Discussion: Ethical Issues in Criminal Justice Research - Criminal
ATTACHED DETAILS INSIDE.....
WEEK 6 CLASS DISCUSSION QUESTION PLEASE READ AND FOLLOW ALL INSTRUCTIONS TO COMPLETE THE ASSIGNMENT I HAVE ATTACH A REWRITE FOR YOU TO USE AS YOUR GUIDE TO HELP YOU PUT THE ANSWERS TOGETHER FOR THIS WORK. I HAVE ALSO ATTACHED SOME READING MATERIALS FOR YOU IN CASE YOU NEED THEM. YOU CAN USE OUTSIDE REFERENCES ALSO……. THANKS
The focus of our final week is a topic that is of critical importance to the Criminal Justice world -- ETHICS. We have two easy tasks to complete this week -- the discussion board and a quiz for understanding. Be sure that you complete both. For the discussion - using your topic of interest chosen in week 1, identify an ethical issue that is relevant to that research problem. Consider how you would address this ethical issue using ethical standards from the Code of Ethics of the Academy of Criminal Justice Services (ACJS).
Discussion: Ethical Issues in Criminal Justice Research
Until the end of the 1970s, the research process was largely unregulated. This lack of regulation allowed some scientists to either fail to consider or ignore the ethical implications of their research and to carry out horrendous experiments. For example, the U.S. Public Health Service funded a study known as the Tuskegee Experiment, which started in the 1920s and continued well into the 1970s. This study was designed to examine the progression of syphilis in poor, urban African American males. None of the subjects were told they had syphilis, and some were treated with placebos even though a cure for this disease was available. Since that time, however, significant safeguards have been put in place to prevent these types of ethical violations. Today, Institutional Review Boards (IRBs) are responsible for evaluating ethical issues that might surface, especially those concerned with the protection of human subjects prior to the commencement of a research project. Multiple safeguards ensure that many of the ethical violations that might have occurred in the past are now prevented.
To prepare:
Recall the research problem you chose in Week 1
Identify one ethical issue that is relevant to that research problem.
Consider how you would address this ethical issue using ethical standards from the Code of Ethics of the Academy of Criminal Justice Sciences (ACJS).
Post a brief description of an ethical issue in criminal justice research generally or related to the research problem you identified in Week 1. Then explain how you might address it using ethical standards from the ACJS Code of Ethics.
I wanted to let you know how useful my research methods class has
already proved to be. For my internship this summer, eueryone had to
get the CITI (Collaboratru e Institutional Training Initiativ e) training
certificatron to conduct our research, which took a few days out of
the actual projects. However,because I was already IRB finstitutional
Review Boardl certified from my class, I was able to start my project
sooner. My superutsor was really appreciatiue thatl didnthave to use
my time to complete the IRB trainrng. Additionally, I utill be utilizing
my knousledge about suruey methods this summer for my research.
ltzlarissa O. , Student
I ets begin with a thought experiment (or a trip down memory lane, dependirs
l-on your earlier exposure to this example). One d^y as you are drinkirg coffee
and reading the newspaper during your summer in California, you notice a small
ad recruiting college students for a study at Stanford University. Feeling a bit
bored with your part-time job waiting on tables and missing the campus environ-
ment you got used to in your previous year as a freshman, you go to the campus
and complete an application.
per day for l-2 weeks beginning Aug. 14. For further information &
applications, come to Room24S,Jordan Hall, Stanford U. (Zimbardo,
Banks, Haney, and Iaffe 1973, 3 8)
After you arrive at the universiry you are given an information form with
more details about the research (Prison Life Study).
Intrigued, you decide to continue. First, you are asked to complete a long
questionnaire about your family background, physical and mental health history
and prior criminal involvement; answer a researchers questions in person; and
sign a consent form. A few days lateg you are informed that you and 20 other
young men have been selected to participate in the experiment. You then return
to the university to complete a battery of psychological tests and are told you
will be picked up for the study the next day ftIaney, Banks, and Zimbardo L973).
The next morning, Iou hear a siren just before a squad car stops in front of
your house. A police officer charges you with assault and battery warns you ofyour
constitutional rights, searches and handcuffs you, and drives you off to the police
station. After fingerprinting and a short stay in a detention cell: /ou are blind-
folded and driven to the Stanford County Prison. Upon arrlal, you are stripped
. . ..
. r.
I ...,ffi .ffi ..H..ffiffii.$.ffi.ffi..i..i., . . ..,..,.,
ffi*,ffiffiffiffibs
5:gi:
ETHICAL GUIDELINES FOR RESEARCH
naked, skin-searched, deloused, and issued a uniform (a loosely
fitting smock \^rith an ID number printed on it), bedding, sozp,
and a towel. You dont recognlze anyone, but you notice that the
other prisoners and th. goards are college-age, apparendy
middle-class white men (and one fuian) like you ftIaney et al.
1973; Zimbardo et al. 1973).
The prison warden welcomes you:
As you probably know; Im your warden. All ofyou have shown that you are unable
to function outside in the real world for one reason or another-that somehow you
lack the responsibility of good citizens of this great country. We of this prison, your
correctional staff, are going to help you learn what your responsibilities as citizens of
this country are. . . . Ifyou follow all ofthese rules and keep your hands clean, repent
for your misdeeds and show a proper attitude ofpenitence, you and I will get along
just fine. (Zimbar do et al. 197 3, 3 8)
Among other behavioral restrictions, the rules stipulate that prisoners must remain silent
during rest periods, during meals, and after lights out; that they must address each other only
General Information
Purpose: A simulated prison witl be established
somewhere in the vicinity of Palo Alto, California,
to study a number of problems of psychological and
sociological relevance.
Paid volunteers will be randomly assigned to
play the roles of either prisoners or guards for the
duration of the sturCy.This time period will vary some-
what from about five days to two weeks for any one
volunteer-depending upon several factors, such
as the sentence for the prisoner or the work
effectiveness of the guards.
Payment will be $gO a day for performing vari-
ous activities and work associated with the opera-
tion of our prison.
Each volunteer must enter a contractual
arrangement with the principal investigator (Dr. P. G.
Zimbardo), agreeing to participate for the full dura-
tion of the study. It is obviously essential that no
prisoner can leave once jailed, except through estab-
lished procedures. In addition, guards must report for
their eight-hour work shifts promptly and regularly
since surveillance by the guards will be around-the-
clock-three work shifts will be rotated or guards will
be assigned a regular shift-day, evening, or early
morning. Failure to fulfitl this contract will result in
a partial loss of salary accumulated-according to a
I,,,
.,,.,. . ,,., .,,,Philip...
G.. zimb:efd:o. PhD
Ptofess6{.. 6.r lSOqiet f
sychoto
.,,,:.,,,. . :StentOrd,UniverSiry
60 SECTION I . FOUNDATIONS FOR SOCIAL RESEARCH
by their assigned ID numbers; that they must address guards as Mr. Correctional Officerl and
that they may be punished for any infractions (Zimbardo et al. 1973).
You can tell that you are in the basement of a building. You are led down a corridor to a
small cell (6 x9) with three cots, where you are locked behind a steel-barred black door with
two other prisoners @xhibit 3.1). There is a small solitary confinement room across the hall
for those who misbehave. There is litde privary, since you realize that the uniformed grrards,
behind their silver sunglasses, can always observe the prisoners. After you go to sleep, you are
awakened by a whisde summoning you and the others foi a roll call.
The next morning, you and the other eight prisoners must stand in line outside your cells
and recite the rules until you remember all 17 of them. Prisoners must chant, Its a wonderful
day, Mr. Correctional OfEcer. Two prisoners who get out of line are put in solitary confine-
ment. After a bit, the prisoners in Cell 1 decide to resist: They barricade their cell door and
call on the prisoners in other cells to join in their resistance. As punishment, the guards pull
the beds out from the other cells and spray some inmates with a fire extinguisher.
The guards succeed in enforcing control and become more authoritarian, while the
prisoners become increasingly docile. Punishmens are meted out for infractions of rules
and sometimes for seemingly no reason at all; punishments include doing push-ups, being
stripped naked, having legs chained, and being repeatedly wakened during the night. Would
you join in the resistance? How would you react to this deprivation of your liberty by these
authoritarian guards?
. By the fifth day of the actual Stanford Prison Experiment, five student prisoners had to
be released due to evident extreme stress (Zimbardo 2007). On the sixth day, Philip Zimbardo
terminated the experiment. A prisoner subsequendy reported,
The way we were made to degrade ourselves really brought us
down and thats whywe all sat docile towards the end of the experi-
ment. (Haney et al. 1973, 88)
One guard later recounted his experience:
I was surprised at myself . . . I made them call each other names and
clean the toilets out with their bare hands. I practically considered
the prisoners cattle, and I kept thinking I have to watch out for
them in case they try something. (Zimbardo et al. L973, 17 4)
Exhibit 3.2 gives some idea of the difference in how the prison-
ers and guards behaved. What is most striking about this result is that
all the guards and prisoners had been screened before the study began
to ensure that they were physically and mentally healthy. The roles of
guard and prisoner had been assigned randomly, by the toss of a coin,
so the two groups were very similar when the study began. It seemed to
be the situation that led to the deterioration of the mental state of the
prisoners and the different behavior of the guards. Being a guard or a
prisoner, with rules and physical arrangements reinforcing distinctive
roles, changed their behavior.
Are you surprised by the outcome of the experiment? By the
guards report of his unexpected, abusive behavior? By the prisoners
ultimate submissiveness and the considerable psychic distress some
felt? (\ /e leave it to you to assess how you would have responded if
you had been an acfual research participant.)
Of course, our purpose in introducing this small experiment
is not to focus attention on the prediction of behavior in pris-
ons; instead, we want to introduce the topic of research ethics by
Source: From The Luctfer Effect: Understanding How Good
People Turn Euil by Philip G. Zimbardo. Copyright @
2007 by Philip G. Zirnbardo, Inc. Used by permission.
61CHAPTER 3 o ETHICAL GUIDELINES FOR RESEARCH
Exhibit 3.1 Prisoner in His Gell
Commands
lnsults
Deindividuating
Reference
Aggression
Threats
Questions
lnformation
Use of
lnstruments
Individuating
Reference
Helping
Resistance
encouraging you to think about research
from the standpoint of the people who
are the subjects of research. We will refer
to Philip Zimbardos Stanford Prison
Experiment throughout this chapter,
since it is fair to say that this research
ultimately had a profound influence on
the way that social scientists think about
research ethics as well as on the way
that criminologists understand behavior
in prisons. We will also refer to Stan-
ly Milgrams (1963) experiments
on obedience to authority, since that
research also pertains to criminal justice
issues and has stimulated much debate
about research ethics.
Every criminal justice researcher
needs to consider how to practice his or
her discipline ethically. Whenever we
interact with other people as social scien-
tists, we must give paramount importance
to the rational concerns and emotional
needs that shape their responses to our
actions. It is here that ethical research
practice begins, with the recognition that
our research procedures involve people
who deserve as much respect for their
well-being as we do for ours.
HISTORICAL
BACKGROUND
40 50 60 70
Frequency
100 1 10
@ Guards ffi Prisoners
Source: From The Lucifer E1fect: tJnderstanding How Good people Tttm Euilby philip c. Concern with ethical practice in relation to
[email protected],Inc.UsedbypermissionofRandom people who are (in some respect) depen-
House, an imprint and division ofPenguin Random House LLC, and the Random deng whether as patients or research sub-
House Group Ltd AII rights reserved
jects, is not a new idea. Ethical guidelines
for medicine trace back to Hippocrates in 5 BC Greece (Ilippocratic Oath, n.d.), and the American
Medical Association (AMA) adopted the worlds first formal professional ethics code in medicine
lt l8+7 (AMA 201 1). Yet the history of medical practice makes it clear that having an ethics code
is not sufficient to ensure ethical practice, at least when there are clear incentives to do otherwise.
The formal procedures for the protection of participants in research we have today grew
Philip Zimbardo,s Stanford out of some widely publicized abuses. One defining event occrured in 1946, when the Nurem-
Prison Experiment berg War Crime Tiials exposed horrific medical experiments conducted by Nazi doctors and
A twoweek experimenl others in the name of science. Almost 20 years later, Milgrams research on obedience also
thal $imulaied thva pri$0n generated controversy about participant protections 6eerry zotf ). fu late ts lgT2,Americans
life of bolh priso*ers and
guards thai was ended iil learned from news reports that researchers funded by the u.S. Public Health Service had fol-
sixdavsbecauseaf wllat lowed 399 low-income A.frican American men since the 1930s, collecting data to study the
the sinrulation was d*ing natural course of syphilis @xhibit 3.3). At the time the study began, there was no effective treat-
to coliege studsnts !.lho ment for the disease, but the men were told they were being treated for bad blood, whether
participated. they had syphilis or not. Participants received free medical exams, meals, and burial insurance
62 SECTION I . FOUNDATIONS FOR SOCIAL RESEARCH
ExhibitS.2 Chart of Guard and Prisoner Behavior
10 20 30
Source: Thskegee Syphilis Study Administrative Records. Records of the Centers for Disease Control and
Prevention. National Archives-Southeast Region (Atlanta).
but were not asked for their consent to be studied. What made this research study, known as the
Tirskegee Syphilis Experimeng so shocking was that many participants were not informed of
their illness and, even after penicillin was recogn ized as an ef[ective treaffnent in 1945 and in
large-scale weby 1947, the study participants were not treated. The research vras ended only
after the study was erposed. In L973, congressional hearings began, and n L97+, an out-of-
court setdement of $10 million was reached; it was not until 1997 that President Bill Clinton
made an ofEcial apology (Centers for Disease Control and Prevention 2009).
Of course, the United States is not the only country to have abused human subjects. For
example, British military scientists exposed hundreds of Indian soldiers serr.ing under the
command of the British military to mustard gas during World War II to determine the how
much gas was needed to produce death (Evans 2007).
These and other widely publicized abuses made it clear that formal review procedures
were needed to protect research participants. The IJ.S. government created a National Com-
mission for the Protection of Human Subjects of Biomedical and Behavioral Research and
charged it with developing guidelines (I(itchener and Kitchener 2009). The commissions
1979 BehnontReport(from the U.S. Departrnent of Health, Education, andWelfare) estab-
lished three basic ethical principles for the protection of human subjects @xhibit 3.4):
o Respect for persons: treating persons as autonomous agents and protecting those
with diminished autonomy
. Beneficence: rninimizingpossible harms and maximizingbenefits
o Justice: distributing benefits and risks of research fairly
Stanley Milgrams
experiments on obedience to
authority:
l r * r.s ri. i\ t! tt i 4, trtt i t. 1 1 7rJ 1ii,1 \r.rrri ttiii)111\t 1!! i)L<l!t1\J1i
J- -
?.fr.i... .-.- i, -., ^ ^ i*,f1 t*iti 1 1 1 t-J i Lti i I i i I U. i, \!1-| -r)
;,i rr)1, r, { ; i i it ri i t. t, rii ! t / i\ t: l i tt t.i !:} t
lLtt-,tI Li 1 | Ll11) urJ I lt..t |f,l t J; i* ,,lii-iij i
.,.,i\, ),?i rr r 14.r r. rr rt : /ti1i : trt, :.: litlr,,t ti rlt:lttllt.i: t 1t 2 ilti.4i \! I-.....,..
h ;,. rin r rii i:..t t! i rt r ifi?l*,t ilVr-J t.: .._j t.-: 1_J i.r 1 \-! I t, 1.u t_.i l.
i t ;1, i r rys
t
i risi; t i i 1; t { t i\ t} | t i ri {li r, i
il\-jJl lj.J tll,.)tt i.idLltJit.J L1-l 1i1l1irr1-
^,-i,,,.-, ^+^.,,^ti..4 1i) I;l! i]]11Pl t ti
Nuremberg War Crime Trials:
T n +, t r irint,sli r; rin.i nttiilarri
,rih,,r:il ltr,.iri nv iix.t,t li.it.)it\.iJ i1,\.) i:,1 i,i! l,{:lJ
\t
i {:1
,i
f i {} tJ I !1,1ii*, t fiftl f
\i,t^,^i,i \!\i ^,- ll 1,. i,i,,...^--.L..,,,,t!i!iil Jti \tll ,1 I tt 111 l1,11tt UMl\U71i)t.,rl J\t trt.\t It tt1 lItt1\,!11it.J\)l llI
11 ^.,..,,- .^.,^... *1- -. L ^.. ^ ^ *,,..1 ti, -.l-,trI ti:II111 1ll -1! tlf1lt1\t*1!1 !ilrJ\L \t ! i i t i.t, I I !, 1. 1 I U,.{ U Ji.i.J \; \l | \..i . t t \.)
ii * r ri:\ r\ ?;\ rtii r. t 1 *v r, * t I iy\ fi i i i,*ttrji j til.-, 2l1trt..tl1rUi \.Jf..lJri lttliJlli.)
I rl n ri, i I {,; {,, d, r, t l:..1 ;:i i i * r,l rl r +
\i t.) tttj..-J t.jt.\)\j 7/ I \tlr.;.,i t.S\.t\/t.\i I
,.J
:tti;i rttl.,:rr: iLt if,fr. tlniTlt:t h{
,-;,.1 i t.] t-) 1 | i \j 1 i t 1 t t. I ! i.J i i t.t I I 1i.j,-j i
$*ititt*,
Tuskegee Syphilis
Experiment:
J 1 t\ h 1 ,\ i 1 : t ft
!! \ 1J1,1.-1.^ l.ilt^lJtt \.t1-t,..t^
l),1!. t lllrllt, il\t1!i1li li\,1rl .111t
,i,..i.,,-,
i 1i.
-,
. n l. t .. r. l,-,
..,,,,n
...
:..tlllt\.j tll llll-. il/1 ltil ..tt I tttlt \:t)
ri1.t.\ny ,t I tJ1\-.! :|lj.i.ji t.l.l !aj\Jt i)\J
,.i,..,, 1.;i.^ ir.,,.i .t,| |, .: \ i i t t i i i \- t i 1, t l,lil tlW *,fi|!:ll iUl ltl:t1,tl1Lj t-tii.Lt \\
lt,,t:; irrrrorrt* il r tt,a,li t,ttl*t lt:itii
tijt,i\ it*t|:. tlir.: i,*?tiS* itt
1t i;i r1 tritiltr,rti *rg.:1fiifltS t**ffl1 tJ ! /*. rttt.ll\JUt,2.rt
tu tTl t fi tfiittli ir, ai!,*i i1 wr:s
;jii;,riii;{*d iJ ** vll*ttivr: iri
!,t b;;iiii il th v, iii r t ttti,T \ r,: s1t t,;v
ii tI q t:lji {\i\{t,:irl ..ill.,ir it iitt t,
,: i 2.t.) * 1.\.1 lt i.j 1., t.l t,i. I i \.t t t L 4 y 11 \.J
,..-1 ,., l nar ,,.,r.t,1r)rrnL.\.1 ttat,-.L.lit tti i \2 i I
;;^riUir:U lli i J I !-, 1+SiiLlilA
i ri r,r i * t-ti - {iI - i),} u r t :i: #tii * Ti | * i1;,
,, ,. l 1 ,. ,.. n
, , {1{1*i ., r; n{ f, ,.i n i.1rir: jit4,:11 1t1 I r..t...r,Jtl\,r f.it.r!tt 1t3 I \.i\/ t 1!.tlt i.tlilt..!\r..i.,
t,, ri,l l. 1 .) tt tri r. n,t l,, fi r *, + i fi ,> r*
t r \.1 t..t I i l.J t-,t,!) 1, t i/ ?j I i-J Y 1 I \) \t i 1.,i\: ! | \
P:i1t i i tilil!,1
Belmont Report:
!1 t.. I lll l\i*1t+qm1 tt:.*.rntF 1 tt. I L4 itl..t! t{l}l.M t11t11iltr:\:ii11lt\ i.r \ \J !l\LiMlr-Ll \lr.a,:t{ittt}i)i\J11
t,,.t 4r, n t) rntnr.ii fl {t iii Drrrrrn r,
lvi ii,lt i lrJLL,ttLl,)li t{1 ilrlllit-\1
t. tr., r, ti<. *{ *,, rrr,tr:tli o,:tit1!llil?al I \ ill ll!rit:lt.J tr1J l\.) \/ i.j 1.. 1 t..t 1 \Jt 1 l\jUilrii
^.^.1 f\ ^r- ^. . .-.. i f\.
; i\{ 1 ?<fi lirt \t i iti:t 1 i4 *+ hli r i ;1
i ii{: {: I I 1l1xi rit:i x*l i *?i a il i ii * r.
I j:i.l i 4 t:i{ii t.;,ii i.}| i !1 i:i\iiLit i i}i
;i-....,....^^.i,, -. i., .^,, ^. i i^,..*. ^. ^ltJt-) lii 11i:*\l1!i\li ,11 lllilli,Jll
\-i it.! lj 1 r.! 1.\.) \.. i.1i., 1i \.j i t 11.11| ti.l1 i
, : , ,,t...tr., r, -,i r. t t nl. r..; r11 ,-1 i.r..q|,,1 t,.,-!
\)tJ lJ i1;\-,1) | 1i1iji\-i\j-lit\t t I t,\i:i:1.1
ti
i, { i, {,. {.;: i\, rt i: l-, ;,, r, *it i, p ri ? i, ir it ri
t \J 1.. r. ! | v.._ | t,,..) \ 1 IJ n t i v t-: 1
1.t | 1 i1
it:*ii*r:,,
Bespect for persons:
-f,...
-+;
I t \r\2.itt1r) l.!,.! \r\)tt\)
?i tit fi ii * t i1* LJ liff it i i1, E 1 t z iJ
ij i ii1* i ii { : U ili c} :itir,i il.l t
.1..,-. ,.,,.S, -.i -.,^.. ^,--..,1,.1
11 i 1i i i i I i tlrl d.rlit l i itJl i iV.
Beneficence:
:it ;., ;,,., i..,i..,..,,..,..,;1.,i r. h^, t.rt,t,t\tl t i 1t,l : II r Ii 1 I i I ll !L t:I
i v 1 1 t 1 | 1 i t : t.. I 1 i )i l_i v ;:r ;:1 I * ! t:r I i (.t I i i 1 \.1
..^- ^l .^^.-.,;.-.,-:.,^. 1 ^,. ^{,.t,.1i1tJ ilJ.l, lllrJ ; lrli 1 !iL\11L1!iii
t.t. i I r-i I i t i.i r, i I I I I r. 1 i t.:3 t
j \.J i 1, 1 I i 1 t i.
CHAPTER 3 T ETHICAL GUIDELINES FOR RESEARCH 63
Exhibit 3.3 Ttrskegee Syphilis Experiment
Respect for Persons
The Department of Health and Fluman Services (DHHS)
and the Food and Drug Administration then translated these
principles into specific regulations that were adopted in l99L
as the Federal Policy for the Protection of Human Subjects
also known as the Common Rule (Title 45 of Code of Federal
Regulations [CFR], Part 46). This policy has shaped the course
of social science research ever since by requiring organizations
that sponsor feder ally funded research-including universities-
to establish committees that review all research proposed at the
institution and ensure compliance with the federal human subjects
requirements when the research is conducted. This policy has
shaped the course of social science research ever since, and you
will have to take it into account as you design your own research
investigations. Professional associations such as the Academy of
Criminal Justice Sciences (ACJS), university review boards, and
ethics committees in other organizations also set standards for the
treatment of human subjects by their members, employees, and
students, although these standards are all designed to comply with the federal poliry. This
section introduces these regulations.
After 25 years, the Common Rule was revised, with modifications that were supposed
to be implemented in January of 2018 but were delayed at the last minute, and the effective
date was moved toJuly 19,2018 (Allen 2018). The revisions relaxed some requirements for
social science research and made several other important changes that are consequential
for both medical and social science researchers. These regulations, as revised, inform the
discussion that follows (Chadwick 2017).
TheACJS and theAmerican Society of Criminology (ASC), like most professional social
science organizations, have adopted ethical guidelines for practicing criminologists that are
more specific than the federal regulations. The ACJS Code of Ethics also establishes proce-
dures for investigating and resolving complaints concerning the ethical conduct of the orga-
nizations members. The code of ethics of the ACJS (2000) is available on the ACJS website
(rttp://www.acjs.org). The ASC follows the American Sociological Associations (ASA 1999)
code of ethics, which is summarized on the ASA website (trttp://www.asanet.orglabout/ethics
.&).
ETHICAL PRINCIPLES
Achieving Valid Results
Achievingvalid results is the necessary starting point for ethical research practice. Simply put,
we have no business asking people to answer questions, submit to observations, or participate
in experimenal procedures if we are simply seeking to veri$z our preexisting prejudices or
convince others to take action bn behalf of our personal interests. It is the pursuit of objec-
tive knowledge about human behavior-the goal of validity-that motivates and justifies our
investigations and gives us some claim to the right to influence others to participate in our
research. Knowledge is the foundation of human progress as well as the basis for our expecta-
tion that we, as social scientists, can help people achieve a brighter future. Ifwe approach our
research projecs objectively, setting aside our personal predilections in the service oflearn-
ing a bit more about human behavior, we can honesdy represent our actions as potentially
contributing to the advancement of knowledge.
Justice (in research);
*i*irinuti *u brnrfits and
ri,lt$s *t r*r:*rtrr:h fairlU,
Federal Policy for the
Protection of Human
Subjects (Common Bule):
{*d*ral ruguillisfi*
est,th!i*h*d in lfi*1 thatrsr*
f:rtr,*rj ** tlt* flrifitiF:leg tf
thr: ***trsrifr*p*r\,
Academy of Criminal Justice
Sciences (ACJS) Code of
Ethics:
Ilre ff*rJc {rt f!nir;* r,t thv,
fr,*adsnt,t *f ff ri rr i nal Justi rc
fir,i*n*x* tfr{),}#} **t* t*rlh
{:3} Lthit:itl fitarzdar** t*at
und*rli* tu*ttsb*rs *{ thc
ht atl*nrys p rfi f fi s* i ttnei
t **p tt {\ yiy}iliti * * t,n r}
cr:ndu*1, sltnfi yrith i$) th*
V*\ir,i** and ?r****L*** t*r
*ntr:rci ng ih{Jse prir*r:tSsi*;
n n rJ *tnn rj ?,r *t), l,{1 *rslt * r *l* trt
in r.h**,r:ad*ntU r:l *rininal
Jt:*i,ir:* $* i * n *cs c t]fiI ffi it;l
i r i {tiv i duxl ffi *ntf} * { * !*
arlfttlrrt trs th* A*J$ trd* *t
t{tfil
r, :t i n rJ *l *r r *i ni n U *tli r;al
hehnvirr irtth* *r:nI*Ht r,lf
lh* tr *v * tu {}dy {s r *i **:*i rs nal
r,r;tiuiti*s.
64 SECTION I . FOUNDATIONS FOR SOCIAL RESEARCH
ExhibitS.4 Belmont Report Principles
The details inZimbardos articles and his book (2007) on the prison experiment make a
compelling case for his commitrnent to achieving valid results-to learning how and why a
prison-like situation influences behavior. In Zimbardos (2009) own words,
Social-psychological studies were showingthathumannaturewas more pliable than pre-
viouslyimagined and more responsive to situational pressures thanwe cared to adorowl-
edge. . . . Missing from the body of social-science research at the time was the direct
confrontation . . . ofgood people pitted against the forces inherent in bad situations. . . . I
decided that what was needed was to create a situation in a controlled experimental set-
ting in which we could array on one side a host ofvariables, such as . . . coercive rules,
power differentials, [and] anonymity. . . . On the other side, we lined up a collection of the
best and brightest ofyoung college men. . . . I wanted to know who wins-good people
or an evil situation-when they were brought into direct confronation.
Zimbardo (Ilaney et al. 1973) devised his experiment so the situation would seem realistic
to the participants and still allow carefirl measurement of imporantvariables and observation
of behavior at all times. Questionnaires and rating scales, interviews with participants as the
research proceeded and after it was over, ongoing video and audio recording, and logs main-
tained by the guards all ensured that very litde would escape the researchers ga.ze.
Zimbardos (Ilaney et al. L973) attention to validity is also apparent in his design of
the physical conditions and organizati_onal procedures for the experiment. The prison was
CHAPTER 3 o ETHICAL GUIDELINES FOR RESEARCH 65
constructed in a basement without any windows so that participants would not have a sense
of where they were. Their isolation was reinforced by the practice of placing paper bags over
their heads when they went with a guard to use the bathroom, which was in a corridor apart
from the prison area. Meals were bland, and conditions were generally demeaning. This was a
very different situation for the participans; it was no college dorm experience.
However, not all social scientists agree that Zimbardos approach achieved valid results.
British psychologisc Reicher and Haslam (2006) argue that guard behavior was not so con-
sistent and that it was determined by the instructions Zimbardo gave the guards at the start of
the experiment rather than by becoming a guard in itself. For example, in another experiment,
when guards were trained to respect prisoners, their behavior was less extreme (Lovibond,
Mithiran, and Adams I 979).
In response to such criticism, Zimbardo (2007) has pointed to several replications of his
basic experiment that support his conclusions-as well as to the evidence of pafterns of abuse
in the real world of prisons, including the behavior of guards who tormented prisoners atAbu
Ghraib.
Do you agree with Zimbardos assumption that the effects of being a prisoner or guard
could fi:uitfully be studied in a mock prison with pretend prisoners? Do you find merit in
the criticisms? Will your evaluation of the ethics of Zimbardos experiment be influenced by
your answers to these questions? Should our ethical judgments differ when we are confident
a studys results provide valid information about imporant social processes?
We cant answer these questions for you, but before you dismiss them as inappropriate
when we are dealing with ethical standards for the treatment of human subjects, bear in mind
that both Zimbardo and his critics buttress their ethical arguments with assertions about the
validity (or invalidiry) of the experimental results. It is hard to justify any risk for human sub-
jects,or any expenditure of time and resources, if our findings tell us nothing about the reality
of crime and punishment.
Honesty and Openness
The scientific concern with validity requires in turn that scientists be open in disclosing
their methods and honest in presenting their findings. In contrast, research distorted
by political or personal pressures to find particular outcomes or to achieve the most
marketable results is unlikely to be carried out in an honest and open fashion. To assess
the validity of a researchers conclusions and the ethics of his or her procedures, you need
to know exacdy how the research was conducted. This means that articles or other reports
must include a detailed methodology section, perhaps supplemented by appendices
containing the research instruments or websites or an address where more information
can be obtained.
Philip Zimbardos research reports seemed to present an honest and open account of
his methods. His initial article (Ilaney et al. 1973) included a detailed description of study
procedures, including the physical aspects of the prison, the instructions to participanrc, the
uniforms used, the induction procedure, and the specific data collection methods and mea-
sures. Many more details, including forms and pictures, are available on Zimbardos website
(htrp://www.prisonexperiment.org) and in his recent book (Zimbardo 2007).
The act of publication itself is a vital element in maintaining openness and honesty.
Otlers can review and question study procedures and so generate an open dialogue with the
researcher. Although Zimbardo disagreed sharply with his critics about many aspects of his
experiment, their mutual commitrnent to public discourse in widely available publications
resulted …
Learnrng q imilar to the research methods we examined in Chapter 10, the dataused for\) the methods described in this chapter often rely on secondary data.Impor-
tantly, the methods covered in this chapter can be used both for investigative
purposes and for basic research purposes. The rise of social media platforms such
as Facebook and Tivitter have provided both researchers and practitioners with
an abundance of data from which to draw inferences.
In this chapteq we will first introduce you to social nenvork analysis and
demonstrate how it has been applied to research as well as law enforcement
investigative practices. We next discuss mapping generally (and crime mapping
specificrll, and examine how this technique has also been applied to police
practice as well as general research. And finally, we will conclude the chapter
with an introduction to the concept of big data, which you will learn is not
merely an extremely large and dynamic set of data but also refers to techniques
used to extract information from these datasets.
SOCIAL N ETWOR K ANALYSIS
It is virtually impossible today not to be part of social networks. Everyone you
interact with, including those in the virtual as well as in the real world ) are
part of your social network. We inherently think about the world in terms of
these networks, including such networks as familial and friendship nenvorks,
other students in your major in college, people who work out at the samo
time as you at the Wm, and the many friends you llr,ay not actually know
in real life on platforms such as Facebook or those who similarly liked some-
thing on Twirter. The method of social network analysis (SNA) has increas-
ingly been used since the Internet and these social media platforms emerged.
There are entire textbooks devoted to SNA, so the goal of this chapter is to
introduce you to the basics, along with a few case studies that highlight their
applicability in the field. SNA is not one type of method but is an approach to
analysis and a set of methodological techniques that help researchers describe
and explore relationships that individuals and groups have with each other
(Scott 2017).
Social networks are tFpes of relationships that can include many dif-
ferent forms, such as face -to-face and online interactions, digital economic
transactions, interaction with a criminal justice agenqr, geopolitical relations
among nation states, and so on. As you can see, there are numerous tFpes
1,,
2i,
ffi.ffii -fl*H
Understand how social
network analysis and crime
mapping can be used for
intelligence-Ied policing as
well as basic research.
Describe the different
research questions crime
mapping can answer.
, Understand how computer
technology has ushered in
t .a.
our ability to analyze big
data and the effects this
has had on criminal justice-
related research.
:!: Be able to see the
connection between
research and investigative
policing.
l.. , 1
An ai:prtath io a*al,rsis and a s*t *f
rrethr:d*lr:$ir:al i*clinir;ues that help
r*s*arrh*r-q de $rrihe anri *xpltr*
r* I ati t ii s lr r ps ih at i:at ir i ri rl i v i rl u a I s a;r d
0rri.Jt]. havr uviih *ar:h r:ther,
: :,
Il$es of relaiionsitips t*;ii tari irtr:lurit
iil.fin1i rJiffrre ni l*rrns, n*t:h as fa*e-r*-fam
ilnd *irlinr intrra*ti*ns, riigital e c*n*mir
t r ait s ar: i i r: r.t s, i li i * ra cl i * nr,, i t ii a * ff {ii {tii
; uslic* i1#*nl;y, il**pr:l itr*al r* latir:rns
ai?1finfi naiicrn stat*s, and s* rn.
SOCIAL N ETWORK A NALYSIS,
CRIME MAPPING, AND BIG DATA
of networks available for analysis. The most important
component of any network is that it is relational. That
is an important assumption. So far in this book, we
have talked about variables that measure attributes of
the units of analysis, such as the behavior of people, the
crime rates of cities, and so on. Relational data measure
the contacts, connections, attachments, and ties that
relate one unit to the next (Scott 2017).Ar a result, these
relation al data are not properties of any particular unit
(e.g., individual, group, .ity) but arerelational systems
of units that are created by connecting pairs of interacting units. Importandy, then, it is the
technique used to describe and examine relational data that is the key to SNA. Many of the
traditional methods that we have already discussed in this book can also be used to collect
relational data. For example, surveys, interviews, participant observation, and secondary
data can all be used to generate relational data for SNA as we will see in the case studies
that follow.
Although literally thousands of articles examined aspects of social structure in the early
twentieth century, one of the first graphical applications of social networks was created by
Jacob Moreno to examine friendship choices. In his classic book,LVho Shall Suntiae? Moreno
(1953) describes his definition of sociometry as being in accordance with its eqrmology from
Latin and Greek, with the emphasis . . . on the second half of the tem,metrum,meaning
measure, but also on the first half, socius meaning companion (51). Instead of focusing
exclusively on the individual or exclusively on an aggregate entity, Mereno believed that the
relationship between individuals within a group must also be examined. Using a sociometric
test, which required individuals to choose their associates from a group in which they were a
member, attractions ar,d.repubions were determined. For example, if your instructor wanted to
understand the social strucflrre of the class you are in right now, she or he might ask each stu-
dent to hypothetically choose among the students whom they wanted to have sit next to them
(attraction) and whom they would like to have moved to another class (repulsion). Responses
received from each individual in the group could then be graphed in asociogram, which is a
way of representing social configurations, with individuals (or some other unit) represented
by points and their social relationships to one another depicted by lines (Moreno 1953). The
formal terminology that describes these graphs as well as the units and relationships therein
are called several things, depending on the discipline. The social sciences generally call the
basic unis in a graph nodes (sometimes called actors or aertices) and nodes are connected by
relations (sometimes called. ties,links, arcs, or edges). As noted above, relationship data such as
these can be collected from many places, such as ofEcial records, Facebook friends, and so on
ffang, Keller, and Zheng 2017).
SNA usually consists of at least two datasets. The first is called the nodelist, where all
of the units of observation are stored. The second defines the relations between these units.
One of the most common t)apes of relations data is called an adjacency matrix (sometimes
called nenlork matix), wherein the nodes constitute both the rows and the columns and the
cells specif, if and what kind of relationship exists between the nodes at the intersection of
each row and column. We are going to stick with the simplest case of a binary network,
which only distinguishes whether a relation does or does not exist between a pair of nodes
(Yang et al. 2017). An example of a network graph and the nodelist and adjacenry matrix
upon which it is based is presented in Exhibit 11.1. fu you can imagine, nodes and relations
can be much more complicated than this simple example, and special software is required to
mathematically describe the numerous networks that emerge from such data. A discussion
of these issues is beyond the scope of this text, but we want to provide you with some excit-
ing case studies of how SNA is being used in research related to criminology and criminal
justice.
Belational data:
l,fi*,t.gu r*$ ihs *oiltact$,
* # fi il o ct i * rz*, atta*hrfi e nt$,
arsd,li** tha+, r*la.tfr olifi ilnit
tc thc noxl,
Sociogram:
h grast?t rspr*$e*linU th*
s*r ia I {r*ilfi # * ralicns, with
individuai* {*r **fflfr rslltrl
unil} re pro$*ntoii by tr:aints
nnr| t**i r st:*ial r*latir:nsh i ps
ir *rl* afiilth*r *,r,pi*r,*rlbu
! ! n*s,
Nodes:
The hasic ufiits ie,$,, p**tJl*\
in a sr:cial n*t,u*rk gravh,
sfiffistiff1** {:all*r} a#*rs *r
{#rtlc#s,
Belations:
Th* c*nn*tti*n* i* a n*tul*rk
#r ,r$h,
g t){t1*,lifft *,* {:dll * d i i * *q,
liuks, fr{{;s, frr xdgss,
Nodelist:
Th* data **t {;t}rfi.dirrirrU thr
nr:d*$ iufiits rst rsb**rttxti**1
f*r a stcial n*trt*rk anal *in,
Adjacency matrix:
fi, rlala,s*t ra nta i n i n g
i nf * r ntali rs n ab rs trt tlt *
r*latir.rns hrhrs*n th* units
cf c rne rv atitsrt,sorilot i rilo$
r,ail*rj a fiatw#rk ffiatrix,
Binary network:
*isir nU u ishe*,ruh*th*r rr
rrlati*nslrip d*cs ar d*cs n*t
exist lietwc#r] rifid{ir,
t:::: iii:::t::.::;:t: ::: ::: ::: ::: ::: ::: ::::: :::,::::::i!:i.i:!:t!:::!:!:i.::i.i:i:::i:;:i:i:i:::i:!:i.i:i.i:i i::.i::!::!: :. :!: :l :
[i *E, ffi.iiiri:.ii.ii.ii.i,.ii..i.i.ii.r,.i.,.,,i.,.i.,.,.,r,,.i .i.
:ii:i:ii:::::l:i::t:l::ii:ra:a:::;:l;i:::ii:i:::i::::i::::,:i::i::ittiiiii:ii:i::t:ti::::::i:iilitli:lt::a::ilil:ilii;::
.:.::i:.::j.:::.:::::,:::.::i::::.:::.:.:.:::::1:::i::j:::.:::.:::::::.::::::ii:::.:::.:::::::.j::.:::.:::j:::::.::::..:::i.::::
::::i:i
: :l:::::j::::::::::t: ::: :: :::ri.:il::l::i::1::
: i :i::i::: :::::i:1:: :::: : : : : ::: : i::: ::: :::.:::.:: .l:: ::i:.:
i:ii:::t:it:iti::tit::i;i::::::j:ti:i!::i!:i::i:ii:i::i::it:i::i::i:ii:i:lli::i:i::i:i,:iii:i:tit|t::iiiji;::i:l:i:i
i::i::::i:i:i::l:r::i::i::::::i:u:j;:i:::::i:l::::i:::;:t::11:jiil:i::itiiij:1il:r::::::t::;:::iitilij:t::tjj:ii:t::;
i::::::::i:t::i:l::::::!:::::::li::l::i::ir::::;i:l:i:::i:i::i:i;it;i:::lt:i:i:ti:it:iiiliiiti:ii:ir:i:tiilii:i:::i:i::i::!lti:t:r:
::.::::: ::j::: ::. . :r:::+1 ::::: : : : ::1: :1 : :::!:::i :i :ll:::::il:i:::i:::ii.i.i:li:;:i:::!:i:i:i:i. :!. ::: : .: .. :::
-.
ouve learned,
tcards,
hapter content,
CHAPTER 11 . SOCIAL NETWORK ANALYSIS, CRIME MAPPING, AND BIG DATA 329
Nodelist
A Andrei
B Barbara
C Chris
D Den n is
E E rica
F Fannv
G Gal ina
H H ans
I oor
J Jennv
Adiacencv Matrix
A B C D E F G H I J
A n 1 0 0 1 0 0 1 1 0
B 1 0 0 0 1 0 0 0 0 U
C 0 0 0 0 1 0 0 0 U 0
D 0 il 0 U 0 tl 0 il 0 n
E 1 1 1 0 0 0 0 0 0 0
F 0 0 0 o 0 0 0 0 1 0
G 0 0 0 0 0 0 0 0 0 0
H 1 0 il 0 n U 0 U 0 0
I 1 U IJ 0 0 1 0 U 0 1
J 0 0 0 0 0 0 0 0 1 0
Source: Adapted from Yang, Ke1ler, and Zheng2017 .
CASE STUDY
Networks of Terrorist Cells
On September 1 l, 2001, nineteen members of the Islamic extremist group al-Qaeda hijacked
four airplanes and carried out suicide crashes into four places in the United States.The targets
included the north and south towers of the World Tiade Center, the Pentagon, and Wash-
ington, D.C. (in the last instance, the passengers fought the hijackers, preventing the plane
from hitting its target and causing it to crash into an empty field in Pennsylvania instead).
Almost 3,000 people were killed, including all of the passengers on the planes along with the
19 hijackers and many hundreds ofpeople in the targeted buildings, which included rescuers.
About a month before the 9/ll attack Zac*ias Moussaoui, a French citizen of Moroccan
descent, and sometimes referred to as the 20th hijacker,was arrested after he raised suspicion
at a flight school in Oklahoma by requesting information on flying a 747. Motssaoui was
eventually indicted and found guilty in 2006 of six charges, including conspirary to com-
mit acts of terrorism. Information from his indictrnent (United States of Arnerica o. Zacarins
330 SECTION lV . TOPICAL RESEARCH DESIGNS
Exhibit L1.1 Example of a Network Graph With lts Nodelist and
Adjacency Matrix
Moussaoui 2001), along with other information uncovered by Tbe Nera York Times and the
Washington Post have been used to conduct social network analyses of the terrorist cell that
carried ofig/ll. One of the first attempts was made by Krebs (2002), who created one of the
first network graphs of the terrorist network. An adapted snippet of his graph is displayed in
Exhibit 11.2.
Without going into the advanced statistical analysis performed by Krebs to describe the
strength of the relations for the terrorists, many conclusions can be drawn from this graph,
including the meticulousness with which the hijackers kept their identities unknown even
from each other. Krebs explains, Many pairs of team members were beyond the horizon
of observability. . . . Keeping cell members distant from each other, and from other cells,
li*.ii
ffi\iin
*ed Belras
il,nnJ,N*,*)*
,r,,,, \ \ fi;Alr,[\
ilitiiiiili nl I I I lglrl I\l.lq,lll lLr! q,l
ffifur=-fu
Mamduh Mahmud Salim
Mamoun Dar kazanli
jed Moqed
lid AI - Mihdhar
Bandar Alhaz mi
Mohammed Abdullah
Faisal Al Salmi
,al- Marabh
Flaed HijaZi
Ahmed Alnami
Mohamed Abdi
! Flight AA#1 1 - Crashed into WTC North
ffi Flight AA#77 - Crashed into Pentagon
ffi Flight UA#93, - Crashed into field in Pennsylvania
Hlrii Flight UA#1 75, - Crashed into WTC Southl+;4i+X v
$l$+i Associated with Hijackers
Source:Adapted from Krebs 2002, Figure 4, p. 50.
-Bin al-shibh
Stam Suqami Y/ Ahtfud.Al
Alhaz mi
CHAPTER 11 . SOCIAL NETWORK ANALYSIS, CRIME MAPPING, AND BIG DATA 331
Exhibi t 77.2 Partial Network Graph of the gt77 Terrorist Attackers
r El Mot assadeq
minimizes damage to the network if a cell member is captured or otherwise compromised
(2002,46).Krebs graph also confirms the fact that MohamedAtta was the likely leader of the
cell, as he has the most relations with other nodes.
Krebs analysis shows the benefits of SNA when putting together a case for prosecution. It
also highlights the inherent difficulty of using SNA for preventing or uncovering secret illegal
networls. Krebs concludes,
The best solution for network disruption may be to discover possible suspects and
then, via snowball sampling, map their ego networks-see whom else they lead to,
and where they overlap. To find these suspects it appears that the best method is for
diverse intelligence agencies to aggregate their information-their individual pieces
to the puzzle-into a larger emergent map. (51)
While using SNA for investigative purposes has its challenges, our next case study demon-
strates the merits of doing so.
CASE STUDY
Finding a Serial Killer
The Green River serial killer (GRK) killed his first victim, 16-year-old Wendy CofEeld, in
Kings County, Washington. Her body was found inJuly of 1982 in the Green River, which
became the name given to the then-unidentified killer. After 48 other murders, Gary Leon
Ridgway was finally charged as the serial killer in September 2001, despite the fact that he
was on the list of suspecrc much earlier. Media interest of the cases generated thousands of
leads, and these leads compounded with every new victim, which resulted in a huge amount of
data to examine. However, large amounts of data are not the only hindrance to solving a case.
Like all of us, police detectives can have cognitive biases (see Chapter 1 for a list of common
biases), and when combined with an overabundance of information coming from the public,
both reliable and unreliable, investigations can go awry.
In a recent papeg Bichler, Lim, and Larin Q0l7) have demonstrated how SNA can be used
to aid in connecting the pieces ofa growing body ofevidence. Bichler and her colleagues col-
lected data about the Green River murders from multiple sources, including newspaper reports,
bools, and court transcrips of Ridgways trial. They then performed a SNA analysis of the evi-
dence over time to determine if SNA could have prevented investigators from keeping another
man on top of their suspect list instead of Gary Ridgway. They state, We argue that by identify-
ing which actors shift in structural position during the investigation, it may be possible to reduce
the damaging effects of tunnel vision, emphasis on specific evidence, and intuition (141). The
goal of their analysis was to find the connections between the victims and the suspects, along
with the places they frequented. Because these murders Iikely involved strangers, Bichler et al.
(2017) explain that other sources of information must be added to find clusters. They state,
People sharing social space will emerge when we link wimesses, friends, and associ-
ates to the places they frequent, but finding individuals positioned between different
::mmff ;ffi ffi:-,iff :x[;i;,H:*tHsuspectinacrimeseries
The categories of the data Bichler and her colleagues examined included victims, suspects,
investigatory involvement (e.g., witnesses, body finders), family and associates, body disposal
sites, last seen locations, and other investigative material. Because there were different levels of
SECTION lV . TOPICAL RESEARCH DESIGNS332
geographical aggregation (e.9., a red light district, a specific hotel), all data points were placed
within a census track Without going into the statistical deails of the study, they were particu-
larly interested in middleman rtrho connected others not direcdy linked to each other. This
is statistically measured with a betweenness centrality score. The researchers also created
multiple graphs using data over time, beginningwith graphs using data thatwas available from
the beginning of the investigation and creating more graphs until the data were exhausted
(about 30 months into the investigation). Exhibit 1 1.3A displays a graph using data from the
first six months of the investigation while Exhibit 11.3B depicts the investigation at 18 months,
after which there was not much new data to incorporate. Line thiclness indicates the number
of shared places between pairs, diamonds depict suspects, gray circles indicate victims, and other
circles represent other case nodes (e.g., witnesses, body disposal sites).
Source: Adapted from Bichler, Lim, and LarinQAfl),Table 3,p.1,46.
Betweenness centrality
sc0re:
A rtatisti * that rn*ax*r**
lltr: *xle*ttr y;hi*h nurk*
**nrz**tl* r,sinr,r rgsd** t*al
arr n*t rlir*r,,,,,,1 link*rlt*
***lt *lh*r itt s,**i*l **ttit*rk
analysis,
(A)
CHAPTER 11 . SOCIAL NETWORK ANALYSIS, CRIME MAPPING,,AND BIG DATA 333
Exhibit 11.3 Network Graph of Nodes in the Green River Killer
Investigation at 6 and 18 Months
CASE STUDY
Using Google Earth to Track Sexual
Offending Recidivism
While the GIS software that was utilized by Fitterer et al. (2015) has many research advan-
ages for displaying the spatial distributions of crime, other researchers have begun to take
advantage of other mapping tools, including Google Earth. One such endeavor was con-
ducted by Duwe, Donnay, and Jbwksbury (2008), who sought to determine the effects of
Minnesotas residency restriction statute on the recidivism behavior of registered sex offend-
ers. Many states have passed legislation that restricts where sex offenders are allowed to live.
These policies are primarily intended to protect children from child molesters by deterring
direct contact with schools, day care centers, parks, and so on. Most of these satutes are
applied to all sex offenders, regardless oftheiroffending history or perceived risk ofreoffense.
The impact of such laws on sexual recidivism, however, remains unclear. Duwe et al.
(2008) attempted to fill this gap in our knowledge.They examined224 sexoffenders who had
been reincarcerated for a new sex offense between 1990 and 2005 and asked several research
questions, including Where did offenders initially establish contact with their victims, and
where did they commit the offense? and What were the physical distances between an
offenders residence and both the offense and first contact locations? (488). The research-
ers used Google Earth to calculate the distance between an offenders place of residence, the
place where first contact with the victim occurred, and the location of offense.
Duwe and his colleagues (2008) investigated four criteria to classifr a reoffense as pre-
ventable: (1) the means by which offenders established contact with their victims, (2) the
cHApTER 11 . SOCTAL NETWORK ANALYStS, CRTME MAPPING, AND BtG DATA 339
Big data:
h,i#{i lar7* datasel
t*,rJ,,r:* ni* i ns th r: r: ran d*
oi cases), a***ssilslrt i;t
c {}ffi{} ute r - r * ?Ld,?Ll:l * f * r n, th at
is tls*rl t* re,t*al patt*rir$,
tr*nris, and ass**iatirrrs
l;e1tru**n ur.uriabl*s ruilh **w
c * m fi u te l
+, **hn*l * g;,
distance between an offenders residence and where first contact was established (i.e., 1,000
feet, 2,500 feet, or I mile), (3) the type of location where contact was esablished (e.g., was it a
place where children congregated?), and (4) whether the victim was under the age of 18. To be
classified as preventable tfuough housing restrictions, an offense had to meet ceftain criteria.
For example, the offender would have had to establish direct contact with a juvenile victim
within one mile of his residence at a place where children congreg?.te (.g., pr.lc school).
Resuls indicated that the majority of offenders, as in all cases of sexual violence, viaimized
someone theyalreadytnew. Oily35\% ofthe sexoffenderrecidivists esablishednewdirectcontact
with a victim, but these victims were more likely to be aduls than children, and the contact usually
occurred more than a mile away from the offenders residence. Of the few offenders who direcdy
esablished new conact with a juvenile victim within dose proximity of their residence, none did
so near a school, a parlg a playground, or other locations included in residential restriction laws.
The authors concluded that residenry restriction laws were not that effective in prevent-
ing sexual recidivism among child molesters. Duwe et al. (2008) stated,
Why does residential proximity appear to matter so litde with regard to sexual reof-
fending? Much of ithas to do with the pattems of sexual offendingin general. . . . Sex
offenders are much more likely to victimize someone they know. For example, one of
the most common victim--offender relationships in this study for those who victim-
ized children] was that of a male offender developing a romantic relationship with a
woman who had children. . . . Theyused their relationships with these women to gain
access to their victims. . . . It was also common for offenders to gain access to victims
through babysitting for an acquainance or co-worker. (500)
Clearly, the power of mapping technologies has changed not only the way law enforcement
ofiicials are preventing crime but also the way in which researchers are examining the factors
related to crime and crime control.
BIG DATA
When do secondary data become what is now referred to as big data? Big data is a somewhat
vague term that has been used to describe large and rapidly changing datasets and the analytic
techniques used to extract information from them. It generally refers to data involving an
entirely different order of magnitude than what we are used to thinking about as large data-
sets. For our purposes, big data is simply defined as a very large dataset (e.g., contains thou-
sands ofcases), accessible in a computer-readable form, that is used to reveal patterns, trends,
and associations among variables. The technological advancements in computing power over
the past decade have made analyses of these huge datasets more available to everyone, includ-
ing government, corporate, and research entities alike. Importandy, many researchers now
contend that big daa holds great promise for improving the efEciency and effectiveness of
law enforcement and security intelligence agencies (Chan and Moses 2017,299).
Here are some examples of what now qualifies as big data (Mayer-Schcinberger and Cukier
2013): Facebookusers upload more than 10 million photos everyhour and leave a comment or
click on a like button almost three billion times per day; YouTirbe users upload more than an
hour of video every second; Twitter users are sending more than 400 million nveets per day. If
all this and other forms of stored information in the world were printed in books, one estimate
in 2 0 1 3 was that these books would cover tfie face of the eath 52 layers thick Thats big.
All this information would be of no more importance than the number of grains of sand
on the beach except that these numbers describe information produced by people, available to
social scientists, and manageable with todays computers. Already, big data anallses are being
used to predict the spread of flu, the behavior of consumers, and the prevalence of crime.
340 sEcnoN rv . ToprcAL RESEARCH DESTGNS
Heres a quick demonstration: We talked about school shootings in Chapter 1, which
are a form of mass murder. We think of mass murder as a relatively recent phenomenon, brit
you may be surprised to learn that it has been written about for decades. One way to examine
inquiries into mass murder is to see how frequendy the term mass murderhas appeared in all
the boolis ever written in the world. It is now possible with the click of a mouse to answer that
question, although with two key limitations: We can only examine bools written in English
(and in a few other languages) and, as of 2014, we are limited to only one quarter of all
books ever published-a mere 30 million books (Aiden and Michel 2013).
To check this out, go to the Google Ngrams site ftttps://books.google.com/ngrams),
type in mass murder and serial murder, and check the case-insensitizte box (and change the end-
ing year to 2015). Exhibit I 1.7 shows the resulting screen (if you dont obtain a graph, try
using a different browser). Note that the height of a graph line represents the percentage
that the term represents of all words in books published in each year, so a rising line means
greater relative interest in the term, not simply more boo[s being published. You can see that
mass ruarder emerges in the early 20th century, while serial ruurder did not begin to appear
until much later, in the 1980s. Its hard to stop checking other ideas by adding in other terms,
searching in other languages, or shifting to another topic entirely. Our next case study illumi-
nates how law enforcement agencies are also harnessing big daa to make predictions.
Ngrams:
F:*q ue*cy g raphs, pr*clu*erJ
hy fi**gie .s dataha**, rf all
1,;r:rris
*rint*t|in mrre lhatt
rtrr* l.ltirrJ *t th* tu*rldn h**ks
{}v*t ttmfr (with r*vcrafi* still
expanding),
0.0000600\%
0.0000550\%
0.0000500\%
0.0000450\%
0.0000400\%
0.0000350\%
0.0000300\%
0.0000250\%
0.0000200\%
0.0000150\%
0.0000100\%
0.0000050\%
0.0000000\%
, -t
,: i
..lii
:rti
t::
il
1 990
mass murder (All)
serial murder (All)
1900 1910 1920 1930 1940 1950 1960
Sour ce : Goo gle B o oks Ngram Viewer, http: / h ooks. go o gle. com/n grams.
CASE STUDY
1970 1 980
Predicting Where Crime Will Occur
If you have seen tlle film Minoity Report, yotrhave gotten a far-fetched glimpse of a world
where people are arrested for criminal acts that they are predicted to do, not that they have
actually done. FOX also had a television series called Minority Report that was based on the
same premise. While crime predictions in tlrese shows are based on clairvoyants (people who
can see into the future) and not real data, law enforcement agencies are beginning to use big
data to predict both future behavior in individuals and, as we saw with crime mapping, areas
where crime is likely to occur in the future.
fu we highlighted earlier, crime mapping allows law enforcement agencies to estimate
where hot spots of crime are occurring-where they have been most likely to occur in the
past. Caplan and Kennedy (2015) from the Rutgers School of CriminalJustice have pioneered
CHAPTER 11 o SOCIAL NETWORK ANALYSIS, CRIME MAPPING, AND BIG DATA 341
Exhibit 11,.7 Ngram of, Mass Murder and Serial Murder
Risk-terrain modeling (BTM):
lvkcl*linu that uses iJata frrnt
seJe ral $ourcfis to prcrjici
the prohahility i:f rrirn*
*c*u rrin7 in the futur#,
usir:# the unrierlying ta*t*rs
al tlt* *n tir *rtn *rti that
;ir* a$$o{:iat*d with iile;,*l
b*hauiar,
a new way to forecast crime using big data called risk-temain modeling (RTM). Using daa
from several sources, this modeling predicts the probability of crime occurring in the future
using the underlying factors of the environment that are associated with illegal behavior. The
imporant difference between this and regular crime mapping is that it takes into account
features of the area that enable criminal behavior.
The process weights these factors (which are the independentvariables) and places them
into a final model that produces a map of places where criminal behavior is most likely to
occur. In this way, the predicted probability of future crime is the dependent variable. This
modeling is essentially special-risk analysis in a more sophisticated form than the early maps
ofthe Chicago school presented earlier. Kennedy and his colleagues (2012) explain:
Operationalizing the spatial influence of a crime factor tells a story, so to spefi about
how that feature of the landscape affects behaviors and attracts or enables crime
occurrence at places nearby to and far away from the feature iself. When certain
motivated offenders interact with suitable targets, the risk of crime and victimization
conceivably increases. But, when motivated offenders interact with suitable targets at
cerain places, the risk of criminal victimization is even higher. Similarly, when …
THIS PAPER IS TO BE USED AS YOUR GUIDE TO HELP YOU PUT TOGETHER THE DISCUSSION FOR THIS WEEKS LESSON PLEASE LOOK BACK AT YOUR INSTRUCTION AND READING MATERIAL TO HELP YOU……THANKS
Week 6 Discussion 1 Ethics
Human experimentation is an ethical issue that exists in criminal justice research. It was
not uncommon for the military to use its own crew members as volunteers for experiments
regarding chemical warfare. In 1944, there was a young Navy man that was subjected to rigorous
testing of chemical agents that yield adverse reactions to his body both internally and externally,
(pcrm.org, n. d.).
The ACJS Code of Ethics would have prevented such brutal treatment of a test subject.
First, full disclosure between the subject and researcher should be completely understood and
full permission must be given prior to experimenting. Minimal harm to the subject is also an
ethical aim when it comes to subjecting people to experimentation. Researchers should inform
participants about any aspects of the research that might change a person’s mind about
participating, such as physical risks, discomfort, and/or unpleasant emotional experiences.
Those found in violation of the ACJS Code of Ethics could result in sanctions all the way
to termination of membership. Basically, all you must do is be a decent human being when
conducting research like one should in everyday life. If decency is a guiding force, ethical issues
won’t be an issue.
References
Pcrm.org staffers, (n. d.). Human experimentation: an introduction to the ethical issues.
Retrieved from http://www.pcrm.org/research/healthcare-professionals/researchcompendium/human-experimentation-an-introduction-to-the
CATEGORIES
Economics
Nursing
Applied Sciences
Psychology
Science
Management
Computer Science
Human Resource Management
Accounting
Information Systems
English
Anatomy
Operations Management
Sociology
Literature
Education
Business & Finance
Marketing
Engineering
Statistics
Biology
Political Science
Reading
History
Financial markets
Philosophy
Mathematics
Law
Criminal
Architecture and Design
Government
Social Science
World history
Chemistry
Humanities
Business Finance
Writing
Programming
Telecommunications Engineering
Geography
Physics
Spanish
ach
e. Embedded Entrepreneurship
f. Three Social Entrepreneurship Models
g. Social-Founder Identity
h. Micros-enterprise Development
Outcomes
Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada)
a. Indigenous Australian Entrepreneurs Exami
Calculus
(people influence of
others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities
of these three) to reflect and analyze the potential ways these (
American history
Pharmacology
Ancient history
. Also
Numerical analysis
Environmental science
Electrical Engineering
Precalculus
Physiology
Civil Engineering
Electronic Engineering
ness Horizons
Algebra
Geology
Physical chemistry
nt
When considering both O
lassrooms
Civil
Probability
ions
Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years)
or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime
Chemical Engineering
Ecology
aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less.
INSTRUCTIONS:
To access the FNU Online Library for journals and articles you can go the FNU library link here:
https://www.fnu.edu/library/
In order to
n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading
ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.
Key outcomes: The approach that you take must be clear
Mechanical Engineering
Organic chemistry
Geometry
nment
Topic
You will need to pick one topic for your project (5 pts)
Literature search
You will need to perform a literature search for your topic
Geophysics
you been involved with a company doing a redesign of business processes
Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience
od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages).
Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in
in body of the report
Conclusions
References (8 References Minimum)
*** Words count = 2000 words.
*** In-Text Citations and References using Harvard style.
*** In Task section I’ve chose (Economic issues in overseas contracting)"
Electromagnetism
w or quality improvement; it was just all part of good nursing care. The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases
e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management. Include speaker notes... .....Describe three different models of case management.
visual representations of information. They can include numbers
SSAY
ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3
pages):
Provide a description of an existing intervention in Canada
making the appropriate buying decisions in an ethical and professional manner.
Topic: Purchasing and Technology
You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class
be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique
low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.
https://youtu.be/fRym_jyuBc0
Next year the $2.8 trillion U.S. healthcare industry will finally begin to look and feel more like the rest of the business wo
evidence-based primary care curriculum. Throughout your nurse practitioner program
Vignette
Understanding Gender Fluidity
Providing Inclusive Quality Care
Affirming Clinical Encounters
Conclusion
References
Nurse Practitioner Knowledge
Mechanics
and word limit is unit as a guide only.
The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su
Trigonometry
Article writing
Other
5. June 29
After the components sending to the manufacturing house
1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend
One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard. While developing a relationship with client it is important to clarify that if danger or
Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business
No matter which type of health care organization
With a direct sale
During the pandemic
Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record
3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i
One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015). Making sure we do not disclose information without consent ev
4. Identify two examples of real world problems that you have observed in your personal
Summary & Evaluation: Reference & 188. Academic Search Ultimate
Ethics
We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities
*DDB is used for the first three years
For example
The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case
4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972)
With covid coming into place
In my opinion
with
Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA
The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be
· By Day 1 of this week
While you must form your answers to the questions below from our assigned reading material
CliftonLarsonAllen LLP (2013)
5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda
Urien
The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle
From a similar but larger point of view
4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open
When seeking to identify a patient’s health condition
After viewing the you tube videos on prayer
Your paper must be at least two pages in length (not counting the title and reference pages)
The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough
Data collection
Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an
I would start off with Linda on repeating her options for the child and going over what she is feeling with each option. I would want to find out what she is afraid of. I would avoid asking her any “why” questions because I want her to be in the here an
Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych
Identify the type of research used in a chosen study
Compose a 1
Optics
effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte
I think knowing more about you will allow you to be able to choose the right resources
Be 4 pages in length
soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test
g
One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research
Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti
3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family
A Health in All Policies approach
Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum
Chen
Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change
Read Reflections on Cultural Humility
Read A Basic Guide to ABCD Community Organizing
Use the bolded black section and sub-section titles below to organize your paper. For each section
Losinski forwarded the article on a priority basis to Mary Scott
Losinksi wanted details on use of the ED at CGH. He asked the administrative resident