scispace - formally typeset
Search or ask a question
Author

Karen Holt

Bio: Karen Holt is an academic researcher from Michigan State University. The author has contributed to research in topics: Poison control & Pornography. The author has an hindex of 6, co-authored 14 publications receiving 101 citations. Previous affiliations of Karen Holt include John Jay College of Criminal Justice.

Papers
More filters
Journal ArticleDOI
TL;DR: An inductive qualitative analysis of over 8,000 posts made in two online incel communities found that the incel community was structured around five interrelated normative orders: the sexual market, women as naturally evil, legitimizing masculinity, male oppression, and violence.
Abstract: Incels, a portmanteau of the term involuntary celibates, operate in online communities to discuss difficulties in attaining sexual relationships. Past reports have found that multiple elements of the incel culture are misogynistic and favorable towards violence. Further, several violent incidents have been linked to this community, which suggests that incel communities may resemble other ideologically motivated extremist groups. The current study employed an inductive qualitative analysis of over 8,000 posts made in two online incel communities to identify the norms, values, and beliefs of these groups from a subcultural perspective. Analyses found that the incel community was structured around five interrelated normative orders: the sexual market, women as naturally evil, legitimizing masculinity, male oppression, and violence. The implications of this analysis for our understanding of extremism and the role of the internet in radicalization to violence are considered in depth.

43 citations

Journal ArticleDOI
TL;DR: In this article, a qualitative ethnographic study sought to gain insight into how participants in the Bondage/Discipline/Sadomasochism (BDSM) community negotiate and maintain boundaries in order to engage in mutually satisfying BDSM activities.
Abstract: This qualitative ethnographic study sought to gain insight into how participants in the Bondage/Discipline/Sadomasochism (BDSM) community negotiate and maintain boundaries in order to engage in mutually satisfying BDSM activities. Additionally, this study explored how boundary violations are handled by a community stigmatized by the larger culture. Results indicated that participants employ methods to keep BDSM play ‘safe, sane, and consensual’, although boundary violations do occur. These violations are handled internally by appointed community members and participants may engage in retaliatory behavior, with the occasional member employing violence. Implications of the research and future avenues for exploration are discussed.

36 citations

Journal ArticleDOI
TL;DR: Characteristics of offenders, victims, demands, and methodology were identified and synthesized to generate a qualitative understanding of offenders who employed cyber sextortion and revealed four different themes of offenders based on crime characteristics.
Abstract: Sextortion, a portmanteau of "sexual" and "extortion," is the threat to distribute intimate, sexual materials unless a victim complies with certain demands. Cyber sextortion is part of a larger continuum of image-based sexual offending in which images are used for harm. Despite the serious nature of this crime, there exists a dearth of empirical knowledge of sextortion. This article employed a qualitative content analysis of media articles and court documents to explore the crimes of 152 cyber sextortion offenders. Characteristics of offenders, victims, demands, and methodology were identified and synthesized to generate a qualitative understanding of offenders who employed cyber sextortion. The results revealed four different themes of offenders based on crime characteristics: minor-focused cyber sextortion offenders, cybercrime cyber sextortion offenders, intimately violent cyber sextortion offenders, and transnational criminal cyber sextortion offenders. The diverse nature of cyber sextortion has implications for crime control policies. Certain offenders are more likely to be apprehended and prosecuted depending on the crime victim and methodology. In addition, there has been a lack of legislative action targeting cyber sextortion, which limits legal recourse available for victims. We discuss the contribution of this work to the broader literature on cyber sextortion and address some of the challenges that this crime presents to the criminal justice system.

28 citations

Journal ArticleDOI
TL;DR: Findings support a situational framework of sexual abuse for the majority of clergy abuse and the assertion that abuse in church can be understood as not a crisis regarding homosexuality but as a social problem that must be examined in its context.
Abstract: The overwhelming number of male victims of clergy sexual abuse led to assumptions regarding sexual preference of clergy offenders. The present study examined 9,540 records (incidents) of alleged cleric sexual abuse in the United States between 1950 and 1999 to explore situational factors of the abuse by victim gender. No evidence was found to suggest that male victims were purposefully targeted more than female victims; rather, the abuse appeared to be more a function of opportunity. These findings support a situational framework of sexual abuse for the majority of clergy abuse and the assertion that abuse in church can be understood as not a crisis regarding homosexuality but as a social problem that must be examined in its context.

26 citations

01 Jan 2019
TL;DR: The authors examined the attitudinal and demographic factors associated with the negative views of online harassment and bullying within a sample of 1,348 constables from 34 local agencies across England and Wales, finding that constables with negative views toward cybercrimes and worked in agencies with inconsistent messaging related to online crimes were more likely to view online harassment as less serious and believe that these offenses could be avoided by victims.
Abstract: The ubiquity of the Internet and computer technology has enabled individuals to engage in bullying, threats, and harassing communications online. Limited research has found that local line officers may not view these offenses as serious compared to real world crimes despite their negative physical and emotional impact on victims. The perceptions of officers can produce poor interactions with victims during calls for service, particularly victim blaming, which can reduce citizens’ confidence in police agencies generally. However, local law enforcement agencies are increasingly mandated to respond to these cases, calling to question how their views may impact the community. This study examined the attitudinal and demographic factors associated with the negative views of online harassment and bullying within a sample of 1,348 constables from 34 local agencies across England and Wales. The study found that constables with negative views toward cybercrimes and worked in agencies with inconsistent messaging related to online crimes were more likely to view online harassment as less serious and believe that these offenses could be avoided by victims. The implications of this study for local police staff and command are discussed in detail.

19 citations


Cited by
More filters
20 Jan 2017
TL;DR: The Grounded Theory: A Practical Guide through Qualitative Analysis as mentioned in this paper, a practical guide through qualitative analysis through quantitative analysis, is a good starting point for such a study.
Abstract: การวจยเชงคณภาพ เปนเครองมอสำคญอยางหนงสำหรบทำความเขาใจสงคมและพฤตกรรมมนษย การวจยแบบการสรางทฤษฎจากขอมล กเปนหนงในหลายระเบยบวธการวจยเชงคณภาพทกำลงไดรบความสนใจ และเปนทนยมเพมสงขนเรอยๆ จากนกวชาการ และนกวจยในสาขาสงคมศาสตร และศาสตรอนๆ เชน พฤตกรรมศาสตร สงคมวทยา สาธารณสขศาสตร พยาบาลศาสตร จตวทยาสงคม ศกษาศาสตร รฐศาสตร และสารสนเทศศกษา ดงนน หนงสอเรอง “ConstructingGrounded Theory: A Practical Guide through Qualitative Analysis” หรอ “การสรางทฤษฎจากขอมล:แนวทางการปฏบตผานการวเคราะหเชงคณภาพ” จะชวยใหผอานมความรความเขาใจถงพฒนาการของปฏบตการวจยแบบสรางทฤษฎจากขอมล ตลอดจนแนวทาง และกระบวนการปฏบตการวจยอยางเปนระบบ จงเปนหนงสอทควรคาแกการอานโดยเฉพาะนกวจยรนใหม เพอเปนแนวทางในการนำความรความเขาใจไประยกตในงานวจยของตน อกทงนกวจยผเชยวชาญสามารถอานเพอขยายมโนทศนดานวจยใหกวางขวางขน

4,417 citations

Journal ArticleDOI
05 Feb 1897-Science

3,125 citations

Journal ArticleDOI

2,707 citations

13 Mar 2016
TL;DR: The case of Nitokalisi Fonua (hereinafter, "Nick") as mentioned in this paper, who admitted to stealing a white GMC Blazer from a motel room at the Days Inn in Utah.
Abstract: FACTS An officer in Midvale, Utah was doing some paperwork in his patrol car when he was approached by man, later identified as Nitokalisi Fonua (hereinafter, “Nick”). Nick “looked suspicious,” mainly because he was “jittery, looking around and appeared to be very nervous.” Nick’s suspicion rating jumped dramatically when, for no apparent reason, he informed the officer he had stolen a white GMC Blazer, which he had parked nearby. Naturally, the officer asked Nick if he would show him the Blazer, and Nick said sure. When they located the Blazer, the officer walked over and looked inside. The first thing he saw was a sawed-off shotgun on the back seat. Then he noticed some markings on the shotgun, “markings that looked gang-related.” Nick told the officer that the key to the Blazer was inside his motel room at the Days Inn. Also in the room, he said, were his “cousins,” meaning “people he knows from the streets.” The officer asked Nick “if we could obtain the keys to the vehicle so we could turn those back over to the owner.” Nick said the keys “were in the room somewhere” and that he “didn’t care” if the officer went in and retrieved them. Nick also gave the officer his key to the room. When backup arrived at the motel, officers knocked on the door which was opened by a man named Vake. There were two other occupants: a woman and Kimoana, the defendant. By this time, the officers were aware that Kimoana—not Nick—had rented the room. The first thing the officers saw as the door opened was the woman pointing “an unidentified black object” at the wall. Concerned for their safety, they ordered the occupants to “show their hands.” Then they pat searched them. Finding no weapons (the “unidentified black object” was a television remote control), they holstered their guns. Although the officers already had Nick’s consent to search the room, they sought and obtained consent from Vake. During the search, they found a “long-barreled revolver” under a mattress. As the result, Kimoana was convicted of being a felon in possession of a firearm.

483 citations

Posted Content
TL;DR: In this paper, the authors provide greater conceptual clarity about shared treatment decision-making, identify some key characteristics of this model, and discuss measurement issues, as well as potential benefits of a shared decision making model for both physicians and patients.
Abstract: Shared decision-making is increasingly advocated as an ideal model of treatment decision-making in the medical encounter. To date, the concept has been rather poorly and loosely defined. This paper attempts to provide greater conceptual clarity about shared treatment decision-making, identify some key characteristics of this model, and discuss measurement issues. The particular decision-making context that we focus on is potentially life threatening illnesses, where there are important decisions to be made at key points in the disease process, and several treatment options exist with different possible outcomes and substantial uncertainty. We suggest as key characteristics of shared decision-making (1) that at least two participants-physician and patient be involved; (2) that both parties share information; (3) that both parties take steps to build a consensus about the preferred treatment; and (4) that an agreement is reached on the treatment to implement. Some challenges to measuring shared decision-making are discussed as well as potential benefits of a shared decision-making model for both physicians and patients.

386 citations