdiction may be difficult to identify as ORT. Improved transparency, interaction and communication among all stakeholders—retailers, law enforcement and prosecutors—have yielded positive results in some cities. Recommendations • Continue support for the Texas Department of Public Safety’s Organized Retail Theft Prevention Unit and consider increasing the total number of FTEs for the unit. • Identify an existing state agency to serve as both an information clearinghouse and a facilitator to help local law enforcement departments develop and improve ORT coordination, cooperation and knowledge sharing with other jurisdictions so that potential links to related cases may be identified and shared. • San Antonio’s Businesses Against Theft Network (BAT-NET) program could serve as a model for other cities to improve communication, transparency and collaboration among stakeholders. • Establish a store walk-through program. Retailers can launch a store walk-through program inviting law enforcement agencies and prosecutors’ offices to get a better understanding of the ORT issue. This can also help foster a stronger relationship between retailers and law enforcement. • Incorporate training on ORT in new officer training classes and as part of a continuing education class for law enforcement. • One-hour presentation to new academy classes. • Quarterly and annual meeting/certification by Texas Organized Retail Crime Association (TXORCA) or similar association. Finding 3 Prosecuting ORT can be time and resource intensive, and prosecutors sometimes apply ORT charges inconsistently (e.g., charging an ORT crime as simple theft, which may take less time and be easier to prove). Prosecutors find the requirement to prove intentionality in ORT cases to be an obstacle in the pursuit of charges under the ORT statute. Other state laws may inadvertently make it difficult for ORT crimes to be prosecuted. Retailers, for example, are required by law to wait 10 days before reporting the theft of certain rental items. Although normally this provision likely would be in a consumer’s best interest, it is a barrier when the retailer becomes aware that the items are being resold before the retailer is allowed to report the theft. Recommendation • Form a committee of prosecutors to review the ORT statute’s requirements, including proof of intentionality, and other statutes that are barriers to ORT prosecution, such as the waiting period on reporting stolen rental items. The committee should seek input from retailers and law enforcement during its review. The committee will present its suggestions to the ORT Task Force before the next legislative session. • Develop training on ORT as a continuing education course, such as a one-hour presentation on the key steps for prosecuting an ORT case.

Austin: Texas Comptroller of Public Accounts 2024. 24p.

download
New Frontiers: The Use of Generative Artificial Intelligence to Facilitate Trafficking in Persons

Bennett, Phil; Cucos, Radu; Winch, Ryan

From the document: "The intersection of AI and transnational crime, particularly its application in human trafficking, represents an emerging and critically important area of study. This brief has been developed with a clear objective: to equip policymakers, law enforcement agencies, and the technology sector with the insights needed to anticipate and pre-emptively address the potential implications of AI on trafficking in persons. While we respond to the early instances of the use of AI by transnational criminal organisations, such as within Southeast Asia's cyber-scam centres, a more systemic approach is required. The potential for transnational criminal organisations to significantly expand their operations using AI technologies is considerable, and with it comes the risk of exponentially increasing harm to individuals and communities worldwide. It is imperative that we act now, before the most severe impacts of AI-enabled trafficking are realised. We have a unique time-limited opportunity--and indeed, a responsibility--to plan, train, and develop policies that can mitigate these emerging threats. This report aims to concretise this discussion by outlining specific scenarios where AI and trafficking could intersect, and to initiate a dialogue on how we can prepare and respond effectively. This document is not intended to be definitive, but rather to serve as a foundation for a broader, ongoing discussion. The ideas presented here are initial steps, and it will require innovative thinking, adequate resourcing, and sustained engagement from all sectors to build upon them effectively."

Organization For Security And Co-Operation In Europe. Office Of The Special Representative And Co-Ordinator For Combating Trafficking In Human Beings; Bali Process (Forum). Regional Support Office .NOV, 2024

download
Online Safety and the Regulation of Gaming Platforms and Services

By Ellen Jacobs, Ella Meyer, Helena Schwertheim, Melanie Döring and Terra Rolfe

The global gaming industry is now worth more than both the film and music industries combined, with an estimated 3.2 billion gamers worldwide. As such, greater attention has paid in recent years to the online safety risks associated with gaming. This includes both gaming-specific companies and the wider ecosystem of gaming-adjacent social media platforms, particularly in the context of online hate and misogyny, extremism and radicalisation, and child safety issues (such as grooming and cyberbullying). Significant progress has been made in understanding how online harms are perpetrated in online gaming spaces. Recognising these risks, policymakers have crafted new digital and online safety regulations such as the EU’s Digital Services Act (DSA) and the UK’s Online Safety Act (UK OSA) to increasingly apply to gaming or gaming-adjacent companies. However, such regulations are still in the early stages of implementation and enforcement, and the extent to which gaming companies or services are within scope can be unclear. This policy brief provides a summary of the current evidence on the nature and extent of these risks and highlights remaining gaps and challenges to building out this evidence base. It also provides an overview of existing government approaches to enhancing online safety in gaming, including both regulatory and non-regulatory efforts, as well as industry and civil society initiatives. Special attention is given to existing regulatory frameworks in the EU (DSA, Terrorist Content Online Regulation), the UK (UK OSA) and Australia (Online Safety Act), to understand how and how far they may provide higher standards of online safety to gamers. Finally, the brief explores both existing and proposed mitigation strategies to enhance online safety in gaming. Throughout, the brief provides recommendations for governments, regulators, researchers and industry. The DPL supports collaboration through a multi-stakeholder approach to develop a better understanding of the risks posed in online gaming spaces and how best to mitigate them

Amman Berlin London Paris Washington DC: Institute for Strategic Dialogue (2024) 47p

Download
The Drug Treatment Debate: Why Accessible and Voluntary Treatment Wins Out Over Forced 

By Drug Policy Alliance

We all want people living with addiction to get the help they need. At the Drug Policy Alliance, we believe that everyone should have access to the substance use disorder (SUD) supports that they choose to improve their physical and mental health — and that effective services should be available when and where people are ready for them, without hurdles like cost or preconditions to get help. In short, SUD support should be voluntary, effective, affordable, accessible, and appealing. Unfortunately, the United States has neither prioritized on-demand care nor ensured that available SUD supports are effective or beneficial. Having failed to provide even remotely sufficient access to the kinds of health-centered approaches that research shows are most effective (e.g., medications for opioid use disorder, or MOUD, and contingency management for stimulant use disorder, or CM), some ill-informed policymakers are advocating for expanding the power of courts to force people into existing SUD services, against their will and not of their choosing. This is not entirely new. Forced treatment has been a familiar practice in criminal courts for decades — where criminal defendants have had the “choice” to opt for court-ordered SUD services or face traditional sentencing, often including incarceration   

New York: Drug Policy Alliance, 2024. 32p.

download
Survey of State Criminal History Information Systems, 2022

By Becki R. Goggins, Dennis A. DeBacco

This report summarizes the results from the seventeenth survey of criminal history information systems conducted for BJS by SEARCH, The National Consortium for Justice Information and Statistics, since 1989; it presents data on the functions and status of state criminal history files as of December 31, 2022. This report is based on the results from a survey conducted among the administrators of the state criminal history record repositories in May–July 2023. The Federal Bureau of Investigation (FBI) was the source for some of the information relating to criminal history records, including state participation in the Interstate Identification Index (III) system (the national criminal records exchange system) and the number of III records maintained by the FBI on behalf of the states; the number of records in the wanted persons file; and the protection order file of the FBI’s National Crime Information Center (NCIC) database. The report found that forty-nine states, the District of Columbia, and Guam report the total number of persons in their criminal history files as 116,447,200, of which over 96% are automated records; thirty states, the District of Columbia, and Guam have fully automated criminal history files.

Sacramento, CA: SEARCH Group, Incorporated; 2024. 65p.

Download
Social media: the good, the bad, and the ugly

By Joint Select Committee on Social Media and Australian Society

This report focusses on the impacts of social media and Australian society. It examines the influence of social media on users' health and wellbeing, particularly on vulnerable cohorts of people, but also how social media can provide users with positive connection, a sense of community, a place for expression and instant access to information and entertainment.

The Committee heard that balancing these conflicting realities is a wicked problem.

The report addresses both the need for immediate action, and the need for a sustained digital reform agenda. It supports protecting Australians through a statutory duty of care by digital platforms, education support and digital competency, greater protections of personal information, independent research, data gathering and reporting, and giving users greater control over what they see on social media.

This report puts Big Tech on notice—social media companies are not immune from the need to have a social licence to operate.

Recommendations for the Australian Government

  1. Consider options for greater enforceability of Australian laws for social media platforms.

  2. Introduce a single and overarching statutory duty of care onto digital platforms for the wellbeing of their Australian users.

  3. Introduce legislative provisions to enable effective, mandatory data access for independent researchers and public interest organisations, and an auditing process by appropriate regulators.

  4. As part of its regulatory framework, ensures that social media platforms introduce measures that allow users greater control over what user-generated content and paid content they see by having the ability to alter, reset, or turn off their personal algorithms and recommender systems.

  5. Prioritise proposals from the Privacy Act review relating to greater protections for the personal information of Australians and children.

  6. Any features of the Australian Government's regulatory framework that will affect young people be codesigned with young people.

  7. Support research and data gathering regarding the impact of social media on health and wellbeing to build on the evidence base for policy development.

  8. One of the roles of the previously recommended Digital Affairs Ministry should be to develop, coordinate and manage funding allocated for education to enhance digital competency and online safety skills.

  9. Reports to both Houses of Parliament the results of its age assurance trial.

  10. Industry be required to incorporate safety by design principles in all current and future platform technology.

  11. Introduce legislative provisions requiring social media platforms to have a transparent complaints mechanism.

  12. Ensures adequate resourcing for the Office of the eSafety Commissioner to discharge its evolving functions.

Parliament of Australia, 18 NOV 2024

Download
Social Media: The Root Cause of Rising Youth Self‐Harm or a Convenient Scapegoat?

By Helen Christensen, Aimy Slade, Alexis Whitton

Recent events have reignited debate over whether social media is the root cause of increasing youth self‐harm and suicide. Social media is a fertile ground for disseminating harmful content, including graphic imagery and messages depicting gendered violence and religious intolerance. This proliferation of harmful content makes social media an unwelcoming space, especially for women, minority groups, and young people, who are more likely to be targeted by such content, strengthening the narrative that social media is at the crux of a youth mental health crisis. However, the parallel rise in social media use and youth mental health problems does not imply a causal relationship. Increased social media use may be a correlate, exacerbating factor, or a consequence of rising trends in youth self‐harm, which may have entirely separate causes. Despite its potential negative impacts, social media is also a source of information and support for young people experiencing mental health problems. Restricting young people's access to social media could impede pathways for help‐seeking. This complexity highlights the need for a considered approach.

Recommendations  

  • Understand why some individuals are more susceptible to social media harms.

  • Assess alternative explanations for youth self-harm trends.

  • Mitigate artificial intelligence (AI)-related risks.

  • Evaluate interventions that restrict social media and ensure they are evidence-based.

Medical Journal of Australia Volume221, Issue10 November 2024 Pages 524-526

download
Anti-Social Norms

By Leopoldo Fergusson, José-Alberto Guerra, and James Robinson

Since formal rules can only partially reduce opportunistic behavior, third-party sanctioning to promote fairness is critical to achieving desirable social outcomes. Social norms may underpin such behavior, but they can also undermine it. We study one such norm the “don’t be a toad” norm, as it is referred to in Colombia that tells people to mind their own business and not snitch on others. In a set of fairness games where a third party can punish unfair behavior, but players can invoke the “don’t be a toad” norm, we find that the mere possibility of invoking this norm completely reverses the benefits of third-party sanctioning to achieve fair social outcomes. We establish this is an anti-social norm in a well-defined sense: most players consider it inappropriate, yet they expect the majority will invoke it. To understand this phenomenon we develop an evolutionary model of endogenous social norm transmission and demonstrate that a payoff advantage from adherence to the norm in social dilemmas, combined with sufficient heterogeneity in the disutility of those who view the norm as inappropriate, can generate the apparent paradox of an anti-social norm in the steady-state equilibrium. We provide further evidence that historical exposure to political violence, which increased the ostracization of snitches, raised sensitivity to this norm.

Chicago: University of Chicago, The Becker Friedman Institute for Economics (BFI) , 2024. 57p.

Download
Criminal Record Stigma in the Labor Market for College Graduates: A Mixed Methods Study

By Michael Cerda-Jara and David J. Harding

One of the primary ways in which contact with the criminal legal system creates and maintains inequality is through the stigma of a criminal record. Although the negative effects of the stigma of a criminal record are well-documented, existing research is limited to the low-wage labor market. Through a job application audit design, this study examines the role of criminal record stigma in the labor market for recent college graduates across Black, Latino, and white men. We find that criminal record stigma has a large effect among white college-educated men but not among Black or Latino men and find no evidence that earning a college degree after the record mitigates criminal record stigma. In-depth interviews with college-educated men with a criminal record show that the criminal record stigma has effects beyond the initial application stage, as many reported provisional job offers being rescinded following a criminal background check, leading participants to limit the jobs to which they applied

Sociological Science 11: 42-66.2024

Download