NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 352 results Save | Export
Eli Ben-Michael; David Arbour; Avi Feller; Alex Franks; Steven Raphael – Grantee Submission, 2023
Gun violence is a critical public safety concern in the United States. In 2006 California implemented a unique firearm monitoring program, the Armed and Prohibited Persons System (APPS), to address gun violence in the state. The APPS program first identifies those firearm owners who be-come prohibited from owning one due to federal or state law,…
Descriptors: Weapons, Crime Prevention, Violence, Safety
James Earl Lyons II – ProQuest LLC, 2024
Investigating crimes on college campuses is a prevalent phenomenon that often requires student cooperation with campus police. Using the procedural justice theory's process-based approach, this applied research examined the likelihood of students reporting campus crime based on their perceived legitimacy of campus police and whether the student's…
Descriptors: College Students, College Environment, Campuses, Crime
Baron, E. Jason; Hyman, Joshua M.; Vasquez, Brittany N. – National Bureau of Economic Research, 2022
This paper asks whether improving the quality of public schools can be an effective long-run crime-prevention strategy in the U.S. Specifically, we examine the effect of school quality improvements early in children's lives on the likelihood that they are arrested as adults. We exploit quasi-experimental variation in school quality due to…
Descriptors: Public Schools, Educational Finance, Educational Quality, Crime Prevention
Jessica Nicole Kennedy – ProQuest LLC, 2023
Higher education students are vulnerable to being sex trafficked (Campus Law Enforcement-DHS, n.d.). As a means of prevention, an online training was developed for higher education students. The purpose of this training was to provide awareness and education about sex trafficking and promote safety in terms of relationships, jobs, and the…
Descriptors: Higher Education, Sexual Abuse, Crime Prevention, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Eva Dias-Oliveira; Catarina Morais; Rita Pasion; Julia Hodgson – SAGE Open, 2024
The Fraud Diamond theory (rationalization, opportunity, motivation and perceived capability) has been widely used as a framework to explain criminal behavior. However, little is known about its application in an academic context. Research on the relationship between the prevalence of academic fraud (e.g., cheating on exams, plagiarizing essays)…
Descriptors: College Students, Student Behavior, Student Attitudes, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Plasman, Jay S.; Passarella, Al – Career and Technical Education Research, 2022
While prior work has explored the relationship between career-focused educational programming on deviant and criminal behavior for incarcerated and delinquent individuals, there is little empirical evidence as to how career and technical education (CTE) participation in traditional high school settings may link to later interaction with the…
Descriptors: Vocational Education, Crime, Crime Prevention, High Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Christine M. Drew; Sarah G. Hansen; Caroline Bell – Journal of Developmental and Physical Disabilities, 2022
While abduction remains a rare occurrence in the United States, many parents and caregivers have concerns about children's reactions to strangers and other safety-related behaviors. Abduction is a risk for all children, but may be of specific concern for people with disabilities due to social skill and communication deficits. Behavior analytic…
Descriptors: Crime, Child Safety, Intellectual Disability, Developmental Disabilities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Peer reviewed Peer reviewed
Direct linkDirect link
Pusch, Natasha – Youth & Society, 2022
School delinquency in public elementary, middle, and high schools has decreased in recent years, but is still a major issue that has negative mental health and academic implications for adolescents. Although research has focused on both individual-level and school-level explanations of school delinquency, it is not yet clear which macro-level…
Descriptors: Elementary Secondary Education, Delinquency, Delinquency Prevention, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Lemke, Melinda – Leadership and Policy in Schools, 2019
Despite its significance as a policy issue, there is a paucity of knowledge about trafficking within educational policy and leadership research. The lack of research in this area and the contemporary spike in displaced youth populations necessitates examining those policies that aim to prevent trafficking through educational mediums. This study…
Descriptors: Educational Policy, State Policy, Crime, Crime Prevention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Martinez, Julia A. – Journal of School Violence, 2020
Disciplinary incidents at U.S. public middle- and high-schools are a public policy concern. Although businesses popularly give credence to leaders' subjective intelligence, principals' reports of their schools' strengths and weaknesses are questioned. To determine whether principals' reports carry legitimacy as indicators of student offenses, the…
Descriptors: Public Schools, Principals, Discipline, Middle Schools
Michael W. English – ProQuest LLC, 2023
Although bullying aggression has been around for a long time, cyberbullying poses a unique and severe threat. With the advent of the internet and digital platforms, a bully can attack anytime and anywhere with exponential and repeatable damage. Before digital media, rumors or singular events were hurtful but did not have the added…
Descriptors: Bullying, Computer Mediated Communication, School Policy, Educational Practices
Peer reviewed Peer reviewed
Direct linkDirect link
Shapiro, Lauren R. – Journal of Vocational Education and Training, 2023
The purpose of this article was to improve the post-secondary vocational education curriculum for private security students by focusing on a particular applied skill -- detection of juvenile shoplifters. Educators are tasked with helping students to identify racist beliefs and reduce worldwide organisational racism in the retail industry.…
Descriptors: College Students, Urban Schools, Security Personnel, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Phyllis Holditch Niolon; Lianne F. Estefan; Sarah DeGue; Vi D. Le; Allison J. Tracy; Colleen Ray; Daniel Bontempo; Todd D. Little; Alana M. Vivolo-Kantor; Natasha Latzman; Bruce Taylor; Andra Tharp – Prevention Science, 2024
Teen dating violence (TDV) is a significant public health problem that can have lifelong consequences. Using a longitudinal, cluster randomized controlled trial (RCT), this study examines whether the "Dating Matters" comprehensive prevention model, implemented in middle school, prevented TDV and negative relationship behaviors and…
Descriptors: Crime, Violence, Dating (Social), Grade 9
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  24