Fighting and voting: Mapping electoral violence in the region of post-Communist Europe
Fighting and voting: Mapping electoral violence in the region of post-Communist Europe . Michal Mochtak Read the syndicated article here
Defected and loyal? A case study of counter-defection mechanisms inside Chechen paramilitaries
Defected and loyal? A case study of counter-defection mechanisms inside Chechen paramilitaries . Emil Aslan Souleimanov Read the syndicated article here
Old (Molotov) cocktails in new bottles? “Price-tag” and settler violence in Israel and the West Bank
Old (Molotov) cocktails in new bottles? “Price-tag” and settler violence in Israel and the West Bank . Ehud Eiran Read the syndicated article here
Ten “Rs” of social reaction: Using social media to analyse the “post-event” impacts of the murder of Lee Rigby
Ten “Rs” of social reaction: Using social media to analyse the “post-event” impacts of the murder of Lee Rigby . Martin Innes Read the syndicated article here
“The movement moves against you”: Coercive spoiler management in the Northern Ireland peace process
“The movement moves against you”: Coercive spoiler management in the Northern Ireland peace process . Peter F. Trumbore Read the syndicated article here
Legitimization Imperative: The Production of Crime Statistics in Guangzhou, China
Legitimization Imperative: The Production of Crime Statistics in Guangzhou, China AbstractAlthough an authoritarian regime is often assumed to manipulate its various statistics for political needs and to maintain its legitimacy,…
Did Nonviolent Resistance Fail in Kosovo?
Did Nonviolent Resistance Fail in Kosovo? AbstractA standard narrative is that nonviolence failed in Kosovo: the Milosevic regime was ended by a NATO bombing campaign. This essay exposes errors in…
The Challenges of Doing Criminology in the Big Data Era: Towards a Digital and Data-driven Approach
The Challenges of Doing Criminology in the Big Data Era: Towards a Digital and Data-driven Approach AbstractThis paper considers emerging challenges and opportunities confronting criminology in the age of Big…
Insider unauthorised use of authorised access: What are the alternatives to the Computer Misuse Act 1990?
Insider unauthorised use of authorised access: What are the alternatives to the Computer Misuse Act 1990? Publication date: December 2016Source:International Journal of Law, Crime and Justice, Volume 47 Author(s): Vasileios…
The gender of justice system: Women's access to justice in Turkey
The gender of justice system: Women's access to justice in Turkey Publication date: December 2016Source:International Journal of Law, Crime and Justice, Volume 47 Author(s): Duygu Hatıpoğlu-Aydın, Mustafa Berkay AydınAccess to…
Thou shalt not: Religiosity and attitudes toward marijuana legalization
Thou shalt not: Religiosity and attitudes toward marijuana legalization Publication date: December 2016Source:International Journal of Law, Crime and Justice, Volume 47 Author(s): Daniel James KrystosekSubstantial research supports the association between…
Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals
Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals Publication date: December 2016Source:International Journal of Law, Crime and Justice, Volume 47 Author(s): Suleman IbrahimThis article aims to establish…