Essential Criminology and Legal Definitions

Classified in Law & Jurisprudence

Written on in English with a size of 4.67 KB

Secondary Victim Defined

A secondary victim is a person who suffers unintended consequences when others are victimized.

Understanding Polyvictimization

Polyvictimization refers to multiple instances of varied victimization. It has a more negative impact than being the victim of one type of chronic victimization.

Revictimization Explained

Revictimization is the continued victimization by the same offender committing the same crime.

Violence Against Women Act of 1994

The Violence Against Women Act of 1994 addressed concerns about violence against women, including sexual violence and domestic abuse.

Restorative Justice Principles

Restorative Justice is the philosophical basis of the victims' movement. It emphasizes offender accountability and victim reparation. Its community safety dimension recognizes that the justice system has a responsibility to protect people.

Wolfgang's 1958 Homicide Study

Marvin Wolfgang's 1958 study of homicides found that 25% of all homicides were between family members. Women were far more likely than men to be both offenders and victims within this category. Men were more likely to be killed by friends and strangers than by family members.

Felony Murder Rule

Felony Murder is a special category of murder. An offender who commits a crime during which someone dies can be found guilty of first-degree murder, even though the person committing the crime had no intention of killing anyone.

Hate Crime Statistics Act of 1990

The Hate Crime Statistics Act of 1990 mandated the collection of data on crimes motivated by religious, ethnic, racial, or sexual orientation prejudice.

Violent Crime Control and Law Enforcement Act (1994)

The Violent Crime Control and Law Enforcement Act of 1994 added crimes motivated by biases against people with disabilities to the data collection.

Rape Shield Laws Explained

Rape Shield Laws are statutes intended to protect rape victims by ensuring that defendants do not introduce irrelevant facts about the victim's sexual past into evidence.

Defining Mass Murder

Mass Murder is the illegal killing of three or more individuals in a single event or during a short period of time.

Aggravated Assault Definition

Aggravated Assault is the unlawful attack by one person upon another wherein the offender uses a weapon or displays it in a threatening manner, or the victim suffers obvious or severe bodily injury.

Typology of Serial Killers

A common four-part typology for serial killers includes:

  • Visionary: Driven by delusions or hallucinations.
  • Comfort: Kills for financial gain or a comfortable lifestyle.
  • Hedonistic: Kills for pleasure or sexual gratification.
  • Power Seekers: Kills to exert control over victims.

Understanding Burglary

Burglary is the unlawful entry into a structure with the intention to commit a crime, typically a felony commission, generally a theft.

Juvenile Shoplifting Trends

Juveniles are overrepresented as shoplifters in self-report data.

What is a Ponzi Scheme?

A Ponzi Scheme is a form of fraud in which belief in the success of a nonexistent enterprise is fostered by the payment of quick returns to the first investors from money invested by later investors.

Money Laundering Process

Money Laundering is the process by which illegal gains are disguised as legal income.

Sarbanes-Oxley Act of 2002

The Sarbanes-Oxley Act of 2002 (SOX) cracks down on corporate fraud.

Drug Trade Interdiction

Interdiction is the act of interrupting the drug trade.

Phishing Scams Explained

Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.

Data Encryption Fundamentals

Data Encryption translates data into another form, or code, so that only people with access to a secret key can read it.

Importance of Audit Trails

Audit Trails are manual or electronic records that chronologically catalog events or procedures to provide supporting documentation and history, used to authenticate security.

Related entries: