19 resultados para Crime and criminals
em Aston University Research Archive
Resumo:
In recent years, the European Union has come to view cyber security, and in particular, cyber crime as one of the most relevant challenges to the completion of its Area of Freedom, Security and Justice. Given European societies’ increased reliance on borderless and decentralized information technologies, this sector of activity has been identified as an easy target for actors such as organised criminals, hacktivists or terrorist networks. Such analysis has been accompanied by EU calls to step up the fight against unlawful online activities, namely through increased cooperation among law enforcement authorities (both national and extra- communitarian), the approximation of legislations, and public- private partnerships. Although EU initiatives in this field have, so far, been characterized by a lack of interconnection and an integrated strategy, there has been, since the mid- 2000s, an attempt to develop a more cohesive and coordinated policy. An important part of this policy is connected to the activities of Europol, which have come to assume a central role in the coordination of intelligence gathering and analysis of cyber crime. The European Cybercrime Center (EC3), which will become operational within Europol in January 2013, is regarded, in particular, as a focal point of the EU’s fight against this phenomenon. Bearing this background in mind, the present article wishes to understand the role of Europol in the development of a European policy to counter the illegal use of the internet. The article proposes to reach this objective by analyzing, through the theoretical lenses of experimental governance, the evolution of this agency’s activities in the area of cyber crime and cyber security, its positioning as an expert in the field, and the consequences for the way this policy is currently developing and is expected to develop in the near future.
Resumo:
The nexus between terrorism and organised crime consists in a strategic alliance between two non-state actors, able to exploit illegal markets, threaten the security of individuals, and influence policy-making on a global level. Recent Europol reports have pointed towards the importance of studying the links between organised crime and terrorist groups, and have underlined that the nature and extent of these connections have seldom been addressed from an academic perspective. Considering the degree of dangerousness that both organised crime and terrorism currently represent in the world, the collusion between these two phenomena is of urgent contemporary interest. Basing itself on geographical case-studies, this edited volume aims at contributing to the existing literature in three ways: by enriching the empirical knowledge on the nature of the crime-terror nexus and its evolution; by exploring the impact of the nexus within different economic, political and societal contexts; and by expanding on its theoretical conceptualization.
Resumo:
Purpose – The purpose of this paper is to explore the criminal workplace activities of both employers and employees in Ukrainian enterprises. It challenges traditional definitions of corruption and suggests that the practices that can be observed fit into the category of organised crime because of the country's economic framework. The paper also explores how the practices are partially a legacy of Soviet economic processes. Design/methodology/approach – A total of 700 household surveys were completed in three cities, Kyiv (where 450 surveys were completed), Uzhgorod (150) and Kharkiv (100). To complement these, approximately 25 in-depth interviews were undertaken with workers in each region. Furthermore, ethnographic observations and “kitchen table” interviews also played an important role in the research. Although the research was oriented towards those working in informal economies, business owners (both formal and informal) were also interviewed. Findings – As well as revealing the endemic nature of corruption in Ukrainian workplaces and the high levels of informal activity undertaken by workers, the research found that many people wish for their workplace to become more regulated. Research limitations/implications – Further interviews could have been carried out with state officials and in more locations. The implications are multiple but mainly they demonstrate the difficulty that those charged with economic reform in Ukraine must face. Originality/value – It is one of the first studies to explore these issues in Ukraine using a variety of research methods.
Resumo:
Book review
Resumo:
The nexus between terrorism and organised crime consists in a strategic alliance between two non-state actors, able to exploit illegal markets, threaten the security of individuals, and influence policy-making on a global level. Recent Europol reports have pointed towards the importance of studying the links between organised crime and terrorist groups, and have underlined that the nature and extent of these connections have seldom been addressed from an academic perspective. Considering the degree of dangerousness that both organised crime and terrorism currently represent in the world, the collusion between these two phenomena is of urgent contemporary interest. Basing itself on geographical case-studies, this edited volume aims at contributing to the existing literature in three ways: by enriching the empirical knowledge on the nature of the crime-terror nexus and its evolution; by exploring the impact of the nexus within different economic, political and societal contexts; and by expanding on its theoretical conceptualization.
Resumo:
SSince the external dimension of the European Union’s Justice and Home Affairs (JHA) began to be considered, a substantial amount of literature has been dedicated to discussing how the EU is cooperating with non-member states in order to counter problems such as terrorism, organized crime and illegal migration. According to the EU, the degree of security interconnectedness has become so relevant that threats can only be adequately controlled if there is effective concerted regional action. This reasoning has led the EU to develop a number of instruments, which have resulted in the exporting of certain elements of its JHA policies, either through negotiation or socialization. Although the literature has explored how this transfer has been applied to the field of terrorism and immigration, very little has been written on the externalisation of knowledge, practice and norms in the area of organized crime. This article proposes to bridge this gap by looking at EU practice in the development of the external dimension of organized crime policies, through the theoretical lens of the EU governance framework.
Resumo:
Police records of 38 rape allegations, evenly split into maintained-as-true and withdrawn-as-false categories were compared with 19 generated-false statements from recruited participants. The Illinois Rape Myth Acceptance Scale (IRMAS) was used to assess the attitudes of the participants and a content analysis derived from IRMAS was used to compare the three categories of allegation. Rape myths were present in all three allegation types. The two categories of false allegation both contained more rape myths than the true allegations but no differences were found between the generated and withdrawn false allegations. High scorers in IRMAS also produced more violent false accounts. In addition to these findings, this study provides support for the further examination of rape myths in both false and true statements and use of generated allegations as proxies for real false statements.
Resumo:
Case linkage, the linking of crimes into series, is used in policing in the UK and other countries. Previous researchers have proposed using rapists' speech in this practice; however, researching this application requires the development of a reliable coding system for rapists' speech. A system was developed based on linguistic theories of pragmatics which allowed for the categorization of an utterance into a speech act type (e.g. directive). Following this classification, the qualitative properties of the utterances (e.g. the degree of threat it carried) could be captured through the use of rating scales. This system was tested against a previously developed system using 188 rapists' utterances taken from victims' descriptions of rape. The pragmatics-based system demonstrated higher inter-rater reliability whilst enabling the classification of a greater number of rapists' utterances. Inter-rater reliability for the subscales was also tested using a sub-sample of 50 rapists' utterances and inter-item correlations were calculated. Seventy-six per cent of the subscales had satisfactory to high inter-rater reliability. Based on these findings and the inter-item correlations, the classification system was revised. The potential use of this system for the practices of case linkage and offender profiling is discussed.
Resumo:
Very little empirical work exists on cyberstalking. The current study analysed detailed questionnaires completed by 1051 self-defined stalking victims. Almost half (47.5%) reported harassment via the Internet, but only 7.2% of the sample was judged to have been cyberstalked. Ordinal regression analyses of four groups of victims, categorized according to degree of cyber involvement in their victimization, revealed a general picture of similarity between the groups in terms of the stalking process, responses to being stalked, and the effects on victims and third parties. It was concluded that cyberstalking does not fundamentally differ from traditional, proximal stalking, that online harassment does not necessarily hold broad appeal to stalkers, and that those who target ex-intimates remain the most populous stalker type.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.