1.

Record Nr.

UNINA9910739436603321

Titolo

Simulation strategies to reduce recidivism : risk need responsivity (RNR) modeling for the criminal justice system / / Faye S. Taxman and April Pattavina, editors

Pubbl/distr/stampa

New York, : Springer, 2013

ISBN

1-4614-6188-X

Edizione

[1st ed. 2013.]

Descrizione fisica

1 online resource (316 p.)

Altri autori (Persone)

TaxmanFaye S

PattavinaApril

Disciplina

364.011

Soggetti

Simulation (Civil law)

Criminology

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Introduction -- The Stages of Simulation Models in Criminal Justice -- Simulation Language, Software, and Data Needs -- Using Simulation Methods to Estimate the Cost of Policy Choices -- A Dynamic Systems Approach to Examining Sentencing Alternatives -- Assessing Correctional Treatment Outcomes with Simulation Techniques -- A Discrete-Event Simulation Model of Heroine Use and Treatment Over the Lifecourse -- Using Evidence-Based Research to Inform Model Assumptions -- Developing Synthetic Data for Criminal Justice Simulation -- The Growing Use of Simulation Techniques by Sentencing Commissions -- Creating and Sustaining Organizational Support for Simulation Use -- Maintaining Agency-Based Simulation Models -- The Benefits of Using Simulation from Criminal Justice Education.

Sommario/riassunto

Mass incarceration, the recession, and the swinging pendulum of correctional philosophies has put increasing attention on the use of evidence-based practices and treatments to guide the future direction of our criminal justice system. The Risk-Need-Responsivity (RNR) framework has emerged as a useful set of organizing principles for treating offenders. While the literature is supportive of the RNR approach, we understand little about the system impacts of moving in this direction. Some important questions include: What would happen if



we implemented RNR programming system-wide? How can we simulate such a complex strategy? What is the estimated impact on individuals, programs, and systems? Simulation modeling can be used to address these basic questions. Since the 1970’s, simulation models have been used to capture the realities of the criminal justice system.  Some early simulation projects were limited due to lack of data available to validate models, deficits in skills needed by staff to design and build models, and limited access to computing technology required to transform models into systems representations.  This timely book revisits the concept of simulation modeling for the 21st century: the wider availability of data has created more opportunity to verify and validate models; computing software has become more available and easier to use; and the capacity for visualization and communication of models shows promise for the future of simulation in criminal justice. This is an opportune time to make use of simulation models to examine the complex world of corrections and investigate the possible outcomes associated with implementing the RNR approach. Simulation Strategies to Reduce Recidivism provides a central source of information on the current state of simulation modeling in corrections. It includes an overview of the methods used to build simulation models that address questions about appropriate placement of offenders in programs and controls, as well as applications of these models. Authors use simulation tools to investigate the impact of diversion programs, to map offender movement through programs and systems, and to address other grappling issues regarding the capability to build effective recidivism reduction systems. This work will be an important resource for researchers in criminal justice and related fields, as well as those studying policy-related topics.



2.

Record Nr.

UNISA996635664203316

Autore

Patil Vishwas T

Titolo

Information Systems Security : 20th International Conference, ICISS 2024, Jaipur, India, December 16–20, 2024, Proceedings / / edited by Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025

ISBN

9783031800207

3031800206

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (501 pages)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 15416

Altri autori (Persone)

KrishnanRam

ShyamasundarRudrapatna K

Disciplina

005.8

Soggetti

Data protection

Computer engineering

Computer networks

Data and Information Security

Computer Engineering and Networks

Computer Communication Networks

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

-- System Security.  -- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.  -- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.  -- S-RFUP: Secure Remote Firmware Update Protocol.  -- Securing Virtual Reality Apps Inter-Process Communication.  -- Network Security.  -- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.  -- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.  -- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.  -- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.  -- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).  -- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.  -- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.  -- QIris: Quantum Implementation of Rainbow



Table Attacks.  -- Malware and Vulnerability Detection.  -- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.  -- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.  -- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.  -- Privacy & Usability.  -- Web Privacy Perceptions Amongst Indian Users.  -- Enabling Privacy in IT Service Operations.  -- Privacy-Preserving Photo Sharing: An SSI Use Case.  -- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol.  -- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.  -- A Decoupling Mechanism for Transaction Privacy.  -- AI Security.  -- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.  -- MALAI: ML-based Attack on Learning With Error problem.  -- Patch based backdoor attack on Deep Neural Networks.  -- Industry Demo/Practice.  -- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.  -- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.  -- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).  -- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.

Sommario/riassunto

This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16–20, 2024. The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.