Category: Criminology

  • “Officer Narcissus and the Consequences of Social Media Misuse: A Case Study in Police Code of Conduct and Digital Privacy Rights”

    Officer Narcissus is the supervisor of the sexual assault unit at the Saint Leo Police Department. The unit is made up of male and female officers. Officer Narcissus has a Facebook account which he accesses daily, sometimes from his department computer. On Facebook, Officer Narcissus has posted several photographs of himself, some of which are sexually suggestive. In others, he is dressed in a vampire costume biting the neck of woman. He has also posted photos of himself in his police uniform. He posts his opinions on politics, his gripes about his salary and hours, his sexual conquests, and his dislike of everything the mayor of Saint Leo, who is up for re-election, has ever done or not done while in office.
    The Sheriff has received complaints from fellow officers and from the public about Officer Narcissus’ posts. The department’s code of conduct states that officers shall not engage in any activity that reflects negatively on the department.
    The Sheriff went into Officer Narcissus’ office and turned on his computer. She did this without the officer’s knowledge. She saw that the computer had been used frequently to access Facebook as well as other social media sites. It was also obvious that the computer had been used to purchase sex toys and hunting equipment. She went to his Facebook page and saw all of the postings. When she was ready to shut down the computer, she clicked on one site that she had not heard of before. It turned out to be a child pornography site and there were photographs of children being sexually abused. The Sheriff wants to bring the officer in for questioning. When she informed the officer of this, Officer Narcissus told the Sheriff that she had no business using his computer to search for anything. Officer Narcissus stormed into the department and began dismantling his computer. The Sheriff and other officers stopped him and cuffed him and placed him in a cell.
    The Sheriff wants to know what she should do now. Can she detain the officer? Can she question him? Does she have to give him any rights? Did she have a right to search his computer? For future reference, she wants to know what restrictions, if any, she can place on her officers’ use of social media sites such as Facebook.

  • “Connecting Theory to the Present: Research, Analysis, and Application Project”

    Research question, Annotated Bibliography, and Citation map
    (20%)
    Each project must include the following:
    1. A research question
    2. An annotated bibliography, in APA Style, for six academic sources (i.e., peer-reviewed
    journals or book chapters published by a university press), at least three of which must be
    published in 2021 or later.
    3. A citation map that shows how the six sources are connected to each other AND how they
    are connected to at least one of the assigned readings OR how they are connected to
    another text that is written by the author of one of the assigned readings
    THIS IS A DRAFT ONLY AND SUBJECT TO REVISION
    4 of 12
    We will discuss how to complete this project in class. In addition, you should refer to these
    instructional resources:
    • How to develop a research question:
    o https://libguides.kpu.ca/crim/1208/research-question
    • How to write annotated bibliographies:
    o https://libguides.kpu.ca/apa (click on the tab that says “annotated bibliography”)
    o https://wiki.ubc.ca/Library:How_to_Write_an_Annotated_Bibliography
    o https://advice.writing.utoronto.ca/types-of-writing/annotated-bibliography/
    • How to produce a citation map:
    o https://libguides.kpu.ca/crim/1208/citation-mapping
    THIS IS A DRAFT ONLY AND SUBJECT TO REVISION
    5 of 12
    Application project
    The purpose of this exercise is to apply course content to a substantive topic of present-day
    interest, including (but not limited to) those discussed in Part III of the course. The project should
    be informed by the Research question, Annotated Bibliography, and Citation map, but it should be
    addressed to, or usable by, a public audience. In other words, this project should communicate
    your research and analysis of a present-day issue to a wider public, not just me as your instructor;
    it should apply the six academic sources to a present-day issue in a way that is meaningful to the
    public. The project can take any form that you want, such as a podcast, video, website, magazine
    article, newspaper editorial, or blog posts, so long as it demonstrates that you have met the course
    learning objectives.
    Minimum expectations:
    • the Application project should take into consideration the instructor’s feedback on the
    Research question, Annotated Bibliography, and Citation map
    THIS IS A DRAFT ONLY AND SUBJECT TO REVISION
    6 of 12
    • the project should be informed by six academic sources (i.e., peer-reviewed journals or
    book chapters published by a university press), at least three of which must be published in
    2021 or later. These can be the same as those used in the Research question, Annotated
    Bibliography, and Citation map assignment.
    • If your Application project uses a different research question and/or different academic
    sources than those used in the Research question, Annotated Bibliography, and Citation
    map, then the connection to course material (i.e., assigned readings) needs to be made
    explicit.
    • be at least 2,500 words OR 10 minutes in duration (or the equivalent thereof, depending on
    what form your project takes)
    • No matter what form your project takes, you must hand in a list of your sources cited in APA
    Style.
    Midterm and final exam (20% each)
    The midterm and final exam will both consist of a mix of multipl  

  • Title: Reducing Recidivism: A Comprehensive Approach Introduction: Recidivism, or the tendency for a convicted criminal to reoffend, is a major issue facing the criminal justice system. It not only leads to increased crime rates,

    You have been chosen to be part of a task force aimed at reducing recidivism. Based on what we
    have read this semester, explain, in detail, how you would reduce recidivism. In your answer, be sure to include what we know about the causes of crime, what we know about the processing of criminals, and what we know about prisoner reentry.

  • Title: Cyberwarfare in the Ukraine-Russia Conflict: Motives, Effects, and Strategies for Combating Attacks

    The structure should be the following: 
    Introduction/methodology
    Chapter
    1 (2200 words approx.)
    ·      
    Overview of the Ukraine-Russia conflict and its impact on
    both countries.           
    ·      
    Definition and types of cyberwarfare in the context of the
    conflict.
    ·      
    You’re looking at cyberwarfare as an extension of the conflict,
    with both sides using computer technology as a weapon.
    ·      
    ‘What does a cyberattack hope to achieve?’ Damage to
    critical infrastructure? Damage to supply lines? Damage to utilities etc.
    Chapter
    2 (2200 words approx.)
    ·      
    Motives behind cyberattacks in the Ukraine-Russia conflict.
    ·      
    Psychological effects of cyberattacks on individuals and
    society.
    ·      
    How the combatants have used cyberattacks against their
    opponent.
    ·       The possible effects of a successful
    cyberattack on the population: What would happen if gas, electric, food supplies were
    disrupted? What would the effect be on the populations?
    Chapter
    3 (2200 words approx.)
    ·      
    Strategies for combating cyberattacks in the context of the
    conflict.         
    ·      
    Main arguments
    o   Cyberattacks have become a
    significant aspect of modern warfare with state and non-state actors using them
    to achieve political and military objectives.
    o   The Ukraine-Russia conflict has seen
    a rise in cyberattacks targeting critical infrastructure government
    institutions and individuals leading to widespread disruption and fear.
    o   Understanding the psychological
    motivations behind cybercrimes in this conflict is crucial for developing
    effective countermeasures and promoting peace and stability in the region.
    ·      
    How other countries prevent cyberattacks
    ·      
    A successful cyberattack: Stuxnet
    ·      
    A successfully prevented cyberattack.
    Summary
    References

  • “The Impact of Artificial Intelligence on Homeland Security: Exploring Opportunities and Challenges”

    Instructions
    Unlike the Reflection Papers, for your Analyst’s Paper
    choose a topic that relates to the materials covered during your studies of the
    Homeland Security world. This topic cannot be one that you wrote about in any
    of your courses at APUS or any other institute of higher learning. This is your
    opportunity to explore in-depth a topic that you have a greater interest in
    than what you covered during the other courses at APUS. Feel free to explore
    the world of Homeland Security and write about something that really interests
    you. Be brave and write about something that others are not going to write
    about, not just a typical paper on a common Homeland Security theme. Explore
    and enjoy. 
    Topic: Artificial Intelligence’s Role in Homeland Security
    Possible references:
    https://www.rand.org/hsrd/topics/dhs-and-ai.html
    https://www.gao.gov/blog/how-artificial-intelligence-transforming-national-security
    https://www.dhs.gov/science-and-technology/artificial-intelligence
    https://www.reuters.com/technology/us-homeland-security-names-ai-safety-security-advisory-board-2024-04-26/
    Please add and use additional references as necessary to
    meet the technical requirements.
    Components of the Analyst’s Paper
    ·      
    Cover Page (does not count towards your minimum
    or maximum page count).
    ·      
    Abstract and Keywords (does not count towards
    your minimum or maximum page count).
    ·      
    Introduction, Body, and Conclusion.
    ·      
    Reference Page (does not count towards your
    minimum or maximum page count). 
    Technical Requirements:
    ·      
    Your
    paper must be at a minimum of 8 pages and a maximum of 9 pages (the Title,
    Abstract, and Reference pages do not count towards the minimum limit).
    ·      
    No direct quotations, paraphrases are
    acceptable.
    ·      
    Do not include a methodology section or a
    literature review.
    ·      
    You must have at least eight unique sources in
    the paper. Each requires both a citation and a reference.
    ·      
    Type in double-spaced Times New Roman 12-point
    font. One-inch margins left, right, top, and bottom.
    ·      
    No direct quotations.
    ·      
    All paraphrases require a reference. All
    references require a paraphrase.
    ·      
    Follow APA 7 as the sole citation and reference
    style used in written work submitted as part of coursework.
    ·      
    Points will be deducted for the use of Wikipedia
    or encyclopedic-type sources. It is highly advised to utilize books,
    peer-reviewed journals, articles, archived documents, etc.
    ·      
    All submissions will be graded using the
    assignment rubric.

  • “Evaluation Report Template: Communicating Data, Interpretations, Conclusions, and Recommendations” Evaluation Report Template: Communicating Data, Interpretations, Conclusions, and Recommendations Introduction: The purpose of this report is to objectively communicate the data, interpretations

    Assignment Content
    You decide to prepare a set of report documents that will be completed concurrently and after the implementation of your evaluation. You decide to add these forms to the memo you drafted in Wk 3 – Design Evaluation. Your intention is to receive feedback on reporting expectations so that the task force can participate in steering the evaluation.
    Given the definition and design of your evaluation, prepare a 525- to 700-word report template that will objectively communicate data, interpretations, conclusions, and recommendations.
    Develop your hypothesis statement for presentation.
    What information from the textbook, assignments, and discussions are relevant to the problems you are addressing in your evaluation?
    What theory and calipers provided background information about the problem(s)?
    What actors and variables are you including in your evaluation?
    Which will change?
    Which will remain the same?
    What is your hypothesis?
    What areas are vulnerable to bias and risk misinterpretation?
    Cite at least 3 peer-reviewed or similar references to support your assignment.
    Format your assignment according to APA guidelines.
    Order 7715355 Week 3 Design Evaluation

  • Title: The Exceptions to the Warrant Requirement: Search Incident to Arrest and Exigent Circumstances

    his week, you are continuing your study of the Fourth, Fifth, and Sixth Amendments. Respond to 1 of the following questions. Support your answer with at least 1 published court case, such as a case from the U.S. Supreme Court, lower federal courts, or appellate state courts.
    What is a search incident to arrest, and what circumstances must exist in order for this exception to the warrant requirement to apply? Next, locate and summarize a published case in which the court discusses a search incident to an arrest. Finally, provide the citation to the case as your reference.
    Or
    What are exigent circumstances, and what are the various circumstances where exigent circumstances exist?  Next, locate and summarize a published case in which the court discusses exigent circumstances. Finally, provide the citation to the case as your reference.
    Discussion Board Reminders:

  • Title: “Exploring the Edward Brooke Papers: A Reflection on Conservatism and Its Evolution in American Politics” The Edward Brooke Papers are a collection of documents that provide valuable insights into the political career and ideologies of Edward Brooke, the first African

    write a 1500 words essay about the Edward Brooke papers- What is the document? Who wrote it? When is it from? – What does it say about the definition and role of conservatism? – Why was it compelling or interesting to you? – What was the context in which it was written? – How does it relate to course themes – ideas, media, social movements, or other themes? include info on Sen. Tom Scott and his views on conservatiism

  • “The Enigma of a Violent Woman: A Critical Analysis of Kilty and Frigon’s Examination of Karla Homolka”

    provide a brief summary and critical analysis of the book The Enigma of a Violent Woman – A Critical Examination of the Case of Karla Homolka by Jennifer Kilty and Sylvie Frigon.  The minimum length for your review is 4 full pages of text – not including your reference page and title page. Note that subtitles, running heads, referencing and spacing between paragraphs does not count as written text. There is no maximum length for your review. If you do not meet the minimum page requirement for your review, you will receive a mark of 0. If you have errors within the first two sentences of your review, you will receive a mark of 0.
    Grading for book review: 20% (15% for content and 5% for style). When writing your book review, you might want to take into consideration the following tips:
    It should present what Kilty and Frigon wanted to accomplish by writing The Enigma of a Violent Woman.  Why did they write the book?  Why should we care about this book?
    – It should give a summary of the main themes/content/ideas presented in the book.
    – It should outline the strengths/weaknesses of the book.  Did anything stand out while you read the book?  
    – Remember to provide support/evidence for all of the claims made in your review from The Enigma of a Violent Woman book.
    – Perhaps you might want to think about how this book potentially contributes to the body of knowledge about serial killers, women who kill and/or the cultural/media fascination with murder/violence.
    – Discuss what you have learned/describe what your take away was from reading this book.
    – Discuss whether Kilty and Frigon accomplished their goal/purpose with writing this book.
    *Note that these tips are not meant to be exhaustive.  You may want to add other key elements to aid in your overall assessment of Kilty and Frigon’s book.*

  • “Balancing Privacy and Technology: The Legal and Ethical Implications of DNA Extraction from Arrestees and the Use of ShotSpotter Technology in Law Enforcement” The Fourth Amendment and the Use of ShotSpotter Technology: An Analysis of United States v. Rickmon and the Goodman Article

    You will create this assignment following the Assignment Detail instructions below.
    Review the tutorial How to Submit an Individual Project.
    Assignment Details
    As recent events have shown, the rapid pace of technology development has created complicated legal questions that are being litigated before the courts today. Select one of the following topics to analyze, and prepare a three to five page paper addressing the following issues.
    DNA from Arrestees
    One of the most controversial of technological advances is the relationship between DNA, probable cause, and issues of privacy and the Fourth Amendment. You are provided with two research documents below that analyze the case of Maryland v. King, 569 U.S. 435 (2013), in which the U.S. Supreme Court held that it is constitutional to extract DNA from arrestees. The author of the first article provides an overview of the legal issues associated with compulsory DNA collection from arrestees and argues that the U.S. Supreme Court correctly decided the Maryland v. King case.
    The author of the second article raises several concerns about the Maryland v. King opinion and the future of privacy and the Fourth Amendment. Read both documents, and then write an argumentative essay explaining your position on the issue of DNA extraction from arrestees.
    Complete the following for this assignment:
    Read the following 2 research documents:
    Deitrich, L. (2015). Say Aah! Maryland v. King Defines Reasonable Standard for DNA Searches. 49 Val. U.L. Rev. 1095.
    Click here to access the article.
    Noronha, S. (2014). Maryland v. King: Sacrificing the Fourth Amendment to Build up the DNA Database. 73 Md. L. Rev. 667 (2014)
    Click here to access the article.
    Summarize the key legal and privacy concerns discussed by Deitrich.
    Summarize the key legal and privacy concerns discussed by Noronha.
    Write an argumentative essay supporting your position relating to those issues raised by Deitrich and Noronha. Indicate the following: 
    Whether you agree with both authors or one author over the other, and why;
    Whether you disagree with one or both authors, and why;
    Discuss your own ideas on DNA extraction from arrestees;
    Explain your position in detail.
    For background and additional insight into the Maryland v. King case,
    Click here to listen to the oral arguments. 
    Click here to read the Maryland v. King case. 
    ShotSpotter Technology
    Another controversial technological advancement has been police departments’ adoption of ShotSpotter technology across the county. ShotSpotter is a sophisticated surveillance system that detects gunshots and pinpoints the location of the gunshots. Once the system’s microphones detect sounds of gunfire, it sends the audio file to the ShotSpotter Review Center where it will be determined whether the sound was indeed gunfire. If it is determined that the sound is gunfire, ShotSpotter notifies the local police department.
    In favor of the use of ShotSpotter, you are provided with a case, United States v. Rickmon, and the oral arguments, in which the majority of the Seventh Circuit Court of Appeals held that a ShotSpotter alert could be used to create reasonable suspicion. There also is a dissenting judge in the Rickmon case. You also are provided with an interview with the president of the company that devised ShotSpotter.
    Concerns also have been raised about the use of ShotSpotter technology. To support this position, you are provided with an article that questions the use of ShotSpotter and its effectiveness, and Chief Judge Wood’s dissenting opinion in the United States v. Rickmon case. In the article, Mr. Goodman also questions the United States v. Rickmon opinion and raises several concerns about the ShotSpotter technology.
    Read these documents and listen to the oral arguments, and then write an argumentative essay explaining your position on the issue of whether ShotSpotter technology is an effective tool that law enforcement should use and whether it should be used to create reasonable suspicion for an investigatory stop, also known as a Terry stop.
    Complete the following for this assignment:
    Read the following documents and listen to the oral arguments.
    Pro ShotSpotter
    United States v. Rickmon, 952 F. 3d 876 (7th Cir. 2020).
    Click here to access the case. 
    United States v. Rickmon Oral Arguments.
    Click here to listen to the oral arguments
    Williams, C. (2017, May 10). ) How ShotSpotter locates gunfire, helps police catch shooters and works to ‘deformalize’ gun violence. Weblog post. Washington Post – Blogs , Washington: WP Company LLC d/b/a The Washington Post. 
    Click here to access the article.
    Questions ShotSpotter
    Goodman, B. (2021). ShotSpotter – The New Tool to Degrade What is Left of the Fourth Amendment, 54 UIC L. Rev. 797.
    Click here to access the article. 
    United States v. Rickmon, 952 F. 3d 876 (7th Cir. 2020) (dissenting opinion)
    Click here to access the dissenting opinion in the Rickmon case. (Only list the dissenting opinion here, if possible). 
    Summarize the key legal points of the Rickmon case and the benefits of ShotSpotter technology.
    Summarize the key legal and privacy concerns discussed by the Goodman article and Chief Judge Wood’s dissenting opinion in the Rickmon case.
    Write an argumentative essay supporting your position relating to those issues raised by the United States v. Rickmon case and the Goodman article. Indicate
    Whether you agree with the majority opinion or the dissenting opinion in the Rickmon case,
    Whether you agree or disagree with the Goodman article.
    Discuss your own ideas about ShotSpotter technology, how it should be used by police departments, and any constitutional concerns that you may have.
    Explain your position in detail.
    For additional background and insight into the ShotSpotter technology and constitutional issues, see
    Gecas, A.S. (2016). GUNFIRE GAME CHANGER OR BIG BROTHER’S HIDDEN EARS?: FOURTH AMENDMENT AND ADMISSIBILITY QUANDARIES RELATING TO SHOTSPOTTER TECHNOLOGY. 2016 U. Ill. L. Rev. 1073.
    Click here to access the article.
    Be sure to cite all references in APA format.
    Please submit your assignment.
    For assistance with your assignment, please use your text, Web resources, and all course materials.
    The following grading rubric will be used for this assignment: Grading Rubric.
    Assignment Reminders:
    Please submit your assignment.
    Make sure you submit this assignment by the listed due date. Late deductions will apply for this assignment. Please refer to the Late Submission of Assignment policy.
    If you need assistance, please view the Troubleshooting tips.
    Resave in the proper format per the Assignment Detail instructions and resubmit.
    Submit with a different Web browser.
    Submit from a different computer.
    Call Technical Support at 877-221-5800, Menu Option 2. They are open 24/7.
    If you are still having difficulties after trying steps 1-4, please contact your course instructor.
    Instructor’s Comments
    There are no instructor comments added at this time.