Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 12:20 pm
Time: 12:20 pm
Results for illegal behavior
5 results foundAuthor: Menard, Scott Title: Victimization and Illegal Behavior Summary: Research has shown that individuals involved in illegal behavior are more likely to be victims than are those not involved in such activities. The temporal order of the victim-offender relationship has been a focus of interest in recent years. Violent victimization has been found to be an important risk factor for subsequent violent offending. The current study furthers our understanding of this sequence by analyzing waves of the National Youth Survey. The relationship between violent victimization and offending was found to change from adolescence to adulthood. Clearly, if violent victimization is a risk factor for engaging in illegal behavior, policies and programs aimed at preventing victimization may be one of the most effective strategies for at-risk youth. Details: Huntsville, TX: Crime Victims' Institute, Sam Houston State University, 2009. 23p. Source: Internet Resource: Accessed September 17, 2010 at: http://www.crimevictimsinstitute.org/documents/VictimizationandIllegalBehaviorpress.pdf Year: 2009 Country: United States URL: http://www.crimevictimsinstitute.org/documents/VictimizationandIllegalBehaviorpress.pdf Shelf Number: 119829 Keywords: At-risk YouthIllegal BehaviorJuvenile OffendersVictimizationViolent Crime |
Author: Groot, Olaf J. de Title: Gov-arrrgh-nance: Jolly Rogers and Dodgy Rulers Summary: In this paper, we argue that the effect of governance on the emergence of crimes of different levels of sophistication is highly non-linear. State failure, anarchy and a lack of infrastructure are not conducive to establishing any business, including illicit enterprises. At the bottom of the spectrum, therefore, both legal business and criminal gangs benefit from improved governance. With further improvements in governance criminal activities decline. We find strong and consistent support for this hypothesis using the International Maritime Bureau's dataset on piracy. Piracy is reported by ship-owners, giving a unique insight into crime in badly governed countries which were systematically excluded from previous analyses. We show that profitable forms of piracy flourish where on the one hand there is stability and infrastructure, but on the other hand the state does not have the capacity to intervene and/or bureaucrats can be bribed to turn a blind eye. For minor acts of theft from ships the pattern is quadratic: piracy first rises and then falls as governance improves. Details: Berlin: DIW Berlin German Institute for Economic Research, 2010. 45p. Source: Internet Resource: DIW Berlin Discussion Papers 1063: Accessed May 5, 2011 at: http://www.diw.de/documents/publikationen/73/diw_01.c.361831.de/dp1063.pdf Year: 2010 Country: International URL: http://www.diw.de/documents/publikationen/73/diw_01.c.361831.de/dp1063.pdf Shelf Number: 121650 Keywords: Illegal BehaviorMaritime CrimePirates/Piracy |
Author: Cohn, Alain Title: Bad Boys: How Criminal Identity Salience Affects Rule Violation Summary: We conducted an experiment with 182 inmates from a maximum security prison to analyze the impact of criminal identity salience on cheating. The results show that inmates cheat more when we exogenously render their criminal identity more salient. This effect is specific to individuals who have a criminal identity, because an additional placebo experiment shows that regular citizens do not become more dishonest in response to crime-related reminders. Moreover, our experimental measure of cheating correlates with inmates' offenses against in-prison regulation. Together, these findings suggest that criminal identity salience plays a crucial role in rule violating behavior. Details: Munich: Center for Economic Studies & Ifo Institute, 2015. 31p. Source: Internet Resource: CESifo Working Paper No. 5363: Accessed July 17, 2015 at: https://www.cesifo-group.de/ifoHome/publications/working-papers/CESifoWP/CESifoWPdetails?wp_id=19160882 Year: 2015 Country: United States URL: https://www.cesifo-group.de/ifoHome/publications/working-papers/CESifoWP/CESifoWPdetails?wp_id=19160882 Shelf Number: 136098 Keywords: CheatingDishonestyIllegal BehaviorPrisoners |
Author: Finklea, Kristin Title: Dark Web Summary: The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. It is the exploitation of the Dark Web for illegal practices that has garnered the interest of officials and policy makers. Individuals can access the Dark Web by using special software such as Tor (short for The Onion Router). Tor relies upon a network of volunteer computers to route users' web traffic through a series of other users' computers such that the traffic cannot be traced to the original user. Some developers have created tools - such as Tor2web - that may allow individuals access to Torhosted content without downloading and installing the Tor software, though accessing the Dark Web through these means does not anonymize activity. Once on the Dark Web, users often navigate it through directories such as the "Hidden Wiki," which organizes sites by category, similar to Wikipedia. Individuals can also search the Dark Web with search engines, which may be broad, searching across the Deep Web, or more specific, searching for contraband like illicit drugs, guns, or counterfeit money. While on the Dark Web, individuals may communicate through means such as secure email, web chats, or personal messaging hosted on Tor. Though tools such as Tor aim to anonymize content and activity, researchers and security experts are constantly developing means by which certain hidden services or individuals could be identified or "deanonymized." Anonymizing services such as Tor have been used for legal and illegal activities ranging from maintaining privacy to selling illegal goods - mainly purchased with Bitcoin or other digital currencies. They may be used to circumvent censorship, access blocked content, or maintain the privacy of sensitive communications or business plans. However, a range of malicious actors, from criminals to terrorists to state-sponsored spies, can also leverage cyberspace and the Dark Web can serve as a forum for conversation, coordination, and action. It is unclear how much of the Dark Web is dedicated to serving a particular illicit market at any one time, and, because of the anonymity of services such as Tor, it is even further unclear how much traffic is actually flowing to any given site. Just as criminals can rely upon the anonymity of the Dark Web, so too can the law enforcement, military, and intelligence communities. They may, for example, use it to conduct online surveillance and sting operations and to maintain anonymous tip lines. Anonymity in the Dark Web can be used to shield officials from identification and hacking by adversaries. It can also be used to conduct a clandestine or covert computer network operation such as taking down a website or a denial of service attack, or to intercept communications. Reportedly, officials are continuously working on expanding techniques to deanonymize activity on the Dark Web and identify malicious actors online. Details: Washington, DC: Congressional Research Service, 2015. 18p. Source: Internet Resource: CRS:R55101: Accessed July 20, 2015 at: https://www.fas.org/sgp/crs/misc/R44101.pdf Year: 2015 Country: International URL: https://www.fas.org/sgp/crs/misc/R44101.pdf Shelf Number: 136120 Keywords: Computer CrimeDark WebIllegal BehaviorIllicit GoodsInternet CrimeOnline Communications |
Author: Finklea, Kristin Title: Dark Web: Updated Summary: The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. It is the exploitation of the Dark Web for illegal practices that has garnered the interest of officials and policymakers. Individuals can access the Dark Web by using special software such as Tor (short for The Onion Router). Tor relies upon a network of volunteer computers to route users’ web traffic through a series of other users’ computers such that the traffic cannot be traced to the original user. Some developers have created tools—such as Tor2web—that may allow individuals access to Torhosted content without downloading and installing the Tor software, though accessing the Dark Web through these means does not anonymize activity. Once on the Dark Web, users often navigate it through directories such as the “Hidden Wiki,” which organizes sites by category, similar to Wikipedia. Individuals can also search the Dark Web with search engines, which may be broad, searching across the Deep Web, or more specific, searching for contraband like illicit drugs, guns, or counterfeit money. While on the Dark Web, individuals may communicate through means such as secure email, web chats, or personal messaging hosted on Tor. Though tools such as Tor aim to anonymize content and activity, researchers and security experts are constantly developing means by which certain hidden services or individuals could be identified or “deanonymized.” Anonymizing services such as Tor have been used for legal and illegal activities ranging from maintaining privacy to selling illegal goods—mainly purchased with Bitcoin or other digital currencies. They may be used to circumvent censorship, access blocked content, or maintain the privacy of sensitive communications or business plans. However, a range of malicious actors, from criminals to terrorists to state-sponsored spies, can also leverage cyberspace and the Dark Web can serve as a forum for conversation, coordination, and action. It is unclear how much of the Dark Web is dedicated to serving a particular illicit market at any one time, and, because of the anonymity of services such as Tor, it is even further unclear how much traffic is actually flowing to any given site. Just as criminals can rely upon the anonymity of the Dark Web, so too can the law enforcement, military, and intelligence communities. They may, for example, use it to conduct online surveillance and sting operations and to maintain anonymous tip lines. Anonymity in the Dark Web can be used to shield officials from identification and hacking by adversaries. It can also be used to conduct a clandestine or covert computer network operation such as taking down a website or a denial of service attack, or to intercept communications. Reportedly, officials are continuously working on expanding techniques to deanonymize activity on the Dark Web and identify malicious actors online. Details: Washington, DC: Congressional Research Service, 2017. 19p. Source: Internet Resource: R44101: Accessed March 17, 2017 at: https://fas.org/sgp/crs/misc/R44101.pdf Year: 2017 Country: United States URL: https://fas.org/sgp/crs/misc/R44101.pdf Shelf Number: 144490 Keywords: Computer Crime Dark Web Illegal Behavior Illicit Goods Internet Crime Online Communications |