205 resultados para theft


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The issues involved in planning for pedal cyclists are examined with reference to the West Midlands County. Working with a local cycling campaign group, the researcher uses action research methods to investigate and influence the campaign. Development of cycle planning is traced through the literature, focusing on bicycle ownership, bicycle use and cycling policy. UK practice is contrasted with the integrated approach of other countries. An extensive bibliography is provided. Local authority cycle planning through the TPP process is systematically assessed over three years. This provides a context for the information regarding cycling in the West Midlands. Existing data is presented from the 1981 Census and local police road accident and bicycle theft records. The developing relationship between the local authority and the cycle campaign group is narrated in detail, explaining the problems that can beset efforts to improve conditions for cyclists. The researcher was closely involved in this interaction, particularly with policy and a major public inquiry. A survey of the Cycle Campaign Network indicates that the local group was not atypical. To provide information relevant to the local campaign and for effective local planning, a survey of 3,500 West Midlands residents was conducted using a novel combination of questionnaires and interviews. It shows that 1) Bicycle ownership and use is considerably higher than indicated by the 1978/9 National Travel Survey 2) Cycling is most import to certain disadvantaged sections of the community, particularly the young, those without access to a car and in the lower SEGs. The broader issues of transport policy are discussed, concluding that cycling is regarded as a marginal activity and that changes in general transport policy, land use planning and fiscal arrangements are necessary conditions for cycle planning to succeed. An integrated package of cycling measures involving engineering, education, enforcement and encouragement is also required. Recommendations are made concerning central government, local authorities and cycle campaign groups. Subjects for further research are identified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this survey was to review 187 transcripts from the United Kingdom’s General Optical Council (GOC) Disciplinary and Fitness To Practise (FTP) Committee hearings from 2001 to 2011 in order to identify common themes and thereby help practitioners to avoid the more frequently occurring pitfalls that were recorded during this period. The study covered changes in GOC FTP regulations in 2005, which involved a change from a disciplinary to a fitness to practise process. The number of cases was very small compared to the total number of optometrist and dispensing optician registrants, which was 13709 in 2001-02 rising to 18582 in 2010-11. The main findings indicated that between 2001 and 2011 there was a three times greater likelihood that male registrants versus female registrants would be brought in front of a GOC Disciplinary or FTP Committee. In terms of erasures from the GOC registers between 2001 and 2011, male registrants were also more likely to be erased than females. The male: female split for erasures between 2001 and 2011 was five: one, increasing to seven: one when considering the situation post the 2005 GOC FTP rule change. Of the cases brought before the Disciplinary and FTP Committees between 2001 and 2011, it was noted that cases implicating theft and fraud were most frequent representing 27% of hearings examined (17% involving NHS fraud and 10% theft or fraud from an employer). The examination of transcripts revealed other hearings were more complex. These hearings often had a primary reason for the investigation that highlighted further secondary concerns that also required investigation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most research on tax evasion has focused on the income tax. Sales tax evasion has been largely ignored and dismissed as immaterial. This paper explored the differences between income tax and sales tax evasion and demonstrated that sales tax enforcement is deserving of and requires the use of different tools to achieve compliance. Specifically, the major enforcement problem with sales tax is not evasion: it is theft perpetrated by companies that act as collection agents for the state. Companies engage in a principal-agent relationship with the state and many retain funds collected as an agent of the state for private use. As such, the act of sales tax theft bears more resemblance to embezzlement than to income tax evasion. It has long been assumed that the sales tax is nearly evasion free, and state revenue departments report voluntary compliance in a manner that perpetuates this myth. Current sales tax compliance enforcement methodologies are similar in form to income tax compliance enforcement methodologies and are based largely on trust. The primary focus is on delinquent filers with a very small percentage of businesses subject to audit. As a result, there is a very large group of noncompliant businesses who file on time and fly below the radar while stealing millions of taxpayer dollars. ^ The author utilized a variety of statistical methods with actual field data derived from operations of the Southern Region Criminal Investigations Unit of the Florida Department of Revenue to evaluate current and proposed sales tax compliance enforcement methodologies in a quasi-experimental, time series research design and to set forth a typology of sales tax evaders. This study showed that current estimates of voluntary compliance in sales tax systems are seriously and significantly overstated and that current enforcement methodologies are inadequate to identify the majority of violators and enforce compliance. Sales tax evasion is modeled using the theory of planned behavior and Cressey’s fraud triangle and it is demonstrated that proactive enforcement activities, characterized by substantial contact with non-delinquent taxpayers, results in superior ability to identify noncompliance and provides a structure through which noncompliant businesses can be rehabilitated.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hotel human resources directors report that the most important ethical issues they face are a lack of work ethic, drug use, and employee theft. When asked about ethical problems experienced in their own hotels. Managers’ report that employees' lack of respect for each other, racial and gender conflicts, guest abuse, dishonesty, and homosexual issues are the biggest problems. The author discusses these ethical dilemmas and suggests ways they can be addressed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study identified and examined the concerns of hotel general managers regarding ethics in the hospitality industry. Thirty-five managers were interviewed during and immediately following the economic recession to determine which ethical issues in the hotel industry and at their own properties concerned them the most. Results showed that more people and organizations attempted to renegotiate hotel rates, which actions, in turn, led to some lapses in ethical behavior. Managers said that because of the economic downturn, they felt pressure from both private owners and corporate headquarters. They also said a lack of work ethic, low motivation, and low pay caused many workers to underperform in ways that raised ethical issues. Managers also mentioned diversity issues and theft by both guests and employees as ethical issues of concern, and shared stories about their experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study identified and examined the concerns of hotel general managers regarding ethics in the hospitality industry. Thirty-five managers were interviewed during and immediately following the economic recession to determine which ethical issues in the hotel industry and at their own properties concerned them the most. Results showed that more people and organizations attempted to renegotiate hotel rates, which actions, in turn, led to some lapses in ethical behavior. Managers said that because of the economic downturn, they felt pressure from both private owners and corporate headquarters. They also said a lack of work ethic, low motivation, and low pay caused many workers to underperform in ways that raised ethical issues. Managers also mentioned diversity issues and theft by both guests and employees as ethical issues of concern, and shared stories about their experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Labor management relations in the hospitality sector is an important aspect of effective management. Increasingly, unions are becoming proactive in organizing hospitality workers. This manifests itself in strikes, boycotts, picketing, sexual harassment complaints, and complaints to OSHA regarding safety and health workplace violations. This research monitors the current scene with respect to labor management relations and analyzes work issues that have been brought up for third-party resolution by NLRB staff or arbitrators. The study reports on 66 NLRB cases and 104 arbitration cases. Issues brought before the NLRB include mostly contract interpretations. In arbitration, there were mostly discipline issues, including work rule violations, disorderly conduct, poor performance and employee theft. Quite often, the proposed job action on the part of the employer was discharge. In NLRB cases, the employee usually prevailed, while in arbitration the employer usually prevailed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Individual cues to deception are subtle and often missed by lay people and law enforcement alike. Linguistic statement analysis remains a potentially useful way of overcoming individual diagnostic limitations (e.g. Criteria based Content Analysis; Steller & Köhnken, 1989; Reality monitoring; Johnson & Raye, 1981; Scientific Content Analysis; Sapir, 1996). Unfortunately many of these procedures are time-consuming, require in-depth training, as well as lack empirical support and/or external validity. The current dissertation develops a novel approach to statement veracity analysis that is simple to learn, easy to administer, theoretically sound, and empirically validated. Two strategies were proposed for detecting differences between liars' and truth-tellers' statements. Liars were hypothesized to strategically write statements with the goal of self-exoneration. Liars' statements were predicted to contain more first person pronouns and fewer third person pronouns. Truth-tellers were hypothesized to be motivated toward being informative and thus produce statements with fewer first person pronouns and more third person pronouns. Three studies were conducted to test this hypothesis. The first study explored the verbal patterns of exoneration and informativeness focused statements. The second study used a traditional theft paradigm to examine these verbal patterns in guilty liars and innocent truth tellers. In the third study to better match the context of a criminal investigation a cheating paradigm was used in which spontaneous lying was induced and written statements were taken. Support for the first person pronoun hypothesis was found. Limited support was found for the third person pronoun hypothesis. Results, implications, and future directions for the current research are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increase of crime in Brazilian society has attracted the interest of a growing number of scholars. In psychology, among the aspects studied for the understanding of antisocial and criminal behaviors, there is the personality, object of study of the different fields of this discipline, such as Cognitive Psychology. Thus, in this study, it was used the Young‟s Personality‟s Schemas theory, which considers that schemas are dysfunctional cognitive or emotional patterns that are constituted in the personality (Young et al., 2008). Moreover, for antisocial and criminal conducts, it was considered the Seisdedos‟ design, which says that the first one represents a violation of social rules, that doesn‟t cause serious harm to others, while the second one causes serious injury (Formiga & Gouveia, 2003). The research aimed mainly, to verify the existence of differences in means of responses to the Scale of Antisocial and Criminal Conducts and Young Schema Questionnaire for different crimes (theft, robbery, murder, rape and drug trafficking). For this purpose, the research was applied on a sample of 355 inmates. First, it was analyzed the reliability of the questionnaires, resulting in excellents reliabilities for this sample. There were significant differences between mean responses only for criminal conducts. The schemas that presented significant differences were: Emotional Deprivation, Social Isolation, Entitlement/Grandiosity and Dependence / Incompetence. The type of conduct and schema prevalent for each offense and total sample were also verified. Antisocial conduct prevailed for total sample and all the offences, except for robbery. Moreover, Self-sacrifice was prevalent for total sample and all the offenses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Historical archaeology, in its narrow temporal sense -as an archaeology of the emergence and subsequent evolution of the Modern world- is steadily taking pace in Spanish academia. This paper aims at provoking a more robust debate through understanding how Spanish historical archaeology is placed in the international scene and some of its more relevant particularities. In so doing, the paper also stresses the strong links that have united historical and prehistorical archaeology since its inception, both in relation to the ontological, epistemological and methodological definition of the first as to the influence of socio-political issues in the latter. Such reflection is partly a situated reflection from prehistory as one of the paper’s authors has been a prehistorian for most of her professional life.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There appears to be a paradox in crime figures according to two reports issued recently by the Home Office in April 2015. The recent crime figures released by the Office for National Statistics (ONS) show a rise in crime in the UK triggered by a rise in violent crime while the figures released by the the Crime Survey of England and Wales (CSEW) (which is based on interviews with members of the public about their experiences of crime) estimated a 7 per cent fall in overall crime to 6.9 million incidents last year. The CSEW, which questions 35,000 people in England and Wales, estimates that crime is now at its lowest level since the study began in 1981.So why have we seen this apparent discrepancy in figures? In reality the ONS figures reflect new reporting practices by the Police and it stated it could no longer approve figures recorded by the police because they were unreliable, prompting major revisions of how each force handles its figures. The renewed focus on the quality of crime recording is thought to have led to improved compliance with national recording standards, leading to proportionally more crimes reported to the police being recorded by them. Improved compliance with recording standards is thought to have particularly affected the way the police recorded crime categories of violence against the person (up 21%) and public order offences (up 14%). These rises were largely off-set by falls in the number of recorded theft offences (down 5%). In contrast to the CSEW, there was a 2% increase in police recorded crime compared with the previous year, with 3.8 million offences recorded in the year ending December 2014 (see Figure 1)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2016-08