861 resultados para criminal profiling


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy while all 'others' are indeed 'othered'. This article draws on research carried out by the authors in a core first year university ethics class, in which a fictional text was introduced with the intention of unpacking these discourses. An ethnographic study was undertaken where both students and teachers engaged in discussions over, and personal written reflections on, the textual content. In reporting the results of that study this article uses a post-structural framework to identify how classroom and textual discourses might be used to break down socially constructed categories of sexuality and students' conceptualisations of non-heterosexual behaviour. It was found that engaging in discussion in the context of the fictional text allowed some students to begin to recognise their own heteronormative views and engage in an informed critique of them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The recent Supreme Court decision of Queensland v B [2008] 2 Qd R 562 has significant implications for the law that governs consent and abortions. The judgment purports to extend the ratio of Secretary, Department of Health and Community Services (NT) v JWB and SMB (1991) 175 CLR 218 (Marion’s Case) and impose a requirement of court approval for terminations of pregnancy for minors who are not Gillick-competent. This article argues against the imposition of this requirement on the ground that such an approach is an unjustifiable extension of the reasoning in Marion’s Case. The decision, which is the first judicial consideration in Queensland of the position of medical terminations, also reveals systemic problems with the criminal law in that State. In concluding that the traditional legal excuse for abortions will not apply to those which are performed medically, Queensland v B provides further support for calls to reform this area of law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This edition has been substantially revised to increase overall clarity and to ensure a balanced examination of the criminal law in the 'Code' states, Queensland and Western Australia. The work has been brought up-to-date in all areas and provides valuable comment on the recent wide-reaching reforms to the law of homicide in Western Australia. Significant developments in both states discussed in this edition include: The abolition of wilful murder and infanticide, and the new definition of murder (WA); The introduction of the new offence of unlawful assault causing death (WA); The abolition of provocation to murder (WA), and whether this excuse still has a part to play (Qld); The reformulation of the excuse of self-defence, and the introduction of excessive self-defence (WA); The creation of offences for drink spiking (Qld and WA); and Current and proposed sentencing considerations (Qld and WA). Fundamental principles of the criminal law are illustrated throughout the book by selected extracts from the Codes and case law, while additional materials foster critical reflection on the law and the need for reform.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Criminal Law in Queensland and Western Australia is a new title in the Butterworths Questions and Answers (BQA) series, focusing on the criminal law in the main code states – Queensland and WA.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer forensics is the process of gathering and analysing evidence from computer systems to aid in the investigation of a crime. Typically, such investigations are undertaken by human forensic examiners using purpose-built software to discover evidence from a computer disk. This process is a manual one, and the time it takes for a forensic examiner to conduct such an investigation is proportional to the storage capacity of the computer's disk drives. The heterogeneity and complexity of various data formats stored on modern computer systems compounds the problems posed by the sheer volume of data. The decision to undertake a computer forensic examination of a computer system is a decision to commit significant quantities of a human examiner's time. Where there is no prior knowledge of the information contained on a computer system, this commitment of time and energy occurs with little idea of the potential benefit to the investigation. The key contribution of this research is the design and development of an automated process to describe a computer system and its activity for the purposes of a computer forensic investigation. The term proposed for this process is computer profiling. A model of a computer system and its activity has been developed over the course of this research. Using this model a computer system, which is the subj ect of investigation, can be automatically described in terms useful to a forensic investigator. The computer profiling process IS resilient to attempts to disguise malicious computer activity. This resilience is achieved by detecting inconsistencies in the information used to infer the apparent activity of the computer. The practicality of the computer profiling process has been demonstrated by a proof-of concept software implementation. The model and the prototype implementation utilising the model were tested with data from real computer systems. The resilience of the process to attempts to disguise malicious activity has also been demonstrated with practical experiments conducted with the same prototype software implementation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses the use of models in automatic computer forensic analysis, and proposes and elaborates on a novel model for use in computer profiling, the computer profiling object model. The computer profiling object model is an information model which models a computer as objects with various attributes and inter-relationships. These together provide the information necessary for a human investigator or an automated reasoning engine to make judgements as to the probable usage and evidentiary value of a computer system. The computer profiling object model can be implemented so as to support automated analysis to provide an investigator with the information needed to decide whether manual analysis is required.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The law recognises the right of a competent adult to refuse medical treatment even if this will lead to death. Guardianship and other legislation also facilitates the making of decisions to withhold or withdraw life-sustaining treatment in certain circumstances. Despite this apparent endorsement that such decisions can be lawful, doubts have been raised in Queensland about whether decisions to withhold or withdraw life-sustaining treatment would contravene the criminal law, and particularly the duty imposed by the Criminal Code (Qld) to provide the “necessaries of life”. This article considers this tension in the law and examines various arguments that might allow for such decisions to be made lawfully. It ultimately concludes, however, that criminal responsibility may still arise and so reform is needed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In their statistical analyses of higher court sentencing in South Australia, Jeffries and Bond (2009) found evidence that Indigenous offenders were treated more leniently than non-Indigenous offenders, when they appeared before the court under similar numerical circumstances. Using a sample of narratives for criminal defendants convicted in South Australia’s higher courts, the current article extends Jeffries and Bond’s (2009) prior statistical work by drawing on the ‘focal concerns’ approach to establish whether, and in what ways, Indigeneity comes to exert a mitigating influence over sentencing. Results show that the sentencing stories of Indigenous and non-Indigenous offenders differed in ways that may have reduced assessments of blameworthiness and risk for Indigenous defendants. In addition, judges highlighted a number of Indigenous-specific constraints that potentially could result in imprisonment being construed as an overly harsh and costly sentence for Indigenous offenders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent Australian research on Indigenous sentencing primarily explores whether disparities in sentencing outcomes exist. Little is known about how judges perceive or refer to Indigenous defendants and their histories, and how they interpret the circumstances of Indigenous defendants in justifying their sentencing decisions. Drawing on the ‘focal concerns’ approach, this study presents a narrative analysis of a sample of judges’ sentencing remarks for Indigenous and non-Indigenous criminal defendants convicted in South Australia’s Higher Courts. The analysis found that the sentencing stories of Indigenous and non-Indigenous offenders differed in ways that possibly reduced assessments of blameworthiness and risk for Indigenous defendants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer profiling is the automated forensic examination of a computer system in order to provide a human investigator with a characterisation of the activities that have taken place on that system. As part of this process, the logical components of the computer system – components such as users, files and applications - are enumerated and the relationships between them discovered and reported. This information is enriched with traces of historical activity drawn from system logs and from evidence of events found in the computer file system. A potential problem with the use of such information is that some of it may be inconsistent and contradictory thus compromising its value. This work examines the impact of temporal inconsistency in such information and discusses two types of temporal inconsistency that may arise – inconsistency arising out of the normal errant behaviour of a computer system, and inconsistency arising out of deliberate tampering by a suspect – and techniques for dealing with inconsistencies of the latter kind. We examine the impact of deliberate tampering through experiments conducted with prototype computer profiling software. Based on the results of these experiments, we discuss techniques which can be employed in computer profiling to deal with such temporal inconsistencies.