tag:open.umn.edu,2005:/opentextbooks/textbooks?utf8=%E2%9C%93&term=criminal&commit=GoOpen Textbook Library - Search results for "criminal"2018-09-07T17:21:41Zhttps://open.umn.edu/assets/common/favicon/favicon-1594c2156c95ca22b1a0d803d547e5892bb0e351f682be842d64927ecda092e7.icohttps://open.umn.edu/assets/library/otl_logo-f9161d5c999f5852b38260727d49b4e7d7142fc707ec9596a5256a778f957ffc.png662018-09-07T17:21:41Z2024-01-22T14:52:22ZCriminal Law<img alt="Read more about Criminal Law" title="Criminal Law cover image" class="cover " width="683" height="1024" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTk1OSwicHVyIjoiYmxvYl9pZCJ9fQ==--fae36e738293a4ac35631fc161540b8e2b88bbf2/Criminal-Law-683x1024.jpg" />Criminal Law uses a two-step process to augment learning, called the applied approach. First, after building a strong foundation from scratch, Criminal Law introduces you to crimes and defenses that have been broken down into separate components. It is so much easier to memorize and comprehend the subject matter when it is simplified this way. However, becoming proficient in the law takes more than just memorization. You must be trained to take the laws you have studied and apply them to various fact patterns. Most students are expected to do this automatically, but application must be seen, experienced, and practiced before it comes naturally. Thus the second step of the applied approach is reviewing examples of the application of law to facts after dissecting and analyzing each legal concept. Some of the examples come from cases, and some are purely fictional. All the examples are memorable, even quirky, so they will stick in your mind and be available when you need them the most (like during an exam). After a few chapters, you will notice that you no longer obsess over an explanation that doesn't completely make sense the first time you read it—you will just skip to the example. The examples clarify the principles for you, lightening the workload significantly.1172018-09-07T17:21:44Z2024-01-22T14:52:13ZFederal Rules of Criminal Procedure<img alt="Read more about Federal Rules of Criminal Procedure" title="Federal Rules of Criminal Procedure cover image" class="cover " width="302" height="400" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTAwLCJwdXIiOiJibG9iX2lkIn19--2e576315ea6af673ed84ea4395121b8d4da96d02/0000CriminalP.png" />This series of Federal Rules books, consisting of the Federal Rules of Evidence, Criminal Procedure and Civil Procedure, are powered by the Legal Information Institute at Cornell Law School, and created in partnership with The Center for Computer-Assisted Legal Instruction (CALI).These rules govern the conduct of all criminal proceedings brought in Federal courts. Our Federal Rules ebooks include: The complete rules as of December 1, 2012 (for the 2013 edition). All notes of the Advisory Committee following each rule. Internal links to rules referenced within the rules. External links to the LII website's version of the US Code.4982018-09-07T17:22:06Z2024-01-22T14:52:13ZIntroduction to Criminal Investigation: Processes, Practices and Thinking<img alt="Read more about Introduction to Criminal Investigation: Processes, Practices and Thinking" title="Introduction to Criminal Investigation: Processes, Practices and Thinking cover image" class="cover " width="867" height="1104" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDI2LCJwdXIiOiJibG9iX2lkIn19--646408e3b783f4e26a1c0511f804b16de95726b5/0000IntroCrim.png" />Introduction to Criminal Investigation, Processes, Practices, and Thinking is a teaching text designed to assist the student in developing their own structured mental map of processes, practices, and thinking to conduct criminal investigations. Delineating criminal investigation into operational descriptors of tactical-response and strategic response while using illustrations of task-skills and thinking-skills, the reader is guided into structured thinking practices. Using the graphic tools of a “Response Transition Matrix”, an “Investigative Funnel”, and the “STAIR Tool”, the reader is shown how to form their own mental map of investigative thinking that can later be articulated in support of forming their reasonable grounds to believe. Chapter 1 introduces criminal investigation as both a task process and a thinking process. This chapter outlines these concepts, rules, and processes with the goal of providing practical tools to ensure successful investigative processes and practices. Most importantly, this book informs the reader how to approach the investigative process using “investigative thinking.” Chapter 2 illustrates investigation by establishing an understanding of the operational forum in which it occurs. That forum is the criminal justice system and in particular, the court system. The investigative process exists within the statutory rules of law, including the Canadian Charter of Rights and Freedoms, and case law rulings adjudicated by the courts. Considering the existence of these conditions, obligations, and case law rules, there are many terms and concepts that an investigator needs to understand to function appropriately and effectively within the criminal justice system. The purpose of this chapter is to introduce some of the basic legal parameters and concepts of criminal justice within which the criminal investigation process takes place. Chapter 3 describes the functions and terms of “evidence”, as they relate to investigation. This speaks to a wide range of information sources that might eventually inform the court to prove or disprove points at issue before the trier of fact. Sources of evidence can include anything from the observations of witnesses to the examination and analysis of physical objects. It can even include the spatial relationships between people, places, and objects within the timeline of events. From the various forms of evidence, the court can draw inferences and reach conclusions to determine if a charge has been proven beyond a reasonable doubt. Considering the critical nature of evidence within the court system, there are a wide variety of definitions and protocols that have evolved to direct the way evidence is defined for consideration by the court. In this chapter, we look at some of the key definitions and protocols that an investigator should understand to carry out the investigative process. Chapter 4 breaks investigation down into logical steps, establishing a progression that can be followed and repeated to reach the desired results. The process of investigation can be effectively explained and learned in this manner. In this chapter the reader is introduced to various issues in the progression that relate to the process of investigation. Chapter 5 examines the operational processes of investigation. In this chapter we introduce the three big investigative errors along with graphic illustrations of “The Investigative Funnel” and the “S T A I R Tool” to illustrate how each of these concepts in the investigative progression. Chapter 6 provides the reader the opportunity to work through some investigative scenarios using the S T A I R Tool. These scenarios demonstrate the investigative awareness required to transition from the tactical investigative response to the strategic investigative response. Once in the strategic response mode the reader is challenged to practice applying theory development to conduct analysis of the evidence and information to create an investigative plan. This chapter presents two investigative scenarios each designed to illustrate different steps of the S T A I R tool allowing the student to recognize both the tactical and the strategic investigative responses and the implications of transitioning from the tactical to the strategic response. Chapter 7 illustrates the investigative practices of witness management. Witness statements will assist the investigator in forming reasonable grounds to lay a charge, and will assist the court in reaching a decision that the charge against an accused person has been proved beyond a reasonable doubt. It is important for an investigator to understand these practices as they allow an investigator to evaluate witnesses and collect witness evidence that will be acceptable to the courts. Chapter 8 describes crime scene management skills. These skills are an extremely significant task component of investigation because evidence that originates at the crime scene will provide a picture of events for the court to consider in its deliberations. That picture will be composed of witness testimony, crime scene photographs, physical exhibits, and the analysis of those exhibits, along with the analysis of the crime scene itself. From this chapter, the reader will learn the task processes and protocols for several important issues in crime scene management. Chapter 9 examines the interviewing, questioning, and interrogation techniques police use to aid them in investigations. The courts expect police to exercise high standards using practices that focus on the rights of the accused person, and minimize any physical or mental anguish that might cause a false confession. In meeting these expectations, the challenges of suspect questioning and interrogation can be complex, and many police agencies have trained interrogators and polygraph operators who undertake the interrogation of suspects for major criminal cases. But not every investigation qualifies as a major case, and frontline police investigators are challenged to undertake the tasks of interviewing, questioning, and interrogating possible suspects daily. The challenge for police is that the questioning of a suspect and the subsequent confession can be compromised by flawed interviewing, questioning, or interrogation practices. Understanding the correct processes and the legal parameters can make the difference between having a suspect's confession accepted as evidence by the court or not. Chapter 10 examines various forensic sciences and the application of forensic sciences as practical tools to assist police in conducting investigations. As we noted in Chapter 1, it is not necessary for an investigator to be an expert in any of the forensic sciences; however, it is important to have a sound understanding of forensic tools to call upon appropriate experts to deploy the correct tools when required. Chapter 11 summarizes the learning objectives of this text and suggests investigative learning topics for the reader going forward. Many topics relative to investigative practices have not been covered here as part of the core knowledge requirements for a new investigator. These topics include: Major Case ManagementInformant and confidential source managementUndercover investigationsSpecialized team investigations6882019-03-17T17:19:47Z2024-03-18T13:10:36ZIntroduction to the American Criminal Justice System<img alt="Read more about Introduction to the American Criminal Justice System" title="Introduction to the American Criminal Justice System cover image" class="cover " width="350" height="525" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NjM0LCJwdXIiOiJibG9iX2lkIn19--088616df468de097d555ab436d0aa22d48b78d75/0000AmeCriJus.jpg" />There is a dearth of OER textbooks in Criminology and Criminal Justice, which made creating this textbook all the more exciting. At times we faced challenges about what or how much to cover, but our primary goal was to make sure this book was as in-depth as the two textbooks we were currently using for our CCJ 230 introduction course. The only way we were willing to undertake this project as if it was as good, or better than the current books students read. We have had very positive feedback about the required textbooks in the course but consistently heard how expensive the books were to buy. We also needed to ensure we met the learning outcomes outlined by SOU for a general education course, as well as the state of Oregon, to make sure this textbook helps students meet those outcomes.11652022-05-07T01:38:58Z2024-01-22T14:52:31ZResearch Methods for Criminal Justice Students<img alt="Read more about Research Methods for Criminal Justice Students" title="textbook cover placeholder image" class="cover fallback " width="247" height="326" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" />This book is based on two open-access textbooks: Bhattacherjee’s (2012) Social science research: Principles, methods, and practices and Blackstone’s (2012) Principles of sociological inquiry: Qualitative and quantitative methods. I first used Bhattacherjee’s book in a graduate-level criminal justice research methods course. I chose the book because it was an open educational resource that covered the major topics of my course. While I found the book adequate for my purposes, the business school perspective did not always fit with my criminal justice focus. I decided to rewrite the textbook for undergraduate and graduate students in my criminal justice research methods courses. As I researched other open- educational resources for teaching social science research methods, I found Blackstone’s book, which covered more of the social science and qualitative methods perspectives that I wanted to incorporate into my book. As a result, this open-access textbook includes some content from both previous works along with my own additions based on my extensive experience and expertise in conducting qualitative and quantitative research in social science settings and in mentoring students through the research process. My Ph.D. is in Sociology, and I currently teach undergraduates and graduate students in a criminal justice program at Weber State University. Throughout my career, I have conducted and published the results of research projects using a variety of methods, including surveys, case studies, in-depth interviews, participant observation, content analysis, and secondary analysis of quantitative data. I have also mentored undergraduates in conducting community-based research projects using many of these same methods with the addition of focus groups and program evaluations.12992022-12-14T15:33:15Z2024-01-22T14:52:36ZCriminal Procedure: Undergraduate Edition Author:<img alt="Read more about Criminal Procedure: Undergraduate Edition Author:" title="Criminal Procedure: Undergraduate Edition Author: cover image" class="cover " width="683" height="1024" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDM2MywicHVyIjoiYmxvYl9pZCJ9fQ==--9b4f09942a7f9f5840dc125919791c9e18e9198d/Criminal-Procedure_Cover-683x1024.jpeg" />An open textbook for undergraduate Criminal Procedure courses that are typically required of criminal justice majors. The book uses U.S. Supreme Court opinions to illuminate the definition of rights concerning search and seizure, right to counsel, and other aspects of the criminal justice process. This open textbook seeks to make undergraduates familiar with judicial reasoning as well as the definitions of rights relevant to individuals who are drawn into contact with criminal justice officials. The chapters give significant attention to police procedures and individual rights under the Fourth Amendment related to searches, including those using warrants and the situations in which warrant searches are permissible. The book also covers rights in the context of police interrogation, including Miranda warnings and exceptions to the Miranda rule. In addition, there is coverage of the exclusionary rule, right to counsel, plea bargaining, and trial rights. It concludes with a brief examination of rights related to sentencing. This resource challenges undergraduates to understand the development and changes affecting rights as new decisions are issued by the U.S. Supreme Court.16142024-03-04T02:13:45Z2024-03-04T02:13:45ZEntre la Criminología y la Política Criminal: Caminos para una Justicia Renovada<img alt="Read more about Entre la Criminología y la Política Criminal: Caminos para una Justicia Renovada" title="Entre la Criminología y la Política Criminal: Caminos para una Justicia Renovada cover image" class="cover " width="1131" height="1600" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEyNDcsInB1ciI6ImJsb2JfaWQifX0=--ae06bfaa1dc788300f4f434a6e89cac149db555a/submission_67_67_coverImage_es_ES.jpg" />El texto aborda la relación entre criminología y política criminal, destacando su importancia en la comprensión del fenómeno criminal y la gestión estatal contra la delincuencia. Se exploran elementos clave, incluyendo los objetivos valorativos de la política criminal, la relación entre violencia estatal y social, la flexibilidad en la elección de objetivos, y la operación en diversos contextos. Se destaca la crucial participación del poder legislativo y la necesidad de adaptarse a la temporalidad. El texto aboga por nuevas políticas criminales respaldadas por instrumentos legales sólidos y una administración pública eficaz para moldear un sistema de justicia más preciso en la sociedad contemporánea.16242024-03-17T02:16:21Z2024-03-18T16:57:08ZSocial Work Practice and Disability Communities: An Intersectional Anti-Oppressive Approach<img alt="Read more about Social Work Practice and Disability Communities: An Intersectional Anti-Oppressive Approach" title="Social Work Practice and Disability Communities: An Intersectional Anti-Oppressive Approach cover image" class="cover " width="350" height="501" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEzMzYsInB1ciI6ImJsb2JfaWQifX0=--4ec4eae574e52abd5210d6f05378ba512e8638d1/081622_RotelProject_Socialwork-Opt2-350x501.png" />Designed as a main textbook for social work courses at the bachelor’s and master’s level or for social work practitioners in the field, this work moves beyond a traditional medicalized and segregated approach (i.e., chapters organized around impairments) to the exploration of disability-specific populations, instead taking a more intersectional approach in discussing specific service areas and practice issues while weaving in stories about the lived experiences of disabled people with a range of social identities. These issues include parenting, mass incarceration, ableism, aging, and employment, among many others. A key goal of this book is to introduce an intersectionality-informed and critically culturally competent approach to anti-oppressive social work practice with disabled people, primarily in the United States. To do this, we present an innovative practice model for social workers to use in their work with disabled people and communities, which is incorporated throughout the book in a variety of practice considerations. The main themes woven throughout our practice model are intersectionality theory, critical cultural competence, and anti-oppressive practice.16182024-03-14T04:49:18Z2024-03-18T16:57:08ZCounter Unmanned Aircraft Systems Technologies and Operations<img alt="Read more about Counter Unmanned Aircraft Systems Technologies and Operations" title="Counter Unmanned Aircraft Systems Technologies and Operations cover image" class="cover " width="350" height="453" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEzMTUsInB1ciI6ImJsb2JfaWQifX0=--a8a6a08c8c6a813c626ad819e9d2d1156637639f/Cover_Counter-Unmanned-Aircraft-Systems-Technologies-and-Operations2-350x453.jpg" />As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020). This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020). Every country seems to be announcing steps forward in this bludgeoning field.16172024-03-14T04:37:00Z2024-03-18T16:57:08ZCyber-Human Systems, Space Technologies, and Threats<img alt="Read more about Cyber-Human Systems, Space Technologies, and Threats" title="Cyber-Human Systems, Space Technologies, and Threats cover image" class="cover " width="350" height="438" data-controller="common--cover" data-placeholder="/assets/common/placeholder-0e0607cbc50663ddb9e8fd188058bcd2630c730ef6ee322801278607b7d5af8e.png" src="/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEzMTIsInB1ciI6ImJsb2JfaWQifX0=--152e94dc971a7dc0d1458003ee5c08ab708fd6e7/Book_8_Cover_JIC-18-authors-07252023-350x438.jpg" />CYBER-HUMAN SYSTEMS, SPACE TECHNOLOGIES, AND THREATS is our eighth textbook in a series covering the world of UASs / CUAS / UUVs / SPACE. We address the technological future of the merging of cyber-human systems (robots, cyborgs, AI/ML, computers) with humans and apply these innovations to space operations and defense against threats that are concomitant with their development. We look at artificial brains, legality of CHS sensors, AI /ML and Ag and food industry; Neurostrike and CHATGPT, biological threats and growth in space, space EW, modeling, deep space warfare, logistics and dominance; hypersonic missiles, cyber threats in space, machine parts, materials technologies, and economies of scale, quantum technologies impact and finally, innovative wireless power transfer for space applications. State-of-the-Art research by a team of eighteen SMEs is incorporated into our book. We trust you will enjoy reading it as much as we have in its writing. There is hope for the future. There is also caution needed.
https://open.umn.edu/opentextbooks/textbooks?commit=Go&page=2&term=criminal