Главная | Обратная связь | Поможем написать вашу работу!
МегаЛекции

Snowball sampling:  see chain referral sampling.




Spatial variation: involves differences in the social, geographical or political organ- ization of the phenomenon of interest; in the social sciences, the typical referent is to individuals, small groups, neighbourhoods, cities, regions or countries.

Storytelling: an unstructured interview approach that allows interviewees to guide the narrative on their own terms, in their own language.

Structured interviews: involve the interviewer setting the same questions for all respondents. Standardization means that interviews are easily replicated and ana- lysed. However, the data is deeply influenced by the researcher’s values, definitions and perceptions.

Summative evaluation: concerned with results and backward looking; it is used to assess performances and outcomes up to a certain point in time.

Survey questionnaire: a research tool that gathers data from respondents through eliciting answers to an organized series of questions. The questionnaire may be admin- istered in written form, verbally (with the researcher and respondent interacting in real time), face to face or at a distance (e. g. online, via telephone, email or post).

Survey research: involves the systematic collection of large quantities of data, by means of questionnaires and/or interviews, from a broad sample of a target population

Symbolic interactionism: the theory that deals with how an individual builds the image of him/herself through a communication process with other individuals. It is communica- tion that takes place through symbols, mainly language. In criminology, symbolic interactionism is most commonly associated with the works of Howard S. Becker and Erving Goffman, and the perspective known as ‘labelling’: a process through which the individual is labelled by the social environment as evil, deviant or criminal. Methodologically, symbolic interactionism is associated with qualitative data and fieldwork.


Synchronic: an approach to research that describes a phenomenon at one point in time.

Systematic review: a formulaic and prescriptive form of review that employs trans- parent and systematic criteria for searching the literature, evaluating the suitability of each source and synthesizing results. Such reviews are favoured for feeding into policy making as they bring together the most directly relevant and rigorous evalua- tions on a particular topic.

Tagging: where original documents are digitized and certain words are picked out or ‘tagged’ so that those words, phrases or figures can be searched for and sometimes additional labels can be adopted. For example, if a victim is called ‘John Smith’, he can be tagged as ‘John Smith’, so that his name can be searched for, and also tagged as ‘male’ since we assume that it is a man’s name. Hence, the gender of all victims in the Old Bailey can be collected.

Temporal variation: the differences or change over time in the phenomenon of interest.

Training set: the data in a set, often drawn from past experience, used in machine learning in order to discover predictive relationships. This can be contrasted with test or validation data, which is used subsequently to assess the validity and strength of an identified predictive relationship.

Transcription: the method of converting the audio and visual data gathered by the researcher into a written form in preparation for coding and analysis. Naturalized transcription is informed by conversation analysis and takes account of every nuance in speech and bodily movement, whilst denaturalized transcription focuses on the more significant meanings.

Triangulation: used in mixed methods research where two or more methods are used to investigate the same phenomenon to ensure consistency and reduce the limitations of a single method. The aim is to seek a convergence and corroboration of the inferences generated from each research component.

Validity the extent to which one can rely upon and trust the findings and conclu- sions of a research study. This involves an evaluation of the methodological objections that can be raised. This means looking at internal validity (can we be sure that a causal relationship exists? ), external validity (can the results be generalised? ) and ecological validity (are the conclusions applicable to everyday situations or have they been drawn from unnatural or unique conditions? ). In addition, construct or meas- urement validity is concerned with whether a measure accurately reflects the concept it is designed to measure.

Variable: an attribute of an observation or set of observations; having a shared meaning with ‘factor’, it is the name a researcher gives to what is being described or measured.


Victim–offender overlap: the notion that many victims of crime are also perpetra- tors. There is a considerable overlap between the two, which is often not recognized in debates about victims of crime.

Virtual ethnography: the adaptation of ethnography to the online environment. Unlike traditional ethnography, where the researcher and those being researched are physically co-present in a given spatial location, virtual ethnography takes place in various online forums or spaces such as chatrooms, discussion groups, social media platforms and interactive simulations.

Visual criminology: the field in criminological and criminal justice studies in which the role and importance of visual experience, images and imagery in criminal offend- ing, criminalization and stigmatization, and crime control, as broadly defined, are explored, analysed and studied.

Visual turn: the focus, from about the 1990s onwards, in the humanities and social sciences, on the visual sphere and visual experience as dimensions of study and analysis.

 

 

REFERENCES

 

Beck, C. and McCue, C. (2009) ‘Predictive policing: what can we learn from Wal-Mart and Amazon about fighting crime in a recession? ’, The Police Chief, 76(11): 20–9.

boyd, d. and Crawford, K. (2012) ‘Critical questions for Big Data: provocations for a cul- tural, technological, and scholarly phenomenon’, Information, Communication and Society, 15: 662–79.

Chan, J. and Bennett Moses, L. (2016) ‘Is Big Data challenging criminology? ’, Theoretical Criminology, 20: 21–39.

Garwood, J. (2006) ‘Quantitative research’, in V. Jupp (ed. ), The SAGE Dictionary of Social Research Methods. London: Sage, pp. 251–2.

Gerring, J. (2017) Case Study Research: Principles and Practices, 2nd edition. Cambridge: Cambridge University Press.

Glaser, B. G. and Strauss, A. L. (1967) The Discovery of Grounded Theory: Strategies for Qualitative Research. Chicago: Aldine.

Kitchin, R. (2014) ‘Big Data, new epistemologies and paradigm shifts’, Big Data and Society, 1: 1–12.

Maguire, M. (2000) ‘Policing by risks and targets: some dimensions and implications of intelligence-led crime control’, Policing and Society, 9: 315–36.

Perry, W. L., McInnis, B., Price, C. C., Smith, S. C. and Hollywood, J. S. (2013) Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations. Santa Monica, CA: RAND.

Uchida, C. (2014) ‘Predictive policing’, in G. Bruinsma and D. Weisburd (eds), Encyclopedia of Criminology and Criminal Justice. New York: Springer, pp. 3871–80.


 


INDEX

 

 

NOTE: Page numbers in italic type refer to boxes, figures and tables. Page numbers in bold type refer to glossary entries.


abductive approach, 118

abolitionism, 138, 139–40, 141, 146, 289, 519

abstracts, 163

academic writing, 26–7, 162–9 access

in ethnography, 389, 397–8, 399–410, 403

to ‘hard to reach’ groups, 202–3, 217–18, 219

in human trafficking research, 348, 352–3 to online resources, 415

planning, 52

to prisons, 145, 329

to victims of state violence, 328–9 across method triangulation, 97 Adler, P., 389

adversarial model, 456, 463

aims see research objectives/purpose Akers, R. L., 286

Alexander, C. S., 213

algorithm, 256–8, 262, 519

Alker, Z., 363

All Our Kin (Stack), 485 analysis see data analysis annotated bibliographies, 83, 84

anonymity, 56, 216, 399, 400, 422, 423

anti-social behaviour, 126–8

Antonopoulos, G., 403–4

anxiety management, 173 appendices, in dissertations, 164 Approaching a City (Hopper), 441 arrest data, 241

artwork, 434–6, 440–41, 443–5

Ashcan group, 441 assault

historical victims of, 186–7, 189–90

see also violence

Asylums (Goffman), 485

asynchronous interviews, 421

attrition, 312–13

audiences, 10–11, 167, 169

authenticity, 389

see also truth


auto-ethnography, 402

autobiography, 375–6, 519

The Bailey see Old Bailey Barthes, R., 443

Baxandall, M., 444

Becker, H., 477–8

Becker, H. J., 213

Belmont Report, 150–1

benchmarks, 7, 519

Bengtsson, T. T., 103 Bennett Moses, L., 251 Bennett, R., 461–62

Bentham, J., 437

Berk, R., 256

Best, D., 126

bibliographic databases, 81

bibliographic referencing, 46, 83, 165

bibliographies, 164–5, 278 Big Data

concept of, 252–3, 395, 519

and history of victims, 183, 191–93

uses of, 252–3 Big Data analytics

evaluation of, 263–4

limitations of, 258–62

non-transparency of, 262–3 use in crime prediction, 253–8

biographical research criminological inquiry, 367–71 in criminology context, 364–7 critical consideration of, 374–7 Digital Panopticon, 371–74

biographical turn, 367

biography, 519

Blaxter, L., 52

Boeije, H., 275

Boolean operators, 80–1

Boutellier, H., 457

Bowling, B., 100

Bows, H., 93, 99, 106


Bradburn, N. M., 213

brainstorming, 170

bribery research example, 490–1 ‘brief and charge’, 444–5, 449, 519

Brienen, M., 462–3

Briggs, D., 393

British Crime Survey see Crime Survey for England and Wales

British Society of Criminology (BSC), 56, 107, 151–2, 201

Brown, A. D., 418–19

Brown, S., 214–15, 216–19

Brunovskis, A., 347

Bryman, A., 100, 122, 216

burglar alarms, 239

burglary, 238–40, 242–3, 459–60

Cambridge Study of Delinquent Development, 301

Campbell Collaboration, 75, 78

CAPI (Computer Assisted Personal Interviewing), 19–20

CAQDAS (computer-assisted qualitative data analysis), 279–80

car parks, 237

car theft, 234–8, 241–42

Carlsson, C., 297, 302–5

Carr, N., 104–5

case (definition), 479, 519

case studies (definition), 479, 519

Case Study Methods: Principles and Practices

(Gerring), 478–9

case study research, 21–2, 389

approaches to, 476–8

case selection, 481–82

classic studies, 485

and comparative case research, 483–5 and comparative criminology, 483–5 contemporary examples, 486–90

history of, 476–8

key terms, 478–81

strengths and limitations of, 483 causal case studies, 481–82, 483

causal relationship, 259, 299–300, 519

Cavadino, M., 456–7

CCTV (closed circuit television), 237 chain referral sampling, 54, 422, 520

Chan, J., 251

Chicago School, 103, 364, 387, 477 child sexual abuse (CSA) research, 274

analysis for theory building, 286–7 context, 272–3

documentary analysis, 276–8

hypothesis testing, 288


interview analysis, 278–83, 284–5

and reflexivity, 290, 291

child sexual exploitation (CSE), 273 children

research with, 201–3, 217–18

as victims of state see victims of state violence Children and Young People’s Safety Survey

(CYPSS), 217

chronologically structured literature reviews, 85 Chu, D., 464–6

classification trees, 256–8

clean/dirty data, 232, 520

Cleveland Inquiry, 272

closed circuit television (CCTV), 237 closed questions, 98, 210, 211, 212

cluster samples, 53

coding, 280, 392

Cohen, S., 145, 146, 485

coining, 184–5, 520

collaboration, 460–1

comparative case research, 483–5 comparative criminology, 483–5, 491–2

comparative methodology, 460–62, 520

comparative research, 8–9

burglary example, 459–60

importance of, 458–60

post-globalization, 467–8

in practice, 462–7

typologies, 460–62

COMPAS (Correctional Offender Management Profiling for Alternative Sanctions), 255, 261

competence, of children, 201–2

complainants, 181–82, 184–5, 187, 188, 191, 520

complementarity, 125, 520

Computer Assisted Personal Interviewing (CAPI), 19–20

computer-assisted qualitative data analysis (CAQDAS), 280–91

concepts, 283–5

conceptual themes, 281–3, 283–5, 520

conclusions, 164

anticipating, 9–10

confidentiality, 56, 207, 216, 217, 396, 399

confirmation bias, 392 consent see informed consent

consequentialist ethics, 148–50

constructivism, 96, 477, 520

content analysis, 50, 51, 281–83, 417–18, 520

content crimes, 419

context, of ethnographic research, 388–9 continuous evaluation, 510, 520

convenience samples, 53

Convention Against Transnational Organized Crime, 343


convergent parallel design, 122 Copes, C., 397

copyediting, 168

copyright, 171

Correctional Offender Management Profiling for Alternative Sanctions (COMPAS), 255, 261

correlation, 259–60, 261, 521

costs, 329, 421

counter-trafficking efforts, 345, 349–50

court registers, 181–82

covert observation, 425–6, 521

covert research, 389, 390, 399–400, 403,

404, 521

Cox, D., 371

Cox, P., 179

creative methods, 104–5

Creswell, J. W., 128 crime

case study examples, 486–7 comparative research on, 466–7 data see data

desistance from, 308, 310

disclosure of, 396, 398, 399

crime concentration, 233

crime control, and images, 441–42 crime drop

alternative explanations, 243–4

background, 230–32

data sources, 232–4

future research, 244, 245

and reductions in criminality, 241–42 research methods, 232–3

security and burglary, 238–8, 242–3

security and car theft, 234–8, 242 security and violence, 240–1

Crime in the Making (Sampson and Laub), 310

crime prediction see offender risk assessment; predictive policing

crime rates

comparative research, 466–7

see also crime drop

Crime Survey for England and Wales (CSEW), 15–17, 19

and crime drop, 234, 235, 239, 240–1

and gender, 377

and sensitive topics, 206–8 criminal biographies, 367–74

criminal careers, 241 criminal justice

case study examples, 487–90 comparative research in practice, 462–4 and globalization, 456–8, 468

historical study see history of victims


human trafficking in context of, 343–4, 346 and images, 440–42, 447–9

importance of comparative work, 458–60 international comparisons, 456–7

and researching victims, 180–1 shifting focus of, 457–8

Criminal Lives (Godfrey et al), 371 criminality, reductions in, 241–42 criminalization, 440

criminological research, golden threads of, 3–5

criminology

and biography see biographical research and ethnography see ethnography

and scientific relevancy, 143–4 critical approach

in evaluation research, 502–3 in victimology, 375–6

critical engagement with literature, 85 critical ethnography, 401

critical reading, 46

critical reflection, 26, 57–8, 288–91, 445

see also reflexivity

critical research, 324–5, 334, 521

cross-case research, 479–81, 481, 483, 485

cross-cultural research, 8–9

cross-sectional methodology, 521

compared with longitudinal, 299, 311–15

cross-sectional studies, 521

CSEW see Crime Survey for England and Wales cybercrime, 414, 419–20

CYPSS (Children and Young People’s Safety Survey), 217

 

Daley, Tom, 434–6

Daly, K., 475, 488, 489–90

data

on crime, 14–17

and ethics, 56

limitations of, 258–9, 302, 303, 306, 346–7,

416–17

qualitative, 49, 307–9

quantitative, 49, 306–7, 501–2

see also Big Data; crime rates; official data/ documents; secondary data

data analysis

in ethnography, 392

qualitative and quantitative, 54, 55–6

of web-based content, 417–20

see also qualitative data analysis; secondary analysis

data analytics, 521

evaluation of, 263–4

limitations of, 258–62


non-transparency of, 262–3

use in crime prediction, 253–62 data collection methods

in crime drop research, 232–4 definition of, 94, 525

dominance of quantitative, 386–7

for evaluations, 501–3, 505, 508–9, 511 in longitudinal research, 305–11

online, 420–27

for primary research, 18–22, 48–52, 97–105

proposing, 48–52

for secondary research, 105–6

for study of historical victims, 181–83, 192–3

see also biographical research; documentary analysis; ethnography; interviews; mixed methods research

data presentation, 169

data signatures, 237, 240, 242–4, 521

David, G., 447

Davies, P. A., 42, 43

Davies, M. D., 49

Davies, P., 1, 26–7, 271 De Cao, E., 210

de Lange, A., 300 Deakin, J., 199

debut crimes, 241

deception, 389, 396

decision making, 3, 13–14, 22, 29, 131, 521

deductive, 521

deductive research, 43, 70, 118, 274, 394,

477, 521

Delinquency in a Birth Cohort (Wolfgang et al), 302 delinquency research, 301, 302, 303–5, 310, 365–6

Denney, A. S., 68

Denscombe, M., 115–16

Denzin, N., 97

descriptive research, 43, 94–5, 522

case studies, 481, 482 design see research design desistance, 308, 310, 373, 527

development, in mixed methods, 125, 522

developmental and life-course criminology, 522

see also life-course research deviance, and images, 440–1 Deviant Leisure Group, 404 diachronic, 484, 522

diaries (fieldwork), 279, 529

digital corpus linguistic methods, 192–3, 522

digital divide, 422–3

Digital Panopticon, 183, 371–73

digital sources, 81, 183, 184, 191, 192–3, 370–

74, 415, 416–17

see also online research Dignan, J., 456–7


dirty data, 232, 520

disclosure of crimes, 396, 398, 399

discourse, 437

discourse analysis, 354–5, 522

discrimination, 260–62

discussion section, in dissertations, 164 disorder see riots

dissertation planning, 37–9

research design, 48–58

research proposal, 58–60

topic and research questions, 39–47 writing up, 162

dissertation structure, 71, 72

dissertation writing, 162–9

distance/detachment, 422, 424

documentary analysis, 275, 276–8, 283,

326–7, 354–5

documents, 50, 51

in evaluation research, 502, 505, 508, 511 in study of historical victims, 181–83

domestic abuse, 8

see also intimate partner violence domestic burglary, 238–40, 242–3, 459–60

draft stop, 172

drafts, 168

Duffy, M. E., 420

Duneier, M., 389

Dussel, E., 153, 154

 

Easton, S. D., 279–80

electronic immobilisers, 236, 242

email surveys, 423

embedded design, 122

emotion, 26–7

emotionality, 331–32, 351–52, 439, 522

environment assessment, 522

epistemology, 522

concept of, 141–2

and critical reflection, 288–91 and ethics, 148–54

and ethnography, 393

and methodology, 94, 96 and mixed methods, 115–16

and politics of research, 142–8 prison example, 138–41, 145–8 and theoretical literature, 69

ethics see research ethics ethnography, 20–1, 103, 522–3

advanced approaches, 400–4

aims of, 388

challenges in, 393–4

in criminology, 394–404

ethics in, 42, 389, 396–7, 399, 403

history of, 387


methods, 388

process of, 388–92 researcher voice in, 166 virtual/online, 403–4, 424–7

evaluation, 523

and Big Data analytics, 263–4 commissioner influence, 506

and consequences, 510–14

of counter-trafficking, 345

data collection methods, 501–503, 505, 508–9, 511

‘Inside Out’ Prison Program, 504–7 of mixed methods research, 128–9 nature of, 498–9

performance indicators, 499–501

politics of, 503–7

purpose of, 7–8, 503

and relationships, 507–10 and systematic reviews, 75

Eviction (Shinn), 441

expansion, 126, 523

experience, 436, 523

explanatory research, 43, 95, 523explanatory sequential design, 122 exploratory research, 95, 482, 483 exploratory sequential design, 122 external validity, 13

 

Farrall, S., 100, 371

Farrell, G., 229

Farrington, D. P., 75–7, 106

feedback, 173, 510, 511–14

feedback loops, 260

feminist ethnography, 401–2

feminist perspectives, 286–7, 289–90 fictional accounts of human trafficking, 355 field notes, 391

Fielding, N., 389

fieldwork, 388, 391–92, 523

fieldwork diaries, 279, 529

Figlio, R. M., 302

Filipas, H. H., 288

film stills, 443

films, 171

Finch, J., 214

findings section, in dissertations, 164 first person writing, 26–7

focus groups, 102–3, 400

Folk Devils and Moral Panics (Cohen), 485

foreign bribery, 490–91

formative evaluations, 510, 523

Foucault, M., 437

Francis, P., 1, 25, 35, 58, 375

fraud (online), 419


Fricker, M., 152–3

Frost, L., 371

funding see research funding funding fit, 145–8

 

Gaarder, E., 487–9

Gallagher, B., 217

Gariglio, L., 446

Garland, D., 458

gatekeepers, 27, 218, 389

Gelsthorpe, L., 365, 374

gender, 184–7, 376–7

generalizability, 8, 99, 101, 393–4, 404, 523generalization, and discrimination, 261 Gerring, J., 478–9, 481, 483–4

Gerstenfeld, P. B., 420

Gfroerer, J., 209

Gillam, L., 397

Global Slavery Index, 347 globalization, 8–9

comparative work after, 468 concept of, 457

and criminal justice, 456–8 decline of, 467–8

Glueck, E., 310, 369–70

Glueck, S., 310, 369–70

goals, and performance targets, 500 Godfrey, B., 179, 183, 187, 188, 190, 371,

373–4

Goffman, E., 485

‘going native’, 390–1

Goodey, J., 367, 369

Google Scholar, 81, 415

Goya, F., 440

graffiti art, 440–1

grand theory, 286

‘grassing’, 399

Green, N., 42

Greene, J. C., 125, 128–9

grey literature, 70

grounded theory, 71, 274, 523

group interviews, 102

Gruenewald, J., 486

Gruenfeld, E., 279–80

Guillemin, M., 397

 

Habigzang, L. F., 281–3

Haiven, M., 154

Hall, A., 161, 403

Hall, M., 455

Hall, S., 21, 385, 396–7

Hallsworth, S., 402

Hammersley, M., 101, 142

harassment (online), 419


‘hard to reach’ groups, 104, 202–3, 523

and surveys, 208–9, 217–18, 219

Harding, J., 284, 285–6

harm, 28, 29

Harris Review, 146–7, 148

Harvey, M., 440

hate speech (online), 419–20 Hayward, K., 438

Heap, V., 113, 126–8

Her Majesty’s Prison and Probation Service (HMPPS), 145

Hillis Miller, J., 444 Hirst, P., 467

historical child sexual abuse, 272

historical institutional abuse see institutional abuse; victims of state violence

historical research, digital sources, 183, 184–5,

191, 192–3, 370–74

history of victims

evolving study of, 183, 190–1 future research on, 190–93 and gender, 186–7

importance of researching, 180–1 methods of study, 181–83, 192–3

Old Bailey Online, 184–5, 191, 192 victims as drivers of justice, 188 victim–offender overlap, 189–90

Ho, K., 399–400

Hoegen, H., 462–3

Hohendorff, J. V., 281–83

Holdaway, S., 389

homicide research example, 486–7

Hopper, E., 441

hot spot policing, 255 hot spots, 523

human trafficking definition/elements of, 342, 343

documentary analysis, 354–5 evaluation of counter-trafficking, 345 interviews, 349–54

knowledge on, 346–7

research on, 342, 347–55

Trafficking Protocol, 343–6

hypotheses, 231–32, 523

hypothesis testing, 287–8, 523

ICVS (International Crime Victimization Survey), 233, 466–7

illegal drug use, 122, 123–4 images see visual criminology impact evaluation, 508

impact of research, 10–11, 334

incidence rates, 233, 524

Independent Inquiry into Child Sexual Abuse, 273


indicators, 22

inductive, 524

inductive bias, 260

inductive research, 43, 70, 96, 274, 524

and abductive approach, 118 case studies, 477

ethnography as, 392

in practice, 278, 280

inference quality, 128, 524

inference transferability, 129

inferences, 125–6, 259, 260, 524

informed consent, 28, 56, 200–2, 389–90, 425

initiation, 126, 524

inquests, 138, 524

inquiries into child sexual abuse, 272–3, 276 inquisitorial model, 456, 463

‘Inside Out’ Prison Program, 504–7 insiders/outsiders, in ethnography, 397–9 institutional abuse

case study example, 488, 489–90 see also victims of state violence

integration, and mixed methods, 124–8, 130

intelligence-led policing, 524

interactionism, 26

see also symbolic interactionism interest, in research topic, 172 internal validity, 13, 483

International Crime Victimization Survey (ICVS), 233, 466–7

International Labour Organization (ILO), 346 international research, 8–9

see also globalization internet, 414

see also online research internet crime, 414, 419–20

interpretive approach, 96, 115, 393, 477

interpretive methods, 502–3

interviewer characteristics, 329–30

interviews, 19–20, 100–2

analysis of, 275, 278–83, 284–5

in evaluation research, 502, 505, 508–9, 511

group interviews, 102

in human trafficking research, 349–54 life history interviews, 308–9, 315, 365–6

narrative approach, 323–4

online, 421–23

power in, 322–3

semi-structured, 100, 278–9, 322, 349–54, 400 strengths and weaknesses, 50–1

structured, 19, 322

unstructured, 19, 20, 100, 322, 323–4, 327 with victims of state violence

access, 328–9

background, 324–6


building trust, 329–30

emotionality, 331–32

method choice, 326–7

reflections, 332–5

speaking out, 330–1

intimate partner violence, 487–9 intimate personal violence, 207–8 introductions, 163

inverse trend, 524

The Jack Roller, 365–6, 374

Jay Report, 272–3

Joliffe, D., 77

Jones, T., 463

journal articles, 415

joyriding, 235–6

The Judgement of Cambyses (David), 447–9 Jupp, V., 41, 48–9, 365–6, 367

justice see criminal justice

 

Kearon, T., 188

Kelley, K., 486

Kelly, L., 205

Kennet, J., 209

key informants, 389, 398, 400

Khasnabish, A., 154

King, A., 125

Kirchengast, T., 186

Kleck, G., 98

knowledge see epistemology; theory building Koestler Trust, 434

Koller, S. H., 281–83

labour trafficking, 342

language, 437–8

Laub, J. H., 308, 310

law

and documentary analysis, 354–5

see also criminal justice; police and policing learning from mistakes, 173

Lee, E., 420

Lee, R. M., 202, 216

Leets, L., 420

length of dissertations, 166–7 Lewis, P., 487

library catalogues, 81

life history interviews, 308–9, 315, 365–6, 524

life-course research advantages of, 299–300

and biography, 368–70

cross-sectional and longitudinal compared, 311–15

definition of, 300, 524

mixed methods, 309–11


prospective and retrospective, 300–305 quantitative and qualitative, 305–9

Lippens, R., 433 literature, types of, 69–70

literature reviews, 11–12, 525in dissertation structure, 163 examples of, 72–3, 77

narrative reviews, 37–8, 45, 73–4, 79, 83

nature of, 44–5, 68–71

online, 415

process, 80–5

purpose of, 12, 71–2, 95

as research method, 106

systematic reviews, 37–8, 45, 75–9, 106,

276, 277

literature searches, 80–2

literature-based dissertations, 37–8, 48–52 Lloyd Warner, W., 477

loaded questions, 212–13

location of crime, predicting, 254–5 location of research, 388–9

Loeber, R., 312

Lombroso, C., 437

long questions, 212

Long Weatherred, J., 277 longitudinal research/studies

compared with cross-sectional, 311–15 definition, 300, 525

mixed methods, 309–11

prospective and retrospective, 300–305 quantitative and qualitative, 305–9

Lö sel, F., 77

lurking, 425

Lutz, C., 210

Luyendijk, J., 399–400

 

McCormack, D., 154

McGarry, R., 363

machine learning, 260, 525

macro theories, 69

Maguire, M., 366

malestream view, 376–7

Mancini, C., 424

Marsh, C., 205

Maruna, S., 125, 305–6, 309

Mawby, R., 459

Maxwell-Stewart, H., 371

May, T., 41, 70

meaning, 275, 443

Mears, D. P., 424

media, 170, 276, 277, 355

Meisenhelder, T., 307–8

Merriam, S. B., 477

meso theories, 69


meta-analysis, 77–8, 106

meta-inferences, 125, 524

methodological choices, 22, 130–1, 305, 309

methodological pragmatism, 130–1, 305, 309

methodological tools, 525

methodologically structured literature reviews, 85 methodology, 12–13

definition of, 94, 525

developing framework, 94–7

in longitudinal research, 300, 305

mixed methods, 130–1

primary data collection, 18–22, 97–105

research proposals, 22–4

secondary research/analysis, 14–18, 105–6

validity, 13–14

see also comparative methodology; longitudinal research/studies; visual criminology

methodology section, in dissertations, 163–4 methods see data collection methods

micro theory, 69, 285

middle-range theory, 285, 286

migrant research, 200

Milivojevic, S., 341 Mills, C. W., 23 mind maps, 43–4

Mishler, E. G., 100

mixed methods designs, 119–24, 525

mixed methods research, 52, 54, 105, 387

evaluating, 128–9

integrating results, 124–8, 130

longitudinal, 309–11

philosophical underpinnings, 114–19

project creation, 129–32

and triangulation, 97, 125

moderatum generalization, 393–4

Morrow, V., 201

multi-generation research, 525

multi-phase mixed methods design, 121–2 multiple realities, 117, 118, 525

multisensory ethnography, 402–3

Muncie, J., 458

Myra (Harvey), 440

 

Naffine, N., 289

narrative approach in interviews, 323–4, 327

narrative criminology, 167–8 narrative literature reviews, 37–8,

45, 73–4, 79, 83

narrative turn, 366–7

National Rural Crime Network (NRCN), 23–4 natural experiments, 236, 526

Nelken, D., 458, 459, 460–1

Newburn, T., 73–4, 463, 487

newspapers, 182–3, 192–3


non-governmental

organizations (NGOs), 352–3, 526

non-participant observation, 403, 425, 526

non-response, 422

non-transparency of data analytics, 262–3 nonprobability sampling, 53–4

see also purposive sampling note taking, 46, 83, 172

NVivo 10 software, 280–83

objectives see research objectives/purpose O’Brien, E., 355

observation(s), 20, 50, 479–80, 502, 526

see also non-participant observation; participant observation

obtuse meaning, 443

offender risk assessment, 252, 255–8, 526

evaluation of tools, 263–4 limitations of techniques, 258–62

non-transparency of data analytics, 262–3 offenders see offender risk assessment; prison/

prisoner research; victim–offender overlap Office for National Statistics (ONS), 15–16 official data/documents, 14–18, 302, 303, 306–7,

326–7

see also Crime Survey for England and Wales Old Bailey, 526

Old Bailey Online (OBO), 183, 184–5, 191, 192

online crime, 414, 419–20

online ethnography, 403–4, 424–7

online fraud, 419

online interviews, 421–23 online literature reviews, 415 online research

analysing content, 417–20 finding secondary data, 416–17 meanings of, 414

reaching participants, 220, 420–27

online sources, 81, 183, 184, 191, 192–3, 370–

74, 415, 416–17

online surveys, 423–4

ONS (Office for National Statistics), 15–16 ontology, 526

concept of, 140

and ethics, 148–54

and ethnography, 393

and methodology, 94, 96 and mixed methods, 117

and politics of research, 142–8 prison example, 138–41, 145–8 and theoretical literature, 69

open questions, 98, 210–11, 212

Operation Yewtree, 272

operationalization, 22, 313–14


oral presentations, 169–70 Ordinary of Newgate, 368 organising oral presentations, 170

outsiders/insiders, in ethnography, 397–9 ‘over-rapport’, 391, 398

overt research, 389, 390, 526

Pain, R., 25

para-suicide, 154, 526

paradigm wars, 115, 119

participant observation, 20–1, 103, 388,

398–9, 526

online, 403–4, 425, 426–7

see also ethnography

participants see research participants participatory approach, 206

peer support, 57

penal abolitionism, 138, 139–40, 141, 146, 289

penal reform, 139–40, 140–1, 146

penetration rate, 414

Pennington, L., 488, 489

performance indicators, 499–501, 527

performance targets, 500, 527

persistence, 310, 369–70, 373, 527

see also recidivism perspective, 69, 283, 438, 527

see also abolitionism; feminist perspectives philosophy see epistemology; ontology photo elicitation, 104, 446

photo voice, 104–5

photographs, making sense of, 443 Pickett, J. T., 424

Pierre, E. A. S., 100

pilot studies, 211, 216, 218

Pink, S., 402–3

Piss Christ (Serrano), 440 Pittsburgh Youth Study, 312

plagiarism research example, 479–80, 481, 482,

483, 484

planning see dissertation planning Plano Cark, V. L., 128

Platts-Fowler, D., 126

plays, 171

Plummer, K., 367

police and policing, 101–2, 186, 418–19, 463–6

policy-related research, 28, 75, 78, 354–5

The Polish Peasant in America and Europe

(Thomas and Znaniecki), 364

politics of research, 27–8, 78, 142–8, 352, 394,

396, 503–7

Pollock, J., 449

positivism, 96, 115, 143–4, 477, 527

Post Release Options Project (PROP), 510–14 postal questionnaires, 220


postpositivism, 305, 527

power, in interviews, 322–3 practise, to improve writing, 173

pragmatism, 115–16, 118, 130–1, 305, 309, 527

praxis, 287, 334, 527

prediction, 527

predictive policing, 252, 253–5, 258–64, 527

PredPol, 254, 260, 262

preparation, 172

see also dissertation planning Presdee, M., 438

presentation of research, 9–10, 162

audiences, 167, 169 crafting final copy, 168–9 data presentation, 169

mixed methods research, 131–2 oral presentations, 169–70

purposes of, 167–8

top tips, 171–3

visual and virtual, 170–1 writing up, 162–9

prevalence rates, 233, 346–7, 528

primary data collection, 14, 18–22, 48–52,

97–105, 275

primary research based dissertation, 37–8, 45

priority question, 119–20, 122 prison/prisoner research

access, 145, 329

and ethics, 152

intervention evaluations, 504–10

interviews, 329, 330, 332

ontology, epistemology and, 138–41, 145–8

surveys, 204

see also offender risk assessment prisoner peer support programme, 507–10 prisoners’ art, 434–6

prisons, PFI contract models, 468 private finance initiative (PFI), 468 probability sampling, 53, 423, 528

probation research, 104–5

procedural ethics, 397

process analysis, 528

PROP (Post Release Options Project), 510–14 prosopography, 191, 528

prospective design, 300–2, 312, 528

proxy variables, 261

public attitudes, 214–15, 218–21, 424, 464–6 public-private partnerships (PPPs), 468 purpose see research objectives/purpose purposive sampling, 53, 418, 528

qualitative data, 49, 307–9

qualitative data analysis, 54, 55–6

critical reflection, 288–91


of documents, 275, 276–8

early consideration of, 273–4, 275 and hypothesis testing, 287–8

of interviews, 275, 278–83, 284–5

online, 418, 420

sources and choice of, 274–5 types and levels, 282–7

qualitative meta-synthesis, 78

qualitative methodology, 95–7, 305, 528

qualitative methods, 98, 100

for evaluations, 502

in longitudinal research, 305–6, 307–11

qualitative research, 528and case studies, 480–81 credibility of, 387

human trafficking interviews, 348, 349–54

and sampling, 53

see also mixed methods research; paradigm wars quality, of online sources, 415

quality assurance, 528

quantitative content analysis, 417–18 quantitative data, 49, 306–7, 500–2

quantitative data analysis, 54, 55–6, 417–18

quantitative methodology, 95–7, 305, 528

quantitative methods, 98

dominance of, 386–7

for evaluations, 501–2

limitations of, 386, 387

in longitudinal research, 305–7, 309–11

quantitative research, 529and case studies, 480–81 and sampling, 52

see also mixed methods research; paradigm wars quasi-ethnography, 425

questionnaires, 50, 98–100, 502, 529

example research, 217–21

strengths and weaknesses, 51, 100, 205–6 questions see closed questions; open questions;

research questions; survey questions quota samples, 54

race, and data analytics, 261 Ragin, C., 477–8

random forest approach, 256–8 random samples, 53

rapid evidence assessments (REAs), 77, 106

rapport, 351, 391, 398, 422, 427

see also trust

readers/audiences, 10–11, 167, 168

reading, 46, 82

realism, 393, 404

realist reviews, 78 reality see ontology recidivism, 255–8, 373


see also persistence Redmon, D., 171

reference lists see bibliographies

reflection, 5, 26, 57–8, 288–91, 391–92, 445

reflective fieldwork diary, 279, 529

reflexive realism, 393, 404

reflexivity, 5, 25–6, 29, 290–91, 327, 392, 529

rehearsal of presentations, 170 Reiner, R., 40–1

relational ethics, 153–4

relationships, 507–10

see also rapport relevance

in longitudinal research, 307, 313–14

scientific relevancy, 143–4 reliability, in quantitative approach, 96 repeat crime rates, 233

research associates, 279–81, 389, 398, 460–61,

509–10

research design, 48–58, 529

longitudinal research, 300–305 mixed methods designs, 119–24 survey research, 209–16, 217

research ethics, 28–9, 54–7, 107, 529

committees and approval, 107, 150–1,

389, 396–7

consequentialist ethics, 148–50

and covert research, 389, 425–6

disclosure of crimes, 396, 398, 399

and ethnography, 389, 396–7, 399, 403, 404

and evaluation research, 263–4, 508–10

guidelines, 56, 57, 107, 150–2, 201

and human trafficking research, 348, 350–52

in online research, 403, 404, 425–6

and relationships, 509–10

and sensitive research, 152, 207, 350 situational and relational, 153–4

and use of images, 171 virtuous researchers, 152–3

Research Ethics Boards (REBs), 150–1 research excellence, 152

research funding, 27, 144, 145–8, 151–2, 506

research impact, 10–11, 334

research literature see literature reviews research objectives/purpose, 7–8, 43–4, 122,

167–8, 503, 529

research participants online, 420–27

see also ‘hard to reach’ groups; rapport; trust; vulnerable populations

research presentation see presentation of research research problems see research topic

research proposals, 22–4, 58–60,

273–4, 275, 529–30


research questions, 7, 41–4, 71, 85, 95, 130,

209–10, 530

research setting, 388–9

research strategies, 94–5

research teams, 279–80

research topic, 3, 7, 39–41, 172 researchers

policing of, 144–5, 151

and relationships, 509

virtuous, 152–3

voice of, 26–7, 85, 86, 166

well-being of, 351–52

see also rapport; research associates; trust restorative justice, 487–9

retrospective design, 302–5, 530

Richards, M., 201

riots, 101, 486, 487

risk assessment see offender risk assessment risk reduction, 151, 396

Robinson, D., 126

Rock, P., 184

Roulston, K., 100

Roux, N., 458

 

Sá enz, S., 490–1

safety, 396

sample size, 52, 53, 422 samples and sampling, 52–4

in longitudinal research, 311–12 in online research, 418, 422–3

sample surveys, 18

in sensitive research, 217–18, 219–20, 328

sampling error, 467, 530

sampling strategies, 53–4

Sampson, R. J., 308, 310

Sandberg, S., 397

Sarnecki, J., 297, 302–5

saturation, 284

Scannell, Peter, 372–3

Schneider, C. J., 419

Schumann, K., 143–4

scientific relevancy, 143–4

scoping reviews, 106

Scott, D., 137

search engines, 81, 415, 417–18

secondary analysis, 14–18, 48–52, 106, 274 examples see crime drop; history of victims see also documentary analysis

secondary data, 14–18, 274, 530

access to, 52

online see online sources

in study of historical victims, 181–83, 184, 192–3

see also victimization surveys


security

and drop in burglary, 238–40, 242–3 and drop in car theft, 234–8, 242 and drop in violence, 240–1

Security Impact Assessment Tool (SIAT), 236 Security Protection Factor (SPF), 236–7, 239

Segrave, M., 341

seldom heard see ‘hard to reach’ groups

self-inflicted deaths (SIDs), 138, 148–50, 156, 530

self-selecting samples, 54

Sellin, T., 302

semi-structured interviews, 100, 278–9, 322,

349–54, 400, 530

semiotics, 443, 530

sensitive research, 530

and confidentiality, 207, 216, 217

defining, 200–202

and ethics, 152, 207, 350

and surveys, 200, 205–6

CSEW approach, 206–8

examples, 216–21

questions, 209–16, 217, 220 with vulnerable groups, 208–9

see also child sexual abuse research; victims of state violence

sentencing, 256

sequence question, 120–2 sequencing of life events, 303

sequential mixed methods design, 121–2

Serious Offenders, 371

Serrano, A., 440

sex offender research, 101–2, 214–15,

218–21, 424

sex trafficking, 342, 345

sexual abuse see child sexual abuse research sexual violence research, 99, 106

Shaw, C., 365–6, 374

Shinn, E., 441

Shore, H., 177

SIAT (Security Impact Assessment Tool), 236 SIDs see self-inflicted deaths

Sillince, J. A., 418–19

simultaneous mixed methods design, 120 situational ethics, 153–4

SLCP (Stockholm Life-Course Project),

302–5, 315

‘smash ‘n’ grab’ surveys, 205

snowball sampling see chain referral sampling social activity, research as, 26

social meaning, 275

social media, 418

The Sociological Imagination (Mills), 22–3 sociology, 394–5

Song, J., 464–6


sources see digital sources; secondary data spatial variation, 483–5, 530

speaking out, victims of state violence, 330–1 Spencer, J., 199

SPF (Security Protection Factor), 236–7, 239

sponsors, 27, 151

see also research funding Stack, C., 485

Stake, R. E., 477

stakeholders, 27, 507–10

see also research funding Stalans, L., 219

standpoint research, 9

Stanford Prison Experiment, 149–50 Stanley, E., 321

Stanley (The Jack Roller), 365–6, 374

State, 143, 144, 147, 152

state violence see victims of state violence status (priority) question, 119–20, 122 Stockholm Life-Course Project (SLCP),

302–5, 315

storytelling, 323–4, 327, 531

Stouthamer-Loeber, M., 312

stratified samples, 53

stress management, 173

structural ethnography, 393 structure of dissertations, 163–5 structured interviews, 19, 322, 531

student plagiarism research, 479–81, 481, 482,

483, 484

subject-specific guides, 81

substantive literature, 70

Sudman, S., 213

suicide, 138, 146, 154, 531summarising oral presentations, 172 summative evaluations, 505, 531

supervision, 57, 351, 352

survey questionnaires, 51, 98–100, 205–6,

217–21, 531

survey questions, 98–9, 209–16, 217, 220

survey research, 18–19, 98–100, 203–4, 531

criticisms of, 100, 204–6

online, 423–4

and sensitive research, 198, 205–6

CSEW approach, 206–8

examples, 216–21

questions, 209–16, 217, 220

with vulnerable groups, 19, 200, 208–9,

217–18

victimization surveys, 206–8, 232–4, 245, 466–7

see also Crime Survey for England and Wales symbolic interactionism, 167, 305, 374, 531

symbols, 446, 447

synchronic, 484, 531


synchronous interviews, 421

systematic literature reviews, 37–8, 45, 75–9,

106, 531

and analysis, 276, 277

systematic samples, 53

tagging, 191, 192, 531

Tashakkori, A., 124–5, 128, 129

Taylor, L., 145, 146

Teddlie, C., 124–5, 128, 129

telephone interviews, 20

temporal variation, 483–4, 532

Tewksbury, R., 68

theft see burglary; car theft thematic content analysis, 281–83

thematically structured literature reviews, 85 theoretical literature, 69–70

theory building, 285–7, 476, 477 The Third of May 1808 (Goya), 441 Thody, A., 165–8

Thomas, W. I., 364

Thompson, G., 467

Tilley, N., 229 time frames

and interviews, 329, 421

in longitudinal research, 314–15 time management, 46–7, 166, 172 timing, in oral presentations, 170 title pages, 163

tone, 168

topic see research topic Trafficking Protocol, 343–6

training set, 256, 532

transcription, 391, 532

triangulation, 97, 125, 238, 532

trust, 329–10, 398, 400, 427, 509–10

see also rapport truth, 115, 142–3

see also authenticity Tseloni, A., 229

Tyldum, G., 347

 

Ullman, S. E., 288

ultra-realism, 167, 168

ultra-realist ethnographic networks, 404 Unraveling Juvenile Delinquency (Glueck), 310 unstructured interviews, 19, 20, 100,

322, 323–4, 327

 

validity, 13–14, 22, 28–9, 96, 128, 483

validity ‘trade-off ’, 13 value neutrality, 142

values, 503, 504, 506

variables, 313–14, 479, 532


victim–offender overlap, 187–8, 532victimization, children and, 217–18 victimization surveys, 19, 232–4, 245, 466–7

see also Crime Survey for England and Wales victimology, 288–9, 375–7

victims of crime

comparative research on, 462–3 concern with, 457

in criminology, 375–7 historical see history of victims

importance of researching, 180–1 victims of state violence

institutional abuse

case study, 488, 489–91

interviews with access, 328–9

background, 324–6

building trust, 329–10

emotionality, 331–32

method choice, 326–7

reflections, 332–5

speaking out, 330–31

video-based interviews, 421 view from below, 153–4 vignettes, 213–16

violence

ethnographies of violent crime, 398 and gender, 377

historical victims of, 186–7, 189–90 homicide case study, 486–7

IPV case study, 487–9 security and drop in, 240–41

see also victims of state violence virtual ethnography, 403–4, 424–7, 532virtual forms of presentation, 170–1 virtual turn, 170–1

virtual worlds, 426

virtuous researchers, 152–3

visual criminology, 24–5, 532

areas within, 439–42

contextualising, 434–6

images of justice, 441–42, 447–9

images as tools, 442, 446–7

making sense of images, 442, 443–6

methods, 104–5, 170–1, 442–3, 446–7

visual ethnography, 402–3

visual forms of presentation, 170–1 visual turn, 104, 162, 170–1, 437–9, 532

voice

and relational ethics, 153–4

of researcher, 26–7, 85, 86, 166

of victims, 330–31


vulnerable populations and ethics, 56, 152

research with children, 200–202, 217–18

and surveys, 19, 200, 208–9, 217–18

see also ‘hard to reach’ groups

 

Wakefield, A., 67

Walby, S., 377

Walkfree Foundation, 346

Walklate, S., 377

Walters, R., 143, 144–5

Ward, K., 168–9

Waters, J., 113, 122, 123–4, 125

Weaver, W., 386

web-based content, 414

analysing, 417–20

see also online

research; online sources web-based surveys, 220, 423–4 well-being, of researchers, 351–52 Welsh, B. C., 75–7

Westmarland, N., 99

White, R., 497

Whittier, N., 286–7

Whyte, W. F., 477

Williams, M., 393–4, 426

Willis, D. G., 279–80

Wilson, M., 355

Winlow, S., 21, 390–1, 395,

396–7, 398, 404

within method triangulation, 97 Wolfgang, M. E., 302

word limits, 166–7

Working Group on Trafficking in Persons (WGTIP), 345

writing

literature reviews, 83–5

see also note taking writing conventions, 166

writing style, 26–7, 168

writing technique, practising, 173 writing up, 162–9

 

Yar, M., 413

Yazan, B., 476

Yin, R. K., 476–7

young people, surveys with, 19 youth justice, 103, 488, 489

Zimbardo, P., 149–50

Znaniecki, F., 364


 


 


 

Поделиться:





Воспользуйтесь поиском по сайту:



©2015 - 2024 megalektsii.ru Все авторские права принадлежат авторам лекционных материалов. Обратная связь с нами...