criminal

Theorizing About Risk Factors: Figuring Out Why Certain Groups Suffer More Often Than Others

Theorizing About Risk Factors: Figuring Out Why Certain Groups Suffer More Often Than Others Theoretical explanations start as hypotheses that answer questions that begin with “Why?” After making an empirical generalization (an observation based on patterns or trends that emerged when the data were analyzed) theorists are inclined to ask, “What accounts for this?” For […]

Theorizing About Risk Factors: Figuring Out Why Certain Groups Suffer More Often Than Others Read More »

The answers to these queries require careful research by victimologists.

The answers to these queries require careful research by victimologists. Facilitation, precipitation, and provocation are recognized as the blameworthy actions of specific individuals in particular incidents. However, the data presented in Chapter 4 from the UCR and the NCVS confirmed a widely held belief that certain entire groups of people are more likely than others

The answers to these queries require careful research by victimologists. Read More »

THE IMPORTANCE OF DETERMINING RESPONSIBILITY IN THE CRIMINAL JUSTICE PROCESS

THE IMPORTANCE OF DETERMINING RESPONSIBILITY IN THE CRIMINAL JUSTICE PROCESS A wife returns home late at night after having a tryst with her landscaper at a motel. Her husband, an executive and former professor, becomes enraged and slams her face into the floor of the garage, splitting her head open. The police find her blood-soaked

THE IMPORTANCE OF DETERMINING RESPONSIBILITY IN THE CRIMINAL JUSTICE PROCESS Read More »

TRANSCENDING VICTIM BLAMING AND VICTIM DEFENDING: SYSTEM BLAMING

TRANSCENDING VICTIM BLAMING AND VICTIM DEFENDING: SYSTEM BLAMING The analysis above of murders, robberies, burglar- ies, auto thefts, and identity thefts uncovered some strengths and weaknesses of both victim blaming and victim defending. Contrary to sweeping char- acterizations made by some victimologists, victim blaming is not inherently an exercise in scapegoat- ing, an example of

TRANSCENDING VICTIM BLAMING AND VICTIM DEFENDING: SYSTEM BLAMING Read More »

Scrutinize bills and account statements for unautho- rized transactions.

Scrutinize bills and account statements for unautho- rized transactions. Request information about security procedures at doc- tors’ offices, businesses, educational institutions, and workplaces, such as who has access to databases, whether records are kept in a safe location, and how old files are disposed of. Don’t carry a Social Security card in a wallet or

Scrutinize bills and account statements for unautho- rized transactions. Read More »