Crime Control Essays (Examples)

Studyspark

Study Document Study Document

White Collar Criminal

Pages: 5 (1593 words) Sources: 3 Document Type:Essay Document #:32631423

… amount to an expense account.
The elements of the Opportunity Triangle (commit, conceal, convert) present in Miller’s case that allowed him to circumvent control when embezzling funds from Associated Communications consisted of the fact that he could get around the requirement for two signatures on checks by … company needed to disburse funds while the executive was away. He had the opportunity to do this and was able to conceal the crime by removing the canceled check from the bank reconciliation and destroying it. The stolen amount would then be charged…[break]…investigating any red flags. Records … fraud perpetrator who manages to evade the law because he is never prosecuted. When companies fail to press charges or fail to report crime like these to the authorities, they simply ensure that such crime will continue to happen in the future. Failure to report is the problem that they suffer from through……

References

References

Association of Certified Fraud Examiners. (2010). Who is Most Likely to Commit Fraud at Your Company? Retrieved from  https://www.acfe.com/press-release.aspx?id=1677 

Friedrichs, D. (2009). Trusted Criminals: White Collar Crime In Contemporary Society. Cengage Learning.

US Attorney’s Office. (2019). Attorney Convicted of Embezzling Over $1.5 Million from Virginia Senator, Canadian Business, and Autism Organization. Retrieved from https://www.justice.gov/usao-edva/pr/attorney-convicted-embezzling-over-15-million-virginia-senator-canadian-business-and-0

Studyspark

Study Document Study Document

Problems Faced By Gangs In America

Pages: 3 (933 words) Sources: 3 Document Type:Essay Document #:49701933

… ongoing informal or formal group, party, or alliance of at least three individuals whose primary activities include perpetrating at least one of the crime listed below: 1) attacking using a lethal weapon, 2) murder, 3) burglary, 4) selling or holding in possession for production, selling, offering for … lethal weapon, 2) murder, 3) burglary, 4) selling or holding in possession for production, selling, offering for sale, transporting, or offering to produce control substances, 5) arson, 6) shooting at any occupied automobile or inhabited house, 7) intimidating victims and witnesses, and 8) carrying out a grand … a common sign, symbol, or name, whose members have separately or, as a group, previously or currently participated in some pattern of hang crime (California Department of Justice, 1993).
Classification of Gangs
Depending on structural elements like size, age, ethnicities, sex, criminality, lifespan, and territoriality, besides conditions … such gangs include fights with……

References

References

California Department of Justice. (1993). Gangs 2000: A call to action. Sacramento, California: Department of Justice.

Department of Public Security. (2007). Definition and classification of gangs: Executive summary. Washington, DC: Organization of American States.

Sanchez-Jankowski, M. (2003). Gangs and social change. Theoretical Criminology, 7(2), 191-216. DOI: 10.1177/1362480603007002413.

Studyspark

Study Document Study Document

Criminal Justice Inequality And Conflict Theory

Pages: 3 (865 words) Document Type:Essay Document #:88382152

… emotional intelligence to read the situation and prevent it from escalating by keeping calm himself but staying firm. It is when officers lose control of their own emotions that escalation happens.
Discussion 3: According to conflict theory, what is “criminal justice inequality”? Provide an example.
Conflict theory … are in a struggle for power over those resources. As a result there is usually a group that has power and consolidates by control the levers of justice, politics, business, and so on; and there is a group that does not have power that struggles to obtain … the black population incarcerated in US prisons, indicating that blacks are not receiving equal fair treatment within the criminal justice system.

Discussion4: Social control Theory
Hirschi’s social bond theory states that crime is committed because of lack of attachment, commitment, involvement, or belief by the individual who commits the crime. In other words,……

Studyspark

Study Document Study Document

Criminology Theory

Pages: 2 (636 words) Document Type:question answer Document #:91855116

… number of African-American imprisoned. This documentary revolves around the racial injustice that happens within the criminal justice system, incarcerating many African-Americans on petty crime, filling most of the prisons with them. This is shown as just an extension of slavery, which was abolished in the 13th amendment. … as no Americans can be slaved except for criminals, which was excessively exploited by the whites to get them to labor on small crime. The perspective that Blacks are criminals was ingrained within the society through movies, which gave birth to public lynching and hanging of African-Americans … start, this was just about enslaving the blacks through exploiting the amendment and portraying them as animals.
Answer B:
The new culture of control has one of the indices; ‘The decline of the rehabilitative ideal.’ This index is shown in the 13th documentary as kalief Browder hanged … significant riots. But all the……

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

Abstract
crime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crime and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and … be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against crime, data breaches, and fraud. It must be performed from time to time in the form of a methodical analysis by an outside specialist … typhoons, among others, terror attacks, vandalism, fire outbreak, illegal tampering, power surges, and break-ins. Vlad and Lenghel (2017) put forward a collection of control defending information systems from such physical threats.
The control include different kinds of locks, hardware insurance coverage, and coverage of information recreation costs, having processes in place for everyday data and information……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Solitary Confinement And Mental Health Issues In Corrections

Pages: 11 (3163 words) Sources: 16 Document Type:Essay Document #:96033944

… ensure their own safety and the safety of prisoners while maintaining an environment of cultural sensitivity, support, civility and due process. In the control model of the corrections institution there are issues here because the personnel attempt to exert total control over the prisoners, which appears to deny the prisoners their right to due process and to human respect. The responsibility model has been ……

References

References

Clemmer, D. (1940). The prison community. New Braunfels, TX: Christopher Publishing House.

Compton, M. T., Anderson, S., Broussard, B., Ellis, S., Halpern, B., Pauselli, L., . . .Johnson, M. (2017). A potential new form of jail diversion and reconnection to mental health services: II. Demonstration of feasibility. Behavioral Sciences & the Law, 35(5–6), 492–500. doi:10.1002/bsl.2319

Corrections Arizona Department. (2020). Retrieved from https://corrections.az.gov/location/110/kingman

Dryburgh, M. (2009). Policy implications of whistle-blowing: The case of Corcoran State Prison. Public Integrity, 11(2): 155-170.

Fantel, H. (1974). William Penn: Apostle of Dissent. NY: William Morrow & Co. Florida Department of Corrections. (2020). Retrieved from

https://twitter.com/FL_Corrections/status/1234884340296843266

Hensley, J. & Rough, G. (2011). Kingman prison still under scrutiny. Retrieved from  http://archive.azcentral.com/news/articles/2011/01/30/20110130kingman-prison-still-under-scrutiny0130.html 

HIV among Incarcerated Populations. (2015). CDC. Retrieved from  http://www.cdc.gov/hiv/group/correctional.html

Studyspark

Study Document Study Document

Race And Incarceration Rates

Pages: 5 (1649 words) Sources: 8 Document Type:Research Paper Document #:97402010

… Destiny nearly 200 years ago): she points out, for instance, that 50% of the young African American male population is “currently under the control of the criminal justice system” (Alexander 2012:16). Another issue is the unjust War on Drugs which disproportionately impacts African Americans, who are commonly ……

References

References

Aguirre, A., & Baker, D. V. (Eds.). 2008. Structured inequality in the United States: Critical discussions on the continuing significance of race, ethnicity, and gender. New York: Pearson Prentice Hall.

Alexander, Michelle. 2012. The New Jim Crow. New York: New Press.

Davis, Angela. 2012. The Meaning of Freedom. San Francisco: City Light Books.

James, Lois. 2018. The stability of implicit racial bias in police officers. Police Quarterly 21(1):0-52.

Lopez, German. 2018. There are huge racial disparities in how US police use force. Retrieved July 30, 2019 ( https://www.vox.com/identities/2016/8/13/17938186/police-shootings-killings-racism-racial-disparities ).

O’Sullivan, John. 1845. Annexation. United States Magazine and Democratic Review 17(1):5-10.

Pettit, Becky, and Bruce Western. 2004. Mass imprisonment and the life course: Race and class inequality in US incarceration." American sociological review 69(2):151-169.

Plessy v. Ferguson. 1896. Retrieved July 30, 2019 ( https://www.oyez.org/cases/1850-1900/163us537 ).

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Crime control Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

Effectiveness Of The War On Drugs

Pages: 14 (4146 words) Sources: 18 Document Type:Reaction Paper Document #:69451857

… Hurley, 2016)
C. Criminalization, justice (ACLU, 2020; “America is At War,” n.d.; Farabee, Prendergast & Anglin, 1998).
D. Other sociological issues
1. Organized crime and terrorism (“America is at War,” n.d.; Coomber, Moyle, Belackova, V., et al., 2018; Pearl, 2018).
2. White collar crime (tobacco and pharmaceutical industries) (Netherland, & Hansen, 2017).
III. Literature Review
A. Balancing public health/safety with personal liberty/self-empowerment (ACLU, 2020; Payne & Hutton, … military skirmishes. Government intervention in the drug trade is a new phenomenon, traceable to the Opium Wars first and then to the initial control placed on chemical compounds as scientific research into their uses expanded in the late 19th and early 20th century. The first drug policy … Drugs has enabled the rise of a powerful military-industrial complex, and is intimately entwined with non-state actors including terrorist organizations and other organized crime syndicates worldwide. Perpetuating the War on Drugs has become……

References

References

ACLU (2020). Against drug prohibition. Retrieved from:  https://www.aclu.org/other/against-drug-prohibition 

“America is At War,” (n.d.). Retrieved from:  https://web.stanford.edu/class/e297c/poverty_prejudice/paradox/htele.html 

Bambauer, J. Y. (2012). How the war on drugs distorts privacy law. Stanford Law Review 62(2012). Retrieved from:  https://www.stanfordlawreview.org/online/how-the-war-on-drugs-distorts-privacy-law/ 

Benson, B.L., Kim., I., Rasmussen, D.W., et al. (1992, 2006). Is property crime caused by drug use or by drug enforcement policy? Applied Economics 24(7): 679-692.

Best, D., Irving, J. & Albertson, K. (2016). Recovery and desistance: what the emerging recovery movement in the alcohol and drug area can learn from models of desistance from offending. Addiction Research & Theory 25(1): 1-10.

Coomber, R., Moyle, L., Belackova, V., et al. (2018). The burgeoning recognition and accommodation of the social supply of drugs in international criminal justice systems: An eleven-nation comparative overview. International Journal of Drug Policy 58(2018): 98-103.

Coyne, C.J. & Hall, A. R. (2017). Four decades and counting. CATO Institute. Retrieved from:  https://www.cato.org/publications/policy-analysis/four-decades-counting-continued-failure-war-drugs 

Farabee, D., Prendergast, M. & Anglin, M.D. (1998). The effectiveness of coerced treatment for drug-abusing offenders. 62 Fed. Probation 3 (1998).

Studyspark

Study Document Study Document

Gun Violence Among African American Community

Pages: 8 (2438 words) Sources: 7 Document Type:Essay Document #:71870574

… killings were a result of an argument between the victim and the offender. 71% of the killings were totally unrelated to any other crime being committed (Violence Policy Center, 2020). These statistics show a community that is being destroyed by gun violence but also by violent attitudes. … buybacks, and 4) gang intervention and prevention programs.
The specific goals that these alternatives would help to meet are: 1) the reduction of crime within the community; 2) the removal of guns from the streets; and 3) the effect of peace throughout the city. From the Christian … a daily basis, get to know them, make their presence known in a friendly and familiar manner, and thus reduce the risk of crime and violence through their positive, social and professional presence in the community. To implement it requires having teams of police—typically two officers per ……

References

References

Brown, J. (2005). Tupac Shakur, (2-Pac) in the Studio: The Studio Years (1989-1996). Phoenix, AZ: Colossus Books.

Carbado, D. W. (2017). From Stop and Frisk to Shoot and Kill: Terry v. Ohio's Pathway to Police Violence. UCLA L. Rev., 64, 1508.

Howard University. (2020). PHD in social work. Retrieved from  https://socialwork.howard.edu/admissions/programs-study/phd-social-work 

Jones, N. (2014). “The regular routine”: Proactive policing and adolescent development among young, poor black men. New directions for child and adolescent development, 2014(143), 33-54.

Llewellyn, J. J., Archibald, B. P., Clairmont, D., & Crocker, D. (2013). Imagining success for a restorative approach to justice: Implications for measurement and evaluation. Dalhousie LJ, 36, 281.

Spergel, I., Wa, K., & Sosa, R. (2005). Evaluation of the Mesa Gang Intervention Program (MGIP). School of Social Service Administration, The University of Chicago.

Violence Policy Center. (2020). Black homicide victimization. Retrieved from  http://vpc.org/revealing-the-impacts-of-gun-violence/black-homicide-victimization/ 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".