首页 > 最新文献

Criminology & Public Policy最新文献

英文 中文
Fair Chance Act failures? Employers’ hiring of people with criminal records 公平机会法案失败?雇主雇佣有犯罪记录的人
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-11-22 DOI: 10.1111/1745-9133.12655
Sharon S. Oselin, Justine G. M. Ross, Qingfang Wang, Wei Kang

Research summary

We examine the efficacy of the California Fair Chance Act (CFCA) policy—legislative stipulations regarding employers’ hiring of individuals with criminal records—on practices and outcomes in two Southern California counties during 2021. We rely on survey and experiment data with 542 hiring decision makers to investigate employer and personal compliance with the CFCA, whether applicant appeals affect employers’ willingness to hire them, and heterogeneity in treatment effects across firms and industries. Close to 80% of hiring decision makers violate the CFCA by obtaining background information before they extend an offer, appeals have a minimal impact on hiring outcomes, and firm-level characteristics continue to shape hiring practices to some extent.

Policy implications

Although certain firms comply with the relatively new CFCA, most employers violate it by seeking applicant criminal background information, a practice that has profound consequences for those with criminal records as well as other disadvantaged groups. This finding underscores the discrepancy between de jure and de facto policy practices. Better statewide enforcement of the CFCA coupled with increased employer educational training could help reform it and improve policy adherence. Given it is a young policy, future research should continue to assess the CFCA's efficacy over time.

我们考察了《加州公平机会法》(CFCA)政策-立法规定关于雇主雇用有犯罪记录的个人的有效性-关于2021年南加州两个县的做法和结果。我们依靠对542名招聘决策者的调查和实验数据来调查雇主和个人对CFCA的遵守情况,申请人的申诉是否会影响雇主雇用他们的意愿,以及不同公司和行业对待他们的效果的异质性。近80%的招聘决策者违反了CFCA,在提供offer之前获取背景信息,上诉对招聘结果的影响微乎其微,公司层面的特征在某种程度上继续影响着招聘行为。
{"title":"Fair Chance Act failures? Employers’ hiring of people with criminal records","authors":"Sharon S. Oselin,&nbsp;Justine G. M. Ross,&nbsp;Qingfang Wang,&nbsp;Wei Kang","doi":"10.1111/1745-9133.12655","DOIUrl":"10.1111/1745-9133.12655","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research summary</h3>\u0000 \u0000 <p>We examine the efficacy of the California Fair Chance Act (CFCA) policy—legislative stipulations regarding employers’ hiring of individuals with criminal records—on practices and outcomes in two Southern California counties during 2021. We rely on survey and experiment data with 542 hiring decision makers to investigate employer and personal compliance with the CFCA, whether applicant appeals affect employers’ willingness to hire them, and heterogeneity in treatment effects across firms and industries. Close to 80% of hiring decision makers violate the CFCA by obtaining background information before they extend an offer, appeals have a minimal impact on hiring outcomes, and firm-level characteristics continue to shape hiring practices to some extent.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy implications</h3>\u0000 \u0000 <p>Although certain firms comply with the relatively new CFCA, most employers violate it by seeking applicant criminal background information, a practice that has profound consequences for those with criminal records as well as other disadvantaged groups. This finding underscores the discrepancy between de jure and de facto policy practices. Better statewide enforcement of the CFCA coupled with increased employer educational training could help reform it and improve policy adherence. Given it is a young policy, future research should continue to assess the CFCA's efficacy over time.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 2","pages":"361-390"},"PeriodicalIF":4.6,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12655","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138442790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gunshot detection technology effect on gun violence in Kansas City, Missouri: A microsynthetic control evaluation 枪击探测技术对密苏里州堪萨斯城枪支暴力的影响:微合成控制评估
IF 3.5 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-11-15 DOI: 10.1111/1745-9133.12648
Eric L. Piza, David N. Hatten, George O. Mohler, Jeremy G. Carter, Jisoo Cho

Research Summary

We apply the microsynthetic control method to evaluate the gun violence prevention effect of gunshot detection technology (GDT) in Kansas City, MO. We measure the influence of GDT on process measures (ballistic evidence collection and gun recoveries) and outcome measures (shots fired calls for service, non-fatal shootings, fatal shootings, and aggravated assaults and robberies committed with a firearm). The GDT system was associated with higher levels of ballistic evidence collection in the GDT target area and surrounding catchment area, higher levels of gun recoveries in the surrounding catchment area, and lower levels of shots fired calls for service in the GDT target area. The GDT system did not influence any of the gun violence categories involving confirmed victims (non-fatal shootings, fatal shootings, and aggravated assaults and robberies committed with a firearm).

Policy Implications

Agencies that highly prioritize increasing evidence collection and reducing unauthorized firearm discharges may consider dedicating necessary resources to acquire GDT. Agencies that prioritize the reduction of gun violence victimization, however, should consider whether resources are better used for solutions other than GDT. Moving forward, violence prevention scholars should strive to identify contextual factors that facilitate or mitigate the GDT system effect, in an attempt to better understand how to deploy GDT in a manner that maximizes the likelihood of success. This would provide additional guidance to public safety agencies looking to maximize return on investment. Continued adoption of GDT should perhaps be contingent upon the development of such research, given the high cost of the technology.

我们应用微合成控制方法来评估密苏里州堪萨斯城枪击检测技术(GDT)的枪支暴力预防效果。我们测量了GDT对过程措施(弹道证据收集和枪支回收)和结果措施(射击呼叫服务,非致命枪击,致命枪击和严重袭击和持枪抢劫)的影响。GDT系统与GDT目标区域和周边集水区较高水平的弹道证据收集,周边集水区较高水平的枪支回收以及GDT目标区域较低水平的射击服务呼叫相关。GDT系统不影响涉及确认受害者的任何枪支暴力类别(非致命枪击、致命枪击和持枪的严重袭击和抢劫)。
{"title":"Gunshot detection technology effect on gun violence in Kansas City, Missouri: A microsynthetic control evaluation","authors":"Eric L. Piza,&nbsp;David N. Hatten,&nbsp;George O. Mohler,&nbsp;Jeremy G. Carter,&nbsp;Jisoo Cho","doi":"10.1111/1745-9133.12648","DOIUrl":"10.1111/1745-9133.12648","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>We apply the microsynthetic control method to evaluate the gun violence prevention effect of gunshot detection technology (GDT) in Kansas City, MO. We measure the influence of GDT on process measures (ballistic evidence collection and gun recoveries) and outcome measures (shots fired calls for service, non-fatal shootings, fatal shootings, and aggravated assaults and robberies committed with a firearm). The GDT system was associated with higher levels of ballistic evidence collection in the GDT target area and surrounding catchment area, higher levels of gun recoveries in the surrounding catchment area, and lower levels of shots fired calls for service in the GDT target area. The GDT system did not influence any of the gun violence categories involving confirmed victims (non-fatal shootings, fatal shootings, and aggravated assaults and robberies committed with a firearm).</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Agencies that highly prioritize increasing evidence collection and reducing unauthorized firearm discharges may consider dedicating necessary resources to acquire GDT. Agencies that prioritize the reduction of gun violence victimization, however, should consider whether resources are better used for solutions other than GDT. Moving forward, violence prevention scholars should strive to identify contextual factors that facilitate or mitigate the GDT system effect, in an attempt to better understand how to deploy GDT in a manner that maximizes the likelihood of success. This would provide additional guidance to public safety agencies looking to maximize return on investment. Continued adoption of GDT should perhaps be contingent upon the development of such research, given the high cost of the technology.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 4","pages":"863-892"},"PeriodicalIF":3.5,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12648","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138442842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On guard but not sworn: The relationship between school security guards, school resource officers, and student behavior, discipline, and arrests 站岗但不宣誓:学校保安、学校资源官员与学生行为、纪律和逮捕之间的关系
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-11-15 DOI: 10.1111/1745-9133.12653
Keenen Vernon, F. Chris Curran

Research Summary

The increasing presence of armed security personnel in schools has led to concerns about the criminalization of students. While many schools use sworn law enforcement (e.g. school resource officers or SROs), many schools also use security guards who are not sworn law enforcement. Recent policy changes in a number of states and political pressures resulting from acts of mass school violence have led policymakers to face decisions between the use of SROs and security guards. This study informs this policy debate by empirically examining the relationships between security guards and SROs with rates of student behavior, discipline, and arrest using nationally representative data from the Civil Rights Data Collection. Controlling for observable covariates and school district fixed effects, we find that, in contrast to SROs, the use of security guards in schools is not systematically related to student arrest or suspension rates. The findings suggest that non-sworn security guards may provide a form of security personnel that minimizes the criminalization of students relative to SROs.

Policy Implications

As school districts nationwide grapple with how to respond to school shootings and other acts of school violence, policymakers have frequently turned to the use of school security personnel, including SROs and security guards, as a response. Doing so, however, has been contentious given concerns about the overcriminalization of students. This study provides evidence to inform these policy debates by demonstrating the relationships between security guards and SROs and a number of outcomes. The results suggest that the use of security guards as a policy response may minimize arrests and exclusionary discipline relative to the use of SROs.

武装保安人员在学校的增加引起了对学生被定罪的担忧。虽然许多学校使用宣誓执法人员(例如学校资源人员或sro),但许多学校也使用没有宣誓执法的保安人员。最近一些州的政策变化以及大规模校园暴力行为带来的政治压力,导致政策制定者在使用sro和保安人员之间面临抉择。本研究利用民权数据收集的具有全国代表性的数据,实证研究了保安人员和sro与学生行为、纪律和逮捕率之间的关系,从而为这一政策辩论提供了信息。控制可观察的协变量和学区固定效应,我们发现,与sro相比,学校保安人员的使用与学生被捕或停学率没有系统关系。研究结果表明,未经宣誓的保安人员可能会提供一种安全人员形式,使学生相对于sro的犯罪化程度降到最低。
{"title":"On guard but not sworn: The relationship between school security guards, school resource officers, and student behavior, discipline, and arrests","authors":"Keenen Vernon,&nbsp;F. Chris Curran","doi":"10.1111/1745-9133.12653","DOIUrl":"10.1111/1745-9133.12653","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>The increasing presence of armed security personnel in schools has led to concerns about the criminalization of students. While many schools use sworn law enforcement (e.g. school resource officers or SROs), many schools also use security guards who are not sworn law enforcement. Recent policy changes in a number of states and political pressures resulting from acts of mass school violence have led policymakers to face decisions between the use of SROs and security guards. This study informs this policy debate by empirically examining the relationships between security guards and SROs with rates of student behavior, discipline, and arrest using nationally representative data from the Civil Rights Data Collection. Controlling for observable covariates and school district fixed effects, we find that, in contrast to SROs, the use of security guards in schools is not systematically related to student arrest or suspension rates. The findings suggest that non-sworn security guards may provide a form of security personnel that minimizes the criminalization of students relative to SROs.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>As school districts nationwide grapple with how to respond to school shootings and other acts of school violence, policymakers have frequently turned to the use of school security personnel, including SROs and security guards, as a response. Doing so, however, has been contentious given concerns about the overcriminalization of students. This study provides evidence to inform these policy debates by demonstrating the relationships between security guards and SROs and a number of outcomes. The results suggest that the use of security guards as a policy response may minimize arrests and exclusionary discipline relative to the use of SROs.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 2","pages":"327-360"},"PeriodicalIF":4.6,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138442789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effect of online ad campaigns on DDoS-attacks: A cross-national difference-in-differences quasi-experiment 网络广告活动对DDoS攻击的影响:跨国差异准实验
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-11-01 DOI: 10.1111/1745-9133.12649
Asier Moneva, Rutger Leukfeldt

Research Summary

European law enforcement agencies have begun to use targeted online ad campaigns to raise cybercrime awareness among at-risk populations. Despite their rapid proliferation, there is little research to support their efficacy and effectiveness. This study uses a quasi-experimental difference-in-differences design to evaluate the effect of seven campaigns deployed in 2021 and 2022 on the volume of (distributed) denial-of-service or (D)DoS-attacks recorded in six European countries: Denmark, Finland, the Netherlands, Norway, Sweden, and Portugal. The results show mixed effects, suggesting that the campaigns are not clearly effective in reducing DDoS-attacks in the short term.

Policy Implications

Law enforcement has partly justified the use of targeted online ad campaigns on the premise that they reduce DDoS-attacks. However, this study shows that the evidence in this regard is inconclusive. If public support for the use of such campaigns is to be secured in the long term, law enforcement will likely need to rely on stronger arguments. The effect of this type of campaigns needs to be further investigated.

欧洲执法机构已开始利用有针对性的在线广告活动,提高高危人群的网络犯罪意识。尽管它们迅速扩散,但几乎没有研究支持它们的功效和有效性。本研究使用准实验差异设计来评估2021年和2022年部署的七场战役对六个欧洲国家(丹麦、芬兰、荷兰、挪威、瑞典和葡萄牙)记录的(分布式)拒绝服务或(D)DoS攻击数量的影响。结果显示,效果喜忧参半,表明这些活动在短期内减少DDoS攻击方面并不明显有效。
{"title":"The effect of online ad campaigns on DDoS-attacks: A cross-national difference-in-differences quasi-experiment","authors":"Asier Moneva,&nbsp;Rutger Leukfeldt","doi":"10.1111/1745-9133.12649","DOIUrl":"10.1111/1745-9133.12649","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>European law enforcement agencies have begun to use targeted online ad campaigns to raise cybercrime awareness among at-risk populations. Despite their rapid proliferation, there is little research to support their efficacy and effectiveness. This study uses a quasi-experimental difference-in-differences design to evaluate the effect of seven campaigns deployed in 2021 and 2022 on the volume of (distributed) denial-of-service or (D)DoS-attacks recorded in six European countries: Denmark, Finland, the Netherlands, Norway, Sweden, and Portugal. The results show mixed effects, suggesting that the campaigns are not clearly effective in reducing DDoS-attacks in the short term.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Law enforcement has partly justified the use of targeted online ad campaigns on the premise that they reduce DDoS-attacks. However, this study shows that the evidence in this regard is inconclusive. If public support for the use of such campaigns is to be secured in the long term, law enforcement will likely need to rely on stronger arguments. The effect of this type of campaigns needs to be further investigated.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"869-894"},"PeriodicalIF":4.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12649","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hydra: Lessons from the world's largest darknet market 九头蛇:世界最大暗网市场的经验教训
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-23 DOI: 10.1111/1745-9133.12647
Priyanka Goonetilleke, Alex Knorre, Artem Kuriksha

Research Summary

We present a comprehensive description of Hydra, the largest darknet marketplace in the world until its shutdown in April 2022. We document the main features of Hydra such as dead-drop delivery, feedback and reputation system, escrow, and dispute resolution. Using data scraped from the platform, we quantitatively examine the scale and the structure of the marketplace. We find that it has been highly competitive, geographically covering at least 69% of the Russian population and trading a wide variety of drugs, while also allowing the wholesale trade of drugs and precursors. The dead-drop delivery system used on Hydra was expensive, as the courier costs comprised a substantial proportion of the sale price of drugs on Hydra. We contribute to the research on drug cryptomarkets by studying an unprecedentedly large non-Western marketplace that existed substantially longer than any other known darknet market.

Policy Implications

The phenomenon of Hydra shows that shut-down policies applied to darknet marketplaces have a large effect and implicitly shape the whole drug market. Without these policies, a pervasive digitalization of the drug trade can occur. The major cost of allowing marketplaces to grow is the probable increase in the consumption of illegal drugs due to convenience for consumers and facilitated cooperation between suppliers. This cost must be weighed against the potential benefits, including a higher quality of drugs, a decrease in potential violence, and the incentives for a large marketplace to self-regulate. The case of Hydra also suggests the relevance of financial regulation to limit the growth of darknet marketplaces.

我们对Hydra进行了全面的描述,Hydra是世界上最大的暗网市场,直到2022年4月关闭。我们记录了九头蛇的主要功能,如死滴交付、反馈和信誉系统、托管和争议解决。使用从平台上收集的数据,我们定量地检查了市场的规模和结构。我们发现,它具有高度竞争力,在地理上覆盖了至少69%的俄罗斯人口,交易各种各样的毒品,同时也允许毒品和前体的批发贸易。Hydra上使用的死滴递送系统非常昂贵,因为快递费用占Hydra上药品销售价格的很大一部分。我们通过研究一个前所未有的大型非西方市场,为药物加密市场的研究做出了贡献,该市场的存在时间远远超过任何其他已知的暗网市场。
{"title":"Hydra: Lessons from the world's largest darknet market","authors":"Priyanka Goonetilleke,&nbsp;Alex Knorre,&nbsp;Artem Kuriksha","doi":"10.1111/1745-9133.12647","DOIUrl":"10.1111/1745-9133.12647","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>We present a comprehensive description of Hydra, the largest darknet marketplace in the world until its shutdown in April 2022. We document the main features of Hydra such as dead-drop delivery, feedback and reputation system, escrow, and dispute resolution. Using data scraped from the platform, we quantitatively examine the scale and the structure of the marketplace. We find that it has been highly competitive, geographically covering at least 69% of the Russian population and trading a wide variety of drugs, while also allowing the wholesale trade of drugs and precursors. The dead-drop delivery system used on Hydra was expensive, as the courier costs comprised a substantial proportion of the sale price of drugs on Hydra. We contribute to the research on drug cryptomarkets by studying an unprecedentedly large non-Western marketplace that existed substantially longer than any other known darknet market.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>The phenomenon of Hydra shows that shut-down policies applied to darknet marketplaces have a large effect and implicitly shape the whole drug market. Without these policies, a pervasive digitalization of the drug trade can occur. The major cost of allowing marketplaces to grow is the probable increase in the consumption of illegal drugs due to convenience for consumers and facilitated cooperation between suppliers. This cost must be weighed against the potential benefits, including a higher quality of drugs, a decrease in potential violence, and the incentives for a large marketplace to self-regulate. The case of Hydra also suggests the relevance of financial regulation to limit the growth of darknet marketplaces.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"735-777"},"PeriodicalIF":4.6,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12647","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-19 DOI: 10.1111/1745-9133.12654
Cynthia Lum, Christopher S. Koper, Jin R. Lee, Thomas J. Holt
{"title":"","authors":"Cynthia Lum,&nbsp;Christopher S. Koper,&nbsp;Jin R. Lee,&nbsp;Thomas J. Holt","doi":"10.1111/1745-9133.12654","DOIUrl":"https://doi.org/10.1111/1745-9133.12654","url":null,"abstract":"","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"589-590"},"PeriodicalIF":4.6,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"109171869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An examination of harm reduction strategies in Oxycodone and Adderall buyer feedback on AlphaBay 羟考酮和Adderall减少伤害策略的研究买家对AlphaBay的反馈
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-16 DOI: 10.1111/1745-9133.12652
Kenji Logie, Katheryne Pugliese, Alexis Acevedo

Research summary

Darknet marketplaces (DNMs) are global digital marketplaces used primarily to buy and sell illicit drugs online. High rates of adulterated substances have contributed to the creation of harm reduction policies by DNM administrators to address growing rates of overdose worldwide. This paper explores the extent to which harm reduction occurs in buyer feedback of Adderall and Oxycodone purchased on AlphaBay and how these comments are impacted by AlphaBay's administrator-led “harm reduction” policy. This study finds that harm reduction strategies are present in buyer feedback of Oxycodone and Adderall pills, but AlphaBay's policy has very little impact on the preexisting harm reduction communication within buyer feedback.

Policy implications

International policy proposals have placed emphasis on addressing the overdose crisis through harm reduction programs that provide people who use drugs with the necessary services and resources to buy and use drugs safely. There have been very few proposals that have considered how these programs can address the unique setting of buying and using drugs purchased on DNMs. Communication occurring among DNM buyers reveals how harm reduction strategies are being employed by users purchasing drugs from DNMs. In particular, these findings offer insight into the shared experiences of drug buyers in anonymous settings and the strategies they are using to protect one another from overdose and other unwanted side effects often caused by adulterated substances. Understanding these strategies highlights the ways in which street-based harm reduction programs can extend their services to online environments to assist buyers with making safe and informed decisions when using substances purchased online.

暗网市场(DNM)是全球数字市场,主要用于在线买卖非法药物。掺假物质的高比率促使DNM管理人员制定了减少危害的政策,以解决全球日益增长的过量用药率问题。本文探讨了在AlphaBay上购买的Adderall和Oxycodone的买家反馈中减少伤害的程度,以及这些评论如何受到AlphaBay管理员主导的“减少伤害”政策的影响。这项研究发现,在羟考酮和Adderall药丸的买家反馈中存在减少伤害的策略,但AlphaBay的政策对买家反馈中预先存在的减少伤害的沟通几乎没有影响。
{"title":"An examination of harm reduction strategies in Oxycodone and Adderall buyer feedback on AlphaBay","authors":"Kenji Logie,&nbsp;Katheryne Pugliese,&nbsp;Alexis Acevedo","doi":"10.1111/1745-9133.12652","DOIUrl":"10.1111/1745-9133.12652","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research summary</h3>\u0000 \u0000 <p>Darknet marketplaces (DNMs) are global digital marketplaces used primarily to buy and sell illicit drugs online. High rates of adulterated substances have contributed to the creation of harm reduction policies by DNM administrators to address growing rates of overdose worldwide. This paper explores the extent to which harm reduction occurs in buyer feedback of Adderall and Oxycodone purchased on AlphaBay and how these comments are impacted by AlphaBay's administrator-led “harm reduction” policy. This study finds that harm reduction strategies are present in buyer feedback of Oxycodone and Adderall pills, but AlphaBay's policy has very little impact on the preexisting harm reduction communication within buyer feedback.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy implications</h3>\u0000 \u0000 <p>International policy proposals have placed emphasis on addressing the overdose crisis through harm reduction programs that provide people who use drugs with the necessary services and resources to buy and use drugs safely. There have been very few proposals that have considered how these programs can address the unique setting of buying and using drugs purchased on DNMs. Communication occurring among DNM buyers reveals how harm reduction strategies are being employed by users purchasing drugs from DNMs. In particular, these findings offer insight into the shared experiences of drug buyers in anonymous settings and the strategies they are using to protect one another from overdose and other unwanted side effects often caused by adulterated substances. Understanding these strategies highlights the ways in which street-based harm reduction programs can extend their services to online environments to assist buyers with making safe and informed decisions when using substances purchased online.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"695-733"},"PeriodicalIF":4.6,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12652","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding markers of trust within the online stolen data market: An examination of vendors’ signaling behaviors relative to product price point 了解在线被盗数据市场中的信任标志:供应商相对于产品价格点的信号行为研究
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-11 DOI: 10.1111/1745-9133.12651
Jin R. Lee

Research Summary

The current study examined 1055 stolen data products across 40 vendors on the Open and Dark Web to determine whether different product- and vendor-level behaviors predicted vendors’ trustworthiness as reflected in their product price point. Understanding the mechanisms that convey trust in the underground marketplace is crucial as it could help law enforcement target serious actors and disrupt the larger marketplace. Findings suggest the online stolen data market may resemble an uninformative cost condition where buyers are unable to accurately differentiate credible sellers due to the obscure nature of signaling behaviors.

Policy Implications

Law enforcement would benefit from designing fake shops and deceptive forum posts that transmit mixed signals to complicate market participants’ process of interpreting trust signals as intended. These interventions would generate high levels of risk that encourage both buyers and sellers to exit the online illicit marketplace without needing law enforcement arrests. Law enforcement could also target prominent market facilitators to generate a larger disruption that prevents actors from continuing their illicit behavior.

目前的研究调查了开放和黑暗网络上40家供应商的1055种被盗数据产品,以确定不同的产品和供应商级别的行为是否能预测供应商的可信度,这反映在他们的产品价格点上。了解地下市场中传递信任的机制至关重要,因为它可以帮助执法部门针对严重行为者,扰乱更大的市场。研究结果表明,在线被盗数据市场可能类似于一种无信息成本的情况,即由于信号行为的模糊性,买家无法准确区分可信的卖家。
{"title":"Understanding markers of trust within the online stolen data market: An examination of vendors’ signaling behaviors relative to product price point","authors":"Jin R. Lee","doi":"10.1111/1745-9133.12651","DOIUrl":"10.1111/1745-9133.12651","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>The current study examined 1055 stolen data products across 40 vendors on the Open and Dark Web to determine whether different product- and vendor-level behaviors predicted vendors’ trustworthiness as reflected in their product price point. Understanding the mechanisms that convey trust in the underground marketplace is crucial as it could help law enforcement target serious actors and disrupt the larger marketplace. Findings suggest the online stolen data market may resemble an uninformative cost condition where buyers are unable to accurately differentiate credible sellers due to the obscure nature of signaling behaviors.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Law enforcement would benefit from designing fake shops and deceptive forum posts that transmit mixed signals to complicate market participants’ process of interpreting trust signals as intended. These interventions would generate high levels of risk that encourage both buyers and sellers to exit the online illicit marketplace without needing law enforcement arrests. Law enforcement could also target prominent market facilitators to generate a larger disruption that prevents actors from continuing their illicit behavior.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"665-693"},"PeriodicalIF":4.6,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12651","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers 为什么年轻人开始并继续进行道德黑客攻击?道德黑客生活中个人和社会方面的定性研究
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-11 DOI: 10.1111/1745-9133.12650
Judith E. Noordegraaf, Marleen Weulen Kranenbarg

Research Summary

This qualitative interview study examined individual and social aspects in the lives of 15 hackers who started with ethical hacking before the age of 18. We examined what motivated and stimulated them to start with ethical hacking and how and why they continued. Results show that individual aspects, such as an early interest in ICT (Information and Communication Technology), the motivation to make systems more secure, and thinking of reporting vulnerabilities as a moral duty, contribute to the initiation of ethical hacking. Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers. Similarly, positive reactions from public and private system owners can further stimulate the development and self-image of ethical hackers.

Policy Implications

In contrast to criminal hackers, ethical hackers improve cybersecurity, for example, by reporting weaknesses or errors in computer systems. Nowadays, an increasing number of public and private organizations around the world are creating cybersecurity policies and practices around ethical hacking. The interest in hacking usually arises at an early age, making it important to gain knowledge about what stimulates and motivates young people to start and continue with ethical hacking, to inform these policies and practices. Our results show that recognition and reactions from system owners are important in the ethical hacking career. Our recommendations based on these results could stimulate more young people to take the ethical path. Simultaneously, this increases the security of public and private organizations, reducing opportunities for criminal hackers.

这项定性访谈研究调查了15名黑客生活中的个人和社会方面,这些黑客在18岁之前就开始进行道德黑客攻击。我们研究了是什么促使和激励他们从道德黑客行为开始,以及他们如何以及为什么继续。结果表明,个人方面,如早期对ICT(信息和通信技术)的兴趣、使系统更安全的动机,以及将报告漏洞视为一项道德义务,都有助于引发道德黑客行为。社会方面,如榜样,主要在道德黑客职业的进一步发展中发挥作用。例如,同龄人、父母、朋友和黑客社区对年轻的道德黑客具有激励和激励作用。同样,公共和私人系统所有者的积极反应可以进一步刺激道德黑客的发展和自我形象。
{"title":"Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers","authors":"Judith E. Noordegraaf,&nbsp;Marleen Weulen Kranenbarg","doi":"10.1111/1745-9133.12650","DOIUrl":"10.1111/1745-9133.12650","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This qualitative interview study examined individual and social aspects in the lives of 15 hackers who started with ethical hacking before the age of 18. We examined what motivated and stimulated them to start with ethical hacking and how and why they continued. Results show that individual aspects, such as an early interest in ICT (Information and Communication Technology), the motivation to make systems more secure, and thinking of reporting vulnerabilities as a moral duty, contribute to the initiation of ethical hacking. Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers. Similarly, positive reactions from public and private system owners can further stimulate the development and self-image of ethical hackers.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>In contrast to criminal hackers, ethical hackers improve cybersecurity, for example, by reporting weaknesses or errors in computer systems. Nowadays, an increasing number of public and private organizations around the world are creating cybersecurity policies and practices around ethical hacking. The interest in hacking usually arises at an early age, making it important to gain knowledge about what stimulates and motivates young people to start and continue with ethical hacking, to inform these policies and practices. Our results show that recognition and reactions from system owners are important in the ethical hacking career. Our recommendations based on these results could stimulate more young people to take the ethical path. Simultaneously, this increases the security of public and private organizations, reducing opportunities for criminal hackers.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"803-824"},"PeriodicalIF":4.6,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“I knew it was a scam”: Understanding the triggers for recognizing romance fraud “我知道这是一个骗局”:了解识别浪漫骗局的诱因
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-06 DOI: 10.1111/1745-9133.12645
Cassandra Cross

Research Summary

This article investigates the contributing factors (or triggers) to a realization of romance fraud victimization, based on 1015 reports lodged with Scamwatch (Australian online reporting portal for fraud) between July 2018 and July 2019 (inclusive). The article examines the free text narrative of each report to propose five discernible trigger categories: further requests for money; characteristics of communications; verification checks; an offender's action(s); and being told by a third party.

Policy Implications

Based on a comprehensive understanding of these five categories, the article advocates for broader messaging approaches to encompass financial literacy and well-being, cyberliteracy and critical thinking skills, cybersecurity practices, and respectful and healthy relationships. Leveraging the use of these wider education and awareness campaigns could improve recognition of romance fraud. Importantly, it is suggested that banks and other financial institutions are in a strong position to focus their efforts on some of these broader messages to effect positive change.

本文基于2018年7月至2019年7月(含)期间向Scamwatch(澳大利亚欺诈在线报告门户网站)提交的1015份报告,调查了导致浪漫欺诈受害的因素(或触发因素)。这篇文章审查了每份报告的自由文本叙述,提出了五个明显的触发类别:进一步的资金请求;通信特性;核查;罪犯的行为;并被第三方告知。
{"title":"“I knew it was a scam”: Understanding the triggers for recognizing romance fraud","authors":"Cassandra Cross","doi":"10.1111/1745-9133.12645","DOIUrl":"10.1111/1745-9133.12645","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This article investigates the contributing factors (or triggers) to a realization of romance fraud victimization, based on 1015 reports lodged with Scamwatch (Australian online reporting portal for fraud) between July 2018 and July 2019 (inclusive). The article examines the free text narrative of each report to propose five discernible trigger categories: further requests for money; characteristics of communications; verification checks; an offender's action(s); and being told by a third party.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Based on a comprehensive understanding of these five categories, the article advocates for broader messaging approaches to encompass financial literacy and well-being, cyberliteracy and critical thinking skills, cybersecurity practices, and respectful and healthy relationships. Leveraging the use of these wider education and awareness campaigns could improve recognition of romance fraud. Importantly, it is suggested that banks and other financial institutions are in a strong position to focus their efforts on some of these broader messages to effect positive change.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"613-637"},"PeriodicalIF":4.6,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12645","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Criminology & Public Policy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1