Criminal Procedure Essays (Examples)

Studyspark

Study Document Study Document

Determinate Versus Indeterminate Sentencing Policies

Pages: 4 (1299 words) Sources: 3 Document Type:Capstone Project Document #:36128387

… a minimum and a maximum but defers authority regarding when a prisoner is released (or when probation ends) to other members of the criminal justice system such as parole board members and probation officers. Determinate sentencing is just the opposite: a procedure in which the trial judge does sentence an offender to a specific length of time. Both determinate and indeterminate sentencing have been commonly … be deemed more fair overall.
Pros of Indeterminate Sentencing
Indeterminate sentencing has been hailed for its potential usefulness in promoting rehabilitative models in criminal justice. With an indeterminate sentence, the parole board exercises discretion based on multiple factors such as good conduct exhibited while the offender serves … professional discretion exercised by probation officers, judges, parole boards, and corrections officers (Tonry, 1999). Therefore, indeterminate sentencing works well from the perspective of criminal justice professionals. Rather than relying on a single decision made by……

References

References

Allen, J. (2016). CU rape case sparks debate over Colorado’s indeterminate sentencing law. The Denver Channel. Retrieved from:  https://www.thedenverchannel.com/news/local-news/colorados-indeterminate-sentencing-criticized 

Baker, J. (2020, Aug 10). Davis sentenced to 15 years in 2017 Wheeling hotel killing. WTOV. Retrieved from:  https://wtov9.com/news/local/davis-sentenced-to-15-years-in-2017-wheeling-hotel-killing 

Cornell Law School Legal Information Institute (n.d.). Indeterminate sentence. Retrieved from:  https://www.law.cornell.edu/wex/indeterminate_sentence 

Gant, J. & Hussain, D. (2020, 5 Aug). Hero PC Andrew Harper’s mother slams ‘unduly lenient sentences for her son’s killers. Daily Mail. Retrieved from:  https://www.dailymail.co.uk/news/article-8592283/Attorney-General-review-jail-terms-handed-three-teenagers-killed-PC-Andrew-Harper.html 

Green, S.J. (2020, Aug 6). Brothers sentenced to 40 years in prison for 2016 shooting at Seattle homeless encampment. Bakersfield. Retrieved from: https://www.bakersfield.com/ap/national/brothers-sentenced-to-40-years-in-prison-for-2016-shooting-at-seattle-homeless-encampment/article_5c5d040d-0e0c-532e-9fd7-794232746f5d.html

O’Hear, M.M. (2011). Beyond rehabilitation. 48 Am. Crim. L. Rev. 1247 (2011).

Puzauskas, K. & Morrow, K. (2018). No indeterminate sentencing without parole. 44 Ohio N.U. L. Rev. 263 (2018).

Rhine, E.E., Watts, A. & Reitz, K.R. (2018). Parole boards within indeterminate and determinate sentencing structures. Robina Institute of Law and Criminal Justice. Retrieved from: https://robinainstitute.umn.edu/news-views/parole-boards-within-indeterminate-and-determinate-sentencing-structures

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Criminal procedure Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

Maritime Safety And Security SOP For Homeland Security Perspectives

Pages: 4 (1341 words) Sources: 11 Document Type:literature review Document #:28623347

… system having already been digitized, automated, and integrated, the concern has now shifted to how entities within the maritime industry should implement appropriate procedure and policies to respond to cybersecurity incidents effectively.
Background
Cybersecurity refers to the ability of entities to prepare for possible attacks initiated through … industry to be on its toes developing new and better technological solutions to provide improved cover to critical systems in the industry.
Investigatory procedure to Be Used
To investigate cybersecurity threats to the maritime industry, the project will review various resources on the subject matter. The researcher ……

References

References

Bowen, B.M. (2011). Measuring the Human Factor of Cyber Security. Rerieved from  http://www.cs.columbia.edu/~bmbowen/papers/metrics_hst.pdf 

Bueger, C. (2015). What is Maritime Security? Maritime Policy, 53, 159-164.

Fitton, O. P. (2015). The Future of Maritime Cyber Security. Retrieved from  https://eprints.lancs.ac.uk/id/eprint/72696/1/Cyber_Operations_in_the_Maritime_Environment_v2.0.pdf 

Hadlington, L. (2018). The \\\\\\"Human Factor\\\\\\" in cybersecurity: Exploring the accidental insider. Psychological and Behavioral Examinations in Cyber Security, 4(6), 46-63.

Hareide, O. S. (2018). Enhancing Navigator Competence By Demonstrating Maritime Cyber Security. The Journal of Navigation, 71(5), 1025-1039.

Hayes, C. R. (2016). Maritime Cybersecurity: The Future of National Security. Monterey, California: Naval Post Graduate School.

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60.

Hoffmann, J. (2018). Review of Maritime Transport. New York: UNCTAD.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

...Criminal procedure Abstract
Cybercrime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It must be performed from time to time in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security,……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Investigative Conclusion And Testimony

Pages: 9 (2819 words) Sources: 6 Document Type:Research Paper Document #:77583608

… locations would be inclusive of Mr.…[break]…opinion of the various facts as presented. This report is of great relevance in as far as court procedure are concerned and it has to adhere to various court rules. To a large extent, the said report details the analysis of the … In our case, we have conducted investigations using tools that are peer-reviewed and have undergone verification tests. We have also documented all the procedure that were used in the making of our findings. As an expert witness, mine is only to present truthful, independent,……

References

References

Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.

Casey, E. (Ed.). (2009). Handbook of Digital Forensics and Investigation. Burlington, MA: Academic Press.

Maras, M. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence (2nd ed.). Burlington, MA: Jones & Bartlett Publishers.

Newman, R.C. (2007). Computer Forensics: Evidence Collection and Management. New York, NY: CRC Press.

Reddy, N. (2019). Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations. New York, NY: Springer.

U.S. Department of Justice (2018). Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft. Retrieved from  https://www.justice.gov/criminal-ccips/file/891011/download 

Studyspark

Study Document Study Document

Recruitment And Retention Human Resource Policies

Pages: 11 (3188 words) Sources: 15 Document Type:question answer Document #:13270710

… classification. To ensure this, the H.R. department will establish a strategy (assuming none exists at the moment) for regulatory reviewing and updating compliance procedure and labor laws that are constantly changing (Breaugh, 2016). The suggested strategy is to have one of the H.R. department staff members as ……

References

References

Arthur, D. (2012). Recruiting, interviewing, selecting & orienting new employees. AMACOM Div American Mgmt Assn.

Avery, D. R., McKay, P. F., & Volpone, S. D. (2013). \\\\\\"Diversity staffing: Inclusive personnel recruitment and selection practices.\\\\\\" In Q. M. Roberson (Ed.), Oxford library of psychology. The Oxford handbook of diversity and work (p. 282–299). Oxford University Press.

Becker, W. J., Connolly, T., & Slaughter, J. E. (2010). The effect of job offer timing on offer acceptance, performance, and turnover. Personnel Psychology, 63(1), 223-241.

Breaugh, J. (2016). Talent acquisition: A guide to understanding and managing the recruitment process. Society of Human Resource Management.

Compton, R. L. (2009). Effective recruitment and selection practices. CCH Australia Limited.

Flynn, W. J., Mathis, R. L., Jackson, J. H., & Valentine, S. R. (2016). Healthcare human resource management, 3rd Edition. Cengage Learning, U.S.

Garner, E. (2012). Recruitment and Selection. Bookboon.

Gusdorf, M. L. (2008). Recruitment and Selection: Hiring the right person. USA: Society for Human Resource Management.

Studyspark

Study Document Study Document

Gun Control Act Of 1968

Pages: 7 (2011 words) Sources: 8 Document Type:Research Paper Document #:16217740

...Criminal procedure Re-Assessing the Effectiveness of the Country’s Gun Laws
America’s Gun Laws Are they Effective
Introduction
Signed into law on the 22nd of Oct, 1968, the Gun Control Act of 1968 is largely considered to be the very first significant attempt at controlling not only interstate firearms commerce, but also firearm ownership. Prior to this particular legislation, there had been other gun-control laws passed. These included but they were not limited to the National Firearms Act of 1934 and the Federal Firearms Act of 1938. These laws did not, however, sufficiently put in place a mechanism for the effective regulation of firearm owners and the firearm industry. However, with the assassination of both Martin Luther King and President J.F. Kennedy, there was a clear need for an interventionist measure in the gun politics realm. Today, gun control remains a rather divisive issue in our nation’s politics. Thanks to an escalation in……

References

References

Ausman, J.I. & Faria, M.A. (2019). Is Gun Control Really About People Control? Surgical Neurology International, 10(6), 195-204.

Bouton, L., Conconi, P., Pino, F. & Zanardi, M. (2014). Guns and Votes. Retrieved from  https://www.nber.org/papers/w20253 

Cole, G.F., Smith, C.E. & DeJong, C. (2016). Criminal Justice in America (9th ed.). Boston, MA: Cengage Learning.

Gramlich, J. & Schaeffer, K. (2019). 7 facts about guns in the U.S. Retrieved from  https://www.pewresearch.org/fact-tank/2019/10/22/facts-about-guns-in-united-states/ 

Hayes, V. (2016). Gun Control in the United States. Journal of Political Sciences & Public Affairs, 4(2), 33-39.

Johnson, N.J., Kopel, D.B. & Mocsary, G.A. (2017). Firearms Law and the Second Amendment: Regulation, Rights, and Policy. New York, NY: Wolters Kluwer Law & Business.

Joslyn, M., Haider-Markel, D., Baggs, M. & Bilbo, A. (2017). Emerging Political Identities? Gun Ownership and Voting in Presidential Elections. Social Science Quarterly, 98(2), 382-396.

Webster, D.W. & Wintemute, G.J. (2015). Effects of Policies Designed to Keep Firearms from High-Risk Individuals. Annual Review of Public Health, 36, 21-37.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… espionage in the modern world is attributable to the struggle for control of world affairs. This struggle incorporates efforts by different stakeholders including criminal, hackers, terrorists, virtual states and foreign powers.[footnoteRef:7] Foreign powers are employing similar tactics as criminal by carrying out malicious activities to intercept communication in computer systems and networks. The digital battlefield has become intense as nations try to ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Violence Prevention Programs

Pages: 9 (2805 words) Sources: 6 Document Type:Essay Document #:52417572

… rational choice theory can all be good theoretical perspectives to apply. Rational choice theory, for instance plays a part in the thinking of criminal is certainly one perspective to consider. People who commit acts of violence are not prohibited from thinking that the benefits of crime outweigh ……

References

References

Altafim, E. R. P., & Linhares, M. B. M. (2016). Universal violence and childmaltreatment prevention programs for parents: A systematic review. Psychosocial Intervention, 25(1), 27-38.

Alternative Paths. (2020). Violence prevention. Retrieved from  https://www.alternativepaths.org/services/diversion-programs/violence-prevention-program 

Farrell, A. D., Meyer, A. L., Kung, E. M., & Sullivan, T. N. (2001). Development and evaluation of school-based violence prevention programs. Journal of clinical child psychology, 30(2), 207-220.

Johnson, D. W., & Johnson, R. T. (1995). Why violence prevention programs don't work--and what does. Educational Leadership, 52(5), 63-68.

Lee, C., & Wong, J. S. (2020). Examining the effects of teen dating violence prevention programs: a systematic review and meta-analysis. Journal of Experimental Criminology, 1-40.

Siegel, L. (2018). Criminology, 7th Ed. Cengage Learning.

Stagg, S. J., & Sheridan, D. (2010). Effectiveness of bullying and violence prevention programs: A systematic review. Aaohn Journal, 58(10), 419-424.

Studyspark

Study Document Study Document

Sociology Law And Identity

Pages: 6 (1908 words) Sources: 1 Document Type:Essay Document #:83127915

… wellness, but in Latin America, it is demeaning and degrading, an aspect that can be used as a basis or evidence to a criminal case.
It is, however, understood that just as an individual can learn about their culture, they can also learn about other cultures. This ……

References

References

Renteln, A. D. (2004). The cultural defense. Oxford University Press.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".