Scholarly Works, Sociology
Permanent URI for this collection
Research articles, presentations, and other scholarship
Browse
Recent Submissions
- Criminological, psychological, and developmental aspects of pandemic strain and online crueltyParti, Katalin; Sanders, Cheryl E.; Breaux, Rosanna; McCoy, Meghan (Springer, 2024-12)
- Managing the threat of decoupling in the U.S. affordable housing industryRead, Dustin C.; Sedgwick, Donna (Springer, 2024-08-12)Decoupling, or the practice of communicating different organizational values and goals than those rigorously pursued, is a concept discussed in the organization theory literature. Organizations engage in it when their legitimacy hinges on obtaining the support of stakeholders with disparate interests, and they attempt to appease some stakeholders with words and others with actions. One problem with decoupling is that it can lead organizations to operate in ways that are not reflective of their stated missions. With this concern in mind, the analysis presented here explores the prevalence of decoupling in the U.S. affordable housing industry and considers how, when, and why it occurs, and to what effect. Thematic analysis of interview data collected from industry practitioners suggests decoupling is common, comes in multiple forms, and must be effectively managed if municipal governments hope to partner with for-profit and nonprofit affordable housing providers to achieve their social policy goals.
- Secret sharing in online communities: A comparative analysis of offender and non-offender password creation strategiesBergeron, Andréanne; Dearden, Thomas E. (Elsevier, 2024-11-05)Even though several authentication methods exist, passwords remain the most common type of authentication. Researchers have demonstrated the influence of a person’s environment and exposure to the Internet on their online security behavior (Bosnjak & Brumen, 2016; He et al., 2021; Juozapavičius et al., 2022). Those studies suggest that social identity seems to play a role in password choice. The objective of this study was to determine if the criminal nature of a network influences password-creation strategies. To achieve this, we utilized two databases with a substantial number of actual passwords (1,485,095) that had been leaked to the Internet. One database was sourced from a non-delinquent social network, while the other was from a hacker forum. We employed logistic regression to reveal the characteristics associated with each group, ensuring a comprehensive analysis of different types of password strategies and the similarity between actors of the same network. Results show that users of the same network have passwords with characteristics that are similar to each other. Individuals with the same social interests seem more likely to use the same password-creation strategies. From a network analysis perspective, the results show that similar individuals (sharing the same interests) are similar in other aspects (password creation strategies). These findings offer valuable insights into the diverse landscape of password varieties and user behaviors, contributing to a more comprehensive understanding of internet user networks.
- Hate and hate crimes in societyHawdon, James E.; Costello, Matthew (Edward Elgar Publishing, 2024-10-17)
- The state's role in hate: Understanding hate crime throughout U.S. historyHawdon, James E. (2024-10-17)
- The Legal Challenges of Realistic and AI-Driven Child Sexual Abuse Material: Regulatory and Enforcement Perspectives in EuropeParti, Katalin; Szabó, Judit (MDPI, 2024-10-30)Although the escalation in online child sexual abuse material (CSAM) is not a novel problem, recent digital proliferation has brought about new alarming challenges in addressing the issue. CSAM poses significant risks to children and society in general, the most serious being the long-lasting harmful effects on depicted victims. The already distressing problem is exacerbated by the worldwide appearance and spread of AI-driven or virtual CSAM, as AI offers a fast and increasingly profitable means for the sexual exploitation of children. The paper aims to provide a comprehensive review of current legislative measures focusing the European Union for combating online CSAM. With a particular focus on AI-driven CSAM, we will systematically evaluate the effectiveness and applicability of these regulations in addressing virtual CSAM. The paper will conclude with policy recommendations to address identified gaps in the European legislative framework concerning virtual CSAM.
- Breaks in the Air: The Birth of Rap Radio in New York City [Book review]Harrison, Anthony Kwame (University of California Press, 2024-03)A book review of: John Klaess. Breaks in the Air: The Birth of Rap Radio in New York City. Durham, NC: Duke University Press, 2022. 232 pages.
- Cybercrime and Strain Theory: An Examination of Online Crime and GenderParti, Katalin; Dearden, Thomas E. (Lifescience Global, 2024-09-11)Purpose: Historically, cybercrime has been seen as a near exclusively male activity. We were interested to learn whether the relationship between strain and crime holds for both males and females. Methods: We utilized an online survey instrument to collect data from a national sample of individuals (n=2,121) representing the US population by age, gender, race and ethnicity. We asked offending related questions regarding various cybercrimes. In the current study, we use data from 390 individuals who reported a cybercrime activity within the past 12 months. Results: We find strong support for prior strains correlating with both specific (e.g., illegal uploading) and general cyber-offending. We further examine whether gender interacts with strain. While general strain theory (GST) correlates with cyber-offending for both males and females, we did find a few important differences. Except for lack of trust in others and receiving unsatisfactory evaluation at school or work, there are different variables responsible for online offending for men and women. Parents’ divorcing, anonymity, and online video gaming increase cybercrime offending in women, whereas falling victim to a crime, breaking up with a significant other, and darkweb activity are correlated with cyber-offending for men. Conclusion: Although GST functions differently by gender when it comes to engaging in cyber-offending, the theory is indeed gender-specific, as different strain variables are responsible for engaging in cyber-offending in women and men. Components of general strain responsible for cyber-offending need to be further studied concerning gender. According to our results, GST is gender-specific, and these variables need to be further studied.
- Perspectives of Paid Panel Survey Research in Cybercrime Victimization and Offending: Validity of global online market research sampling and data collectionParti, Katalin; Dearden, Thomas E.; Hawdon, James E. (Routledge, 2024-08-27)Surveys are common tools for gathering data on myriad topics, including the study of online deviance and cybercrime. Topics such as teen cybervictimization (Wright et al., 2021), differential association and self-control applied to cybercrime (Dearden & Parti, 2021), cyber hatred (Reichelmann & Costello, 2021), cybercrime and institutional anomie theory (Dearden et al., 2021), and cybercrime and COVID (Hawdon et al., 2020; Kemp et al., 2021) have been studied using the non-probability data collected from online panels and tools such as Mechanical Turk. However, the validity of these data is of concern. This chapter considers the validity of using online polling for cybercrime data. First, we compare data from two of the most prominent global data vendors. Next, we use a control question about the 2020 presidential election. This item allows us to consider the validity of both internet-polling services by comparing our online surveys with data from FiveThirtyEight’s “polls-only” and actual election results. Finally, we provide estimates of cybercrime offending and victimization from our data, and we discuss the differences in the estimates from the two samples.
- Differentiating Insider and Outsider Cyberattacks on BusinessesDearden, Thomas E.; Parti, Katalin; Hawdon, James E.; Gainey, Randy; Vandecar-Burdin, Tancy; Albanese, Jay (Springer Nature, 2023-08-01)The use of information and communication technologies in business has opened several new ways for employees to commit cybercrimes against their employers. Utilizing opportunity theory, the current paper investigates the characteristics of businesses victimized by employee-committed cyberattacks and compares insider- and outsider-committed cybercrime in terms of the damage they cause to the business. We used online sampling to obtain information on 350 businesses in the Commonwealth of Virginia, revealing 29 outsider cases and 17 insider attacks that were clearly identified. We found that insider attacks were more costly, resulting in more damage than external attacks; the most frequent attack type was impersonating the organization online for insiders, and viruses, spyware, and malware for outsiders. Our data suggested restricting personal devices, making cybersecurity a priority, cybersecurity updates among management, and employee training do not significantly lessen the risk or mitigate the effects of insider attacks. We suggest that organizational security culture must be refined and strengthened to identify and prevent insider attacks successfully.
- Problems of knowledge, problems of order: the open science field siteGoldensher, Liora O’Donnell (Frontiers Media, 2023-11-16)Ethnographers can and should not just do or not do open science, but study the push to share data, instruments, and other research materials as an important moment of change and contest in contemporary knowledge-making and knowledge politics. Following ethnographers of science and technology who have demonstrated the analytic opportunities afforded by moments of scientific controversy, we should treat the places where these calls are made, debated, and taken up as important field sites for ethnographic inquiry. Whenever and wherever the sharing of data, instruments, and research is discussed, planned, done, measured, judged, or regulated, there are powerful claims, visions, and action concerning what makes for facticity, legitimacy, and credibility in both research and politics. From these sites, I argue, we can observe changes to disciplinary and popular understandings of epistemic virtue, or what makes for reliable, factual, or adequately transparent knowledge production. Attention to these sites can also yield important perspectives on the ways that visions of proper research conduct are imbricated with visions of governance. I argue that turning ethnographic methods to studying the open science movement can enable us to do timely scholarship about shifting understandings of facticity, knowledge, information, and governance.
- Social network interventions to reduce race disparities in living kidney donation: Design and rationale of the friends and family of kidney transplant patients study (FFKTPS)Daw, Jonathan; Verdery, Ashton M.; Ortiz, Selena E.; Reed, Rhiannon Deierhoi; Locke, Jayme E.; Redfield III, Robert R.; Kloda, David; Liu, Michel; Mentsch, Heather; Sawinski, Deirdre; Aguilar, Diego; Porter, Nathaniel D.; Roberts, Mary K.; McIntyre, Katie; Reese, Peter P. (Wiley, 2023-07-03)Introduction: Racial/ethnic disparities in living donor kidney transplantation (LDKT) are a persistent challenge. Although nearly all directed donations are from members of patients’ social networks, little is known about which social network members take steps toward living kidney donation, which do not, and what mechanisms contribute to racial/ethnic LDKT disparities. Methods: We describe the design and rationale of the Friends and Family of Kidney Transplant Patients Study, a factorial experimental fielding two interventions designed to promote LKD discussions. Participants are kidney transplant candidates at two centers who are interviewed and delivered an intervention by trained center research coordinators. The search intervention advises patients on which social network members are most likely to be LKD contraindication-free; the script intervention advises patients on how to initiate effective LKD discussions. Participants are randomized into four conditions: no intervention, search only, script only, or both search and script. Patients also complete a survey and optionally provide social network member contact information so they can be surveyed directly. This study will seek to enroll 200 transplant candidates. The primary outcome is LDKT receipt. Secondary outcomes include live donor screening and medical evaluations and outcomes. Tertiary outcomes include LDKT self-efficacy, concerns, knowledge, and willingness, measured before and after the interventions. Conclusion: This study will assess the effectiveness of two interventions to promote LKD and ameliorate Black-White disparities. It will also collect unprecedented information on transplant candidates’ social network members, enabling future work to address network member structural barriers to LKD.
- Designing and Implementing Active Learning with DataPorter, Nathaniel D. (2024-02-09)Slides for a workshop at the Conference on Higher Education Pedagogy 2024.
- Developing Self-guided Online Training for NVivo Users of Open Data at QDRPorter, Nathaniel D. (2023-09-27)
- Cyberattacks and public opinion - The effect of uncertainty in guiding preferencesJardine, Eric; Porter, Nathaniel D.; Shandler, Ryan (Sage, 2024-01-30)When it comes to cybersecurity incidents – public opinion matters. But how do voters form opinions in the aftermath of cyberattacks that are shrouded in ambiguity? How do people account for the uncertainty inherent in cyberspace to forge preferences following attacks? This article seeks to answer these questions by introducing an uncertainty threshold mechanism predicting the level of attributional certainty required for the public to support economic, diplomatic or military responses following cyberattacks. Using a discrete-choice experimental design with 2025 US respondents, we find lower attributional certainty is associated with less support for retaliation, yet this mechanism is contingent on the suspected identity of the attacker and partisan identity. Diplomatic allies possess a reservoir of good will that amplifies the effect of uncertainty, while rivals are less often given the benefit of the doubt. We demonstrate that uncertainty encourages the use of cognitive schemas to overcome ambiguity, and that people fall back upon pre-existing and politically guided views about the suspected country behind an attack. If the ambiguity surrounding cyberattacks has typically been discussed as an operational and strategic concern, this article shifts the focus of attention to the human level and positions the mass public as a forgotten yet important party during cyber conflict.
- Relationships, race/ethnicity, gender, age, and living kidney donation evaluation willingnessDaw, Jonathan; Roberts, Mary K.; Salim, Zarmeen; Porter, Nathaniel D.; Verdery, Ashton M.; Ortiz, Selena E. (Elsevier, 2024-04)Racial/ethnic and gender disparities in living donor kidney transplantation are large and persistent but incompletely explained. One previously unexplored potential contributor to these disparities is differential willingness to donate to recipients in specific relationships such as children, parents, and friends. We collected and analyzed data from an online sample featuring an experimental vignette in which respondents were asked to rate their willingness to donate to a randomly chosen member of their family or social network. Results show very large differences in respondents' willingness to donate to recipients with different relationships to them, favoring children, spouses/partners, siblings, and parents, and disfavoring friends, aunts/uncles, and coworkers. Evidence suggesting an interactive effect between relationship, respondent race/ethnicity, respondent or recipient gender, was limited to a few cases. At the p < 0.05 level, the parent-recipient gender interaction was statistically significant, favoring mothers over fathers, as was other/multiracial respondents' greater willingness to donate to friends compared to Whites. Additionally, other interactions were significant at the p < 0.10 level, such as Hispanics' and women's higher willingness to donate to parents compared to Whites and men respectively, women's lower willingness to donate to friends compared to men, and Blacks' greater willingness to donate to coworkers than Whites. We also examined differences by age and found that older respondents were less willing to donate to recipients other than their parents. Together these results suggest that differential willingness to donate by relationship group may be a moderately important factor in understanding racial/ethnic and gender disparities in living donor kidney transplantation.
- "This is not a scam!!" A mixed methods evaluation of findings of an interactive theatre production about scams victimizing older peopleParti, Katalin (2024-03-26)In 2021-23, this interdisciplinary collaborative project investigated the needs of older scam victims. The report is an assessment of the interactive theatre program "This is not a scam!!" showcased in the Spring of 2023. Implications and recommendations are included.
- Pipelines and Power: Psychological Distress, Political Alienation, and the Breakdown of Environmental Justice in Government Agencies’ Public Participation ProcessesBell, Shannon E.; Hughes, Michael; Tuttle, Grace; Chisholm, Russell; Gerus, Stephen; Mullins, Danielle R.; Baller, Cameron; Scarff, Kelly; Spector, Rachel; Nalamalapu, Denali (Elsevier, 2024-01-25)Environmental health research has demonstrated that living near industrial activity is associated with increased stress, depressive symptoms, and feelings of powerlessness. Little is known, however, about the effects of new natural gas pipelines—or the institutional processes dictating their approval and construction—on the mental health of local residents. Through our analysis of a mail survey, an online survey, and a set of semi-structured interviews, we examine how engagement with public participation processes associated with new interstate natural gas pipelines affects mental health. Our results suggest that the public participation opportunities offered by regulatory agencies during the pipeline certification process are primarily performative, and we find that many of the people who have taken part in these performative public input opportunities experience psychological distress, stress-activated physical health effects, and a loss of trust in government institutions. We argue that when people engage in public participation processes that have little or no effect on agency decision-making, it not only disempowers, but can harm those individuals and erode their trust in government institutions. Furthermore, we contend that providing the public with participation opportunities that are merely performative, with little ability to influence decision-making outcomes, is a violation of both procedural and recognition justice, two of the core tenets of environmental justice.
- Routine citizen Internet practices and cyber victimization: a state-wide study in VirginiaGainey, Randy; Albanese, Jay; Vandecar-Burdin, Tancy; Hawdon, James E.; Dearden, Thomas E.; Parti, Katalin (Taylor & Francis, 2023-10-22)Cybercrime has become a major societal concern, and a better understanding OF cybercrime is needed to target and prevent it more effectively, minimize its consequences, and provide support for victims. Research on cybercrime victimization has exploded in the past few years, but much of it relies on convenience samples and is largely descriptive in nature. The research presented here involves the collection of data from a large sample of Virginia households in 2022 (n = 1,206). The data are analyzed to provide a partial test of routine activity theory to better understand fraud and theft via the Internet. The data provide a solid baseline for describing the extent of cyber victimization across the state. Bivariate and multivariate analyses (logistic regressions) show support for routine activity theory and provide important insights for future research. In particular, we find that certain routine Internet activities may better predict unique forms of cybervictimization than others and that length of time on the Internet is not a good indicator of exposure to motivated offenders. Further, protective guardianship mediates the effects of exposure to motivated offenders; thus, efforts to educate the public on best practices are needed. We conclude that to better assess cybercrime, victimization and engagement, better measurement and longitudinal panel data will be needed.
- Dead-end days: The sacrifice of displaced workers on filmKing, Neal M. (University of Illinois Press, 2004)