Kyung-shick Choi
Bridgewater State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kyung-shick Choi.
Women & Criminal Justice | 2010
Kyungseok Choo; Joon Oh Jang; Kyung-shick Choi
The objective of this article is to review a range of serious methodological and ethical challenges to studying human trafficking. In particular, the article focuses on lessons learned from a field research study of Korean sex trafficking and smuggling to the United States. We first introduce the general background of the field study as well as its findings. Then we discuss the ethnographic approach and its implementation. Finally, we discuss the various methodological challenges and ethical issues related to studying active Korean traffickers and smugglers as well as Korean victims in the U.S. sex industry.
Journal of Aggression, Maltreatment & Trauma | 2017
Sujung Cho; Jun Sung Hong; Dorothy L. Espelage; Kyung-shick Choi
ABSTRACT Peer victimization is a serious problem, and understanding where, with whom, and how long victims spend their time is important. Applying the lifestyle routine activities theory (LRAT), this study examines the association between 4 components of LRAT and physical and nonphysical peer victimization. Using the 2007 National Crime Victimization Survey, we examined Poisson and negative binomial regression models to explain whether physical and nonphysical peer victimization was affected by measures of routine activities. Our findings indicate that students’ exposure and proximity to motivated offenders, school environment, capable guardianship, and target attractiveness were associated with risk of peer victimization. Findings also reveal that risk factors varied depending on the type of victimization.
Police Practice and Research | 2014
Kyung-shick Choi; Mitch Librett; Taylor J. Collins
The rapid development of technologies has led police departments to adopt new physical security systems to manage violent crimes. This study evaluates the implementation of a gunshot detection system in an urban neighborhood plagued by high rates of violent crime in southeast Massachusetts. Data were collected from the police dispatch log of a southeastern Massachusetts city employing the technology; the research design then evaluated the impact of the Shotspotter™ system on the ability of the police to more effectively identify, investigate, and prosecute gun-involved crimes. This study utilized a quasi-experimental design confirming positive outcomes in police response and dispatch times, but not except case resolutions. Future research may need to establish a refined measurement on case resolution variable to clearly reflect its constructs considering the police investigation process.
Police Practice and Research | 2016
Kyung-shick Choi; Shea Cronin; Heather Correia
Abstract Policymakers, school officials and the law enforcement community have expanded legal tools and other strategies to address bullying in recent years. This has resulted in a larger and more challenging role for law enforcement officers working in school settings. The present study seeks to understand the ways in which local law enforcement officers interpret this new role and their efforts to prevent and respond to bullying. We draw upon Routine Activities Theory as a lens to view officer perceptions of promoting guardianship and reducing target suitability of young people most at-risk for bullying victimization. Data collected from qualitative interviews of law enforcement officers working with local schools, suggest that officers see a role for law enforcement in promoting guardianship around this health and safety concern, but recognize the limitations of using arrest authority. They emphasize promoting trust and building relationship in efforts to support potential and current bullying victims.
Computers in Human Behavior | 2019
Kyung-shick Choi; Kevin J. Earl; Jin Ree Lee; Sujung Cho
Abstract Cyberbullying is a global phenomenon brought by the proliferation of digital technology and social networking sites (SNS). Defined as intentional and repeated harm via technology, cyberbullying has provided youth with another medium to experience bullying victimization. The purpose of this study is to examine both cyber and non-physical bullying victimization using Cohen, Kluegel, and Lands (1981) Lifestyles and Routine Activities Theory. Data were derived from the 2013 school crime supplement of the National Crime Victimization Survey (NCVS) for delineating the pattern of cyber and non-physical bullying victimization. This study indicates that cyber and non-physical bullying victimization have similarities and differences reflecting lifestyle and routine activity factors. Youth who had illicit access to alcohol and drugs, used alcohol or drugs at school, and had an affiliation with gang membership involving violence, were more likely to be exposed to potential offenders for both cyberbullying and non-physical bullying victimization. Moreover, while involvement in the performing arts made youth more vulnerable to victimization, youth who followed school rules and were given teacher care were less likely to be targeted. In closing, the study offers effective preventive measures against both cyber and non-physical youth bullying activities.
Computers in Human Behavior | 2017
Kyung-shick Choi; Jin Ree Lee
The current study provides an empirical testing of the victim-offender overlap in online platforms due to the scarcity of studies examining this overlapping victim-offending dynamic. Two types of cyber-interpersonal violence are examined: Cyber-harassment (including cyber-sexual harassment) and cyber-impersonation. Using Chois (2008) integrated theory of Cyber-Routine Activities Theory, a sample of 272 college students at a Massachusetts university are examined. Three major findings are revealed: (1) Respondents who engage in risky online leisure activities are more likely to experience interpersonal violence in cyberspace, (2) poor online security management can contribute to the likelihood of being victimized by interpersonal violence on social networking sites (SNS), and (3) respondents who engage in risky social networking site activities are likely to commit cyber-interpersonal violence. For the two types of cyber-interpersonal violence examined in this study, it could also be predicted that females are more likely to have higher levels of victimization. Cybersecurity management and sex had no significant effects on cyber-interpersonal violence offending. The hope is that education on the potential hazards of the Internet and of cyber-interpersonal violence will induce more responsible online activity and engagement. Risky online leisure activities increase cyber-interpersonal violence.Poor online security management increases cyber-interpersonal violence victimization on social networking sites (SNS).Risky Social Networking Sites (SNS) activities contribute to cyber-interpersonal violence offending.Females have higher levels of cyber-harassment victimization.Security management and sex had no significant effects on cyber-interpersonal offending.
Journal of Child Custody | 2016
Kyung-shick Choi; Elizabeth Englander; Youngki Woo; Jisun Choi; Ji-eun Kim; Hyejung Kim
ABSTRACT This study attempts to address the dearth of information about child sexual abuse (CSA) and psychological functioning in Korean children by measuring the psychological impact of sexual abuse on children in South Korea. The original data were collected on 92 sexually abused children (age 13 or younger) who underwent medical forensic interviews and psychological evaluations prior to treatment. This study collected additional data reflecting specific psychological evaluations from a control group drawn from five randomly chosen elementary schools. The psychological impact on the group of sexually abused children was compared to the control group via the assessment of four major psychological diagnostic criteria: (1) Child Attribution Perception Scale (CAPS), (2) Self-Esteem Scale (SES), (3) Parental Behavior Scale-Child reporting (PBS), and (4) State Trait Anxiety Inventory-Children (STAI-C). Using structural equation modeling, the findings indicated that the abused and control-group children differed significantly on these four psychological criteria. Policy recommendations addressing victim, parent, and health provider needs are reviewed.
Cluster Computing | 2016
Kyung-shick Choi; Kyungseok Choo; Yong-eun Sung
The purpose of this research is to examine how demographics variables interact with factors such as online lifestyle, digital-capable guardianship, computer security management, and levels of individual computer crime victimization. The current study used a secondary data which was a self-report survey (
International Journal of Cyber Criminology | 2008
Kyung-shick Choi
Asian Journal of Criminology | 2015
Kyung-shick Choi; Kyungseok Choo; Jisun Choi; Youngki Woo
N=204