- Crime, Illicit Activities, and Governance
- Crime Patterns and Interventions
- Cybercrime and Law Enforcement Studies
- Criminal Justice and Corrections Analysis
- HIV, Drug Use, Sexual Risk
- Race, History, and American Society
- Homelessness and Social Issues
- Sex work and related issues
- Focus Groups and Qualitative Methods
- Wildlife Conservation and Criminology Analyses
- Latin American and Latino Studies
- Pharmaceutical Economics and Policy
- Blockchain Technology Applications and Security
- Urban, Neighborhood, and Segregation Studies
- Healthcare Systems and Practices
- International Law and Human Rights
- Spam and Phishing Detection
- Terrorism, Counterterrorism, and Political Violence
- Torture, Ethics, and Law
- Qualitative Research Methods and Ethics
- Diverse Research Studies Overview
- Policing Practices and Perceptions
- Crime, Deviance, and Social Control
- Law in Society and Culture
- Migration, Refugees, and Integration
University of the West of Scotland
2023
Flinders University
2019-2023
University of the West Indies System
2023
University of Liverpool
2017-2021
Royal Holloway University of London
2021
Cardiff University
2013-2015
Cybercrime is recognized as one of the top threats to UK economic security. On a daily basis, computer networks businesses suffer security breaches. A less explored dimension this problem cybercrimes committed by insiders. This paper provides criminological analysis corporate insider victimization. It begins presenting reviews criminal and routine activities theory applied cybercrime. Analysis nationally representative Cardiff University Business Survey then informs statistical models that...
Abstract This article revisits the framework which Buentello et al. (Prison J 71(2): 3–14, 1991) created to describe development of inmate solidarity groups into prison gangs in Texas Department Corrections. Interviews with current and former gang members Texas, Arizona, Illinois augment published literature on California. argues that responses administrations make prisoners’ social orders are not static have, some cases, caused vertically configured evolve horizontally groups. These...
Abstract The illicit drug trade generates billions of dollars in revenue per year, much which comes from wholesale and retail sales late the supply chain. Yet, methods retailers low-level wholesalers use to launder this remain poorly understood. Using in-depth interviews with entrepreneurs United States Kingdom, article analyses laundering strategies among such market actors. Our findings indicate that a significant proportion their proceeds are disposed through relatively small-scale...
This article presents a framework for understanding three different strata within the context of illicit enterprise – being low hanging fruit, occupying “sweet spot,” and big enchilada. It shows that each stratum, there is progression opportunity contributes to criminal actors’ motivations proceed with their careers. Each progressing stratum has significant barrier entry that, once overcome, signals state where risk, income potential, stability change significantly. Nonetheless,...
Current and ex-gang members are hard-to-reach populations for research purposes. To date, researchers have resorted to embedding themselves long-term or recruiting individuals of interest within a target community. Typically, such studies provide great deal empirical depth but not necessarily breadth given their lack comparative analysis generalizability. Moreover, they often rely on snowballing chain referral methods that depend the networks recruited seeds. This article explores use...
Barrio Azteca is a criminal organization that has significantly evolved since its inception as prison solidarity group—first into true gang and then an organized enterprise operating in the free world. Today, declined power effectiveness carceral settings but continues to play important role wholesale retail drug trade Paso del Norte area. Its organizational life cycle appears parallel of licit enterprise, except it primarily competes protection marketplace. Thus, survive compete market for...
This report surveys what is currently known about the financial transactions that cybercriminals conduct among themselves or demand/receive from their victims in English, Russia, Spanish, French, and Chinese contexts.
While there are no new frauds, internet technology provides opportunities for fraudsters by facilitating volumes of attacks that law enforcement then struggles to address. Moreover, since context can affect how potential victims respond crisis influences design frauds. This article assesses fraudsters' fraud strategies during two external events impacted Australia: The Black Summer Bushfires occurred from September 2019 March 2020 and the onset first year COVID-19 pandemic January through...
The swift evolution of digital spaces challenges the established norms ethical research policy. Ineffective review diminishes researchers' ability to conduct cutting-edge and socially sensitive research, institutions' engage at forefront technology, relationship between researcher committee. In criminology other disciplines that navigate especially when working with ephemeral data in field sites, researchers require fast approval turnarounds ethics committees can issues challenge analogue...
This article contributes to the growing literature on use of computer-mediated communications research illicit markets. In it, we conduct an analysis British cannabis market using data crowdsourced from a publicly available platform, PriceofWeed.com. Crowd-sourced transaction present some new insights into market. First, this study has tracked trafficking flow within UK. Second, it shows extent which quantity discount is granted consumers. Third, discusses purchasing habits users....
With limited time and funding, scholars who deploy qualitative methodologies to examine deviance criminogenic contexts, such as ethnography, must leverage sources of capital which reduce time-arcs costs needed for research. Traditional ethnographic projects require both significant funding; accordingly, several authors have indicated the utility “rapid ethnographies”, less in field funding. By reflecting on three rapid ethnographies, we show how identity is simultaneously a property that...