![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Sociology, social studies > Crime & criminology > General
Provides an in-depth understanding of how certain features of ASD may provide the context of vulnerability to engaging in a number of types of offending behaviours Written by a world-leading expert in the field of violent crime and its relationship to ASD Evidence-based, practical guide to working with Suspects, Defendants and Offenders with Autism, making it suitable for both researchers and professionals across Psychology and Legal domains
In September 2001, the world witnessed the horrific events of 9/11. A great deal has happened on the counterterrorist front in the 20 years since. While the terrorist threat has greatly diminished in Northern Ireland, the events of 9/11 and their aftermath have ushered in a new phase for the rest of the UK with some familiar, but also many novel, characteristics. This ambitious study takes stock of counterterrorism in Britain in this anniversary year. Assessing current challenges, and closely mirroring the 'four Ps' of the official CONTEST counterterrorist strategy - Protect, Prepare, Prevent, and Pursue - it seeks to summarize and grasp the essence of domestic law and policy, without being burdened by excessive technical detail. It also provides a rigorous, context-aware, illuminating, yet concise, accessible, and policy-relevant analysis of this important and controversial subject, grounded in relevant social science, policy studies, and legal scholarship. This book will be an important resource for students and scholars in law and social science, as well as human rights, terrorism, counterterrorism, security, and conflict studies.
Cyberstalking is an entirely new form of deviant behavior that uses technology to harass others in a variety of ways. In less than a decade, our reliance on the Internet, email, instant messaging, chat rooms, and other communications technologies has made cyberstalking a growing social problem that can affect computer users anywhere in the world. This is the first book devoted entirely to an examination of cyberstalking, providing an overview of the problem, its causes and consequences, and practical advice for protecting yourself and your loved ones. New technologies have enriched our lives in countless ways. Yet these technologies can easily be misused to frighten, intimidate, coerce, harass, and victimize unsuspecting users. Cyberstalking is an entirely new form of deviant behavior that uses technology to harass others in a variety of ways. In less than a decade, our reliance on the Internet, email, instant messaging, chat rooms, and other communications technologies has made cyberstalking a growing social problem that can affect computer users anywhere in the world. This is the first book devoted entirely to an examination of cyberstalking, providing an overview of the problem, its causes and consequences, and practical advice for protecting yourself and your loved ones. Although cyberstalking usually involves one person pursuing another, this is not always the case. As the behavior has evolved, it has come to include such acts as stock market fraud, identity theft, sexual harassment, data theft, impersonation, consumer fraud, computer monitoring, and attacks by political groups on government services. More disturbingly, pornographers and pedophiles have begun to use cyberstalking as a way of locating new victims. While cyberstalking has become a worldwide problem, most cases originate in the United States, making Americans the most vulnerable group of targets. Bocij carefully delineates the boundaries of cyberstalking, providing real-life examples, guidance for avoiding the pitfalls, and suggestions for what to do if you fall victim.
Tavistock Press was established as a co-operative venture between the Tavistock Institute and Routledge & Kegan Paul (RKP) in the 1950s to produce a series of major contributions across the social sciences. This volume is part of a 2001 reissue of a selection of those important works which have since gone out of print, or are difficult to locate. Published by Routledge, 112 volumes in total are being brought together under the name The International Behavioural and Social Sciences Library: Classics from the Tavistock Press. Reproduced here in facsimile, this volume was originally published in 1977 and is available individually. The collection is also available in a number of themed mini-sets of between 5 and 13 volumes, or as a complete collection.
This book is a practical and thoughtful guide for the forensic interview of children, presenting a synthesis of the empirical and theoretical knowledge necessary to understand the account of child victims of abuse or witnesses of crime. It is a complex task to interview children who are suspected of being abused in order to gather their stories, requiring the mastery of many skills and knowledge. This book is a practical one in that constant links are made between the results of the research and their relevance for the interventions made when interviewing child victims of abuse or witnesses of crime and in understanding their accounts. This book also presents in a detailed and concrete way the revised version of the National Institute of Child Health and Human Development (NICHD-R) Protocol, a forensic structured interview guide empirically supported by numerous studies carried out in different countries. The step-by-step explanations are illustrated with a verbatim interview with a child, as well as other tools to help the interviewer to prepare and handle an efficient and supportive interview. Conducting Interviews with Child Victims of Abuse and Witnesses of Crime is essential reading for stakeholders in the justice, social and health systems as well as anyone likely to receive allegations from children such as educators or daycare staff. Although the NICHD-R Protocol is intended for forensic interviewers, the science behind its development and application is relevant to all professionals working with children.
Sexual crime, past and present, is rarely far from the headlines. How these crimes are punished, policed and understood has changed considerably over the last century. From hormone injections to cognitive behavioural therapy, medical and psychological approaches to sexual offenders have proliferated. This book sets out the history of such theories and treatments in England. Beginning in the early 20th century, it traces the evolution of medical interest in the mental state of those convicted of sexual crime. As part of a broader interest in individualised responses to crime as a means to rehabilitation, doctors offered new explanations for some sexual crimes, proposed new solutions, and attempted to deliver new cures. From indecent exposure to homosexuality between men, from sadistic violence to thefts of underwear from washing lines, the interpretation and treatment of some sexual offences was thought to be complex. Of less medical interest, though, were offences against children, prostitution, and rape. Using a range of material, including medical and criminological texts, trial proceedings, government reports, newspapers, and autobiographies and memoirs, Janet Weston offers powerful insights into changing medico-legal practices and attitudes towards sex and health. She highlights the importance of prison doctors and rehabilitative programmes within prisons, psychoanalytically-minded private practitioners, and the interactions between medical and legal systems as medical theories were put into practice. She also reveals the extent and legacy of medical thought, as well as the limitations of a medical approach to sexual crime.
This volume fills a research gap of striking proportions by exploring the contingencies that mediate the crimes perpetrated on those who are themselves perpetrators. The notion that violence is something that happens only to law-abiding citizens is both widely held and inaccurate. The disproportionate share of victims of crime are, in reality, themselves involved in crime. Yet existing scholarship has failed to explore the contingencies that mediate offenses like drug robbery--from the forces that inspire it, to the methods used to select targets, to the means employed to generate compliance, down to the tactics used to thwart retaliatory attempts after the crime has ended. Given that predatory behavior between and among offenders ultimately spreads to society at large (the "contagion effect"), a research gap of striking proportions has emerged. The imprudence of robbing other criminals is widely assumed. Yet criminologists paradoxically observe that a major benefit of robbing fellow criminals is that they cannot report the offense to the authorities. Why, then, should offenders elect to reduce their odds of getting arrested at the cost of enhancing their chances of getting killed? Drawing on candid interviews with the perpetrators, Jacobs attempts to answer such questions and fill this gap in the research agenda of criminology. The result is a narrative that explores the world of street-corner drugs from the vantage point of those who actually commit these high-risk crimes. It also introduces serious ethical issues that criminology and law enforcement tend to gloss over or ignore entirely. This work is innovative and troubling at the same time. It takes a theme that Hollywood films have explored in greater depth than social science, and restores it as a crucial part of the ethnography of crime.
Terrorism Awareness: Understanding the Threat and How You Can Protect Yourself provides readers a foundational understanding of the threats that face us every day. The goal is to introduce readers to different tactics and techniques used by terrorists-both international and domestic-to better understand personal protection concepts and, if necessary, take actions to make themselves "hard targets" that terrorist organizations will want to avoid. This includes providing a background on understanding how terrorists operate, and, more specifically, how to recognize the pre-incident indicators associated with terrorist operations. Coverage includes situation awareness of the phases of terrorist operations, common attacks, surveillance and targeting tactics, kidnapping and hostage situations, bombings and blast effects, hijacking, armed assaults, and more. With such awareness, readers can be alert to common cues to avoid dangerous situations, as well as familiarize themselves with various actions they can take to better protect themselves. Sometimes certain events may arise which are unavoidable and, in those cases, learning how to best mitigate those scenarios can mean life or death and provide the best opportunity for safety and survival. Terrorism Awareness is a helpful guide to provide anyone working or traveling in the United States or overseas-particularly in potentially volatile places subject to terrorism or civil unrest-the tools they need to recognize potential threats and to keep themselves, and those they are with, safe.
Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It s not just computer hackers and cyber crooks who lurk in the dark corners of the Web the cops are there, too. In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose natural male enhancement pill inadvertently protected the privacy of your e-mail to the Russian spam king who ended up in a Milwaukee jail to the Australian arrest that ultimately led to the breakup of the largest child pornography ring in the United States, Anderson draws on interviews, court documents, and law-enforcement reports to reconstruct accounts of how online policing actually works. Questions of online crime are as complex and interconnected as the Internet itself. With each episode in The Internet Police, Anderson shows the dark side of online spaces but also how dystopian a fully ordered alternative would be."
Prosecutors are powerful figures in any criminal justice system. They decide what crimes to prosecute, whom to pursue, what charges to file, whether to plea bargain, how aggressively to seek a conviction, and what sentence to demand. In the United States, citizens can challenge decisions by police, judges, and corrections officials, but courts keep their hands off the prosecutor. Curiously, in the United States and elsewhere, very little research is available that examines this powerful public role. And there is almost no work that critically compares how prosecutors function in different legal systems, from state to state or across countries. Prosecutors and Politics begins to fill that void. Police, courts, and prisons are much the same in all developed countries, but prosecutors differ radically. The consequences of these differences are enormous: the United States suffers from low levels of public confidence in the criminal justice system and high levels of incarceration; in much of Western Europe, people report high confidence and support moderate crime control policies; in much of Eastern Europe, people's perceptions of the law are marked by cynicism and despair. Prosecutors and Politics unpacks these national differences and provides insight into this key area of social control. Since 1979 the Crime and Justice series has presented a review of the latest international research, providing expertise to enhance the work of sociologists, psychologists, criminal lawyers, justice scholars, and political scientists. The series explores a full range of issues concerning crime, its causes, and its cure.
Law regulates human behaviour, a phenomenon about which neuroscience has much to say. Neuroscience can tell us whether a defendant suffers from a brain abnormality, or injury and it can correlate these neural deficits with criminal offending. Using fMRI and other technologies it might indicate whether a witness is telling lies or the truth. It can further propose neuro-interventions to 'change' the brains of offenders and so to reduce their propensity to offend. And, it can make suggestions about whether a defendant knows or merely suspects a prohibited state of affairs; so, drawing distinctions among the mental states that are central to legal responsibility. Each of these matters has philosophical import; is a neurological 'deficit' inculpatory or exculpatory; what is the proper role for law if the mind is no more than the brain; is lying really a brain state and can neuroscience really 'read' the brain? In this edited collection, leading contributors to the field provide new insights on these matters, bringing to light the great challenges that arise when disciplinary boundaries merge.
The objective of Arab Criminology is to establish a criminological sub-field called 'Arab Criminology.' The ever-evolving field of criminology has advanced in the past decade, yet many impediments remain. Unlike criminology in Africa, Asia, the Americas, Europe, and Oceania based merely on geopolitical constructs, the Arab world has unique commonalities that do not exist in the other established sub-fields on criminology. The Arab world has largely remained in criminology's periphery despite the region's considerable importance to current international affairs. In response, this book explores two main questions: Why should we and how do we establish a sub-field in Arab Criminology? The authors examine the state of criminology in the Arab world, define its parameters, and present four components that bond and distinguish Arab criminology from other criminological area studies. They then identify the requirements for establishing Arab criminology and detail how local, regional, and international researchers can collaborate, develop, and expand the sub-field. Arab Criminology will challenge some of the recurrent Orientalist and Islamophobic tropes in Northern criminology and progress the discipline of criminology to reflect a more diverse focus that embraces regions from the Global South. Presenting compelling arguments and examples that support the establishment of this sub-field, Arab Criminology will be of great interest to Criminology, Criminal Justice, Legal Studies, and Middle Eastern/North African studies scholars, particularly those working on Southern Criminology, Comparative Criminology, International Criminal Justice Systems, and Arab studies.
This book addresses the challenges within teaching Criminology and Criminal Justice, for students studying and academics involved in designing and delivering courses at an undergraduate and postgraduate level. The book highlights a number of contemporary issues through a wide context of themes and reflections of practice. The chapters are arranged in thematic parts: firstly 'the challenges of diversity and inclusion' secondly 'challenges of creating authentic learning environments', and lastly 'the challenge of creating transformative conversation'. These themes discuss different teaching approaches and present materials which address questions relevant for meeting the challenges. The book focuses on the role and impact of teaching Criminology and Criminal Justice in the real world and explores debates which have autonomy in their questioning and overlapping themes. The narratives reflect upon others' experiences and explore transformative learning and innovation in Criminology and Criminal Justice.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
Despite massive investments in mitigation capabilities, financial crime remains a trillion-dollar global issue with impacts that extend well beyond the financial services industry. Worldwide, there are between $800 billion and $2 trillion laundered annually with the United States making up at least $300 billion of that figure. Although it is not possible to measure money laundering in the same way as legitimate economic activity, the scale of the problem is considered enormous. The cybersecurity landscape is always shifting, with threats becoming more sophisticated all the time. Managing risks in the banking and financial sectors requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Cybercrime is a global problem, which requires a coordinated international response. This book outlines the regulatory requirements that come out of cyber laws and showcases the comparison in dealing with AML/CFT and cybersecurity among the G-20, which will be of interest to scholars, students and policymakers within these fields.
This is the opening line of a letter hidden under a carpet for a decade. The chilling words are followed by a confession to a murder committed nearly 13 years earlier. The chance discovery of the letter on 31 March 2012 reawakens a case long considered to have run cold, and a hunt begins for the men who kidnapped and killed Betty Ketani - and were convinced they had gotten away with it. The investigation spans five countries, with a world-renowned DNA laboratory called in to help solve the forensic puzzle. The author of the confession letter might have feared death, but he is very much alive, as are others implicated in the crime. Betty Ketani, a mother of three, came to Johannesburg in search of better prospects for her family. She found work cooking at one of the city's most popular restaurants, and then one day she mysteriously disappeared. Those out to avenge her death want to bring closure to Betty's family, still agonising over her fate all these years later. The storyline would not be out of place as a Hollywood movie - and it's all completely true. Written by the reporter who broke the story, Cold Case Confession goes behind the headlines to share exclusive material gathered in four years of investigations, including the most elusive piece of the puzzle: who would want Betty Ketani dead, and why?
Political corruption has traditionally been presented as a phenomenon characteristic of developing countries, authoritarian regimes, or societies in which the value system favored tacit patrimony and clientelism. Recently, however, the thesis of an inverse correlation between corruption and economic and political development (and therefore democratic "maturity") has been frequently and convincingly challenged. Countries with a long democratic tradition, such as the United States, Belgium, Britain, and Italy, have all experienced a combination of headline-grabbing scandals and smaller-scale cases of misappropriation. In "Corrupt Exchanges," primary research on Italian cases (judicial proceedings, in-depth interviews, parliamentary documents, and press databases), combined with a cross-national comparison based on a secondary analysis of corruption in democratic systems, is used to develop a model to analyze corruption as a network of illegal exchanges. The authors explore in great detail the structure of that network, by examining both the characteristics of the actors who directly engage in the corruption and the resources they exchange. These processes of degeneration have caused a crisis in the dominant paradigm in both academic and political considerations of corruption. The book is organized around the analysis of the resources that are exchanged and of the different actors who take part. Politicians in business, illegal brokers, Mafia members, protected entrepreneurs, and party-appointed bureaucrats exchange resources on the illegal market, altering the institutional system of interactions between the state and the market. In this complex web of exchanges, bonds of trust are established that allow the corrupt exchange to thrive. The book will serve both as a theoretical approach to a political problem of large bearing on democratic institutions and a descriptive warning of a system in peril.
Sickle cell is a multi-system disorder that in the USA and the UK predominantly, but not exclusively, affects those of black and minority ethnic communities. The disorder is not widely understood, so, when a sudden death of a black man in official custody is blamed on sickle cell trait (for example, Martin Lee Anderson in the USA or Alton Manning in the UK) the worlds of health, criminal justice, and black politics collide. This ground-breaking book examines: The myths about sickle cell disease The context of racism in the criminal justice systems in the UK and USA The misuse of sickle cell trait to explain away sudden deaths in custody The historic neglect of health care within prisons in the UK and USA The lack of care for those with sickle cell disease within the criminal justice system The lessons both for criminal justice systems, and for human rights and sickle cell campaigners. The book will interest: Members of the sickle cell community, including families, voluntary groups, and sickle cell chapters Health professionals including doctors, nurses, counsellors, and specialist sickle cell workers Members of the legal profession, including those specializing in inquests, human rights, prison law, criminal law, actions against the police, immigration, and clinical negligence Those involved in the criminal justice system, including prison, police, court and probation services. Coroners and medical examiners Human rights, civil liberties, and justice organizations Advocacy agencies representing black communities University lecturers in criminology, sociology, social policy, 'race' and ethnic relations, law, nursing, and medicine
Community policing is "personalized policing" that involves the same officer patrolling the same areas on a permanent basis, operating from a decentralized ministation and working with citizens to identify and solve crime problems. Despite widespread public support for police department decentralization, permanent assignments, and the development of citizen/police partnerships with local communities, the issue remains a controversial one. Community policing necessarily requires a radical transformation of what police have traditionally done. Full adoption of community policing involves substantial organizational change, including the leveling of the bureaucratic hierarchy, and, unsurprisingly, there is considerable resistance to such changes within police departments. This book is an examination of the development of community policing in Seattle, Washington. Exploring the processes of legitimation, urban politics, and micro-organization, the author shows how one police department negotiated both the internal and external political pressures to create community policing -- and the level of success attained.
Winner, 2019 Goddard Riverside Stephan Russo Book Prize for Social Justice, given by the Goddard Riverside Community Center The impact of stop-and-frisk policing on a South Bronx community What's it like to be stopped and frisked by the police while walking home from the supermarket with your young children? How does it feel to receive a phone call from your fourteen-year-old son who is in the back of a squad car because he laughed at a police officer? How does a young person of color cope with being frisked several times a week since the age of 15? These are just some of the stories in No Place on the Corner, which draws on three years of intensive ethnographic fieldwork in the South Bronx before and after the landmark 2013 Floyd v. City of New York decision that ruled that the NYPD's controversial "stop and frisk" policing methods were a violation of rights. Through riveting interviews and with a humane eye, Jan Haldipur shows how a community endured this aggressive policing regime. Though the police mostly targeted younger men of color, Haldipur focuses on how everyone in the neighborhood-mothers, fathers, grandparents, brothers and sisters, even the district attorney's office-was affected by this intense policing regime and thus shows how this South Bronx community as a whole experienced this collective form of punishment. One of Haldipur's key insights is to demonstrate how police patrols effectively cleared the streets of residents and made public spaces feel off-limits or inaccessible to the people who lived there. In this way community members lost the very 'street corner' culture that has been a hallmark of urban spaces. This profound social consequence of aggressive policing effectively keeps neighbors out of one another's lives and deeply hurts a community's sense of cohesion. No Place on the Corner makes it hard to ignore the widespread consequences of aggressive policing tactics in major cities across the United States. |
You may like...
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, …
Paperback
(1)
Autopsy - Life In The Trenches With A…
Ryan Blumenthal
Paperback
(14)
The Profiler Diaries - From The Case…
Gerard Labuschagne
Paperback
(2)
Death And Taxes - How SARS Made Hitmen…
Johann van Loggerenberg
Paperback
|