922 resultados para LGBTIQ crime and justice


Relevância:

100.00% 100.00%

Publicador:

Resumo:

O objeto de pesquisa desta dissertação são as perícopes de Isaías 7,10-17;8,23-9,6 e 11,1-9. Nelas encontra-se o cerne do pensamento messiânico de Isaías. É importante salientar que o messianismo isaiano parte da concepção de um messias que vem para governar a partir do direito e da justiça, e, assim, estabelecer a paz. O messianismo apresentado por este profeta não parte das esferas de poder da corte, mas dos pequenos e frágeis da sociedade, dotados do espírito de Javé. Há que se destacar que a profecia de Isaías é um divisor de águas no que concerne à teologia messiânica no Reino do Sul, especialmente nos profetas depois dele. Em Isaías, encontra-se a ruptura com as classes dominantes e com um messianismo bélico. A proposta deste profeta aponta para um messias frágil, mas que é movido pelo sopro, pelo movimento de Javé em suas ações. E assim, Isaías abre as portas para compreensão de um messias pobre, como retrata Zacarias, um messias servo, apresentado pelo Dêutero-Isaías, ou quem sabe um messias pastor, como proposto por Miquéias e Ezequiel e bem recebido pelas tradições do primeiro século (Jo 10,10). O messias em Isaías tem nomes e adjetivos : Imanuel, menino, raiz de Jessé, mas não tem rosto, não tem localização geográfica, não se enquadra em nenhum tipo messiânico desde o davidismo de Jerusalém. Este messias pode ser encontrado em qualquer época com qualquer rosto, por isso a importante releitura messiânica apresentada em textos do cristianismo nascente. Muitos deles inspirados na profecia isaiana do 8º. século a.C.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Case linkage, the linking of crimes into series, is used in policing in the UK and other countries. Previous researchers have proposed using rapists' speech in this practice; however, researching this application requires the development of a reliable coding system for rapists' speech. A system was developed based on linguistic theories of pragmatics which allowed for the categorization of an utterance into a speech act type (e.g. directive). Following this classification, the qualitative properties of the utterances (e.g. the degree of threat it carried) could be captured through the use of rating scales. This system was tested against a previously developed system using 188 rapists' utterances taken from victims' descriptions of rape. The pragmatics-based system demonstrated higher inter-rater reliability whilst enabling the classification of a greater number of rapists' utterances. Inter-rater reliability for the subscales was also tested using a sub-sample of 50 rapists' utterances and inter-item correlations were calculated. Seventy-six per cent of the subscales had satisfactory to high inter-rater reliability. Based on these findings and the inter-item correlations, the classification system was revised. The potential use of this system for the practices of case linkage and offender profiling is discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Very little empirical work exists on cyberstalking. The current study analysed detailed questionnaires completed by 1051 self-defined stalking victims. Almost half (47.5%) reported harassment via the Internet, but only 7.2% of the sample was judged to have been cyberstalked. Ordinal regression analyses of four groups of victims, categorized according to degree of cyber involvement in their victimization, revealed a general picture of similarity between the groups in terms of the stalking process, responses to being stalked, and the effects on victims and third parties. It was concluded that cyberstalking does not fundamentally differ from traditional, proximal stalking, that online harassment does not necessarily hold broad appeal to stalkers, and that those who target ex-intimates remain the most populous stalker type.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Witnesses often experience lengthy delays prior to being interviewed, during which their memories inevitably decay. Video-communication technology - favored by intergovernmental organizations for playing larger roles in judicial processes - might circumvent some of the resourcing problems that can exacerbate such delays. However, whereas video-mediation might facilitate expeditious interviewing, it might also harm rapport-building, make witnesses uncomfortable, and thereby undermine the quality and detail of their reports. Participants viewed a crime film and were interviewed either one day later via video-link, one day later face-to-face, or 1-2 weeks later face-to-face. Video-mediation neither influenced the detail or the accuracy of participants' reports, nor their ratings of the quality of the interviews. However, participants who underwent video-mediated interviews after a short delay gave more accurate, detailed reports than participants who waited longer to be interviewed face-to-face. This study provides initial empirical evidence that video-mediated communication (VMC) could facilitate the expeditious conduct of high-quality investigative interviews. © 2013 © 2013 Taylor & Francis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sex work is a subject of significant contestation across academic disciplines, as well as within legal, medical, moral, feminist, political and socio-cultural discourses. A large body of research exists, but much of this focuses on the sale of sex by women to men and ignores other performances, practices, meanings and embodiments in the contemporary sex industry. A queer agenda is important in order to challenge hetero-centric gender norms and to develop new insights into how gender, sex, power, crime, work, migration, space/place, health and intimacy are understood in the context of commercial sexual encounters. Queer Sex Work explores what it might mean to 'be', 'do' and 'think' queer(ly) in the study and practice of commercial sex. It brings together a multiplicity of empirical case studies - including erotic dance venues, online sex working, pornography, grey sexual economies, and BSDM - and offers a variety of perspectives from academic scholars, policy practitioners, activists and sex workers themselves. In so doing, the book advances a queer politics of sex work that aims to disrupt heteronormative logics whilst also making space for different voices in academic and political debates about commercial sex. This unique and multidisciplinary volume will be indispensable for scholars and students of the global sex trade and of gender, sexuality, feminism and queer theory more broadly, as well as policymakers, activists and practitioners interested in the politics and practice of sex work in local, national and international contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter introduces Native Language Identification (NLID) and considers the casework applications with regard to authorship analysis of online material. It presents findings from research identifying which linguistic features were the best indicators of native (L1) Persian speakers blogging in English, and analyses how these features cope at distinguishing between native influences from languages that are linguistically and culturally related. The first chapter section outlines the area of Native Language Identification, and demonstrates its potential for application through a discussion of relevant case history. The next section discusses a development of methodology for identifying influence from L1 Persian in an anonymous blog author, and presents findings. The third part discusses the application of these features to casework situations as well as how the features identified can form an easily applicable model and demonstrates the application of this to casework. The research presented in this chapter can be considered a case study for the wider potential application of NLID.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Brazilians greeted the long-awaited decision of making Rio de Janeiro the host of the 2016 Olympic Games with tremendous exhilaration. Although Rio’s fantastic natural beauty certainly added to its attraction in hosting the games, its alarming rates of urban crime and violence largely associated with drug trafficking immediately triggered worldwide criticism, and put at issue its ability to guarantee the security for the games. Brazilians have been vying for a position as an emerging global economy and understand the importance of the Games for international prestige. This makes the stakes very high when hosting the Olympic Games in the wake of the 2014 Soccer World Cup, which will also be held in Brazil. This paper explores these criticisms and assesses Rio’s ability to prepare for this important event. The paper further explores the consensus that Brazilians will be more equipped to address actions taken by organized crime capable of affecting the Olympic Games than to face a terrorist attack. Brazil – and Rio – does not figure in the “terrorism map” as a region particularly linked to terrorism. Aside from uncorroborated suspicions of activities by terrorist organizations on the Tri-Border region (Argentina, Brazil, and Paraguay), Brazil does not elicit many concerns regarding terrorism.1 Yet, there is no way to guarantee that terrorist organizations will not try to make use of the 2016 Rio Olympic Games to advance their agenda. This being in mind, Rio and Brazil in general face a long road ahead to prepare, prevent, protect and respond to a possible terrorist attack during the 2016 Olympics. It is clear that prevention and preparation towards potential threats to the Games must necessarily include cooperation and exchange of best practices with other countries. 1 U.S. Department of State has confirmed that this area may have been used to transport weapons and conduct financial affairs in the past. This type of activity has been made more difficult with the fortification of border controls in more recent times.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Faced with the violence, criminality and insecurity now threatening peace and democratic governance in Central America, the region’s governments have decided to use the Armed Forces to carry out actions in response to criminal actions, looking to improve their performance. Although public demand for including the Armed Forces in these functions takes place within a legally legitimate framework, it is motivated by tangible circumstances such as increased levels of violence, delinquency and crime. Despite being coupled with the perception of institutional weakness within the security and judicial system (particularly police) and the recognition of prestige, efficiency, discipline and severity in fulfilling the Armed Forces’ missions, these arguments are insufficient to legitimize the use of the military as a police force. Within this context, this paper reflects on the implications or consequences of the use of the Armed Forces in duties traditionally assigned to the police in the Central American region with the goal of contributing to the debate on this topic taking place in the Americas. To achieve this end, first we will focus on understanding the actual context in which a decision is made to involve the Armed Forces in security duties in the region. Second, we will examine the effects and implications of this decision on the Armed Forces’ relations within their respective societies. Third and finally, considering this is already a reality in the region, this paper will provide recommendations. The main findings of this research, resulting from the application of an analyticaldescriptive and historically based study, are organized in three dimensions: the political dimension, by implication referring to the relationship between the ultimate political authority and the Armed Forces; the social dimension, by implication the opinion of citizens; and other implications not only affecting the structural and cultural organization of armies and police but also the complementary operational framework within a context of comprehensive response by the State. As a main conclusion, it poses there is an environment conducive to the use of the Armed Forces in citizen’s security, in view of the impact of threats provoked by criminal structures of a military nature currently operating in Central America. However, this participation creates an inevitable social and political impact if implemented in isolation or given a political leading role and/or operational autonomy. This participation poses risks to the institutions of the Armed Forces and the police as well. Finally, this paper identifies an urgent need for the Armed Forces’ role to be more clearly defined with regard to security matters, limiting it to threats that impact States’ governability and existence. Nonetheless, Central American States should seek a COMPREHENSIVE response to current crime and violence, using all necessary institutions to confront these challenges, but with defined roles and responsibilities for each and dynamic coordination to complement their actions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the wake of the “9-11” terrorists' attacks, the U.S. Government has turned to information technology (IT) to address a lack of information sharing among law enforcement agencies. This research determined if and how information-sharing technology helps law enforcement by examining the differences in perception of the value of IT between law enforcement officers who have access to automated regional information sharing and those who do not. It also examined the effect of potential intervening variables such as user characteristics, training, and experience, on the officers' evaluation of IT. The sample was limited to 588 officers from two sheriff's offices; one of them (the study group) uses information sharing technology, the other (the comparison group) does not. Triangulated methodologies included surveys, interviews, direct observation, and a review of agency records. Data analysis involved the following statistical methods: descriptive statistics, Chi-Square, factor analysis, principal component analysis, Cronbach's Alpha, Mann-Whitney tests, analysis of variance (ANOVA), and Scheffe' post hoc analysis. ^ Results indicated a significant difference between groups: the study group perceived information sharing technology as being a greater factor in solving crime and in increasing officer productivity. The study group was more satisfied with the data available to it. As to the number of arrests made, information sharing technology did not make a difference. Analysis of the potential intervening variables revealed several remarkable results. The presence of a strong performance management imperative (in the comparison sheriff's office) appeared to be a factor in case clearances and arrests, technology notwithstanding. As to the influence of user characteristics, level of education did not influence a user's satisfaction with technology, but user-satisfaction scores differed significantly among years of experience as a law enforcement officer and the amount of computer training, suggesting a significant but weak relationship. ^ Therefore, this study finds that information sharing technology assists law enforcement officers in doing their jobs. It also suggests that other variables such as computer training, experience, and management climate should be accounted for when assessing the impact of information technology. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The crisis of the model of technical and formal rationality is discussed in light of a paradigmatic change of the Law that arises in the context of recent transformations of capitalism worldwide, proposing a humanization of Law and Justice with a new ethical-political foundation that promotes a reconciliation between the rules that governs the social order and the world of life, a process of society’s emancipation. As empirical cut it is taken the Right of Children and Youth and, in a practical perspective, the recognition and effectiveness of the Rights of Children and Adolescents in Brazil. It is proposed to analyze the process of democratization and legitimacy of the children and youth rights from the study and apprehension of knowledge that advocate a multidisciplinary view of knowledge and a dialogic praxis for construction of a thought able to contribute to the analysis of public policies and to develop strategies that allow a real change on the social thinking about the doctrine of integral protection of children and adolescents. The proposed methodological approach was developed from a dialectical view of science and as a research strategy for data collection of symbolic cartography or cartographic sociology of law and justice. It is shown that in the process of humanization of the Law and Justice there is a gap between the rights and the democratic participation of these rights.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis investigates the historical influence of the criminal policy in the context that shapes the first specific law for children and adolescents in Brazil, the 1927 Children's Code, a standard that inaugurates the conceptual scission between children and "minor" and their different treatment by the State. The study addresses the demand for order in the context of changes in the working world in the transition from the slave system to the capitalist mode of production, and the corresponding disciplinary and punitive control mechanisms directed to the segment of childhood and adolescence. The theoretical route proposes a questioning of the political construction of law and justice, as well as the conformation of the punitive techniques, and the construction of the stereotype of the "delinquent", prime target of the criminal policy, focusing on the process of criminalization of the segment in question through the confrontation of the Critical perspective with the approaches of Classical and Positive schools. This research shows the imposition of a bourgeois morality that obscures the social conflict attributing it to people isolated by the criminalization of their conduct; and points out that the historical forms of selective social control were greatly influenced by psychiatry and psychology, either by the elaboration of the image of the "delinquent" or by the expected performance of custodial institutions. Finally, the developments and the permanence of the historical roots of the criminal policy are problematized, relating them to the difficulties currently encountered in the consolidation of the legal garantism paradigm proposed by the Children and Adolescent Statute.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis investigates the historical influence of the criminal policy in the context that shapes the first specific law for children and adolescents in Brazil, the 1927 Children's Code, a standard that inaugurates the conceptual scission between children and "minor" and their different treatment by the State. The study addresses the demand for order in the context of changes in the working world in the transition from the slave system to the capitalist mode of production, and the corresponding disciplinary and punitive control mechanisms directed to the segment of childhood and adolescence. The theoretical route proposes a questioning of the political construction of law and justice, as well as the conformation of the punitive techniques, and the construction of the stereotype of the "delinquent", prime target of the criminal policy, focusing on the process of criminalization of the segment in question through the confrontation of the Critical perspective with the approaches of Classical and Positive schools. This research shows the imposition of a bourgeois morality that obscures the social conflict attributing it to people isolated by the criminalization of their conduct; and points out that the historical forms of selective social control were greatly influenced by psychiatry and psychology, either by the elaboration of the image of the "delinquent" or by the expected performance of custodial institutions. Finally, the developments and the permanence of the historical roots of the criminal policy are problematized, relating them to the difficulties currently encountered in the consolidation of the legal garantism paradigm proposed by the Children and Adolescent Statute.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A dissertação preocupou-se em analisar as relações de bandidos e ex-bandidos com o pentecostalismo na Assembleia de Deus Fortificada em Cristo (ADFEC), situada na favela Jardim São Jorge, periferia da Cidade Ademar, região Sul da capital de São Paulo. Interessou-nos compreender as interações desses agentes e de qual maneira a igreja desempenhou seu trabalho em um espaço pentecostal. A pesquisa, teve como objetivo fundamental, examinar as aproximações da criminalidade e o pentecostalismo indicando suas rupturas e características peculiares. O trabalho de campo se dedicou em coletar dados que comprovassem atuação da ADFEC juntos aos agentes do crime, e em que medida a filiação religiosa dos agentes ganhava importância. Por fim, buscamos refletir sobre a adesão de bandidos e ex-bandidos ao pentecostalismo e a influência dessa adesão no cotidiano da comunidade.