It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 16813cam 2200625 a 4500
001 ocm48674578
003 OCoLC
005 20181122233736.0
008 011207s2003 maua b 001 0 eng
010 $a 2001056627
040 $aDLC$beng$cSTF$dDLC$dYDX$dBAKER$dMUQ$dNLGGC$dBTCTA$dYDXCP$dUBY$dCRH$dOCLCF$dOCLCO$dOCLCQ
020 $a0205366775
020 $a9780205366774
035 $a(OCoLC)48674578
042 $apcc
050 00 $aHV6024.5$b.H33 2003
082 00 $a364/.07/2$221
084 $a71.65$2bcl
084 $a86.43$2bcl
100 1 $aHagan, Frank E.
245 10 $aResearch methods in criminal justice and criminology /$cFrank E. Hagan.
250 $a6th ed.
260 $aBoston, MA :$bAllyn and Bacon,$c℗♭2003.
300 $axxi, 505 pages :$billustrations ;$c25 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references (pages 454-489) and index.
505 0 $a1. Introduction to criminal justice research methods : theory and method -- Scientific research in criminal justice -- Common sense and nonsense -- Why study research methods in criminal justice? -- The emergence of science and criminal justice -- The probabilistic nature of science -- Proper conduct of critical inquiry -- Approaches to theory and method in criminal justice -- Exhibit 1.1. Merton's "Matthew effect" in science -- Exhibit 1.2. The paradigm shift in policing -- Pure versus applied research -- Exhibit 1.3. The project on human development -- Exhibit 1.4. Crime analysis : applied criminal justice research -- Qualitative and quantitative research -- Researchese : the language of research -- Concepts -- Operationalization -- Variables -- Dependent and independent variables -- Theories/hypotheses -- Examples of the research process -- Recidivism among juvenile offenders -- General steps in empirical research in criminal justice -- Problem formulation : selection of research problem -- Problem formulation : specification of research problem -- Exhibit 1.5. Feminist perspectives and research methods -- Exhibit 1.6. The World Wide Web (WWW) -- Summary -- Key concepts -- Review questions -- 2. Ethics in criminal justice research -- Ethical horror stories -- Biomedical examples -- Social science examples -- Exhibit 2.1. AIDS research in Africa and Asia : is it ethical? -- Researcher fraud and plagiarism -- Exhibit 2.2. Legendary research scams -- The researcher's role -- Research targets in criminal justice -- Ethics and professionalism -- Ethics in criminal justice research -- History of federal regulation of research -- The Belmont Report -- Institutional review boards -- Research activities exempt from HHS review -- National Institute of Justice's human subject protection requirements -- Confidentiality of criminal justice research -- Exhibit 2.3. Codes of research ethics of the ACJS and the ASC -- Ethical issues in criminology/criminal justice research -- Avoid research that may harm respondents -- Honor commitments to respondents and respect reciprocity -- Exercise objectivity and professional integrity in performing and reporting research -- Protect confidentiality and privacy of respondents -- Ethical problems -- The Brajuha case (Weinstein decision) -- The Ofshe case -- The Hutchinson case -- Additional ethical concerns -- Avoiding ethical problems -- Summary -- Key concepts -- Review questions.
505 0 $a3. Research design : the experimental model and its variations -- The experimental model -- Research design in a nutshell -- Causality -- Resolution of the causality problem -- Rival causal factors -- Validity -- Internal factors : variables related to internal validity -- History -- Maturation -- Testing -- Instrumentation -- Statistical regression -- Selection bias -- Experimental mortality -- Selection--maturation interaction -- External factors : variables related to external validity -- Testing effects -- Selection bias -- Reactivity or awareness of being studied -- Multiple-treatment interferences -- Related rival causal factors -- Hawthorne effect -- Halo effect -- Post hoc error -- Placebo effect -- Other rival causal factors in criminal justice field experiments -- Diffusion of treatment -- Compensatory equalization of treatment -- Local history -- Experimental designs -- The classic experimental design -- Some criminal justice examples of the classic experimental design -- Candid camera -- Scared straight -- Community policing -- Exhibit 3.1. The Kansas City gun experiment -- Other experimental designs -- Posttest-only control group design -- Solomon four-group design -- Preexperimental designs -- One-group ex post facto design -- One-group before-after design -- Two-group ex post facto design -- Cross-sectional and longitudinal designs -- Exhibit 3.2. The cycle of violence and victims of child abuse -- Quasi-experimental designs -- Time-series designs -- Multiple interrupted time-series designs -- Counterbalanced designs -- Some other criminal justice examples of variations of the experimental model -- The Provo and Silverlake experiments -- Exhibit 3.3. Evaluations of shock incarceration -- The Kansas City preventive patrol experiment -- The Minneapolis domestic violence experiment -- The experiment as a data-gathering strategy -- Advantages of experiments -- Disadvantages of experiments -- Summary -- Key concepts -- Review questions -- 4. An introduction to alternative data-gathering strategies and the special case of Uniform Crime Reports -- Alternative data-gathering strategies -- Social surveys -- Participant observation -- Life history and case studies -- Unobtrusive measures -- Exhibit 4.1. Applied research : geographic information systems (GIS) -- The special case of Uniform Crime Reports -- The crime index -- Crime rate -- Cautions in the use of UCR Data -- Factors affecting the UCR -- Related UCR issues -- Exhibit 4.2. The crime dip -- UCR redesign -- National Incident-Based Reporting System -- Exhibit 4.3. The National Incident-Based Reporting System (NIBRS) -- NIBRS versus UCR -- Summary -- Key concepts -- Review questions.
505 0 $a5. Sampling and survey research : questionnaires -- Types of sampling -- Probability samples -- Nonprobability samples -- Exhibit 5.1. Crime profiling -- Sample size -- Survey research -- Some guidelines for questionnaire construction -- Questionnaire wording -- Pretest -- Organization of the questionnaire -- Mail surveys -- Advantages of mail surveys -- Disadvantages of mail surveys -- Ways of eliminating disadvantages in mail surveys -- Follow-up -- Offering remuneration -- Attractive format -- Sponsorship and endorsements -- Personalization -- Shortened format -- Good timing -- Self-reported measures of crime -- Some problems with self-report surveys -- Strengths of self-report surveys -- Reliability -- Validity -- Use of other data -- Use of other observers -- Use of polygraph -- "Known group" validation -- Use of lie scales -- Measures of internal consistency -- Use of interviews -- Internet surveys -- Advantages of Internet surveys -- Disadvantages of Internet surveys -- Procedures in Internet surveys -- Summary -- Key concepts -- Review questions -- 6. Survey research : interviews and telephone surveys -- Types of interviews -- Advantages of interviews -- Disadvantages of interviews -- Interviewing aids and variations -- Exhibit 6.1. Public opinion polls -- General procedures in interviews -- Training and orientation session -- Arranging the interview -- Demeanor of interviewer -- Administration of the structured interview -- Probing -- The exit -- Recording the interview -- Telephone surveys -- Advantages and prospects of telephone surveys -- Disadvantages of telephone surveys -- Computers in survey research -- Random digit dialing -- Techniques employed in telephone surveys -- Victim surveys in criminal justice -- National Crime Victimization Survey -- Sampling -- Panel design -- A comparison of UCR, NCVS, and self-report data -- Some problems in victim surveys -- Cost of large samples -- False reports -- Mistaken reporting -- Poor memory -- Telescoping -- Sampling bias -- Overreporting and underreporting -- Interviewer effects -- Coding unreliability and mechanical error -- Problems measuring certain crimes -- Benefits of victim surveys -- A defense of victim surveys -- Controlling for error in victim surveys -- Bounding -- Reverse record checks -- Victim surveys : a balanced view -- Community crime victimization survey software -- Redesign of the National Crime Victimization Survey -- Exhibit 6.2. The redesigned National Crime Victimization Survey -- Summary -- Key concepts -- Review questions.
505 0 $a7. Participant observation and case studies -- A critique of experiments and surveys -- Verbal reports versus behavior -- A defense of quantitative research -- Participant observation -- Types of participant observation -- Characteristics of participant observation -- Objectivity in research -- "Going native" -- General procedures in participant observation -- Field notes -- Mnemonics -- Caution in use of other recording methods -- Tips on participant observation -- Gaining access -- Exhibit 7.1. American skinheads -- Gatekeepers -- Announcement of intentions -- Sampling -- Reciprocity and protection of identity -- Concern for accuracy -- Examples of participant observation -- Exhibit 7.2. Islands in the streets -- Exhibit 7.3. This thing of darkness : a participant observation study of Idaho Christian patriots -- Advantages of participant observation -- Disadvantages of participant observation -- Case studies -- Life history/oral history -- Some examples of case studies -- Journalistic field studies -- Single-subject designs -- Summary -- Key concepts -- Review questions -- 8. Unobtrusive measures, secondary analysis, and the uses of official statistics -- Major types of unobtrusive methods -- Physical trace analysis -- Use of available data and archives -- Secondary analysis -- Personal documents and biographies -- Examples of secondary analysis -- Exhibit 8.1. Automated pin mapping : applied criminal justice research using GIS for crime analysis -- Exhibit 8.2. Street gang crime in Chicago -- Limitations of official data -- Measuring hidden populations -- Historical and archival data -- Content analysis -- Content analysis by computer -- Meta-analysis -- Exhibit 8.3. Applied criminal justice research : hotspot analysis -- Sources of existing data -- Exhibit 8.4. X-Files at the Federal Bureau of Investigation -- Exhibit 8.5. National Archive of Criminal Justice Data -- Observation -- Disguised observation -- Simulations -- Advantages of unobtrusive measures -- Disadvantages of unobtrusive measures -- Summary -- Key concepts -- Review questions -- 9. Validity, reliability, and triangulated strategies -- Error in research -- Reasons for lack of validation studies in criminal justice -- Ways of determining validity -- Face validity -- Content validity -- Construct validity -- Pragmatic validity -- Convergent-discriminant validation/triangulation -- Reliability -- Test-retest -- Multiple forms -- Split-half technique -- Mythical numbers -- Phantom army of addicts -- ADAM (Arrestee Drug Abuse Monitoring Program) -- Exhibit 9.1. ADAM -- Other examples of research validation -- Summary -- Key concepts -- Review questions.
505 0 $a10. Scaling and index construction -- Levels of measurement -- Exhibit 10.1. Score yourself general attitude/knowledge survey -- Scaling procedures -- Arbitrary scales -- The Uniform Crime Report as an arbitrary scale -- Attitude scales -- Thurstone scales -- Likert scales -- Guttman scales -- Other scaling procedures -- Q sort -- Semantic differential -- Other variations -- Crime seriousness scales -- Sellin-Wolfgang index -- Types of crime seriousness scales -- Prediction scales -- The Salient Factor Score -- Greenwood's "Rand Seven-Factor Index" -- Career criminal programs -- Advantages of scales -- Disadvantages of scales -- Summary -- Key concepts -- Review questions -- 11. Data analysis : coding, tabulation, and simple data presentation -- Variables list -- Computers -- Data management -- Editing -- Coding -- Coder monitoring -- Keyboard entry -- Data verification -- Simple data presentation -- Rates -- Proportions -- Percentages -- Ratios -- The frequency distribution -- Graphic presentations -- Pie charts -- Bar graphs -- Frequency polygons (line charts) -- Crime clocks -- Table reading -- Why bother with tables? -- What to look for in a table -- Steps in reading a table -- Summary of table 11.3 -- How to construct tables -- Presentation of complex data -- General rules for percentaging a table -- Improper percentaging -- Elaboration -- Lying with statistics -- Summary -- Key concepts -- Review questions -- 12. Data analysis : a user's guide to statistics -- Why study statistics? -- Types of statistics -- Measures of central tendency for a simple distribution -- Mode -- Median -- Mean -- Measures of dispersion -- Range -- Standard deviation ([sigma]) -- Standard deviation units (z scores) -- Chi-square (x℗ø) -- Calculation of chi-square -- Cautions -- Chi-square-based measures of association -- Phi coefficient (©ı) and phi-square (©ı℗ø) -- Contingency coefficient (C) -- Cramer's V -- Nature and types of statistics -- Nonparametric statistics -- Null hypothesis -- Tests of significance -- The t test (difference of means test) -- Types of t tests -- ANOVA (analysis of variance) -- Calculation of ANOVA -- Other measures of relationship -- The concept of relationship -- Correlation coefficient (Pearson's r) -- Interpretation of Pearson's r -- Calculation of Pearson's r -- Statistical significance of Pearson's r -- Regression -- Ordinal level measures of relationship -- Spearman's rho (rs) -- Interpretation of rho -- Gamma -- Multivariate analysis -- Partial correlation -- Multiple correlation and regression -- Statistical software -- Caveat emptor -- The ecological fallacy -- Summary -- Key concepts -- Review questions.
505 0 $a13. Policy analysis and evaluation research -- Policy analysis -- Evaluation research -- Policy experiments -- Policy analysis : the case of the National Institute of Justice research program -- NIJ mission statement -- NIJ research priorities -- A systems model of evaluation research -- Types of evaluation research -- Will the findings be used? -- Is the project evaluable? -- Who can do this work? -- Steps in evaluation research -- Problem formulation -- Design of instruments -- Research design -- Data collection -- Data analysis -- Utilization -- What works in criminal justice? -- Exhibit 13.1. Preventing crime : what works, what doesn't, what's promising -- Obstacles to evaluation research -- Researchers and host agencies -- Summary -- Key concepts -- Review questions -- Appendix A. How to write the research report -- Appendix B. Table of random numbers -- Appendix C. Statistics : an addendum to chapter 12 -- Measures of central tendency for grouped data -- Standard deviations for grouped data -- Raw score approach -- Deviation score approach -- Calculation of ANOVA -- Regression calculations -- A test of significance for gamma -- Appendix D. Answers to pop quizzes in chapter 12 -- Appendix E. Normal curve areas -- Appendix F. Distribution of chi-square (X℗ø) -- Appendix G. Proposal writing and evaluation -- Proposal writing -- Funding agencies -- Grantsmanship -- Basic elements of a proposal -- NIJ proposal format and content -- Evaluation of research proposals -- NIJ evaluation of proposals -- References -- Glossary -- Name index -- Subject index.
650 0 $aCriminology$xResearch$xMethodology.
650 0 $aCriminal justice, Administration of$xResearch$xMethodology.
650 0 $aCriminal statistics.
650 6 $aCriminologie$xRecherche$xMe thodologie.
650 6 $aJustice pe nale$xAdministration$xRecherche$xMe thodologie$xMe thodes statistiques.
650 6 $aCriminologie.
650 6 $aCriminalite $xRecherche$xMe thodologie.
650 7 $aCriminal justice, Administration of$xResearch$xMethodology.$2fast$0(OCoLC)fst00883302
650 7 $aCriminal statistics.$2fast$0(OCoLC)fst00883500
650 7 $aCriminology$xResearch$xMethodology.$2fast$0(OCoLC)fst00883583
650 17 $aCriminologie.$2gtt
650 17 $aStrafrechtspleging.$2gtt
650 17 $aOnderzoeksmethoden.$2gtt
938 $aBaker & Taylor$bBKTY$c101.20$d101.20$i0205366775$n0003869486$sactive
938 $aBaker and Taylor$bBTCP$n2001056627
938 $aYBP Library Services$bYANK$n1855258
029 1 $aAU@$b000023286434
029 1 $aNLGGC$b244867496
029 1 $aYDXCP$b1855258
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 114 OTHER HOLDINGS