878 resultados para Crime and Misconduct Commission


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Global Survey on Trade Facilitation and Paperless Trade Implementation 2014-2015 is a global effort led by the Economic and Social Commission for Asia and the Pacific (ESCAP) in collaboration with the other four United Nations Regional Commissions, namely, the Economic Commission for Latin America and the Caribbean (ECLAC), the Economic and Social Commission for Western Asia (ESCWA), the Economic Commission for Africa (ECA) and the Economic Commission for Europe (UNECE). The goal of the Global Survey is to gather information from the member states of the respective Regional Commissions on trade facilitation and paperless trade measures and strategies implemented at the national and regional levels. The results of the survey will enable countries and development partners to better understand and monitor progress on trade facilitation, support evidence-based public policies, share best practices and identify capacity building and technical assistance needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Seeking alternatives for the economic system to face the several crises it has gone through lately (electrical power, cultural, financing and technological) brought about a new market involving the Kyoto Protocol signatory countries: the carbon market. The present article aims at assessing the carbon market institutional issue in Brazil by identifying the risks and opportunities inherent to the institutional agent characteristics and to that market rules. The research methodology was bibliographic and based on the analysis of the Securities and Exchange Commission of Brazil (Comissao de Valores Mobiliarios and Bolsa Mercantil de Valores) contents. Its theoretical basis rests on concepts of the institution and the new institutional economy. The results show that in spite of the risks and institutional problems it involves, the carbon market is promising due to the opportunities create by new technologies and energies developed to achieve and sustain the capitalist system new cycle, addressed to produce a clean development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJETIVOS: compreender as representações sociais de membros do Poder Judiciário acerca da prevenção da violência sexual intrafamiliar contra crianças e adolescentes. MÉTODOS: pesquisa de abordagem qualitativa que teve como campo de estudo as 1ª e 2ª Varas dos Crimes contra a Criança e o Adolescente, no Tribunal de Justiça de Pernambuco, com participação de 17 sujeitos (juiz, assessor, técnicos e analistas judiciários). Observação participante, entrevistas semiestruturadas e grupo focal compreenderam as técnicas para coleta de dados, que foram analisados por meio da interpretação dos sentidos. RESULTADOS: a categoria "cultura penal" emergiu dos discursos, bem como suas subcategorias: "prevenção do crime" e "prevenção do dano". CONCLUSÕES: as representações dos sujeitos revelam uma dicotomia, caracterizando o conflito entre a tradição do Poder Judiciário e o direito novo, que abrange os princípios da proteção integral e da prioridade absoluta às crianças e dos adolescentes. O conceito de prevenção da violência sexual intrafamiliar contra crianças e adolescentes deve ser ampliado para além da mera prevenção do crime. A abordagem do problema por meio da prevenção requer que se incorpore ao Poder Judiciário uma cultura penal que abarque os princípios da proteção integral e da prioridade absoluta.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this article, we refine a politics of thinking from the margins by exploring a pedagogical model that advances transformative notions of service learning as social justice teaching. Drawing on a recent course we taught involving both incarcerated women and traditional college students, we contend that when communication among differentiated and stratified parties occurs, one possible result is not just a view of the other but also a transformation of the self and other. More specifically, we suggest that an engaged feminist praxis of teaching incarcerated women together with college students helps illuminate the porous nature of fixed markers that purport to reveal our identities (e.g., race and gender), to emplace our bodies (e.g., within institutions, prison gates, and walls), and to specify our locations (e.g., cultural, geographic, socialeconomic). One crucial theoretical insight our work makes clear is that the model of social justice teaching to which we aspired necessitates re-conceptualizing ourselves as students and professors whose subjectivities are necessarily relational and emergent.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The US penitentiary at Lewisburg, Pennsylvania, was retrofitted in 2008 to offer the country's first federal Special Management Unit (SMU) program of its kind. This model SMU is designed for federal inmates from around the country identified as the most intractably troublesome, and features double-celling of inmates in tiny spaces, in 23-hour or 24-hour a day lockdown, requiring them to pass through a two-year program of readjustment. These spatial tactics, and the philosophy of punishment underlying them, contrast with the modern reform ideals upon which the prison was designed and built in 1932. The SMU represents the latest punitive phase in American penology, one that neither simply eliminates men as in the premodern spectacle, nor creates the docile, rehabilitated bodies of the modern panopticon; rather, it is a late-modern structure that produces only fear, terror, violence, and death. This SMU represents the latest of the late-modern prisons, similar to other supermax facilities in the US but offering its own unique system of punishment as well. While the prison exists within the system of American law and jurisprudence, it also manifests features of Agamben's lawless, camp-like space that emerges during a state of exception, exempt from outside scrutiny with inmate treatment typically beyond the scope of the law

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is a challenging time to be a social scientist. Many of the concepts and categories we took for granted have been revealed as temporally and geographically specific. It is now widely accepted that the nation-state is no longer the sole container for economic, political and social processes, if indeed it ever was. This is where Kevin Stenson begins his paper. He traces the re-ordering of both state and nation, highlighting recent discussions about the unbundling and rescaling of the state and outlining how increasing ethnic and cultural diversity challenge homogeneous conceptions of the nation. In Stenson’s account these are largely empirical processes that are the basis for the important questions he raises about changing understandings of publics and social order, and their implications for the local governance of community safety. He contrasts two alternative positions; the ‘universal human rights position’ which refuses to privilege the interests of majority populations, and a more ‘communitarian and nationalistic position’ which he argues is most likely to be deployed by right wing politicians and interests groups. Drawing from extensive research in the Thames Valley region of the United Kingdom, he shows how these two understandings have both shaped the local policy response to crime and disorder.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Grounded in group conflict theory and the defended neighborhoods thesis, this nationwide empirical study of cities and their residential segregation levels, examines the occurrence of hate crime using data on for all U.S. cities with populations over 95,000, and data compiled from the Uniform Crime Report for hate crime, in conjunction with 2000 census data. Hate crime is any illegal act motivated by pre-formed bias against, in this case, a person’s real or perceived race. This research asks: Do hate crime levels predict white/black segregation levels? How does hate crime predict different measures of white/black segregation? I use the dissimilarity index measure of segregation operationalized as a continuous, binary and ordinal variable, to explore whether hate crime predicts segregation of blacks from whites. In cities with higher rates of hate crime there was higher dissimilarity between whites and blacks, controlling for other factors. The segregation level was more likely to be “high” in a city where hate crime occurred. Blacks are continually multiply disadvantaged and distinctly affected by hate crime and residential segregation. Prior studies of residential segregation have focused almost exclusively on individual choice, residents’ lack of finances, or discriminatory actions that prevent racial minorities from moving, to explore the correlates of segregation. Notably absent from these studies are measures reflecting the level of hate crime occurring in cities. This study demonstrates the importance of considering hate crime and neighborhood conflict when contemplating the causes of residential segregation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper asks: is it a fact that there is more violence in districts affected by Naxalite (Maoist) activity compared to those which are free of Naxalite activity? And can the existence of Naxalite activity in some districts of India, but not in others, be explained by differences in economic and social conditions? This study identifies districts in India in which there was significant Naxalite activity and correlating the findings with district-level economic, social, and crime indicators. The econometric results show that, after controlling for other variables, Naxalite activity in a district had, if anything, a dampening effect on its level of violent crime and crimes against women. Furthermore, even after controlling for other variables, the probability of a district being Naxalite-affected rose with an increase in its poverty rate and fell with a rise in its literacy rate. So, one prong in an anti-Naxalite strategy would be to address the twin issues of poverty and illiteracy in India.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Maternal ingestion of high concentrations of radon-222 (Rn-222) in drinking during pregnancy may pose a significant radiation hazard to the developing embryo. The effects of ionizing radiation to the embryo and fetus have been the subject of research, analyses, and the development of a number of radiation dosimetric models for a variety of radionuclides. Currently, essentially all of the biokinetic and dosimetric models that have been developed by national and international radiation protection agencies and organizations recommend calculating the dose to the mother's uterus as a surrogate for estimating the dose to the embryo. Heretofore, the traditional radiation dosimetry models have neither considered the embryo a distinct and rapidly developing entity, the fact that it is implanted in the endometrial layer of the uterus, nor the physiological interchanges that take place between maternal and embryonic cells following the implantation of the blastocyst in the endometrium. The purpose of this research was to propose a new approach and mathematical model for calculating the absorbed radiation dose to the embryo by utilizing a semiclassical treatment of alpha particle decay and subsequent scattering of energy deposition in uterine and embryonic tissue. The new approach and model were compared and contrasted with the currently recommended biokinetic and dosimetric models for estimating the radiation dose to the embryo. The results obtained in this research demonstrate that the estimated absorbed dose for an embryo implanted in the endometrial layer of the uterus during the fifth week of embryonic development is greater than the estimated absorbed dose for an embryo implanted in the uterine muscle on the last day of the eighth week of gestation. This research provides compelling evidence that the recommended methodologies and dosimetric models of the Nuclear Regulatory Commission and International Commission on Radiological Protection employed for calculating the radiation dose to the embryo from maternal intakes of radionuclides, including maternal ingestion of Rn-222 in drinking water would result in an underestimation of dose. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Jóvenes Nucleares (Spanish Young Generation in Nuclear, JJNN) is a non-profit organization and a commission of the Spanish Nuclear Society (SNE). The Universidad Politécnica de Madrid (Technical University of Madrid, UPM) is one of the most prestigious technical universities of Spain, and has a very strong curriculum in nuclear engineering training and research. Finishing 2009, JJNN and the UPM started to plan a new and first-of-a-kind Seminar in Nuclear Safety focused on the Advanced Reactors (Generation III, III+ and IV). The scope was to make a general description of the safety in the new reactors, comparing them with the built Generation II reactors from a technical point of view but simple and without the need of strong background in nuclear engineering to try to be interesting for the most number of people possible.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper first takes a step backwards with an attempt to situate the recent adoption of the Treaty on Stability, Coordination and Governance in the Economic and Monetary Union in the context of discussions on the Stability and Growth Pact (SGP) and the ‘Maastricht criteria’, as fixed in the Maastricht Treaty for membership in the Economic and Monetary Union (EMU) in a longer perspective of the sharing of competences for macroeconomic policy-making within the EU. It then presents the main features of the new so-called ‘Fiscal Compact’ and its relationship to the SGP and draws some conclusions as regards the importance and relevance of this new step in the process of economic policy coordination. It concludes that the Treaty on Stability, Coordination and Governance in the Economic and Monetary Union does not seem to offer a definitive solution to the problem of finding the appropriate budgetary-monetary policy mix in EMU, which was already well identified in the Delors report in 1989 and regularly emphasised ever since and is now seriously aggravated due to the crisis in the eurozone. Furthermore, implementation of this Treaty may under certain circumstances contribute to an increase in the uncertainties as regards the distribution of the competences between the European Parliament and national parliaments and between the former and the Commission and the Council.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the last 30 years, a clear trend has come to define modern immigration law and policy. A set of seemingly disparate developments concerning the constant reinforcement of border controls, tightening of conditions of entry, expanding capacities for detention and deportation and the proliferation of criminal sanctions for migration offences, accompanied by an anxiety on the part of the press, public and political establishment regarding migrant criminality can now be seen to form a definitive shift in the European Union towards the so-called ‘criminalisation of migration’. This paper aims to provide an overview of the ‘state-of-the-art’ in the academic literature and EU research on criminalisation of migration in Europe. It analyses three key manifestations of the so-called ‘crimmigration’ trend: discursive criminalisation; the use of criminal law for migration management; and immigrant detention, focusing both on developments in domestic legislation of EU member states but also the increasing conflation of mobility, crime and security which has accompanied EU integration. By identifying the trends, synergies and gaps in the scholarly approaches dealing with the criminalisation of migration, the paper seeks to provide a framework for on-going research under Work Package 8 of the FIDUCIA project.