Susan Donkin

Susan Donkin
University of Leeds

Doctor of Philosophy

About

19
Publications
17,817
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
95
Citations
Additional affiliations
January 2004 - January 2008
UCL Jill Dando Institute of Crime Science
Position
  • Research Associate
January 2012 - January 2018
Griffith University
Position
  • Lecturer
Education
February 2008 - December 2011
Griffith University
Field of study
  • Criminology
September 2000 - September 2001
University of Toronto
Field of study
  • Criminology
September 1995 - June 1999
The University of Sheffield
Field of study
  • Law & Criminology

Publications

Publications (19)
Article
Full-text available
Within criminology and criminal law the reception of post-9/11 counter-terrorist law has generally been critical, if not hostile. The undeniable proliferation of preventive statutes has been regarded as incompatible with conventional liberal norms and as dangerously innovative in its embrace of new strategies of control. But is such law innovati...
Chapter
Full-text available
The central hypothesis of this chapter is that the post 9/11 era has spawned a new hybrid form of terrorism regulation. The Oxford English Dictionary defines hybrid as follows: “Derived from heterogeneous or incongruous sources; having a mixed character; composed of two diverse elements; mongrel” (Oxford English Dictionary, 2nd edn, online version,...
Book
Full-text available
The last decade ushered in the introduction of several precautionary control mechanisms transcending preconceived categories of law, procedure and risk to deal with individuals thought to pose a danger to the state or its citizens. Exemplified by control order regimes in the UK and Australia, this precautionary approach to anti-terrorism law has be...
Chapter
Full-text available
Despite being labelled ineffective, inappropriate and unnecessary by the Independent National Security Legislation Monitor in 2012, terrorism control orders look set to remain on the Australian statute books for the next few years, albeit with some important recent amendments. As well as reducing the threshold for issuance, the grounds for issuing...
Chapter
Full-text available
Since their introduction in 2005, terrorism control orders have been divisive owing to their ability to impose serious restrictions and obligations on individuals’ liberty based on an intelligence-led, low standard of proof in a civil process originating with the Executive. Advocates of the scheme, of whom there are comparatively few, argued that c...
Chapter
Full-text available
Over the last decade, several scholars described a change in criminal law procedures, many identifying a shift towards a pre-emption paradigm in the post 9/11 era. A considerable terminology around the legal preventive framework has developed to describe what Dershowitz called “a conceptual shift in emphasis” from deterrence to prevention, signalli...
Chapter
Full-text available
The previous chapters have highlighted how the risk of unpredictable and grave harm has been used to construct controversial legal hybrids aimed at preventing terrorist attacks. Exemplified by control order regimes in the UK and Australia, this precautionary approach to anti-terrorism law has been repeatedly challenged, resulting in the abolishment...
Chapter
Full-text available
The aim of this chapter is to conduct a statutory analysis of the legislation providing the legal framework for control orders. I begin by providing a brief account of the developments immediately preceding the introduction of the control order regime in the United Kingdom, before providing an overview of the provisions contained within the Prevent...
Chapter
Full-text available
Control orders aim to prevent an individual from engaging in activities that could ultimately lead to them carrying out a terrorist attack. To do so, they impose restrictions or obligations on an individual suspected of terrorist involvement. As the previous legal analysis has highlighted, the degree to which these individuals are being restricted...
Chapter
Full-text available
The statutory analysis of the control order regimes highlighted important distinctions between how the two countries incorporated the restriction of opportunities to engage in terrorism-related activity into the legal framework. While the British provisions are more executive-driven, their Australian counterparts provide for greater judicial input....
Chapter
Full-text available
The previous chapters have highlighted that much of the criticism arising from control orders stems from their lack of adherence to procedural safeguards. Yet, both the British and Australian governments have described control orders as a necessary tool to protect their citizens from the enormous and uncertain risk posed by terrorism. Indeed, risk...
Chapter
This chapter examines the use of computer simulation, specifically agent-based modeling, as a tool for criminologists and its potentially unique ability to examine, test, refine, and validate criminological theory. It suggests an approach to be taken by those working in this field, through the use of detailed examples of the processes necessary to...
Chapter
This chapter examines the use of computer simulation, specifically agent-based modeling, as a tool for criminologists and its potentially unique ability to examine, test, refine, and validate criminological theory. It suggests an approach to be taken by those working in this field, through the use of detailed examples of the processes necessary to...
Article
Full-text available
There has been an increasing interest in the emerging trend of stealing cars using keys taken during a burglary. This paper examines the issue through analysis of West Midlands Police data from 1998 to 2004 for the Borough of Sandwell. It finds evidence not only of an increase in cars stolen in burglaries, but also that the main purpose of over hal...

Network

Cited By