Law enforcement’s examination of vehicle crashes is often nested in the Data-Driven Approaches to Crime and Traffic Safety (DDACTS) framework which highlights the importance of hot spot analysis. To assist law enforcement efforts, this study explores how two additional spatial techniques, namely risk terrain modeling (RTM) and conjunctive analysis of case configurations (CACC), could be incorporated within the DDACTS framework. RTM was utilized to identify how the built, physical environment contributed to the risk of traffic incidents. RTM identified 6 risk factors related to the occurrence of vehicle crashes, and high-risk places were compared to hot spots on predictive accuracy. CACC was used to explore configurations likely to result in traffic incidents for the priority places. Our findings support the Theory of Risky Places and fit within a vulnerability-exposure framework, providing law enforcement with guidance for identifying places where vehicle crashes are likely to occur in the future. In addition to providing insight for law enforcement, we discuss how law enforcement can develop working partnerships with stakeholders capable of preventing and/or reducing traffic incidents, which is in line with the general DDACTS framework.
The Public Perceptions of Child Welfare Scale measures how the social environment influences child welfare workers, including their job satisfaction and intent to leave. Psychometric studies have validated the scale for private child welfare workers, but there are no validation studies with public agency staff. This study fills that gap, showing stigma and respect are important constructs that also predict worker intent to leave. This research found an additional construct, blame, which was not present in private worker validation studies. The scale provides an important tool for the field as we continue to build evidence for effective recruitment and retention. 相似文献
The use of paramilitary methods in civil policing tasks has become common in Western police agencies. Despite propositions that such methods should undermine the relationship between the police and the public, the effect of paramilitary policing on public trust in the police has not been empirically tested. In the present study, we examine this question in the context of protest policing, which has become a major concern for Western police agencies. Using a survey of 470 protesters who participated in “Occupy” protest events in Israel in 2012, we find that the perceived use of paramilitary methods has an independent and negative effect on trust, stronger than that of police effectiveness and the “neutrality” component of procedural justice. In‐depth interviews suggest that the significance of paramilitarism may be the result of a sense of alienation and criminalization it elicits among protesters who generally perceive themselves as law‐abiding citizens. 相似文献
This article examines how parties organize legislative speech. Electoral incentives and legislative institutions affect speech participation. When electoral systems create personal vote‐seeking incentives, parties are less concerned with screening speeches and more supportive of members seeking to garner name recognition. But in many countries, legislative rules and norms constrain opportunities for individual position taking during the lawmaking debates. We argue that parties resolve this dilemma by organizing speech participation into nonlegislative speeches and lawmaking debates. In each instance, different types of legislators are more likely to speak. We examine the case of Chile and test the implications of our theory with data on congressional speeches. 相似文献
Despite important progress in knowledge about interview ‘best practice’ with child victims, few studies had yet evaluated the impact of interviewers’ personal characteristics on adherence to these ‘best practice’. This study was designed to determine whether interviewers’ personal characteristics are associated with adherence to a structured interview protocol (National Institute of Child and Human Development), the use of open-ended questions and the amount of details provided in children’s responses during investigative interviews with alleged victims of child sexual abuse. 114 interviews were scored from 13 police investigators after they followed a one-week training program. Results showed that experience, emotional intelligence, Extraversion, Agreeableness, Conscientiousness and Neuroticism were related with adherence to the protocol and ratio of open-ended questions. Cognitive abilities were related to the amount of details obtained from the child. Generalized estimating equations were used to compare relative contribution of each variable. These findings raise questions about how investigative interviewers are selected and trained. 相似文献
Family factors have long been considered an important contributor to the criminogenic process. Family Preservation (FP) programs attempt to improve family functioning and, thereby, dissuade future delinquency. Despite years of delivery, the limited research concerning the influence of FP programs on juvenile delinquency remains inconclusive.
Methods
This study examined the effectiveness of an FP program implemented in a metropolitan county of a large Southern state. Subjects were adjudicated male juveniles referred to the program by the courts. Recidivism outcomes for FP participants were compared against those of a simple random sample of non-participants.
Results
Findings suggest that FP does not impact recidivism among study participants. Issues with treatment fidelity may be responsible for the lack of results for this program.
Conclusion
These findings fail to lend support to the FP program. However, they do demonstrate the importance of treatment fidelity in juvenile justice programming. 相似文献
Regional prosperity increasingly depends on a region’s capacity to have command over the production of ideas. Measuring the
production of ideas with patents, the objective of this paper is to analyze how the number of utility patents granted to inventors
in U.S. States in different technologies changed between 1997 and 2007 and how States took advantage of the new opportunities
and adapted to the changing technology landscape. The paper uses shift-share analysis, traditionally used in employment studies,
for analyzing change in patents by technology categories developed by the NBER. The shift-share results show that only a few
states were able to take advantage of the information technology driven increases in patents. California dominates in patent
production and may be providing spillover benefits to neighboring states. The shift-share decompositions are used as variables
in a fixed-effect panel-regression model of state economic growth. The regression results show that the shift-share decompositions
provide statistically significant information in explaining growth after accounting for a State’s stock of patents, suggesting
that States should concentrate on effective ways to boost their stock of knowledge in rapidly growing technologies to improve
state economic growth. 相似文献
The use of computers in the commission of crime, so-called ??cybercrime??, presents a considerable challenge to law enforcement. Central to the prosecution of cybercrime is the offence of unauthorised access to a computer, or ??hacking??. Originally conceived of as analogous to trespass, the trend in some jurisdictions has been toward punishing access to computer data per se. This issue also arises under the Council of Europe Convention on Cybercrime which criminalizes ??offences against the confidentiality, integrity and availability of computer data and systems??. As the criminal law traditionally provides protection only to limited forms of information, the increasing use of the criminal law to protect computer data therefore confers on it a status not enjoyed by information stored in other forms. Drawing upon the laws of Australia, the United Kingdom and the United States, this article explores the increasing criminalization of access to computer data. It describes the evolution of cybercrime laws and considers ways in which problems of over breadth may be avoided. Questions will also be raised as to the appropriate role of the criminal law in protecting information. 相似文献
We present a formal model of an intelligence agency that must divide its resources between the collection and analysis of information pertaining to terror plots. The model highlights the negative consequences of queues which form when collection exceeds analytic capacity. We incorporate the response of a terrorist organization to the operating characteristics of the intelligence system it faces, and solve for equilibrium strategies for the intelligence system and terrorist organization. Our results demonstrate the importance of properly balancing resources between collection and analysis, and stand in contrast to the observed state of overcollection in US intelligence agencies. 相似文献