The main objective of the second edition of the Routledge Handbook of Critical Criminology is twofold: (1) to provide original chapters that cover contemporary critical criminological theoretical offerings generated over the past five years and (2) to provide chapters on important new substantive topics that are currently being studied and theorized by progressive criminologists.
Shaping National Security: International Emergency Mechanisms and Disaster Risk Reduction presents international emergency mechanisms relative to disaster risk reduction (DRR).
No-Body Homicides: The Evolution of Investigation and Prosecution examines how police and prosecutors have become more successful in obtaining convictions for homicide when the remains of the victim are unavailable as evidence.
Bio-Privacy: Privacy Regulations and the Challenge of Biometrics provides an in-depth consideration of the legal issues posed by the use of biometric technology.
Challenging Organized Crime in the Western Hemisphere: A Game of Moves and Countermoves takes the unusual approach of exploring and describing how organized crime groups develop their capacities in response to heightened powers of law enforcement; and how law enforcement in turn responds, creating an ongoing dynamic interaction.
In a rapidly evolving world where technology is increasingly integrated into our daily lives, security has become a top priority for individuals, organizations, and governments.
Homicide Case Studies is a first-of-its-kind text, offering readers more than 30 case studies drawn from real-world homicide cases that include the often-overlooked context and complexities faced by victims, offenders, law enforcement, attorneys, jurors, and correctional personnel.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.
In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country's economy, politics, and security.
Rural-oriented scholarship in criminology is growing, in part motivated by governmental, community and academic recognition that, despite stereotypes of the 'rural idyll', crime and justice are significant issues in the rural landscape.
Strategic Security will help security managers, and those aspiring to the position, to think strategically about their job, the culture of their workplace, and the nature of security planning and implementation.
Human trafficking has emerged as one of the top international and domestic policy concerns, and is well covered and often sensationalized by the media.
This book explores misdemeanor courts in the United States by focusing on the processing of misdemeanor crimes and the resultant consequences of conviction, such as loss of employment and housing, the imposition of significant fines, and loss of liberty-all amounting to the criminalization of poverty that happens in many U.
Crime Prevention Through Environmental Design (CPTED) is a practice-oriented approach to reduce the risk of offences such as burglary and fear of crime by modifying the built environment.
Introducing nuanced and rich data around the growing interest in desistance and what leads someone to move away from crime, this book explores the ongoing and individual desistance journeys of ex-offenders during re-integration into society.
This book provides an original theoretically and empirically grounded analysis of regulatory enforcement activism in post-crisis periods and the ensuing regulatory interactions.
Terrorism Awareness: Understanding the Threat and How You Can Protect Yourself provides readers a foundational understanding of the threats that face us every day.
This collection of essays, published to mark the 20th anniversary of Realistic Evaluation, celebrates the work of Professor Nick Tilley and his significant influence on the fields of policing, crime reduction and evaluation.
Former police and military personnel possess attractive skill sets for the private security industry; however, the transition to the corporate arena is not without challenges.
The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its beginnings to modern uses.
The movement of humans across borders is increasing exponentially'some for benign reasons, others nefarious, including terrorism, human trafficking, and people smuggling.
This new edition of Risk Analysis and Security Countermeasure Selection presents updated case studies and introduces existing and new methodologies and technologies for addressing existing and future threats.
Although billions of dollars have been spent on crime prevention and controlprograms during the past decade, scientifically strong impact evaluations of theseprograms are uncommon in the context of the overall number of programs thathave received funding.
This book is aimed at a diverse audience including students, researchers, academicians, cybersecurity professionals, IT managers, Metaverse developers, business leaders, policymakers, and tech enthusiasts.
With cities increasingly following rigid rules for designing out crime and producing spaces under surveillance, this book asks how information shapes bodies, space, and, ultimately, policymaking.
As gang violence continues to rise across the country and the world, police departments, prosecutors, and community members are seeking new methods to reduce the spread of gang-related criminal activity.
This book provides valuable information and recommendations for current and future officers and correctional system employees, introducing them to civil liability and federal law, as well as recommending strategies that can be taken to minimize risks.
Preventing recidivism is one of the aims of criminal justice, yet existing means of pursuing this aim are often poorly effective, highly restrictive of basic freedoms, and significantly harmful.