66 resultados para Crimes Hediondos


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is concerned with the evolution of fraud investigation and prevention in light of the advances in computing technology. These recent advances have impacted upon traditional fraud offences as well as creating a range of new crimes. The financial significance of fraud is growing whereas law enforcement and the judicial system appear to be unable to meet the demands of these emerging crimes and its victims. This research compares the responses of our present and future investigators with those of our current business leaders from the government and the commercial sectors. This research establishes the needs of corporate decision-makers and the attitudes of police with regard to fraud. Data relating to persons arrested and convicted of fraud was also analysed to identify the issues that may be responsible for the non-reporting of offences to police by victims. The research found that victims are seeking solutions that are not available through law enforcement, for example financial compensation. Law enforcement also under-utilises the potential of proactive responses to prevent offences and they are reluctant to acknowledge the benefits of preventative measures and to incorporate this strategy within criminal investigation training programmes. The lack of deterrence offered by the judicial system does not make the situation any better. The police function is still primarily a reactive one. In order to overcome fraud and to be able to adapt to changes there needs to be collaboration between stakeholders. This requires a joint effort from the police, government, commerce and the victims of fraud. An innovative model involving stakeholders has been formulated that represents an alternative to the current system. This approach utilises the financial resources and expertise from the commercial sector as well as the skills of criminal investigators from the police. This means adopting a combined package of both reactive and proactive measures in order to minimise the impact of fraud. This model will be adaptive and will be able to accommodate any future requirements arising out of further inevitable advances in computer technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relationship between international law and domestic law has long been problematic. This article considers in particular the enforcement of customary international law through an analysis of judicial practice in England and Australia. The examination of the jurisprudence suggests that domestic judges often feel uncomfortable when asked to apply international law in the domestic courts and struggle to somehow justify its use. This has led to an inconsistency in judicial practice in the application of international law in jurisdictions such as Australia. However, ultimately the monist theory that recognizes that customary international law automatically flows into the domestic law appears to be reflected in an emerging trend in judicial practice in the common law judicial systems under consideration. However, the article suggests that the English courts now see international crimes as an exception to that theory and require domestic legislative transformation. Ultimately the article concludes that the municipal courts provide an important forum for the enforceability of customary international law, including human rights norms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evoking Genocide compiles more than sixty short essays written by leading scholars and activists in the field of genocide studies. These authors pay eloquent tribute to the works of art and media that influenced their engagement with genocide and crimes against humanity. The subjects include books and stories, films, songs, drawings, documents, monuments, sculptures, personal testimonies, and even a Lego set. In an accessible and often deeply personal way, contributors explore their own relationships with the works in question. Edited by Adam Jones, recently selected as one of fifty key thinkers in Holocaust and genocide studies, Evoking Genocide makes an important contribution to the study of the art and culture of mass atrocity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis proposes a novel architecture of Distributed Active Defense System (DADS) against Distibuted Denial of Service (DDoS) attacks. Three sub-systems of DADS were built. For each sub-system corresponding algorithms were developed, prototypes implemented, criteria for evaluation were set up and experiments in both simulation and real network laboratory environments were carried out.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Examines "best practice" in reducing recidivism. Compares two interventions for violent offenders, and examines whether their different theoretical orientations (unitary or transtheoretical) affected program efficiency. Although the transtheoretical intervention was more efficacious, insufficient adherence to best practice principles within implementation of both programs significantly impinged upon program success.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fraud and deception in online marketplaces has been an on-going problem. This thesis proposes novel techniques and mechanisms using agent technology to protect buyers and sellers in online environments such as eBay. The proposed solution has been rigorously tested and the results show good commercial promise.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is the first national study of workers who have contact with victims and perpetrators of domestic violence. It highlights that the victim and perpetrator's gender, as well as the relevant professional's agency type and experience, all influenced their attitudes to, and service delivery decisions with, domestic violence-related clients. The portfolio utilises four case studies to examine the way that two Victorian sex offender programs attempt to balance risk-need and good lives principles in the assessment and treatment of sex offenders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis surveys the latest development of digital forensic tools designed for anti-cybercrime purposes. It discusses the necessity of testing the digital forensics tools, and presents a novel testing framework. This new testing framework takes the viewpoint of software vendors rather than traditional software engineering approaches.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thesis analyses judgments from the higher criminal courts in Victoria involving problem gamblers charged with serious crimes, investigates actions brought by gamblers against gaming establishments in the civil courts and examines the legislation governing gambling in Victoria and the effectiveness of recently introduced harm minimisation measures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Allegations of body parts trafficking implicating the West have been surfacing persistently in the media of many non Western countries for almost 20 years. Western media has responded to the allegations with denials and denunciations. This thesis considers the competing accounts and places them in a framework for analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using a multilevel study design, this study examined the associations between social characteristics of individuals and neighbourhoods and physical activity among women. Women (n = 1405) recruited from 45 Melbourne (Australia) neighbourhoods of varying socioeconomic disadvantage provided data on social factors and leisure-time: physical activity; walking; and walking in one’s own neighbourhood. Individual level social factors were number of neighbours known and social participation. Neighbourhood-level social characteristics (interpersonal trust, norms of reciprocity, social cohesion) were derived by aggregating survey data on these constructs within neighbourhoods. Objective data on crimes within neighbourhoods were obtained from Victoria Police. In bivariable regression models, all social variables at both the individual and neighbourhood level were positively associated with odds of physical activity, walking, and walking in one’s own neighbourhood. Associations with individual social participation (associated with all three physical activity variables) and neighbourhood interpersonal trust (associated with overall physical activity only) remained significant in multivariable models. Neither neighbourhood crime against the person nor incivilities were associated with any form of physical activity. These results demonstrate that women who participated in local groups or events and, less consistently, women living in neighbourhoods where residents trusted one another, were more likely to participate in leisure-time physical activity. While redressing macro-level social and economic policies that contribute to neighbourhood inequalities remains a priority, public health initiatives aimed at promoting physical activity could consider focusing on fostering social interactions targeting both individuals and communities. Further investigation of causal mechanisms underlying these associations is required.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

According to the Good Lives Model, the inability to meet human needs in an adaptive manner - through lack of suitable circumstances, abilities, or opportunity - compels the individual to address this deficiency through other (maladaptive) means available to them. Thus the GLM contends that offending behavior serves a specific function and that different behaviors (crimes) are used to meet different needs. This presentation will discuss how the Good Lives Model can be used, in conjunction with that of the Risk-Needs Model, in a prison service. The combined model develops and implements programming for offenders prior to release into the community by mapping the offender's offence, social and psychological history against the secondary goods described in the Good Lives Model (i.e., the concrete means by which primary goods or human needs can be achieved), with identified deficits in secondary goods being the focus of intervention.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigated laypersons' perceptions of memory evidence in a mock childhood sexual abuse trial. Results indicated that delay, memory type (continuous vs. recovered) and the nature of the alleged sexual assault (penetrative vs. fondling) influenced both how witnesses were perceived and the outcome of the trial.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australia has followed the course taken by other English-speaking countries in recent years of enacting legislation that requires convicted sexual offenders to register personal details with law enforcement agencies. These laws have been enacted to protect the public from the perceived threat posed by sex offenders, but have been written with little apparent reference to the available research literature about the nature and extent of this threat. In addition, there is no empirical evidence supporting the effectiveness of legislatively based sex offender registries to either reduce sexual offending or to enable the police to investigate sex crimes and apprehend offenders. This article compares and contrasts the current laws governing sex offender registration enacted by the various states and territories in Australia, and offers a critical analysis of their provisions in light of the research literature on sexual offending.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social networking systems (SNS’s) such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting with "strangers" through the advent of a large number of social applications. The attractiveness of such software has meant a dramatic increase in the number of frequent users of SNS’s and the threats which were once common to the Internet have now been magnified, intensified and altered as the potential for criminal behaviour on SNS’s increases. Social networking sites including Facebook contain a vast amount of personal information, that if obtained could be used for other purposes or to carry out other crimes such as identity theft. This paper will focus on the security threats posed to social networking sites and gain an understanding of these risks by using a security approach known as “attack trees”. This will allow for a greater understanding of the complexity associated with protecting Social Networking systems with a particular focus on Facebook.