Author Archives: ilind

Chesney-Lind article is most-cited in Feminist Criminology

Meda Chesney-Lind’s 2006 article, “Patriarchy, Crime, and Justice: Feminist Criminology in an Era of Backlash”, was the most cited article in Feminist Criminology as of September 1, 2010, according to Sage Journals Online.

Posted in Uncategorized | Leave a comment

First copies of “Fighting for Girls” delivered from publisher

The first author’s copies of “Fighting for Girls” arrived in Honolulu last week from SUNY Press, and the book is now shown as available from Amazon.com.

Posted in Uncategorized | Leave a comment

Arrest Trends, Gang Involvement, and Truancy in Hawaii

Arrest Trends, Gang Involvement, and Truancy in Hawaii: An Interim Report to the Twenty-Second Hawaii State Legislature Prepared by: Meda Chesney-Lind, Principal Investigator Lisa Pasko, Project Coordinator Nancy Marker, Educational Specialist Shayna Freeman and Joanne Nakano, Research Assistants http://www.publicpolicycenter.hawaii.edu/images/PDF/gang04_1.pdf February … Continue reading

Posted in Uncategorized | Leave a comment

“Bad Girls Go Wild?”

On February 1, 2007, Professor Chesney-Lind presented the annual Beto Chair Lecture at Sam Houston State University in Huntsville, Texas. A video of her presentation, “Bad Girls Go Wild? Media Hype and Trends in Girls’ Violence and Aggression,” can be … Continue reading

Posted in Uncategorized | Leave a comment

New York Times Op-Ed: “The Myth of Mean Girls”

An op-ed by Meda Chesney-Lind and Mike Males, senior researcher at the Center on Juvenile and Criminal Justice, appeared in the NY Times on April 1, 2010. They wrote: We have examined every major index of crime on which the … Continue reading

Posted in Uncategorized | Tagged | Leave a comment

Feminist Criminologist Meda Chesney-Lind is back online

Welcome to Chesneylind.com, which is the website of Meda Chesney-Lind, feminist criminologist. An earlier version of this site recently fell victim to computer hackers, apparently based in Russia, who were able to insert hidden but malicious computer code within the … Continue reading

Posted in Uncategorized | Leave a comment