5 resultados para theft

em Aston University Research Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the present study is to test the case linkage principles of behavioural consistency and behavioural distinctiveness using serial vehicle theft data. Data from 386 solved vehicle thefts committed by 193 offenders were analysed using Jaccard's, regression and Receiver Operating Characteristic analyses to determine whether objectively observable aspects of crime scene behaviour could be used to distinguish crimes committed by the same offender from those committed by different offenders. The findings indicate that spatial behaviour, specifically the distance between theft locations and between dump locations, is a highly consistent and distinctive aspect of vehicle theft behaviour; thus, intercrime and interdump distance represent the most useful aspects of vehicle theft for the purpose of case linkage analysis. The findings have theoretical and practical implications for understanding of criminal behaviour and for the development of decision-support tools to assist police investigation and apprehension of serial vehicle theft offenders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research paper presents an examination of the journey to and from crime for autotheft offenders in the UK. For 852 offences, ‘wheel’ distances are calculated for triangles formed by offenders’ home location, theft location, and vehicle disposal location. The study demonstrates typical isosceles mobility triangles; distances travelled to and from home locations are roughly equal, whereas distances between theft and disposal points were shorter. Distances travelled by offenders under 17 years old and offences involving drug and drink were shown to be shorter than comparison groups. Prolifi c offenders tend to travel further, although there is signifi cant variation in this subgroup. Explanations and implications are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The issues involved in planning for pedal cyclists are examined with reference to the West Midlands County. Working with a local cycling campaign group, the researcher uses action research methods to investigate and influence the campaign. Development of cycle planning is traced through the literature, focusing on bicycle ownership, bicycle use and cycling policy. UK practice is contrasted with the integrated approach of other countries. An extensive bibliography is provided. Local authority cycle planning through the TPP process is systematically assessed over three years. This provides a context for the information regarding cycling in the West Midlands. Existing data is presented from the 1981 Census and local police road accident and bicycle theft records. The developing relationship between the local authority and the cycle campaign group is narrated in detail, explaining the problems that can beset efforts to improve conditions for cyclists. The researcher was closely involved in this interaction, particularly with policy and a major public inquiry. A survey of the Cycle Campaign Network indicates that the local group was not atypical. To provide information relevant to the local campaign and for effective local planning, a survey of 3,500 West Midlands residents was conducted using a novel combination of questionnaires and interviews. It shows that 1) Bicycle ownership and use is considerably higher than indicated by the 1978/9 National Travel Survey 2) Cycling is most import to certain disadvantaged sections of the community, particularly the young, those without access to a car and in the lower SEGs. The broader issues of transport policy are discussed, concluding that cycling is regarded as a marginal activity and that changes in general transport policy, land use planning and fiscal arrangements are necessary conditions for cycle planning to succeed. An integrated package of cycling measures involving engineering, education, enforcement and encouragement is also required. Recommendations are made concerning central government, local authorities and cycle campaign groups. Subjects for further research are identified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this survey was to review 187 transcripts from the United Kingdom’s General Optical Council (GOC) Disciplinary and Fitness To Practise (FTP) Committee hearings from 2001 to 2011 in order to identify common themes and thereby help practitioners to avoid the more frequently occurring pitfalls that were recorded during this period. The study covered changes in GOC FTP regulations in 2005, which involved a change from a disciplinary to a fitness to practise process. The number of cases was very small compared to the total number of optometrist and dispensing optician registrants, which was 13709 in 2001-02 rising to 18582 in 2010-11. The main findings indicated that between 2001 and 2011 there was a three times greater likelihood that male registrants versus female registrants would be brought in front of a GOC Disciplinary or FTP Committee. In terms of erasures from the GOC registers between 2001 and 2011, male registrants were also more likely to be erased than females. The male: female split for erasures between 2001 and 2011 was five: one, increasing to seven: one when considering the situation post the 2005 GOC FTP rule change. Of the cases brought before the Disciplinary and FTP Committees between 2001 and 2011, it was noted that cases implicating theft and fraud were most frequent representing 27% of hearings examined (17% involving NHS fraud and 10% theft or fraud from an employer). The examination of transcripts revealed other hearings were more complex. These hearings often had a primary reason for the investigation that highlighted further secondary concerns that also required investigation.