The perils of methods that detect lies 70% of the time: A reply to Ben‐Shakhar and Verschuere (2024)
The perils of methods that detect lies 70% of the time: A reply to Ben‐Shakhar and Verschuere (2024) Abstract Ben-Shakhar and Verschuere (2024) commented on Brennen and Magnussen's (2023) review…
Standardized risk levels for violent recidivism risk assessed with the HCR-20: an exploration
Standardized risk levels for violent recidivism risk assessed with the HCR-20: an exploration . Maaike van Dooren Wineke J. Smid Katarzyna Uzieblo Marije Keulen-de Vos Vivienne de Vogel Robert Lehmann…
Child sexual exploitation (CSE) networks: reassembling structure and activity
Child sexual exploitation (CSE) networks: reassembling structure and activity . Sophie Dixon Institute of Criminology, University of Cambridge, Cambridge, UK Read the syndicated article here
One of the Boys: On Researching the Far Right as a Woman
. Go to Source Author: Tamta Gelashvili Audrey Gagnon a Department of Political Science, University of Oslo, Oslo, Norwayb Center for Research on Extremism, University of Oslo, Oslo, Norway
Supply and Demand: Drivers of Women Non-Combat Participation in Rebel Groups
. Go to Source Author: Tobias Ide School of Humanities, Arts and Social Sciences, Murdoch University, Murdoch, Australia
What Has Love Got to Do with Cyber Dating Abuse: Indirect Effect of Attachment Style on Depressive Symptoms
What Has Love Got to Do with Cyber Dating Abuse: Indirect Effect of Attachment Style on Depressive Symptoms . Genta Kulari Universidade Autónoma de Lisboa, Lisboa, PortugalGenta Kulari is a…
Adolescent Binge Drinking: An Examination of Three Criminological Theories
Adolescent Binge Drinking: An Examination of Three Criminological Theories . George E. Higgins Catherine D. Marcum Fredrick A. Williams Jason Nicholson Sifat E. Rahman a University of Louisville, Louisville, KY,…
A Video Data Analysis of Pet Theft Incidents: An Examination of Offense Form, Situational Dynamics, & Offender Characteristics
A Video Data Analysis of Pet Theft Incidents: An Examination of Offense Form, Situational Dynamics, & Offender Characteristics . Ben Stickle Brenda Vose J. Mitchell Miller a Middle Tennessee State…
Are Active Users the Most Central to Hacker Social Networks? A Comparative Analysis of Public and Private Online Network Structures Among Hackers
Are Active Users the Most Central to Hacker Social Networks? A Comparative Analysis of Public and Private Online Network Structures Among Hackers . Olga Smirnova Thomas S. Hyslip Thomas J.…
The Waxing and Waning of Criminological Citation Careers of Scholars and Works, 1986-2020
The Waxing and Waning of Criminological Citation Careers of Scholars and Works, 1986-2020 . Ellen G. Cohn David P. Farrington a Department of Criminology and Criminal Justice, Affiliated Faculty, Center…
Future security threats arising from the UK’s deprivation of citizenship: a model to understand the human rights-security risk landscape
Future security threats arising from the UK’s deprivation of citizenship: a model to understand the human rights-security risk landscape . Erika Brady School of Law, Policing and Social Sciences, Canterbury…
In the Discomfort Zone: Emotional Labour and Reflexivity in Field Research on Extremism
. Go to Source Author: Fiore Geelhoed Joel Busher Léa Massé Lana De Pelecijn a Department of Law, Society, and Crime, Erasmus University Rotterdam, Rotterdam, the Netherlandsb Centre for Trust,…