StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Criminal Psychology and Forensic Technology - Essay Example

Cite this document
Summary
This essay "Criminal Psychology and Forensic Technology" discusses privacy as the right of one and all. It is taught by all cultures all civilizations that privacy should be respected. However, as a matter of fact, we find many instances around us where people are being harassed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Criminal Psychology and Forensic Technology
Read Text Preview

Extract of sample "Criminal Psychology and Forensic Technology"

Privacy is the right of one and all. It is taught be all the cultures, all the religions, all the civilizations that privacy should be respected. However, as a matter of fact, we find many instances around us where people are being harassed, watched out, sent unwanted mails, or their privacy is intervened in one way or other. However, it becomes more problematic, both physically and emotionally, when such vile acts are being done by someone who had relations with you in the past. Usually, harassing in such cases is a response to the emotional set back emerged in the person as result of being hurt by the break up. This intake form is thus intended to gather some required information so as to make sure that the intensity or the level of the severity of the stalking can be realized. Before filling any form, the concept of stalking must be made clear to the respondents. Basically, stalking is the sequence of actions by some person, that makes the victim feel that the fear of his or her safety. This action is known as Stalking. A person can be stalked in many ways such as following the victim, harassing him or her, continuously wandering around his or her house, unwanted communication by various modes or any other activity that is sufficient to make the victim feel frighten. Although the exact legal definition of stalking varies from constitution to constitution. However, the fundamentals are common in all of them. . Such as any undesirable contact between the stalker and the victim that would directly or indirectly threaten the victim of being unsafe. The stalking law (Penal code 42.072) prohibits the following behavior, either of the stalker or of someone who acts on behalf of the stalker: 1. On one or more occasion, the stalker has followed, placed under surveillance, made threats, restrained, confined, or behaved and/or made threats that caused the victim to fear immediate or future injury, death, or damage to property 2. Threats and/or actions can be conveyed either to the victim or to the family or other household members of the victim. (Brewster, 2003) A first stalking conviction is a third degree felony and subsequent convictions are second degree felonies. In some cases, when charging a person with a crime of stalking, it may be appropriate to file additional charges. For example, if an assault with a deadly weapon occurs in addition to the stalking, the defendant should be charged with both crimes. INTAKE FORM Name: Age: Gender: Marital Status: How long you are married Occupation: Past Occupations: Do you know the stalker If yes, how do you know him Since when you know him Does he mention the (or is there any implied) reason for stalking you Since when you are being stalked What mode or modes are used to stalk you continuous physical following; Undesired communication (by using modes like letters, mails, telephone calls etc.); continuously wandering around your home contacting your family members, friends, or other relatives or members od your close social circle inappropriately; Threatening you using computer technologies, like email, instant messages etc. Others: (Please mention) What is the frequency of each of the above methods used to stalk you Do you receive all the threats at the same time If yes, when What is exactly the stalk message Do you know the past track record specially character record of the stalker If yes, please mention briefly his past record. (If you do not know the exact stalker, but if you suspect someone to be the stalker, even then attempt this question, since this is the most important measure in determining the severity of the issue). Mention your daily routine in detail, for example when do you go for work, what mode of transport you use and so on In your view, does the stalker have an idea of your routine What particular part of your routine, you think, is the most inviting one for stalker to fulfill his threats EVALUATION AND THE ASSESSMENT FORM This part describes that how various responses indicate the level of severity. Bio Data: The basic bio data of victim such as gender, age and marital status etc. will help in determining the exposure of the particular age group or gender to get the threats actualized. This can be done by matching the data received with the statistics provided by various agencies. Past occupations may help in finding out who may be the stalker, if the stalker is unknown. (Adler, 2004) Information about the stalker and his relationship details with the victims: If the victim knows the stalker, half the work is done. Since, it is the stalker who is supposed to take any action. So knowing about the stalker can help in predicting that to what extent the stalker can go. The client must be encouraged to fill this part as essential. Even if she does not know the stalker, she must fill it for the suspected ones. Reason of Stalking: Knowing the reason for stalking may also indicate the severity. Probably, the stalking may be some the result of some misunderstanding, so it can be removed. If the stalking is a result of some passing affair's break up, then too it is not too serious. However, the stalker blames the victim for deceiving him or for having some extra-marital affairs etc., and then the case may be serious. Since when you are being stalked At times, stalking is the immediate response of some mental distressed caused due to some break up or any other harsh feeling. If the time since the stalking started is too short, one must wait. It is also possible that the stalker ultimately give up stalking when he cools down and realize that it does worth nothing. (Godwin, 2001) Modes of Stalking and the frequency of each mode: The modes of stalking will reflect the level of access of the stalker to the victim. If the mode is something like email, it is safe to assume that the stalker does not have enough access to the victim, probably this fact compelled him to use email as a mode as vice versa. Stalking Message: The stalking message also reflects the stalker's determination. Words like 'I will' shows determination. Whereas, the words like "I can" or "I may" shows that the stalker just wants to threaten. (Meloy, 2001) Time of Receiving the Threat: If all the threats are received at same time, it is an indication of planned work by the stalker. However, receiving threats at different times does not always mean that the stalker is not planned. Past Record of the Stalker: It is the strongest indicator of the potential of the threat being actualized. If he has past criminal record, he is most likely to harm the victim too. Routine of the Victim: The routine of victim and its knowledge to the stalker also indicates the exposure of victim to the risk. For example, if the victim goes home from work alone, at late nights, she has more chances to be harmed at that time. BIBLIOGRAPHY Adler, J., (2004). Forensic Psychology. Cullompton: Willan. Godwin, G., (2001). Criminal Psychology and Forensic Technology. Boca Raton: CRC Press. Meloy, J., (2001). The Psychology of Stalking. Boston: Academic Press. Brewster, M., (2003). Stalking: Psychology, Risk Factors, Interventions, and Law. City: Civic Research Institute, Incorporated. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Stalking Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Stalking Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/miscellaneous/1514541-stalking
(Stalking Essay Example | Topics and Well Written Essays - 750 Words)
Stalking Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/miscellaneous/1514541-stalking.
“Stalking Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/miscellaneous/1514541-stalking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Criminal Psychology and Forensic Technology

How has Forensic Science Impacted Anit-terrorism Internationally or Nationally

The word of crime and the area of technology have come together to make this world a place of complexity.... Student Name Course Name TABLE OF CONTENTS Introduction 3 Current Challenges 4 Best Practices 5 Resources 6 Applicable technology 8 Research and Evaluation Needs 9 Homeland Securities 11 References 13 Introduction The word of crime and the area of technology have come together to make this world a place of complexity.... How has forensic science impacted anti-terrorism internationally or nationally?...
9 Pages (2250 words) Research Paper

Difference between Clinical and Forensic Psychology

Contrasts between Clinical psychology and forensic PsychologyForensic evaluation is narrow in scope and focuses while the clinical evaluation is broad and professionally inclined.... The paper "Difference between Clinical and forensic Psychology " evaluates branches of neuropsychology that assess the ties between brain capabilities and behavior, issues related to brain stability, and damage, how an individual performs a task and its impacts on the victim and the society....
10 Pages (2500 words) Research Paper

Crime Scene Investigation

Additionally, to reduce maximum stress levels, learning institutions offer research and forensic services to crime scene investigators.... In the 1800s, forensic science had taken a new outline.... This had a significant contribution to forensic science because it provided a better understanding of the criminal involved.... To keep up with this frequency, universities and other learning situations have offered learning forensic science courses....
4 Pages (1000 words) Research Proposal

Forensic Crime Scene Analysis in Developing Offender Profiles

Over the years, forensic technology has improved vastly and has had a tremendous impact on police investigations as we know it.... Some people go as far as to say that the infamous Jack the Ripper would have been nabbed if Scotland Yard could have had the benefits of the enhanced forensic technology available today.... Locard's Exchange Principle was a groundbreaking development in forensic technology.... Fingerprint technology and DNA profiling can further be used to create an airtight case against the offender....
10 Pages (2500 words) Case Study

Professional EthicsRole and Importance

Criminal Psychology and Forensic Technology: a collaborative approach to effective profiling.... This thus has necessitated the inception and use of forensic psychology in the field of criminal investigation, clinical practice, legal affairs and also as a profession (Weiner, 2006). ... This thus has necessitated the inception and use of forensic psychology in the field of criminal investigation, clinical practice, legal affairs and also as a profession (Weiner, 2006)....
2 Pages (500 words) Essay

Wearable Technology for Crime Scene Investigation

In the paper 'Wearable technology for Crime Scene Investigation,' the author discusses the importance of developing a uniform system, which will enable experts to conduct a comprehensive investigation.... With technology perfecting itself all the time more ways are being discovered to authenticate fingerprints....
10 Pages (2500 words) Annotated Bibliography

Forensic Science and Security

Forensic science links different features of science and technology with the legal system.... Some of the examples of forensic science encompass the employment of gas chromatography in the identification of seized drugs, laser Raman spectroscopy to identify microscopic paint fragments, and DNA profiling to assist in the identification of a murder suspect (Owen, 2000), This essay will focus on forensic science and security and it will support the statement: technology is the key in forensic science....
11 Pages (2750 words) Report

OSforensics Tool and Recovered Forensic Artifacts

The paper 'OSforensics Tool and Recovered forensic Artifacts' is an impressive example of a law presentation.... The paper 'OSforensics Tool and Recovered forensic Artifacts' is an impressive example of a law presentation.... The paper 'OSforensics Tool and Recovered forensic Artifacts' is an impressive example of a law presentation.... The above forensic tool, despite its criticism, has been an invaluable asset in solving crimes....
11 Pages (2750 words) Speech or Presentation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us