Book review: Marian Filar and Jarosław Utrat-Milecki (eds), Kulturowe uwarunkowania polityki kryminalnej (Cultural Determinants of Criminal Policy)

Book review: Marian Filar and Jarosław Utrat-Milecki (eds), Kulturowe uwarunkowania polityki kryminalnej (Cultural Determinants of Criminal Policy) Crime, Media, Culture, Volume 14, Issue 1, Page 124-127, March 2018. Piotr Żuk…
continue reading

Book review: Lizbet Simmons, The Prison School: Educational Inequality and School Discipline in the Age of Mass Incarceration

Book review: Lizbet Simmons, The Prison School: Educational Inequality and School Discipline in the Age of Mass Incarceration Crime, Media, Culture, Volume 14, Issue 1, Page 127-130, March 2018. Kaitlyn…
continue reading

What influences social outcomes among offenders with personality disorder: A systematic review

What influences social outcomes among offenders with personality disorder: A systematic review Criminal Behaviour and Mental Health, EarlyView. CatrionaConnell , VivekFurtado , Elizabeth , Swaran Read the syndicated article here
continue reading

The Efficacy of the Growing Pro-social Program in Reducing Anger, Shame, and Paranoia over Time in Male Prison Inmates: A Randomized Controlled Trial

The Efficacy of the Growing Pro-social Program in Reducing Anger, Shame, and Paranoia over Time in Male Prison Inmates: A Randomized Controlled Trial Journal of Research in Crime and Delinquency,…
continue reading

The Age of Lone Wolf Terrorism. By Mark S. Hamm and Ramon Spaaij (New York: Columbia University Press, 2017 pp. 307, £27.00)

The Age of Lone Wolf Terrorism. By Mark S. Hamm and Ramon Spaaij (New York: Columbia University Press, 2017 pp. 307, £) The Age of Lone Wolf Terrorism. By HammMark…
continue reading

Securing the Brisbane 2014 G20 in the Wake of the Toronto 2010 G20: ‘Failure-Inspired’ Learning in Public Order Policing

Securing the Brisbane 2014 G20 in the Wake of the Toronto 2010 G20: ‘Failure-Inspired’ Learning in Public Order Policing AbstractExtending inquiries into the dynamics underpinning the ‘iterative’ development of security…
continue reading