859 resultados para Hate crimes
Resumo:
General note: Title and date provided by Bettye Lane.
Resumo:
General note: Title and date provided by Bettye Lane.
Resumo:
General note: Title and date provided by Bettye Lane.
Resumo:
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.
Resumo:
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.
Resumo:
This article explores the feminist critique that progress in the classification of sexual violence crimes within international criminal law has not been matched by sufficient legal enforcement. It takes the Extraordinary Chambers in the Courts of Cambodia (ECCC) as a case study, exploring the various myths, investigative failures and procedural developments that have hindered the ECCC’s effective investigation of sexual violence. The article argues that while there is a need to adopt a nuanced perspective of the many gender inequalities facing women, it remains crucial that sexual violence is adequately investigated and prosecuted, due to the normative value of such prosecutions. It concludes with some suggestions as to how the ECCC can improve accountability for such crimes, but also highlights lessons that future courts can learn from the ECCC’s failures.
Resumo:
Dissertação de Mestrado apresentada ao Instituto Superior de Psicologia Aplicada para obtenção de grau de Mestre na especialidade de Psicologia Clínica.
Resumo:
This study had three purposes. First, it aimed to re-conceptualize organization-public relationships (OPRs) in public relations and crisis communication. This OPR re-conceptualization helps find out when the OPR buffering effect or the OPR love-becomes-hate effect happens. Second, it aimed to examine how consumer emotions are influenced by OPRs and influence consumer behavioral intentions. Third, it aimed to address the current problematic operationalization of the concept of consumer. Three pilot studies and one main study were conducted. Apple and Whole Foods were the two brands examined. One crisis that undermined the self-defining attributes shared between the brand and its consumers and another crisis that did not were examined for each brand. Almost 500 Apple consumers and 400 Whole Foods consumers provided usable questionnaires. This study had several major findings. First, non-identifying relationship and identifying relationship were different constructs. Moreover, trust, satisfaction, and commitment were not conceptually separate dimensions of OPRs. Second, the non-identifying relationships offered buffering effects by increasing positive attitudes and tempering anger and disappointment. The identifying relationships primarily offered the love-becomes-hate effects by increasing anger and disappointment. Third, if the crisis was relevant to consumers’ daily lives, brand response strategies were less effective at mitigating consumer negative reactions. Moreover, apology-compensation-reminder strategy was more effective compared to no-comment strategy. However, the apology-compensation-reminder strategy was no more effective than other strategies as long as brands compensate to the victims. Identifying relationships increased the effectiveness of response strategies. If the crisis did not undermine the self-defining attributes shared between consumers and brands, the response strategies worked even better. This study contributes to crisis communication research in multiple ways. First, it advances the OPR conceptualization by demonstrating that non-identifying relationship and identifying relationship are different concepts. More importantly, it advances the theory building of OPRs’ influences on crises by finding out when the buffering effect and the love-becomes-hate effect happen. Second, it adds to emotion research by demonstrating that strong OPRs can lead to negative emotions and positive emotions can have negative behavioral consequences on organizations. Third, the precise operationalization of the concept of consumer gives more insights about consumer reactions to crises.
Resumo:
O presente Relatório Científico Final do Trabalho de Investigação Aplicada está subordinado ao tema “Crimes em ambiente digital – Investigação da GNR para a obtenção de prova”. O tema enunciado tem como finalidade fazer uma análise da investigação criminal da GNR, no que diz respeito à obtenção de prova digital, em inquéritos delegados pela Autoridade Judiciária. Como objetivo geral pretende-se determinar a importância da prova digital para a investigação criminal da GNR. A investigação tem ainda objetivos específicos como a determinação das capacidades e dificuldades das vertentes operativa e criminalística para a obtenção de prova digital e também a determinação dos principais tipos de crime que se suportaram neste tipo de prova. Ao nível das bases lógicas, a presente investigação apoia-se no método hipotéticodedutivo, como tal, o ponto de partida é a conceção das questões de investigação, respetivos objetivos e hipóteses de investigação. No que diz respeito às técnicas de recolha de dados, a presente investigação é apoiada em conteúdo documental, entrevistas e questionários. A análise e discussão dos resultados obtidos permite tecer as conclusões do trabalho que, por sua vez, permitem verificar a veracidade das hipóteses formuladas na fase inicial da investigação. Como principais resultados conseguimos constatar que a prova digital é um tipo de prova que deve ser priorizada para os inquéritos podendo ser obtida num grande espectro de tipologias criminais que são da competência da GNR, em matéria de investigação criminal. Concluímos também que a Guarda ainda tem uma grande margem de progressão até estar completamente capacitada para a obtenção de prova digital, ainda assim, estão a ser desenvolvidos esforços e competências nesse sentido, sendo que alguns Comandos Territoriais se encontram mais desenvolvidos nesta matéria.
Resumo:
Dissertação (mestrado)—Universidade de Brasília, Instituto de Ciências Sociais, Centro de Pesquisa e Pós-Graduação sobre as Américas, Programa de Pós-Graduação em Estudos Comparados sobre as Américas, 2016.
Resumo:
A fraude e evasão fiscal são realidades cada vez mais presentes no quotidiano nacional. Não raras vezes, somos bombardeados por notícias, que nos dão conta de suspeita da prática de crimes de natureza fiscal, perpetuados por indivíduos com cargos importantes, e influência no panorama nacional, causando grandes danos para os cofres do Estado. Por esse motivo, o legislador tem adotado uma postura mais interventiva, no sentido de punir mais severamente os agentes que praticam este tipo de crimes. Assim, temos assistido à criminalização e à responsabilização dos agentes que praticam este tipo de criminalidade. Paralelamente a responsabilização dos agentes, temos a responsabilização das sociedades, contudo tal como veremos ao longo da dissertação, esta realidade é bastante recente entre nós. De facto, o código penal anterior à versão introduzida pela lei n.º 59/2007, de 4 de setembro, não responsabilizavam penalmente e diretamente as sociedades, admitindo-se apenas, a sua responsabilização de forma estritamente excecional. Contudo, e tal como veremos, o nosso ordenamento jurídico já prevê que haja responsabilidade penal, fiscal e civil das sociedades e dos seus administradores. Nesse sentido, faremos todo o enquadramento legal da responsabilidade penal, fiscal e civil das sociedades e dos seus administradores, e de que modo é que ela opera. No final da exposição acerca do regime geral da responsabilidade, faremos uma pequena análise e enquadramento ao concreto caso do BES, na exata medida em que, estamos perante um caso em que existem fortes suspeitas da existência de crimes tributários fiscais levados a cabo por administradores daquela sociedade anónima que causaram elevado prejuízos para o banco levando o mesmo à falência.
Resumo:
Through the Clock’s Workings is a world first: a remixed and remixable anthology of literature.----- Prominent Australian authors have written new short stories and released them under a Creative Commons Attribution Non-Commercial ShareAlike licence. What that means is you can remix the stories, but only if you acknowledge the author, the remix is not for commercial use, and your new work is available for others to remix. The authors’ stories were made available on our website and new and emerging writers were invited to create their own remixes to be posted on the website and considered for publication in the print anthology alongside the original stories.----- The result is a world first: a remixed and remixable anthology of literature. Buy your copy now from the Sydney University Press eStore or download the electronic version.----- So how do you use a remixable anthology? Simple.----- Step 1 - Read. Thumb your way through the pages at will. Find the stories you love, the ones you hate, the ones that could be better.----- Step 2 - Re/create. Each story is yours to share and to remix. Use only one paragraph or character or just make subtle changes. Change the genre, alter its formal or stylistic characteristics, or revise its message. Use as little or as much as you like - as long as it works.----- Step 3 - Share. Be part of a growing community of literature remixing. Email your remix to us and start sharing. The entire anthology can be remixed - the original stories, the remixes, and even the fonts.----- Through the Clock’s Workings is Read&Write!
Resumo:
The analysis and value of digital evidence in an investigation has been the domain of discourse in the digital forensic community for several years. While many works have considered different approaches to model digital evidence, a comprehensive understanding of the process of merging different evidence items recovered during a forensic analysis is still a distant dream. With the advent of modern technologies, pro-active measures are integral to keeping abreast of all forms of cyber crimes and attacks. This paper motivates the need to formalize the process of analyzing digital evidence from multiple sources simultaneously. In this paper, we present the forensic integration architecture (FIA) which provides a framework for abstracting the evidence source and storage format information from digital evidence and explores the concept of integrating evidence information from multiple sources. The FIA architecture identifies evidence information from multiple sources that enables an investigator to build theories to reconstruct the past. FIA is hierarchically composed of multiple layers and adopts a technology independent approach. FIA is also open and extensible making it simple to adapt to technological changes. We present a case study using a hypothetical car theft case to demonstrate the concepts and illustrate the value it brings into the field.