84 resultados para Crimes violents
Resumo:
The history of war is blighted with astonishing reminders of man’s ability to cast his sense of humanity aside and inflict unspeakable harm upon one another. The ruthless bombing of Dresden, the callousness of the Nazi concentration camps and the massacre of the Tutsis are but a few of the atrocities that have haunted our past. In response to these atrocities, society has imposed an ever-increasing number of laws and rules to regulate warfare. Amongst these is the doctrine of command responsibility. The doctrine of command responsibility states that a commander is criminally liable for the crimes of his subordinates if he knew or should have known of their crimes. This paper will examine whether the doctrine is an appropriate and realistic legal standard to hold commanders accountable to or whether the doctrine is more a reflection of social sentiment and legal rhetoric. If the doctrine, and indeed the law of war in general, is unrealistic then the law cannot fulfil its purpose - that is, the prevention of atrocities. Instead of being solely a reflection of moral authority and social sentiments the law must also be a tool that guides and shapes the decisions and actions of the military through the chaotic and brutal nature of war...
Resumo:
Visitors to prison are generally innocent of committing crime, but their interaction with inmates has been studied as a possible incentive to reduce recidivism. The way visitors’ centres are currently designed takes in consideration mainly security principles and the needs of guards or prison management. The human experience of the relatives or friends aiming to provide emotional support to inmates is usually not considered; facilities have been designed with an approach that often discourages people from visiting. This paper discusses possible principles to design prison visitors’ centres taking in consideration practical needs, but also human factors. A comparative case study analysis of different secure typologies, like libraries, airports or children hospitals, provides suggestions about how to approach the design of prison in order to ensure the visitor is not punished for the crimes of those they are visiting.
Resumo:
This preliminary paper provides an overview of the legislative and policy context of restorative justice measures for juveniles in each Australian state and territory, highlighting the diverse characteristics of current restorative practices. Further, it provides an indication of the numbers and characteristics of juveniles who are referred by police to restorative justice measures and the offence types for which they are most commonly referred. A number of key points about the application of restorative justice measures to juveniles in Australia’s jurisdictions are highlighted, including that juveniles were referred to conferences primarily for property crimes and that Indigenous juveniles comprised higher proportions of those sent to court than to conferencing. This paper argues that more detailed data on the offending histories, offence types and offence seriousness of juveniles referred by police to restorative justice processes would enable a more finely-grained analysis of restorative justice for juveniles in Australia.
Resumo:
It is widely accepted in the literature on restorative justice that restorative practices emerged at least partly as a result of the recent shift towards recognising the rights of victims of crime, and increasing the involvement of victims in the criminal justice system. This article seeks to destabilise this claim. Although it accepts that there is a relationship between the emergence of a strong victims' rights movement and the emergence of restorative justice, it argues that this relationship is more nuanced, complex and contingent than advocates of restorative justice allow.
Resumo:
Sexual offending against children is a highly emotive issue. It is nonetheless important that public policy initiatives to prevent and/or respond to child sexual abuse are based on the available evidence about child sex offenders. This paper addresses five common misperceptions about the perpetrators of sexual offences against children. Specifically, the issues addressed include whether all child sex offenders are ‘paedophiles’, who sexually abuse children, whether most child sex offenders were victims of sexual abuse themselves, rates of recidivism among child sex offenders and the number of children sex offenders typically abuse before they are detected by police. The evidence outlined in this paper highlights that there are few black and white answers to these questions. Perpetrators of sexual crimes against children are not, contrary to widespread opinion, a homogenous group. Rather, there are a number of varied offending profiles that characterise child sex offenders. Gaining an understanding of the nuances of this offender population is critical if children are to be protected from sexual abuse.
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
This paper grapples with the question of how progressive criminologists might approach working with people who have committed violent or predatory crimes, or are ‘at risk’ of doing so. Progressives have often been uneasy about ‘intervention’ with people who offend: but in the face of the destructiveness of violence, especially in some parts of the world, a posture of simple non-intervention won’t suffice. I suggest three central principles – which I call consciousness, solidarity and hope – that may guide us in developing ways of working with offenders that are both progressive and effective.
Resumo:
Purpose – The purpose of this paper is to explore the role of leadership in problem-oriented policing (POP). Design/methodology/approach – This paper uses interrupted time series models to isolate the impact on crime trends of a transformational leader's efforts to spearhead the implementation of a program of POP, called the problem solving model (PSM), in a southern state in Australia. Findings – This paper finds that the PSM led directly to an impact on overall crime, with a significant reduction in crimes per 100,000 persons per year after the introduction of the PSM. The majority of the overall crime drop attributable to implementation of POP was driven by reductions in property crime. It was noted that the leadership influence of the PSM was not effective in reducing all types of crime. Crimes against the person where not affected by the introduction of the PSM and public nuisance crimes largely followed the forecasted, upward trajectory. Practical implications – The driver behind the PSM was Commissioner Hyde and the success of the PSM is largely attributable to his strong commitment to transformational leadership and a top-down approach to implementation. These qualities encapsulate the original ideas behind POP that Goldstein (1979, 2003), back in 1979, highlighted as critical for the success of future POP programs. Social implications – Reducing crime is an important part of creating safe communities and improving quality of life for all citizens. This research shows that successful implementation of the PSM within South Australia under the strong leadership of Commissioner Hyde was a major factor in reducing property crime and overall crime rates. Originality/value – This paper is valuable because it demonstrates the link between strong leadership in policing, the commissioner's vision for POP and how his vision then translated into widespread adoption of POP. The study empirically shows that the statewide adoption of POP led to significant reductions in crime, particularly property crime.
Resumo:
Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.
Resumo:
The sentencing of a self-confessed child sex offender and senior Brisbane Anglican priest Canon Barry Greaves in Brisbane District Court last Friday (April 24, 2009) is a significant event for many reasons and for many people. It is a significant event because Greaves was a priest at Boonah in the early 1980s when he committed the offences and because knowledge of his own sex offending against children failed to deter him from seeking and gaining high office in the Anglican Church. He accepted the position of being an Archbishop’s chaplain to Brisbane Archbishop Dr Peter Hollingworth in 1999. He stayed on as an Archbishop’s chaplain to the incoming Archbishop Dr Phillip Aspinall in 2002 and not even the disgrace of the sex scandal in the Brisbane Diocese resulted in a glimmer of guilt that maybe he was not an appropriate person to be providing pastoral care to other victims of sexual assault. Families of victims who were referred to Greaves for pastoral care are now flabbergasted by the double betrayal. “I went looking for comfort and now I discover I was confiding in a f***ing pedophile,” one woman said.
Resumo:
Sex, Love and Abuse intervenes in a timely way on some important issues that have become 'elephants in the room' for academic and policy considerations around sexual violence and abuse. In so doing, this book draws upon a range of literatures and novel empirical sources to encourage critical thinking about the relationship between sex, love and abuse, examining crimes including sexual assault, pornography, child sexual abuse and domestic violence. This provocative book seeks to destabilize essentialist understandings of these phenomena with a view to identifying the subtle and complex nature of relationships, which often defy easy explanation and categorisation. Focusing on theories, public discourses and moral ideals, Hayes connects romantic love, intimacy and harm in a unique philosophical analysis, exploring abuse in relationships and how such abuse is fostered.
Resumo:
Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata across forensic disk images, files, system and application logs and network packet captures. The results prove that metadata based associations can be used to extract meaningful relationships between digital artifacts, thus potentially benefiting real-life forensics investigations.
Resumo:
This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.
Resumo:
In 2005, governments around the world unanimously agreed to the principle of the responsibility to protect (R2P), which holds that all states have a responsibility to protect their populations from genocide and mass atrocities, that the international community should assist them to fulfil this duty, and that the international community should take timely and decisive measures to protect populations from such crimes when their host state fails to do so. Progressing R2P from words to deeds requires international consensus about the principle’s meaning and scope. To achieve a global consensus on this, we need to better understand the position of governments around the world, including in the Asia-Pacific region, which has long been associated with an enduring commitment to a traditional concept of sovereignty. The present article contributes to such an endeavour through its three sections. The first part charts the nature of the international consensus on R2P and examines the UN secretary-general’s approach. The second looks in detail at the positions of the Asia-Pacific region’s governments on the R2P principle. The final part explores the way forward for progressing the R2P principle in the Asia-Pacific region.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.