首页 > 最新文献

Criminology & Public Policy最新文献

英文 中文
An examination of harm reduction strategies in Oxycodone and Adderall buyer feedback on AlphaBay 羟考酮和Adderall减少伤害策略的研究买家对AlphaBay的反馈
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-16 DOI: 10.1111/1745-9133.12652
Kenji Logie, Katheryne Pugliese, Alexis Acevedo

Research summary

Darknet marketplaces (DNMs) are global digital marketplaces used primarily to buy and sell illicit drugs online. High rates of adulterated substances have contributed to the creation of harm reduction policies by DNM administrators to address growing rates of overdose worldwide. This paper explores the extent to which harm reduction occurs in buyer feedback of Adderall and Oxycodone purchased on AlphaBay and how these comments are impacted by AlphaBay's administrator-led “harm reduction” policy. This study finds that harm reduction strategies are present in buyer feedback of Oxycodone and Adderall pills, but AlphaBay's policy has very little impact on the preexisting harm reduction communication within buyer feedback.

Policy implications

International policy proposals have placed emphasis on addressing the overdose crisis through harm reduction programs that provide people who use drugs with the necessary services and resources to buy and use drugs safely. There have been very few proposals that have considered how these programs can address the unique setting of buying and using drugs purchased on DNMs. Communication occurring among DNM buyers reveals how harm reduction strategies are being employed by users purchasing drugs from DNMs. In particular, these findings offer insight into the shared experiences of drug buyers in anonymous settings and the strategies they are using to protect one another from overdose and other unwanted side effects often caused by adulterated substances. Understanding these strategies highlights the ways in which street-based harm reduction programs can extend their services to online environments to assist buyers with making safe and informed decisions when using substances purchased online.

暗网市场(DNM)是全球数字市场,主要用于在线买卖非法药物。掺假物质的高比率促使DNM管理人员制定了减少危害的政策,以解决全球日益增长的过量用药率问题。本文探讨了在AlphaBay上购买的Adderall和Oxycodone的买家反馈中减少伤害的程度,以及这些评论如何受到AlphaBay管理员主导的“减少伤害”政策的影响。这项研究发现,在羟考酮和Adderall药丸的买家反馈中存在减少伤害的策略,但AlphaBay的政策对买家反馈中预先存在的减少伤害的沟通几乎没有影响。
{"title":"An examination of harm reduction strategies in Oxycodone and Adderall buyer feedback on AlphaBay","authors":"Kenji Logie,&nbsp;Katheryne Pugliese,&nbsp;Alexis Acevedo","doi":"10.1111/1745-9133.12652","DOIUrl":"10.1111/1745-9133.12652","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research summary</h3>\u0000 \u0000 <p>Darknet marketplaces (DNMs) are global digital marketplaces used primarily to buy and sell illicit drugs online. High rates of adulterated substances have contributed to the creation of harm reduction policies by DNM administrators to address growing rates of overdose worldwide. This paper explores the extent to which harm reduction occurs in buyer feedback of Adderall and Oxycodone purchased on AlphaBay and how these comments are impacted by AlphaBay's administrator-led “harm reduction” policy. This study finds that harm reduction strategies are present in buyer feedback of Oxycodone and Adderall pills, but AlphaBay's policy has very little impact on the preexisting harm reduction communication within buyer feedback.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy implications</h3>\u0000 \u0000 <p>International policy proposals have placed emphasis on addressing the overdose crisis through harm reduction programs that provide people who use drugs with the necessary services and resources to buy and use drugs safely. There have been very few proposals that have considered how these programs can address the unique setting of buying and using drugs purchased on DNMs. Communication occurring among DNM buyers reveals how harm reduction strategies are being employed by users purchasing drugs from DNMs. In particular, these findings offer insight into the shared experiences of drug buyers in anonymous settings and the strategies they are using to protect one another from overdose and other unwanted side effects often caused by adulterated substances. Understanding these strategies highlights the ways in which street-based harm reduction programs can extend their services to online environments to assist buyers with making safe and informed decisions when using substances purchased online.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"695-733"},"PeriodicalIF":4.6,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12652","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding markers of trust within the online stolen data market: An examination of vendors’ signaling behaviors relative to product price point 了解在线被盗数据市场中的信任标志:供应商相对于产品价格点的信号行为研究
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-11 DOI: 10.1111/1745-9133.12651
Jin R. Lee

Research Summary

The current study examined 1055 stolen data products across 40 vendors on the Open and Dark Web to determine whether different product- and vendor-level behaviors predicted vendors’ trustworthiness as reflected in their product price point. Understanding the mechanisms that convey trust in the underground marketplace is crucial as it could help law enforcement target serious actors and disrupt the larger marketplace. Findings suggest the online stolen data market may resemble an uninformative cost condition where buyers are unable to accurately differentiate credible sellers due to the obscure nature of signaling behaviors.

Policy Implications

Law enforcement would benefit from designing fake shops and deceptive forum posts that transmit mixed signals to complicate market participants’ process of interpreting trust signals as intended. These interventions would generate high levels of risk that encourage both buyers and sellers to exit the online illicit marketplace without needing law enforcement arrests. Law enforcement could also target prominent market facilitators to generate a larger disruption that prevents actors from continuing their illicit behavior.

目前的研究调查了开放和黑暗网络上40家供应商的1055种被盗数据产品,以确定不同的产品和供应商级别的行为是否能预测供应商的可信度,这反映在他们的产品价格点上。了解地下市场中传递信任的机制至关重要,因为它可以帮助执法部门针对严重行为者,扰乱更大的市场。研究结果表明,在线被盗数据市场可能类似于一种无信息成本的情况,即由于信号行为的模糊性,买家无法准确区分可信的卖家。
{"title":"Understanding markers of trust within the online stolen data market: An examination of vendors’ signaling behaviors relative to product price point","authors":"Jin R. Lee","doi":"10.1111/1745-9133.12651","DOIUrl":"10.1111/1745-9133.12651","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>The current study examined 1055 stolen data products across 40 vendors on the Open and Dark Web to determine whether different product- and vendor-level behaviors predicted vendors’ trustworthiness as reflected in their product price point. Understanding the mechanisms that convey trust in the underground marketplace is crucial as it could help law enforcement target serious actors and disrupt the larger marketplace. Findings suggest the online stolen data market may resemble an uninformative cost condition where buyers are unable to accurately differentiate credible sellers due to the obscure nature of signaling behaviors.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Law enforcement would benefit from designing fake shops and deceptive forum posts that transmit mixed signals to complicate market participants’ process of interpreting trust signals as intended. These interventions would generate high levels of risk that encourage both buyers and sellers to exit the online illicit marketplace without needing law enforcement arrests. Law enforcement could also target prominent market facilitators to generate a larger disruption that prevents actors from continuing their illicit behavior.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"665-693"},"PeriodicalIF":4.6,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12651","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers 为什么年轻人开始并继续进行道德黑客攻击?道德黑客生活中个人和社会方面的定性研究
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-11 DOI: 10.1111/1745-9133.12650
Judith E. Noordegraaf, Marleen Weulen Kranenbarg

Research Summary

This qualitative interview study examined individual and social aspects in the lives of 15 hackers who started with ethical hacking before the age of 18. We examined what motivated and stimulated them to start with ethical hacking and how and why they continued. Results show that individual aspects, such as an early interest in ICT (Information and Communication Technology), the motivation to make systems more secure, and thinking of reporting vulnerabilities as a moral duty, contribute to the initiation of ethical hacking. Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers. Similarly, positive reactions from public and private system owners can further stimulate the development and self-image of ethical hackers.

Policy Implications

In contrast to criminal hackers, ethical hackers improve cybersecurity, for example, by reporting weaknesses or errors in computer systems. Nowadays, an increasing number of public and private organizations around the world are creating cybersecurity policies and practices around ethical hacking. The interest in hacking usually arises at an early age, making it important to gain knowledge about what stimulates and motivates young people to start and continue with ethical hacking, to inform these policies and practices. Our results show that recognition and reactions from system owners are important in the ethical hacking career. Our recommendations based on these results could stimulate more young people to take the ethical path. Simultaneously, this increases the security of public and private organizations, reducing opportunities for criminal hackers.

这项定性访谈研究调查了15名黑客生活中的个人和社会方面,这些黑客在18岁之前就开始进行道德黑客攻击。我们研究了是什么促使和激励他们从道德黑客行为开始,以及他们如何以及为什么继续。结果表明,个人方面,如早期对ICT(信息和通信技术)的兴趣、使系统更安全的动机,以及将报告漏洞视为一项道德义务,都有助于引发道德黑客行为。社会方面,如榜样,主要在道德黑客职业的进一步发展中发挥作用。例如,同龄人、父母、朋友和黑客社区对年轻的道德黑客具有激励和激励作用。同样,公共和私人系统所有者的积极反应可以进一步刺激道德黑客的发展和自我形象。
{"title":"Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers","authors":"Judith E. Noordegraaf,&nbsp;Marleen Weulen Kranenbarg","doi":"10.1111/1745-9133.12650","DOIUrl":"10.1111/1745-9133.12650","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This qualitative interview study examined individual and social aspects in the lives of 15 hackers who started with ethical hacking before the age of 18. We examined what motivated and stimulated them to start with ethical hacking and how and why they continued. Results show that individual aspects, such as an early interest in ICT (Information and Communication Technology), the motivation to make systems more secure, and thinking of reporting vulnerabilities as a moral duty, contribute to the initiation of ethical hacking. Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers. Similarly, positive reactions from public and private system owners can further stimulate the development and self-image of ethical hackers.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>In contrast to criminal hackers, ethical hackers improve cybersecurity, for example, by reporting weaknesses or errors in computer systems. Nowadays, an increasing number of public and private organizations around the world are creating cybersecurity policies and practices around ethical hacking. The interest in hacking usually arises at an early age, making it important to gain knowledge about what stimulates and motivates young people to start and continue with ethical hacking, to inform these policies and practices. Our results show that recognition and reactions from system owners are important in the ethical hacking career. Our recommendations based on these results could stimulate more young people to take the ethical path. Simultaneously, this increases the security of public and private organizations, reducing opportunities for criminal hackers.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"803-824"},"PeriodicalIF":4.6,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“I knew it was a scam”: Understanding the triggers for recognizing romance fraud “我知道这是一个骗局”:了解识别浪漫骗局的诱因
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-06 DOI: 10.1111/1745-9133.12645
Cassandra Cross

Research Summary

This article investigates the contributing factors (or triggers) to a realization of romance fraud victimization, based on 1015 reports lodged with Scamwatch (Australian online reporting portal for fraud) between July 2018 and July 2019 (inclusive). The article examines the free text narrative of each report to propose five discernible trigger categories: further requests for money; characteristics of communications; verification checks; an offender's action(s); and being told by a third party.

Policy Implications

Based on a comprehensive understanding of these five categories, the article advocates for broader messaging approaches to encompass financial literacy and well-being, cyberliteracy and critical thinking skills, cybersecurity practices, and respectful and healthy relationships. Leveraging the use of these wider education and awareness campaigns could improve recognition of romance fraud. Importantly, it is suggested that banks and other financial institutions are in a strong position to focus their efforts on some of these broader messages to effect positive change.

本文基于2018年7月至2019年7月(含)期间向Scamwatch(澳大利亚欺诈在线报告门户网站)提交的1015份报告,调查了导致浪漫欺诈受害的因素(或触发因素)。这篇文章审查了每份报告的自由文本叙述,提出了五个明显的触发类别:进一步的资金请求;通信特性;核查;罪犯的行为;并被第三方告知。
{"title":"“I knew it was a scam”: Understanding the triggers for recognizing romance fraud","authors":"Cassandra Cross","doi":"10.1111/1745-9133.12645","DOIUrl":"10.1111/1745-9133.12645","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This article investigates the contributing factors (or triggers) to a realization of romance fraud victimization, based on 1015 reports lodged with Scamwatch (Australian online reporting portal for fraud) between July 2018 and July 2019 (inclusive). The article examines the free text narrative of each report to propose five discernible trigger categories: further requests for money; characteristics of communications; verification checks; an offender's action(s); and being told by a third party.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Based on a comprehensive understanding of these five categories, the article advocates for broader messaging approaches to encompass financial literacy and well-being, cyberliteracy and critical thinking skills, cybersecurity practices, and respectful and healthy relationships. Leveraging the use of these wider education and awareness campaigns could improve recognition of romance fraud. Importantly, it is suggested that banks and other financial institutions are in a strong position to focus their efforts on some of these broader messages to effect positive change.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"613-637"},"PeriodicalIF":4.6,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12645","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing nation-state-sponsored cyberattacks using aspects of Situational Crime Prevention 利用情景犯罪预防的各个方面评估国家支持的网络攻击
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-10-04 DOI: 10.1111/1745-9133.12646
Thomas J. Holt, Mae Griffith, Noah Turner, Emily Greene-Colozzi, Steven Chermak, Joshua D. Freilich

Research Summary

This study utilized a quantitative analysis of 246 cyberattack incidents reported in the Extremist CyberCrime Database to identify significant predictors of nation-state-sponsored cyberattacks relative to those performed by non-nation-state-sponsored ideological actors. Clarke and Newman's Situational Crime Prevention framework for terrorism was used to identify differential opportunities to successfully affect targets on the basis of tools, weapons, and the ability to access targets in online settings. The analysis noted nation-state-sponsored attacks were less likely to use high-visibility attack methods and more likely to utilize attack methods leading to data breaches. In addition, they were more likely to target state governments and military entities relative to ideological actors.

Policy Implications

Nation-state attacks are more difficult to identify or mitigate while in process, requiring a more robust national cybersecurity policy framework to be implemented that moves beyond current practices. There is a need to better utilize all aspects of government, from legislation to grant funding, in order to deter cyberattacks from continuing into the future.

这项研究对极端主义网络犯罪数据库中报告的246起网络攻击事件进行了定量分析,以确定国家支持的网络攻击相对于非国家支持的意识形态行为者进行的网络攻击的重要预测因素。Clarke和Newman的恐怖主义情景犯罪预防框架用于根据工具、武器和在线环境中访问目标的能力,确定成功影响目标的不同机会。分析指出,国家支持的攻击不太可能使用高可见性攻击方法,更有可能使用导致数据泄露的攻击方法。此外,相对于意识形态行为者,他们更有可能针对州政府和军事实体。
{"title":"Assessing nation-state-sponsored cyberattacks using aspects of Situational Crime Prevention","authors":"Thomas J. Holt,&nbsp;Mae Griffith,&nbsp;Noah Turner,&nbsp;Emily Greene-Colozzi,&nbsp;Steven Chermak,&nbsp;Joshua D. Freilich","doi":"10.1111/1745-9133.12646","DOIUrl":"10.1111/1745-9133.12646","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>This study utilized a quantitative analysis of 246 cyberattack incidents reported in the Extremist CyberCrime Database to identify significant predictors of nation-state-sponsored cyberattacks relative to those performed by non-nation-state-sponsored ideological actors. Clarke and Newman's Situational Crime Prevention framework for terrorism was used to identify differential opportunities to successfully affect targets on the basis of tools, weapons, and the ability to access targets in online settings. The analysis noted nation-state-sponsored attacks were less likely to use high-visibility attack methods and more likely to utilize attack methods leading to data breaches. In addition, they were more likely to target state governments and military entities relative to ideological actors.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Nation-state attacks are more difficult to identify or mitigate while in process, requiring a more robust national cybersecurity policy framework to be implemented that moves beyond current practices. There is a need to better utilize all aspects of government, from legislation to grant funding, in order to deter cyberattacks from continuing into the future.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"825-848"},"PeriodicalIF":4.6,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12646","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Like aspirin for arthritis”: A qualitative study of conditional cyber-deterrence associated with police crackdowns on the dark web “就像阿司匹林治疗关节炎”:与警方打击暗网相关的条件网络威慑的定性研究
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-09-27 DOI: 10.1111/1745-9133.12642
David Décary-Hétu, Camille Faubert, Julien Chopin, Aili Malm, Jerry Ratcliffe, Benoît Dupont

Research summary

Crackdowns are law enforcement strategies based on the principles of deterrence theory, which stipulates that offenders are rational actors who will refrain from crime if perceived risks are higher than perceived benefits. Studies have shown that the effects of police street drug crackdowns are mostly short termed and followed by considerable displacement. In the early 2010s, an important part of illicit drug trades moved online to cryptomarkets, and law enforcement agencies have responded by engaging in online drug crackdowns. In this study, we focus on the perceptions of dark web users in order to determine, from a qualitative “data-driven” perspective, whether police online crackdowns may have a cyber-deterrent effect by analyzing 1796 forum posts. Our results show that these events trigger psychological and practical consequences that participants claim to have a conditional, although minor, deterrent effect. In the majority of cases, dark web users claimed to engage in several forms of spatial and tactical displacement.

Policy implications

Our study suggests that police crackdowns on the dark web have limited, short-term effectiveness in curbing illicit activities. It proposes that innovative policing approaches such as problem-oriented policing and “pulling levers/focused deterrence” strategies, which involve identifying key actors and engaging with them, be potentially extended to the dark web. While this approach is promising, it emphasizes the need for further research to assess its efficacy in the online realm, as it is a largely uncharted territory for law enforcement.

打击是基于威慑理论原则的执法策略,该理论规定,如果感知到的风险高于感知到的利益,罪犯是理性的行为者,他们会避免犯罪。研究表明,警方在街头打击毒品的效果大多是短期的,随之而来的是相当大的流离失所。2010年代初,非法毒品交易的一个重要部分转移到了加密市场,执法机构通过参与在线毒品打击行动做出了回应。在这项研究中,我们重点关注暗网用户的感知,以便通过分析1796条论坛帖子,从定性的“数据驱动”角度确定警方的网络打击是否具有网络威慑作用。我们的研究结果表明,这些事件会引发心理和实际后果,参与者声称这些后果具有有条件的、尽管很小的威慑作用。在大多数情况下,暗网用户声称参与了几种形式的空间和战术位移。
{"title":"“Like aspirin for arthritis”: A qualitative study of conditional cyber-deterrence associated with police crackdowns on the dark web","authors":"David Décary-Hétu,&nbsp;Camille Faubert,&nbsp;Julien Chopin,&nbsp;Aili Malm,&nbsp;Jerry Ratcliffe,&nbsp;Benoît Dupont","doi":"10.1111/1745-9133.12642","DOIUrl":"10.1111/1745-9133.12642","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research summary</h3>\u0000 \u0000 <p>Crackdowns are law enforcement strategies based on the principles of deterrence theory, which stipulates that offenders are rational actors who will refrain from crime if perceived risks are higher than perceived benefits. Studies have shown that the effects of police street drug crackdowns are mostly short termed and followed by considerable displacement. In the early 2010s, an important part of illicit drug trades moved online to cryptomarkets, and law enforcement agencies have responded by engaging in online drug crackdowns. In this study, we focus on the perceptions of dark web users in order to determine, from a qualitative “data-driven” perspective, whether police online crackdowns may have a cyber-deterrent effect by analyzing 1796 forum posts. Our results show that these events trigger psychological and practical consequences that participants claim to have a conditional, although minor, deterrent effect. In the majority of cases, dark web users claimed to engage in several forms of spatial and tactical displacement.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy implications</h3>\u0000 \u0000 <p>Our study suggests that police crackdowns on the dark web have limited, short-term effectiveness in curbing illicit activities. It proposes that innovative policing approaches such as problem-oriented policing and “pulling levers/focused deterrence” strategies, which involve identifying key actors and engaging with them, be potentially extended to the dark web. While this approach is promising, it emphasizes the need for further research to assess its efficacy in the online realm, as it is a largely uncharted territory for law enforcement.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"639-664"},"PeriodicalIF":4.6,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12642","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does scientific research change minds? Linking criminology and public perceptions of policing 科学研究会改变人们的想法吗?将犯罪学与公众对警务的看法联系起来
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-09-24 DOI: 10.1111/1745-9133.12644
Hunter M. Boehme, Ian T. Adams, Christi Metcalfe, Peter Leasure, Melissa S. Nolan

Research summary

This study investigates the impact of scientific research findings on public views of policing topics. Specifically, we conducted an original survey experiment to determine whether research information treatments influence respondents’ views on the effectiveness of the police in reducing crime, defunding and refunding police budgets, and use of body-worn cameras. Our results indicated that presenting confirmatory research information had a significant positive impact on perceptions of police effectiveness in reducing crime and use of body-worn cameras compared to comparison groups. Conversely, presenting “negative” research information had a significant negative effect on these perceptions. Interestingly, neither positive nor negative research information treatments related to defunding versus refunding the police had a statistically significant impact on respondents compared to comparison groups, suggesting that research findings have limited effects on more ideologically complex policing topics.

Policy implications

Scientific research can effectively shape public perceptions of police effectiveness in reducing crime and the use of body-worn cameras, but it has limited effects on politically charged issues, such as defunding and refunding the police. To enhance the impact of evidence-based policing, we suggest that police administrators collaborate with researchers to evaluate new policies and disseminate these findings widely to the public. Additionally, researchers should strive to make their research more accessible to the general public, beyond academic journals, scientific conferences, and paywalls. We recommend using open-access platforms, social media, and other media outlets to disseminate unbiased, evidence-based research on policing that is digestible to the public.

本研究调查了科学研究结果对公众警务主题看法的影响。具体而言,我们进行了一项原始的调查实验,以确定研究信息处理是否会影响受访者对警察在减少犯罪、削减和退还警察预算以及使用随身携带的摄像头方面的有效性的看法。我们的研究结果表明,与对照组相比,提供验证性研究信息对警察在减少犯罪和使用随身携带的摄像头方面的有效性有显著的积极影响。相反,呈现“负面”研究信息对这些认知产生了显著的负面影响。有趣的是,与对照组相比,无论是与撤资还是向警察退款相关的积极或消极研究信息处理对受访者都没有统计学上的显著影响,这表明研究结果对意识形态更复杂的警务主题的影响有限。
{"title":"Does scientific research change minds? Linking criminology and public perceptions of policing","authors":"Hunter M. Boehme,&nbsp;Ian T. Adams,&nbsp;Christi Metcalfe,&nbsp;Peter Leasure,&nbsp;Melissa S. Nolan","doi":"10.1111/1745-9133.12644","DOIUrl":"10.1111/1745-9133.12644","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research summary</h3>\u0000 \u0000 <p>This study investigates the impact of scientific research findings on public views of policing topics. Specifically, we conducted an original survey experiment to determine whether research information treatments influence respondents’ views on the effectiveness of the police in reducing crime, defunding and refunding police budgets, and use of body-worn cameras. Our results indicated that presenting confirmatory research information had a significant positive impact on perceptions of police effectiveness in reducing crime and use of body-worn cameras compared to comparison groups. Conversely, presenting “negative” research information had a significant negative effect on these perceptions. Interestingly, neither positive nor negative research information treatments related to defunding versus refunding the police had a statistically significant impact on respondents compared to comparison groups, suggesting that research findings have limited effects on more ideologically complex policing topics.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy implications</h3>\u0000 \u0000 <p>Scientific research can effectively shape public perceptions of police effectiveness in reducing crime and the use of body-worn cameras, but it has limited effects on politically charged issues, such as defunding and refunding the police. To enhance the impact of evidence-based policing, we suggest that police administrators collaborate with researchers to evaluate new policies and disseminate these findings widely to the public. Additionally, researchers should strive to make their research more accessible to the general public, beyond academic journals, scientific conferences, and paywalls. We recommend using open-access platforms, social media, and other media outlets to disseminate unbiased, evidence-based research on policing that is digestible to the public.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 1","pages":"201-224"},"PeriodicalIF":4.6,"publicationDate":"2023-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12644","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effects of confessions on misconduct and guilty pleas in exonerations: Implications for discovery policies 供词对无罪释放中不当行为和认罪的影响:对发现政策的启示
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-09-20 DOI: 10.1111/1745-9133.12643
Talley Bettens, Allison D. Redlich

Research Summary

Using data from the National Registry of Exonerations, we examined how the presence of confession evidence impacts prosecutors’ tendency in order to (1) commit misconduct in any form (e.g., permitting perjury and witness tampering) and (2) specifically withhold exculpatory evidence (i.e., evidence favorable to the defense). We assess these relationships particularly in the context of wrongful convictions by guilty plea from an innocent individual (i.e., false guilty plea [FGP]) or guilty verdict at trial. We show the presence of false confessions increased the likelihood of (1) prosecutors engaging in misconduct generally and (2) prosecutors withholding exculpatory evidence specifically. However, the presence of prosecutorial misconduct and withholding evidence decreased the odds of a wrongful conviction via an FGP compared to wrongful conviction via guilty verdict.

Policy Implications

Policies encouraging prosecutorial transparency and accountability are needed in order to better identify misconduct when it occurs, particularly in the context of guilty pleas. Open-file discovery policies, which aim to provide full transparency, may prevent prosecutors from intentionally or unintentionally withholding evidence when faced with strong evidence like a confession, which could ultimately decrease the potential of wrongful conviction.

利用国家免罪登记处的数据,我们研究了供词证据的存在如何影响检察官的倾向,以便(1)犯下任何形式的不当行为(例如,允许作伪证和篡改证人)和(2)特别扣留开脱罪责的证据(即有利于辩方的证据)。我们评估这些关系,特别是在无辜个人认罪(即虚假认罪[FGP])或审判中有罪判决的错误定罪的情况下。我们发现,虚假供词的存在增加了(1)检察官普遍不当行为的可能性,以及(2)检察官具体隐瞒开脱罪责证据的可能性。然而,与通过有罪判决错误定罪相比,检察官的不当行为和隐瞒证据的存在降低了通过FGP错误定罪的几率。
{"title":"The effects of confessions on misconduct and guilty pleas in exonerations: Implications for discovery policies","authors":"Talley Bettens,&nbsp;Allison D. Redlich","doi":"10.1111/1745-9133.12643","DOIUrl":"10.1111/1745-9133.12643","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>Using data from the National Registry of Exonerations, we examined how the presence of confession evidence impacts prosecutors’ tendency in order to (1) commit misconduct in any form (e.g., permitting perjury and witness tampering) and (2) specifically withhold exculpatory evidence (i.e., evidence favorable to the defense). We assess these relationships particularly in the context of wrongful convictions by guilty plea from an innocent individual (i.e., false guilty plea [FGP]) or guilty verdict at trial. We show the presence of false confessions increased the likelihood of (1) prosecutors engaging in misconduct generally and (2) prosecutors withholding exculpatory evidence specifically. However, the presence of prosecutorial misconduct and withholding evidence decreased the odds of a wrongful conviction via an FGP compared to wrongful conviction via guilty verdict.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>Policies encouraging prosecutorial transparency and accountability are needed in order to better identify misconduct when it occurs, particularly in the context of guilty pleas. Open-file discovery policies, which aim to provide full transparency, may prevent prosecutors from intentionally or unintentionally withholding evidence when faced with strong evidence like a confession, which could ultimately decrease the potential of wrongful conviction.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 1","pages":"179-199"},"PeriodicalIF":4.6,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12643","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deregulation of public civilian gun carrying and violent crimes: A longitudinal analysis 1981–2019 放松对公众携带枪支和暴力犯罪的管制:1981年至2019年的纵向分析
IF 3.5 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-09-19 DOI: 10.1111/1745-9133.12638
Mitchell L. Doucette, Cassandra K. Crifasi, Alex D. McCourt, Julie A. Ward, Rebecca L. Fix, Daniel W. Webster

Research Summary

We utilized the synthetic difference-in-difference method to estimate the impact of adopting a permitless concealed carry weapons (CCW) law on rates of assaults, robberies, and homicides committed with a firearm and by other means, as well as weapons arrests, from 1981 to 2019. We stratified permitless CCW laws by whether they previously prohibited violent misdemeanants from obtaining a CCW permit or previously required live firearm training to obtain a permit prior to law adoption. Findings robust to sensitivity analyses suggest that states that lost a training requirement to obtain a CCW permit had 21 additional gun assaults per 100,000 population (SE = 5.2) (32% increase).

Policy Implications

In the wake of the Supreme Court's decision in New York State Rifle & Pistol Association, Inc. v. Bruen, states should implement CCW permitting law provisions that may reduce the risk of firearm violence. Requiring live firearm training prior to carry a concealed weapon may attenuate negative health impacts of deregulation associated with permitless CCW laws.

我们利用综合差异法来估计1981年至2019年采用无许可隐蔽携带武器法对使用枪支和其他手段实施袭击、抢劫和凶杀以及武器逮捕率的影响。我们根据之前是否禁止暴力轻罪获得《特定常规武器公约》许可证,或之前是否要求实弹训练以在法律通过前获得许可证,对无许可的《特定常规弹药公约》法律进行了分层。敏感性分析的有力结果表明,失去获得《特定常规武器公约》许可证的培训要求的州每10万人口中有21起额外的枪支袭击事件(SE=5.2)(增加32%)。
{"title":"Deregulation of public civilian gun carrying and violent crimes: A longitudinal analysis 1981–2019","authors":"Mitchell L. Doucette,&nbsp;Cassandra K. Crifasi,&nbsp;Alex D. McCourt,&nbsp;Julie A. Ward,&nbsp;Rebecca L. Fix,&nbsp;Daniel W. Webster","doi":"10.1111/1745-9133.12638","DOIUrl":"10.1111/1745-9133.12638","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>We utilized the synthetic difference-in-difference method to estimate the impact of adopting a <i>permitless</i> concealed carry weapons (CCW) law on rates of assaults, robberies, and homicides committed with a firearm and by other means, as well as weapons arrests, from 1981 to 2019. We stratified <i>permitless</i> CCW laws by whether they previously prohibited violent misdemeanants from obtaining a CCW permit or previously required live firearm training to obtain a permit prior to law adoption. Findings robust to sensitivity analyses suggest that states that lost a training requirement to obtain a CCW permit had 21 additional gun assaults per 100,000 population (SE = 5.2) (32% increase).</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>In the wake of the Supreme Court's decision in <i>New York State Rifle &amp; Pistol Association, Inc. v. Bruen</i>, states should implement CCW permitting law provisions that may reduce the risk of firearm violence. Requiring live firearm training prior to carry a concealed weapon may attenuate negative health impacts of deregulation associated with <i>permitless</i> CCW laws.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"23 4","pages":"833-861"},"PeriodicalIF":3.5,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12638","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory 是什么促使用户采用网络安全做法?保护动机理论评估的调查实验
IF 4.6 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY Pub Date : 2023-09-11 DOI: 10.1111/1745-9133.12641
Cassandra E. Dodge, Nathan Fisk, George W. Burruss, Richard K. Moule Jr., Chae M. Jaynes

Research Summary

A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so.

Policy Implications

The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users’ self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.

使用2×2×3的完全交叉因子实验来检验保护动机理论的关键维度(PMT;感知的风险严重性、易受风险影响性和响应成本)与在得知小插曲中的风险程度后采用信息技术(IT)网络安全建议的意图之间的联系。这项研究的数据包括720名美国成年人的全国性样本。一系列分数逻辑回归的结果表明支持PMT中的许多核心机制。70%的受访者表示,他们可能会遵循IT建议来减轻网络威胁。自我效能和反应成本影响了这样做的意图。
{"title":"What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory","authors":"Cassandra E. Dodge,&nbsp;Nathan Fisk,&nbsp;George W. Burruss,&nbsp;Richard K. Moule Jr.,&nbsp;Chae M. Jaynes","doi":"10.1111/1745-9133.12641","DOIUrl":"10.1111/1745-9133.12641","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Research Summary</h3>\u0000 \u0000 <p>A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Policy Implications</h3>\u0000 \u0000 <p>The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users’ self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.</p>\u0000 </section>\u0000 </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"849-868"},"PeriodicalIF":4.6,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12641","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Criminology & Public Policy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1