Welcome to the First Edition of an OER textbook for Penn State's …
Welcome to the First Edition of an OER textbook for Penn State's CRIMJ 100 Course. This text was developed with the assistance of an Affordable Course Transformation grant from The Pennsylvania State University.
The ability to communicate is critical to those who work in law …
The ability to communicate is critical to those who work in law enforcement. This book will examine the key principles of communication personnel in law enforcement require. Areas covered include listening skills, communicating tactics, interviewing skills, note-taking, report writing and testifying in court. Also covered is a section on PTSD and its interaction with law enforcement. Key here is that police officers should understand the relationship between PTSD and the need to communicate with others in seeking help and assistance. The book concludes with a section on the history of women in policing. It is the belief of the authors of this book, that women have played an enormous role in developing the communication within policing and have advanced the narrative of a more inclusive approach to communication.
In this lab, we will be working with entering, formatting, and analyzing …
In this lab, we will be working with entering, formatting, and analyzing data in Excel. Please note: this lab is written for a beginner in Excel and meant to introduce you to various capabilities of Excel. You may feel the need to skip through some steps if you are experienced with Excel, and that is fine. Just make sure you understand the content of the lab! Future work will build on these skills.
Criminal Law uses a two-step process to augment learning, called the applied …
Criminal Law uses a two-step process to augment learning, called the applied approach. First, after building a strong foundation from scratch, Criminal Law introduces you to crimes and defenses that have been broken down into separate components. It is so much easier to memorize and comprehend the subject matter when it is simplified this way. However, becoming proficient in the law takes more than just memorization. You must be trained to take the laws you have studied and apply them to various fact patterns. Most students are expected to do this automatically, but application must be seen, experienced, and practiced before it comes naturally. Thus the second step of the applied approach is reviewing examples of the application of law to facts after dissecting and analyzing each legal concept. Some of the examples come from cases, and some are purely fictional. All the examples are memorable, even quirky, so they will stick in your mind and be available when you need them the most (like during an exam). After a few chapters, you will notice that you no longer obsess over an explanation that doesn’t completely make sense the first time you read it—you will just skip to the example. The examples clarify the principles for you, lightening the workload significantly.
This lecture presents information about cybercrime, which has become the most ubiquitous …
This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.
This presentation covers the legal environment of cybercrime to date. It addresses: …
This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. state jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.
The goals of this activity are to facilitate team work, critical thinking, …
The goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.
This is an activity the goals of which are to facilitate team …
This is an activity the goals of which are to facilitate team work; critical thinking; presentation skills in the area of cybersecurity and law. Students will be grouped into two teams. As a team, they will choose and analyze cases about online identity theft through the questions presented in the activity. They will present their analysis to the class.
The lecture presents information about how the Internet works so students studying …
The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.
With 38.5 billion smart devices in existence in 2020 and increasing every …
With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.
These are a set of fictional case studies that are designed to …
These are a set of fictional case studies that are designed to prompt reflection and discussion about issues at the intersection of AI and Ethics. These case studies were developed out of an interdisciplinary workshop series at Princeton University that began in 2017-18. They are the product of a research collaboration between the University Center for Human Values (UCHV) and the Center for Information Technology Policy (CITP) at Princeton. Click the title of each case study to download the full document.
In this book, you will examine the moral and ethical issues that …
In this book, you will examine the moral and ethical issues that exist within law enforcement. This book will also familiarize you with the basic history, principles, and theories of ethics.
In this book, you will examine the moral and ethical issues that …
In this book, you will examine the moral and ethical issues that exist within law enforcement. This book will also familiarize you with the basic history, principles, and theories of ethics. These concepts will then be applied to the major components of the criminal justice system: policing, the courts, and corrections. Discussion will focus on personal values, individual responsibility, decision making, discretion, and the structure of accountability. Specific topics covered will include core values, codes of conduct, ethical dilemmas, organizational consequences, liability, and the importance of critical thinking. By the end of this book, you will be able to distinguish and critically debate contemporary ethical issues in law enforcement.
Our goal in writing this text was to provide a comprehensive overview …
Our goal in writing this text was to provide a comprehensive overview of the diverse and broad field of forensic psychology, including applications in both the criminal and civil legal systems, with a focus on the Canadian experience. The core topics include forensic assessment in the criminal and civil domains, treat- ment, children and juveniles in the legal system, eyewitness testimony, police and police investigations, jury decision making, and correctional psychology.
This book has been specifically created to make it easier for professors …
This book has been specifically created to make it easier for professors to offer a law school course on global corruption. It is issued under a creative commons license and can be used for free in whole or in part for non-commercial purposes. The first chapter sets out the general context of global corruption: its nature and extent, and some views on its historical, social, economic and political dimensions. Each subsequent chapter sets out international standards and requirements in respect to combating corruption – mainly in the UN Convention Against Corruption (UNCAC) and the OECD Bribery of Foreign Officials Convention (OECD Convention). The laws of the United States and United Kingdom are then set out as examples of how those Convention standards and requirements are met in two influential jurisdictions. Finally, the law of Canada is set out. Thus, a professor from Africa, Australia, New Zealand or English speaking countries in Asia and Europe has a nearly complete coursebook – for example, that professor can delete the Canadian sections of this book and insert the law and practices of his or her home country in their place. While primarily directed to a law school course on global corruption, this book will be of interest and use to professors teaching courses on corruption from other academic disciplines and to lawyers and other anti-corruption practitioners.
Introduction to Criminal Investigation, Processes, Practices, and Thinking is a teaching text …
Introduction to Criminal Investigation, Processes, Practices, and Thinking is a teaching text designed to assist the student in developing their own structured mental map of processes, practices, and thinking to conduct criminal investigations.
Delineating criminal investigation into operational descriptors of tactical-response and strategic response while using illustrations of task-skills and thinking-skills, the reader is guided into structured thinking practices. Using the graphic tools of a “Response Transition Matrix”, an “Investigative Funnel”, and the “STAIR Tool”, the reader is shown how to form their own mental map of investigative thinking that can later be articulated in support of forming their reasonable grounds to believe.
This textbook was designed especially for Reedley College Criminology students. It provides …
This textbook was designed especially for Reedley College Criminology students. It provides an overview of the three components of the Criminal Justice System: Law Enforcement, Courts, and Corrections. There are four types of interactive features in this book to help students engage with the various concepts and procedures behind criminology.
This introductory textbook is unique because it was a collaborative effort by …
This introductory textbook is unique because it was a collaborative effort by all Criminology and Criminal Justice professors at Southern Oregon University (SOU) in Ashland, Oregon. This book can be used on a quarter or semester system, as well as cover topics that may get left out of some introductory texts such as controversial issues in the criminal justice system. Further, we made it as comprehensive as possible to cover core concepts and areas in the criminal justice system including theory, policing, courts, corrections, and the juvenile justice system. Additionally, we created examples that will help make difficult concepts or ideas more relatable. Every section provides an overview of key terms, critical thinking questions for course engagement, assignments, and other ancillaries such as multimedia links, images, activity ideas, and more.
This course involves the study of victims and witnesses of crime. An …
This course involves the study of victims and witnesses of crime. An emphasis will be placed on the psychological and emotional detriments associated with being victimized and the classification of the types of victims. Students will learn how to apply criminological theory to address why offenders choose their victims. Additionally, students will examine a victim’s reaction to crime.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.