Crime Law and Social Change

Papers
(The TQCC of Crime Law and Social Change is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Punishment before trial: public opinion, perp walks, and compensatory justice in the United States19
Between the legal technique and the social question: the plural commitments of public defenders in Argentina18
Prison in Iran, a known unknown; by Nahid Rahimipour Anaraki18
Clarifying Maritime Criminal Cases Jurisdiction and its International Implications—Current Legal Developments in China16
Fault lines of food fraud: key issues in research and policy14
Book Review: Measuring compliance – Assessing Corporate Crime and Misconduct. Edited by Melissa Rorie and Benjamin Van Rooij13
Can a prison be self-managed? A study of the informal organisation of a bolivian prison13
Carceral-capital-charitable politics in Kingston, Ontario: analyzing relationships of embeddedness and indebtedness13
National legislative adoption of international wildlife law after treaty ratification12
Terrorist financing via the banking sector10
Criminal justice involvement, structural vulnerability and social safety net services among people living with HIV in Baltimore10
The impact of corruption on government performance: evidence from South Korea9
Ethnographic semantics and documentary method in criminology. A combination of reconstructive approaches using the example of Municipal Law Enforcement Services9
Who steals? Who bribes? Multilevel determinants of corruption types in China8
The ouster clause in the Hong Kong national security law: its effectiveness in the common law and its implications for the rule of law8
Book Review: Political corruption: the internal enemy of public institutions, by Emanuela Ceva and Maria Paola Ferretti, Oxford University Press (2021)8
The view of judicial activism and public legitimacy8
The acquisition of legitimacy for civilian policing: A case study of pedophile hunting groups8
Drugs behind the veil of Islam: a view of Saudi youth7
Routine activity theory and malware, fraud, and spam at the national level6
Giving the green light: corporate environmental crimes, the treadmill of production, and environmental justice6
The social perception of environmental victimization. A visual and sensory methodological proposal6
“State ineffectiveness in deterring organized crime style homicide in Mexico: a vicious cycle”5
The application of restorative justice in China’s environmental crime: an evolutionary game perspective5
Corruption tolerance as a process of moral, social, and political cognition: evidence from Latin America5
Book review: The corruption dilemma: controlling the power of the powerful, by Stephen D. Morris, Lynne Rienner Publishers (2022)5
Policing telecommunication and cyber fraud: Perceptions and experiences of law enforcement officers in China5
Uncovering patterns of public perceptions towards biodiversity crime using conservation culturomics4
Open for integrity? Ministry-level evidence on the impact of open recruitment on government integrity in South Korea4
Hawala in criminal court: the role of law and commercial culture in informal financial exchange4
The logic of CPTED for public space or the social potential of physical security4
Border crossings from Mexico to the U.S. and the role of border homicides4
International regime complexes and corporate crime: a research agenda based on the Volkswagen diesel fraud case4
Violence against Women and Femicide: an analysis on the murders of foreign women in Italy4
Unveiling the multifaceted dimensions: a sociological inquiry into kidnapping in Nigeria4
Conflict mitigation or governance choreographies? Scaling up and down state-criminal negotiations in Medellin and lessons for Mexico4
Making a dent in human trafficking: investigating the effects of social institutions and policies across 60 countries4
The rural enterprise crime complex: ‘undefendable rural space’ and the threat from the fortress farm4
A need for revenge after terrorism for indirectly impacted citizens?4
Bid-rigging in public procurement: cartel strategies and bidding patterns4
Legal aspects of corporate systems for preventing cybercrime among personnel4
Corruption framing and formation of action strategies: case of regional civil society organizations in Ukraine3
An integrated model of human trafficking response in the prosecution process: restorative justice, therapeutic jurisprudence, survivor centered practice and anti-oppressive practice3
“Incitement of insurrection”: Criminogenic antecedents and potential policy responses3
Differential effects of corruption on export margins: insights from firm-level data of selected South Asian economies3
Crime and crisis in China’s P2P online lending market: a comparative analysis of fraud3
Behind the criminal economy: using UK tax fraud investigations to understand money laundering myths and models3
Criminal defense work in a sample of arrest hearings in three states of Mexico: the micro-dynamics of case-level engagement, influence, and strategy3
Irregularly regulated collecting markets: antiquities, fossils, and wildlife3
Competencies for rehabilitation professionals working with ideology-based terrorism offenders3
Typology and factors underlying criminals’ utilisation of spiritual charms for crime perpetration in Nigeria3
Enacting social engineering: the emotional experience of information security deception3
An empirical test of techniques of neutralization regarding polluting behaviors in rural Iran3
Tax evasion and illicit cigarettes in California: prevalence and demand-side correlates3
Trafficking North Korean women into China for forced marriage: Evidence from court judgments3
Long-term mental health, victimization, and behavioral consequences associated with human sex trafficking3
Unveiling the Nexus of trafficking: Socio-economic determinants, victimization forms, and psychological impacts on women in Bangladesh3
The impact of corruption and clientelism on voter turnout in Africa3
Judicial practices in brazil: How do inquisitorial institutions apply adversarial norms?2
Occupational crimes in casinos: employee theft in Macau, China2
The “New Wars”: security and cooperation in Mexico and Northern Central America2
The changing forms of corruption in China2
Following the (DNM) Bible? A crime script analysis of darknet drug vending2
Obligation-based bribes in Vietnam: A view from the norm of reciprocity2
The Dark Web and anonymizing technologies: legal pitfalls, ethical prospects, and policy directions from radical criminology2
Protest policing and policing protesters: Litigation in the U.S. circuit courts of appeals2
Corporate involvement in atrocity crimes—trends and patterns in regulation2
The implications of illicit networks for changes in anti-narcotics policies2
Regulating deepfakes between Lex Lata and Lex ferenda—a comparative analysis of regulatory approaches in the U.S., the EU and China2
A content analysis on state human trafficking statutes: how does the legal system acknowledge survivors in the United States (US)?2
A socio-legal analysis of the Belgian protective legislation towards victims of aggravated forms of migrant smuggling2
Correction to: Protest policing and policing protesters: litigation in the U.S. Circuit courts of appeals2
Correction to: A positive feedback mechanism? Institutional responsiveness to bribery reporting by citizens in 12 African countries2
‘I have used up my entire youth in the bush’: the Comités de Autodefensa during and after the Peruvian internal armed conflict2
The European committee for the prevention of torture and the gendered experience of imprisonment2
Book Review: Sexual Offending in Asia. By Heng Choon (Oliver) Chan2
Carceral Experiences of White-Collar Offenders: Qualitative Research Design Utilising the Offender-Based Definition and Pierre Bourdieu’s Capital Theory2
The welfare of wildlife: an interdisciplinary analysis of harm in the legal and illegal wildlife trades and possible ways forward2
Female violence in terror attacks: a phenomenological analysis based on evidence from the “Intifada of the Individuals”2
0.10408997535706