32 resultados para Law-enforcement agencies
Resumo:
In the wake of the “9-11” terrorists' attacks, the U.S. Government has turned to information technology (IT) to address a lack of information sharing among law enforcement agencies. This research determined if and how information-sharing technology helps law enforcement by examining the differences in perception of the value of IT between law enforcement officers who have access to automated regional information sharing and those who do not. It also examined the effect of potential intervening variables such as user characteristics, training, and experience, on the officers' evaluation of IT. The sample was limited to 588 officers from two sheriff's offices; one of them (the study group) uses information sharing technology, the other (the comparison group) does not. Triangulated methodologies included surveys, interviews, direct observation, and a review of agency records. Data analysis involved the following statistical methods: descriptive statistics, Chi-Square, factor analysis, principal component analysis, Cronbach's Alpha, Mann-Whitney tests, analysis of variance (ANOVA), and Scheffe' post hoc analysis. ^ Results indicated a significant difference between groups: the study group perceived information sharing technology as being a greater factor in solving crime and in increasing officer productivity. The study group was more satisfied with the data available to it. As to the number of arrests made, information sharing technology did not make a difference. Analysis of the potential intervening variables revealed several remarkable results. The presence of a strong performance management imperative (in the comparison sheriff's office) appeared to be a factor in case clearances and arrests, technology notwithstanding. As to the influence of user characteristics, level of education did not influence a user's satisfaction with technology, but user-satisfaction scores differed significantly among years of experience as a law enforcement officer and the amount of computer training, suggesting a significant but weak relationship. ^ Therefore, this study finds that information sharing technology assists law enforcement officers in doing their jobs. It also suggests that other variables such as computer training, experience, and management climate should be accounted for when assessing the impact of information technology. ^
Resumo:
Valuing Polyrhythmic Realities and Critical Theories, specifically Critical Race Theory, is facilitated by Interdisciplinary inquiry. Racial Profiling will be utilized to demonstrate how acknowledging the lived experiences of individuals and viewing situations from the oppressed viewpoint will positively impact the number of Blacks in law enforcement.
Resumo:
Faced with the violence, criminality and insecurity now threatening peace and democratic governance in Central America, the region’s governments have decided to use the Armed Forces to carry out actions in response to criminal actions, looking to improve their performance. Although public demand for including the Armed Forces in these functions takes place within a legally legitimate framework, it is motivated by tangible circumstances such as increased levels of violence, delinquency and crime. Despite being coupled with the perception of institutional weakness within the security and judicial system (particularly police) and the recognition of prestige, efficiency, discipline and severity in fulfilling the Armed Forces’ missions, these arguments are insufficient to legitimize the use of the military as a police force. Within this context, this paper reflects on the implications or consequences of the use of the Armed Forces in duties traditionally assigned to the police in the Central American region with the goal of contributing to the debate on this topic taking place in the Americas. To achieve this end, first we will focus on understanding the actual context in which a decision is made to involve the Armed Forces in security duties in the region. Second, we will examine the effects and implications of this decision on the Armed Forces’ relations within their respective societies. Third and finally, considering this is already a reality in the region, this paper will provide recommendations. The main findings of this research, resulting from the application of an analyticaldescriptive and historically based study, are organized in three dimensions: the political dimension, by implication referring to the relationship between the ultimate political authority and the Armed Forces; the social dimension, by implication the opinion of citizens; and other implications not only affecting the structural and cultural organization of armies and police but also the complementary operational framework within a context of comprehensive response by the State. As a main conclusion, it poses there is an environment conducive to the use of the Armed Forces in citizen’s security, in view of the impact of threats provoked by criminal structures of a military nature currently operating in Central America. However, this participation creates an inevitable social and political impact if implemented in isolation or given a political leading role and/or operational autonomy. This participation poses risks to the institutions of the Armed Forces and the police as well. Finally, this paper identifies an urgent need for the Armed Forces’ role to be more clearly defined with regard to security matters, limiting it to threats that impact States’ governability and existence. Nonetheless, Central American States should seek a COMPREHENSIVE response to current crime and violence, using all necessary institutions to confront these challenges, but with defined roles and responsibilities for each and dynamic coordination to complement their actions.
Resumo:
In response to a crime epidemic afflicting Latin America since the early 1990s, several countries in the region have resorted to using heavy-force police or military units to physically retake territories de facto controlled by non-State criminal or insurgent groups. After a period of territory control, the heavy forces hand law enforcement functions in the retaken territories to regular police officers, with the hope that the territories and their populations will remain under the control of the state. To a varying degree, intensity, and consistency, Brazil, Colombia, Mexico, and Jamaica have adopted such policies since the mid-1990s. During such operations, governments need to pursue two interrelated objectives: to better establish the state’s physical presence and to realign the allegiance of the population in those areas toward the state and away from the non-State criminal entities. From the perspective of law enforcement, such operations entail several critical decisions and junctions, such as: Whether or not to announce the force insertion in advance. The decision trades off the element of surprise and the ability to capture key leaders of the criminal organizations against the ability to minimize civilian casualties and force levels. The latter, however, may allow criminals to go to ground and escape capture. Governments thus must decide whether they merely seek to displace criminal groups to other areas or maximize their decapitation capacity. Intelligence flows rarely come from the population. Often, rival criminal groups are the best source of intelligence. However, cooperation between the State and such groups that goes beyond using vetted intelligence provided by the groups, such as a State tolerance for militias, compromises the rule-of-law integrity of the State and ultimately can eviscerate even public safety gains. Sustaining security after initial clearing operations is at times even more challenging than conducting the initial operations. Although unlike the heavy forces, traditional police forces, especially if designed as community police, have the capacity to develop trust of the community and ultimately focus on crime prevention, developing such trust often takes a long time. To develop the community’s trust, regular police forces need to conduct frequent on-foot patrols with intensive nonthreatening interactions with the population and minimize the use of force. Moreover, sufficiently robust patrol units need to be placed in designated beats for substantial amount of time, often at least over a year. Establishing oversight mechanisms, including joint police-citizens’ boards, further facilities building trust in the police among the community. After disruption of the established criminal order, street crime often significantly rises and both the heavy-force and community-police units often struggle to contain it. The increase in street crime alienates the population of the retaken territory from the State. Thus developing a capacity to address street crime is critical. Moreover, the community police units tend to be vulnerable (especially initially) to efforts by displaced criminals to reoccupy the cleared territories. Losing a cleared territory back to criminal groups is extremely costly in terms of losing any established trust and being able to recover it. Rather than operating on a priori determined handover schedule, a careful assessment of the relative strength of regular police and criminal groups post-clearing operations is likely to be a better guide for timing the handover from heavy forces to regular police units. Cleared territories often experience not only a peace dividend, but also a peace deficit – in the rise new serious crime (in addition to street crime). Newly – valuable land and other previously-inaccessible resources can lead to land speculation and forced displacement; various other forms of new crime can also significantly rise. Community police forces often struggle to cope with such crime, especially as it is frequently linked to legal business. Such new crime often receives little to no attention in the design of the operations to retake territories from criminal groups. But without developing an effective response to such new crime, the public safety gains of the clearing operations can be altogether lost.
Resumo:
This phenomenological study explored Black male law enforcement officers' perspectives of how racial profiling shaped their decisions to explore and commit to a law enforcement career. Criterion and snow ball sampling was used to obtain the 17 participants for this study. Super's (1990) archway model was used as the theoretical framework. The archway model "is designed to bring out the segmented but unified and developmental nature of career development, to highlight the segments, and to make their origin clear" (Super, 1990, p. 201). Interview data were analyzed using inductive, deductive, and comparative analyses. Three themes emerged from the inductive analysis of the data: (a) color and/or race does matter, (b) putting on the badge, and (c) too black to be blue and too blue to be black. The deductive analysis used a priori coding that was based on Super's (1990) archway model. The deductive analysis revealed the participants' career exploration was influenced by their knowledge of racial profiling and how others view them. The comparative analysis between the inductive themes and deductive findings found the theme "color and/or race does matter" was present in the relationships between and within all segments of Super's (1990) model. The comparative analysis also revealed an expanded notion of self-concept for Black males – marginalized and/or oppressed individuals. Self-concepts, "such as self-efficacy, self-esteem, and role self-concepts, being combinations of traits ascribed to oneself" (Super, 1990, p. 202) do not completely address the self-concept of marginalized and/or oppressed individuals. The self-concept of marginalized and/or oppressed individuals is self-efficacy, self-esteem, traits ascribed to oneself expanded by their awareness of how others view them. (DuBois, 1995; Freire, 1970; Sheared, 1990; Super, 1990; Young, 1990). Ultimately, self-concept is utilized to make career and life decisions. Current human resource policies and practices do not take into consideration that negative police contact could be the result of racial profiling. Current human resource hiring guidelines penalize individuals who have had negative police contact. Therefore, racial profiling is a discriminatory act that can effectively circumvent U.S. Equal Employment Opportunities Commission laws and serve as a boundary mechanism to employment (Rocco & Gallagher, 2004).
Resumo:
The purpose of this research was to study the nutritional status of United States Coast Guard Law Enforcement Detachment (USCG/ LEDET) personnel before and after prolonged travel at sea. To date there is no information available regarding the nutritional status of Coast Guard personnel. Forty-seven subjects were studied in total, each served as their own control. Demographic and health history data was collected at baseline. Dietary and exercise data was collected before and during the deployment. Body composition was determined before and after a deployment. The results of this study revealed that the USCG/LEDET personnel had high cholesterol and decreased fiber intakes. Cholesterol intake during deployment (516.8±239.7 mg/day) was significantly higher (p= 0. 047) than pre-deployment (448.2 ± 144.3 mg/day). Fiber intake was significantly lower than recommended (p The results of this study indicate that LEDET personnel are put at higher nutritional risk while deployed and also have increased negative health behaviors associated with risk for Cardiovascular Disease (CVD) and other related diseases. This is crucial information for the USCG so that action can be taken to improve the physical well being of their personnel.
Resumo:
This phenomenological study explored Black male law enforcement officers’ perspectives of how racial profiling shaped their decisions to explore and commit to a law enforcement career. Criterion and snow ball sampling was used to obtain the 17 participants for this study. Super’s (1990) archway model was used as the theoretical framework. The archway model “is designed to bring out the segmented but unified and developmental nature of career development, to highlight the segments, and to make their origin clear” (Super, 1990, p. 201). Interview data were analyzed using inductive, deductive, and comparative analyses. Three themes emerged from the inductive analysis of the data: (a) color and/or race does matter, (b) putting on the badge, and (c) too black to be blue and too blue to be black. The deductive analysis used a priori coding that was based on Super’s (1990) archway model. The deductive analysis revealed the participants’ career exploration was influenced by their knowledge of racial profiling and how others view them. The comparative analysis between the inductive themes and deductive findings found the theme “color and/or race does matter” was present in the relationships between and within all segments of Super’s (1990) model. The comparative analysis also revealed an expanded notion of self-concept for Black males – marginalized and/or oppressed individuals. Self-concepts, “such as self-efficacy, self-esteem, and role self-concepts, being combinations of traits ascribed to oneself” (Super, 1990, p. 202) do not completely address the self-concept of marginalized and/or oppressed individuals. The self-concept of marginalized and/or oppressed individuals is self-efficacy, self-esteem, traits ascribed to oneself expanded by their awareness of how others view them. (DuBois, 1995; Freire, 1970; Sheared, 1990; Super, 1990; Young, 1990). Ultimately, self-concept is utilized to make career and life decisions. Current human resource policies and practices do not take into consideration that negative police contact could be the result of racial profiling. Current human resource hiring guidelines penalize individuals who have had negative police contact. Therefore, racial profiling is a discriminatory act that can effectively circumvent U.S. Equal Employment Opportunities Commission laws and serve as a boundary mechanism to employment (Rocco & Gallagher, 2004).
Resumo:
Establishing an association between the scent a perpetrator left at a crime scene to the odor of the suspect of that crime is the basis for the use of human scent identification evidence in a court of law. Law enforcement agencies gather evidence through the collection of scent from the objects that a perpetrator may have handled during the execution of the criminal act. The collected scent evidence is consequently presented to the canines for identification line-up procedures with the apprehended suspects. Presently, canine scent identification is admitted as expert witness testimony, however, the accurate behavior of the dogs and the scent collection methods used are often challenged by the court system. The primary focus of this research project entailed an evaluation of contact and non-contact scent collection techniques with an emphasis on the optimization of collection materials of different fiber chemistries to evaluate the chemical odor profiles obtained using varying environment conditions to provide a better scientific understanding of human scent as a discriminative tool in the identification of suspects. The collection of hand odor from female and male subjects through both contact and non-contact sampling approaches yielded new insights into the types of VOCs collected when different materials are utilized, which had never been instrumentally performed. Furthermore, the collected scent mass was shown to be obtained in the highest amounts for both gender hand odor samples on cotton sorbent materials. Compared to non-contact sampling, the contact sampling methods yielded a higher number of volatiles, an enhancement of up to 3 times, as well as a higher scent mass than non-contact methods by more than an order of magnitude. The evaluation of the STU-100 as a non-contact methodology highlighted strong instrumental drawbacks that need to be targeted for enhanced scientific validation of current field practices. These results demonstrated that an individual's human scent components vary considerably depending on the method used to collect scent from the same body region. This study demonstrated the importance of collection medium selection as well as the collection method employed in providing a reproducible human scent sample that can be used to differentiate individuals.
Resumo:
Human scent and human remains detection canines are used to locate living or deceased humans under many circumstances. Human scent canines locate individual humans on the basis of their unique scent profile, while human remains detection canines locate the general scent of decomposing human remains. Scent evidence is often collected by law enforcement agencies using a Scent Transfer Unit, a dynamic headspace concentration device. The goals of this research were to evaluate the STU-100 for the collection of human scent samples, and to apply this method to the collection of living and deceased human samples, and to the creation of canine training aids. The airflow rate and collection material used with the STU-100 were evaluated using a novel scent delivery method. Controlled Odor Mimic Permeation Systems were created containing representative standard compounds delivered at known rates, improving the reproducibility of optimization experiments. Flow rates and collection materials were compared. Higher air flow rates usually yielded significantly less total volatile compounds due to compound breakthrough through the collection material. Collection from polymer and cellulose-based materials demonstrated that the molecular backbone of the material is a factor in the trapping and releasing of compounds. The weave of the material also affects compound collection, as those materials with a tighter weave demonstrated enhanced collection efficiencies. Using the optimized method, volatiles were efficiently collected from living and deceased humans. Replicates of the living human samples showed good reproducibility; however, the odor profiles from individuals were not always distinguishable from one another. Analysis of the human remains samples revealed similarity in the type and ratio of compounds. Two types of prototype training aids were developed utilizing combinations of pure compounds as well as volatiles from actual human samples concentrated onto sorbents, which were subsequently used in field tests. The pseudo scent aids had moderate success in field tests, and the Odor pad aids had significant success. This research demonstrates that the STU-100 is a valuable tool for dog handlers and as a field instrument; however, modifications are warranted in order to improve its performance as a method for instrumental detection.
Resumo:
SmartWater is a chemical taggant used as a crime deterrent. The chemical taggant is a colorless liquid that fluoresces yellow under ultra-violet (UV) light and contains distinctive, identifiable and traceable elemental composition. For instance, upon a break and entry scenario, the burglar is sprayed with a solution that has an elemental signature custom-made to a specific location. The residues of this taggant persist on skin and other objects and can be easily recovered for further analysis. The product has been effectively used in Europe as a crime deterrent and has been recently introduced in South Florida. In 2014, Fourt Lauderdale Police Department reported the use of SmartWater products with a reduction in burglaries of 14% [1]. The International Forensic Research Institute (IFRI) at FIU validated the scientific foundation of the methods of recovery and analysis of these chemical tagging systems using LA-ICP-MS. Analytical figures of merit of the method such as precision, accuracy, limits of detection, linearity and selectivity are reported in this study. Moreover, blind samples were analyzed by LA-ICP-MS to compare the chemical signatures to the company’s database and evaluate error rates and the accuracy of the method. This study demonstrated that LA-ICP-MS could be used to effectively detect these traceable taggants to assist law enforcement agencies in the United States with cases involving transfer of these forensic coding systems.
Resumo:
The use of canines as a method of detection of explosives is well established worldwide and those applying this technology range from police forces and law enforcement to humanitarian agencies in the developing world. Despite the recent surge in publication of novel instrumental sensors for explosives detection, canines are still regarded by many to be the most effective real-time field method of explosives detection. However, unlike instrumental methods, currently it is difficult to determine detection levels, perform calibration of the canines' ability or produce scientifically valid quality control checks. Accordingly, amongst increasingly strict requirements regarding forensic evidence admission such as Frye and Daubert, there is a need for better scientific understanding of the process of canine detection. ^ When translated to the field of canine detection, just like any instrumental technique, peer reviewed publication of the reliability, success and error rates, is required for admissibility. Commonly training is focussed towards high explosives such as TNT and Composition 4, and the low explosives such as Black and Smokeless Powders are added often only for completeness. ^ Headspace analyses of explosive samples, performed by Solid Phase Microextraction (SPME) paired with Gas Chromatography - Mass Spectrometry (GC-MS), and Gas Chromatography - Electron Capture Detection (GC-ECD) was conducted, highlighting common odour chemicals. The odour chemicals detected were then presented to previously trained and certified explosives detection canines, and the activity/inactivity of the odour determined through field trials and experiments. ^ It was demonstrated that TNT and cast explosives share a common odour signature, and the same may be said for plasticized explosives such as Composition C-4 and Deta Sheet. Conversely, smokeless powders were demonstrated not to share common odours. An evaluation of the effectiveness of commercially available pseudo aids reported limited success. The implications of the explosive odour studies upon canine training then led to the development of novel inert training aids based upon the active odours determined. ^
Resumo:
The attempts at carrying out terrorist attacks have become more prevalent. As a result, an increasing number of countries have become particularly vigilant against the means by which terrorists raise funds to finance their draconian acts against human life and property. Among the many counter-terrorism agencies in operation, governments have set up financial intelligence units (FIUs) within their borders for the purpose of tracking down terrorists’ funds. By investigating reported suspicious transactions, FIUs attempt to weed out financial criminals who use these illegal funds to finance terrorist activity. The prominent role played by FIUs means that their performance is always under the spotlight. By interviewing experts and conducting surveys of those associated with the fight against financial crime, this study investigated perceptions of FIU performance on a comparative basis between American and non-American FIUs. The target group of experts included financial institution personnel, civilian agents, law enforcement personnel, academicians, and consultants. Questions for the interview and surveys were based on the Kaplan and Norton’s Balanced Scorecard (BSC) methodology. One of the objectives of this study was to help determine the suitability of the BSC to this arena. While FIUs in this study have concentrated on performance by measuring outputs such as the number of suspicious transaction reports investigated, this study calls for a focus on outcomes involving all the parties responsible for financial criminal investigations. It is only through such an integrated approach that these various entities will be able to improve performance in solving financial crime. Experts in financial intelligence strongly believed that the quality and timeliness of intelligence was more important than keeping track of the number of suspicious transaction reports. Finally, this study concluded that the BSC could be appropriately applied to the arena of financial crime prevention even though the emphasis is markedly different from that in the private sector. While priority in the private sector is given to financial outcomes, in this arena employee growth and internal processes were perceived as most important in achieving a satisfactory outcome.
Resumo:
Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.
Resumo:
Mistaken eyewitness identifications of innocent lead to more false convictions in the United States than any other cause. In response to concerns about the reliability of eyewitness evidence, the National Institute of Justice (NIJ) in 1999 published a Guide for the gathering and preservation of eyewitness evidence by law enforcement personnel. Previous research has shown that eyewitness identifications are more accurate when obtained using procedures recommended in the NIJ Guide. This experiment assessed whether informing jurors about the Guide can improve their ability to discriminate between eyewitness identifications likely to be accurate and those likely to be inaccurate and, if so, how to most effectively provide jurors with such information. ^ Seven hundred sixteen U.S. citizens who reported for criminal jury duty participated. Half of the participant jurors read a summary of an armed robbery trial in which the police followed the NIJ Guide when obtaining an eyewitness identification of the defendant. The other half read about an identical case in which the police did not follow the Guide. Jurors received information about the Guide from a court-appointed expert witness, one of the attorneys in the case, the trial judge, the judge in combination with one of the attorneys, or from no one (in the control groups). Jurors then rendered a verdict in the case and answered questions about the evidence in the case. ^ When an expert witness or the judge (either alone or in combination with one of the attorneys) informed jurors about the Guide, the jurors voted to convict defendants likely to be guilty and to acquit defendants likely to be innocent more often than did uninformed jurors assigned to a control group. These data suggest that informing jurors about the NIJ Guide using expert testimony or instructions from a judge will improve the quality and accuracy of jurors' verdict decisions in cases involving eyewitness identification evidence. However, more research is needed to determine whether the judge will remain an effective source of information about the Guide in a longer, more detailed trial scenario and to learn more about the underlying psychological processes governing the effects observed in this experiment. ^
Resumo:
This dissertation analyzes recent financial crises in developed and developing countries. The research emphasizes the effects of institutional factors on the international banking and currency crises and their output losses. ^ Chapter two examines the roles of regulation, supervision, and countries' institutional environment in determining the probability of banking crises for a panel of fifteen developed countries from 1975 to 1998. The results from a multivariate logit model indicated that countries with greater government involvement, less capital standard requirements, and lower lending limits on a single borrower are associated with a higher probability of banking crises. ^ Chapter three studies whether output loss in banking crisis differs in market-based or bank-based financial systems. Using existing banking crisis data for sixty-nine countries during 1970–1999, we investigate whether the underlying financial system affects the output loss. The results show that output losses are more serious in market-based economies than those in bank-based economies. Longer crisis duration tends to increase the output losses in banking crises. Finally, countries with deposit insurance and strict law enforcement have less output losses. ^ Chapter four uses macroeconomic and institutional measures to explain the extent of exchange rate depreciation and the decline in stock prices for emerging countries affected by the Mexican currency crisis of 1994–95. The results show that countries with more government budget deficits, and worse reserve adequacies tend to experience large exchange rate depreciation. The institutional measures do not explain much the extent of both the exchange rate depreciation and the decline in stock prices. ^