Listening to the Crime Victim: Evaluating Victim Input at Sentencing and Parole

2009 ◽  
Vol 38 (1) ◽  
pp. 347-412 ◽  
Author(s):  
Julian V. Roberts
Keyword(s):  
NWSA Journal ◽  
2005 ◽  
Vol 17 (3) ◽  
pp. 1-17 ◽  
Author(s):  
Jennifer <u></ Wood
Keyword(s):  

2000 ◽  
Vol 25 (04) ◽  
pp. 1111-1150 ◽  
Author(s):  
Jonathan Simon

To an unprecedented degree American society at the turn of the twentieth century is governed through crime. Nearly three percent of adults are in the custody of the correctional system. Crime and fear of crime enter into a large part of the fundamental decisions in life: where to live, how to raise your family, where to locate your business, where and when to shop, and so on. The crime victim has become the veritable outline of a new form of political subjectivity. This essay explores the complex entanglements of democracy and governing through crime. The effort to build democratic governance after the American Revolution was carried out in part through the problem of crime and punishment. Today, however, the enormous expansion of governing through crime endangers the effort to reinvent democracy for the twenty-first century.


Author(s):  
D.V. Zhmurov ◽  

The article presents an analysis of the cybervictimization phenomenon. The author justifies the use of an integrative (interdisciplinary) approach to the study of this problem, proposes the definition of the term under study as a process or end result of becoming a crime victim in the sphere of unified computer networks. A theoretical and methodological matrix for the analysis of cybervictimization (PCPPE model) was developed. The model includes five system characteristics of cybervictimization, the comprehensive study of which to a maximum extent will simplify the understanding of the essence of the object of study. These characteristics include: profiling, conditionality, prevalence, predictability and epidemicity. Each of these aspects is explained in detail: the author developed a detailed nomenclature of cybervictimization forms. The problems of identifying its extent, as well as the determinant role of gender, age, behavioral and personal factors are discussed in the article, and a list of key cybervictimization acts is formulated. This meta-analysis includes thirteen global categories and about seventy of its accent forms. Among the global categories the following ones are identified: threats, harassment, illegal interest, infringement, insult, spoofing, disclosure, compulsion, seizure, infecting, access and use. The prevalence rates of cybervictimization on the example of the United States (Internet Crime Report) are also studied, certain aspects of the methodology of cyber victim number counting are considered.


Temida ◽  
2004 ◽  
Vol 7 (1) ◽  
pp. 17-29
Author(s):  
Milan Skulic

In this paper the position of victim in criminal procedure for organized crime is analyzed. Through recent changes of our criminal procedure law, the special type of procedure is created in relation to organized crime, with inclusion of large number of specific criminal procedure norms. These new solutions contribute to the protection of victims/witnesses, although there are still more space for the improvement. Legislative body still needs to overcome deeply embedded attitude that the witnesses and victims are the exclusive source of evidence, or, in other words, that the witness testimony is only way to find out evidence information. The victim has to be treated at the first place as a person to whom specific position in criminal procedure, with special regard on the protection of her basic rights, should be guaranteed.


Author(s):  
◽  
Pat Mayhew ◽  
Ugi Svekic ◽  
◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document