996 resultados para Criminal trajectory


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inductive reasoning is fundamental to human cognition, yet it remains unclear how we develop this ability and what might influence our inductive choices. We created novel categories in which crucial factors such as domain and category structure were manipulated orthogonally. We trained 403 4-9-year-old children to categorise well-matched natural kind and artefact stimuli with either featural or relational category structure, followed by induction tasks. This wide age range allowed for the first full exploration of the developmental trajectory of inductive reasoning in both domains. We found a gradual transition from perceptual to categorical induction with age. This pattern was stable across domains, but interestingly, children showed a category bias one year later for relational categories. We hypothesise that the ability to use category information in inductive reasoning develops gradually, but is delayed when children need to process and apply more complex category structures. © 2014 © 2014 Taylor & Francis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article begins by setting out the human rights provisions that apply to social media expression. It then provides insight into the part social media plays within our society by analysing the social media landscape and how it facilitates a ‘purer’ form of expression. The social media paradox is explored through the lens of current societal issues and concerns regarding the use of social media and how these have manifested into litigation. It concludes by analysing the tension that the application of an array of criminal legislation and jurisprudence has created with freedom of expression, and whether this can successfully mitigated by the Director of Public Prosecution’s Interim Guidelines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When export and import is connected with output of basic production, and criterion functional represents a final state of economy, the generalization of classical qualitative results of the main-line theory on a case of dynamic input-output balance optimization model for open economy is given.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Book review: Heidelberg, Dordrecht, London, and New York, Springer, 2010, 189 pp., £93.55 (hardcover), ISBN 978-3-642-04330-7, e-ISBN 978-3-642-04331-4

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research was to explore the differences in factors associated with girls' status and criminal arrests. This study used data from six juvenile justice programs in multiple states, which was derived from the Juvenile Assessment and Intervention System (JAIS). The sample of 908 adolescent girls (ages 13-19) was ethnically and racially diverse (41% African American, 32% white, 12% Hispanic, 11% Native American and 4% Other). A structural equation model (SEM) was analyzed which tested the potential effects of adolescent substance use, truancy, suicidal ideation/attempt, self-harm, peer legal trouble, parental criminal history and parental and non-parental abuse on type of offense (status and criminal) and whether any of these relationships varied as a function of race/ethnicity. ^ Complex relationships emerged regarding both status and more serious criminal arrests. One of the most important findings was that distinct and different patterns of factors were associated with status arrests compared to criminal arrests. For example, truancy and parental abuse were directly associated with status offenses, whereas parental criminal history was directly related to criminal arrests. However, both status and criminal arrests shared common associations, including substance use, which signifies that certain variables are influential regarding both non-criminal and more serious crimes. In addition, significant meditating influences were observed which help to explain some underlying mechanisms involved in girls' arrest patterns. Finally, race/ethnicity moderated a key relationship, which has serious implications for treatment. ^ In conclusion, the present study is an important contribution to research regarding girls' delinquency in that it overcomes limitations in the existing literature in four primary areas: (1) it utilizes a large, multi-state, ethnically and racially diverse sample of justice system-involved girls, (2) it examines numerous co-occurring factors influencing delinquency from multiple domains (family, school, peers, etc.) simultaneously, (3) it formally examines race/ethnicity as a moderator of these multivariate relationships, and (4) it looks at status and criminal arrests independently in order to highlight possible differences in the patterning of risk factors associated with each. These findings have important implications for prevention, treatment and interventions with girls involved in the juvenile justice system.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program (INP) towards being designated as a proliferation threat (securitization)? What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program away from being designated as an existential threat (de-securitization)? What has been the overall balance of power and interaction dynamics of these opposing forces over the last half-century and what is their most likely future trajectory? ^ Iran's nuclear story can be told as the unfolding of constant interaction between state and non-state forces of "nuclear securitization" and "nuclear de-securitization." Tracking the crisscrossing interaction between these different securitizing and de-securitizing actors in a historical context constitutes the central task of this project. ^ A careful tracing of "security events" on different analytical levels reveals the broad contours of the evolutionary trajectory of INP and its possible future path(s). Out of this theoretically conscious historical narrative, one can make informed observations about the overall thrust of INP along the securitization - de-securitization continuum. ^ The main contributions of this work are three fold: First, it brings a fresh theoretical perspective on Iran's proliferation behavior by utilizing the "securitization" theory tracing the initial indications of the threat designation of INP all the way back to the mid 1970s. Second, it gives a solid and thematically grounded historical texture to INP by providing an intimate engagement with the persons, processes, and events of Tehran's nuclear pursuit over half a century. Third, it demonstrates how INP has interacted with and even at times transformed the NPT as the keystone of the non-proliferation regime, and how it has affected and injected urgency to the international discourse on nuclear proliferation specifically in the Middle East.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organized crime and illegal economies generate multiple threats to states and societies. But although the negative effects of high levels of pervasive street and organized crime on human security are clear, the relationships between human security, crime, illicit economies, and law enforcement are highly complex. By sponsoring illicit economies in areas of state weakness where legal economic opportunities and public goods are seriously lacking, both belligerent and criminal groups frequently enhance some elements of human security of the marginalized populations who depend on illicit economies for basic livelihoods. Even criminal groups without a political ideology often have an important political impact on the lives of communities and on their allegiance to the State. Criminal groups also have political agendas. Both belligerent and criminal groups can develop political capital through their sponsorship of illicit economies. The extent of their political capital is dependent on several factors. Efforts to defeat belligerent groups by decreasing their financial flows through suppression of an illicit economy are rarely effective. Such measures, in turn, increase the political capital of anti-State groups. The effectiveness of anti-money laundering measures (AML) also remains low and is often highly contingent on specific vulnerabilities of the target. The design of AML measures has other effects, such as on the size of a country’s informal economy. Multifaceted anti-crime strategies that combine law enforcement approaches with targeted socio-economic policies and efforts to improve public goods provision, including access to justice, are likely to be more effective in suppressing crime than tough nailed-fist approaches. For anti-crime policies to be effective, they often require a substantial, but politically-difficult concentration of resources in target areas. In the absence of effective law enforcement capacity, legalization and decriminalization policies of illicit economies are unlikely on their own to substantially reduce levels of criminality or to eliminate organized crime. Effective police reform, for several decades largely elusive in Latin America, is one of the most urgently needed policy reforms in the region. Such efforts need to be coupled with fundamental judicial and correctional systems reforms. Yet, regional approaches cannot obliterate the so-called balloon effect. If demand persists, even under intense law enforcement pressures, illicit economies will relocate to areas of weakest law enforcement, but they will not be eliminated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The promise of Wireless Sensor Networks (WSNs) is the autonomous collaboration of a collection of sensors to accomplish some specific goals which a single sensor cannot offer. Basically, sensor networking serves a range of applications by providing the raw data as fundamentals for further analyses and actions. The imprecision of the collected data could tremendously mislead the decision-making process of sensor-based applications, resulting in an ineffectiveness or failure of the application objectives. Due to inherent WSN characteristics normally spoiling the raw sensor readings, many research efforts attempt to improve the accuracy of the corrupted or "dirty" sensor data. The dirty data need to be cleaned or corrected. However, the developed data cleaning solutions restrict themselves to the scope of static WSNs where deployed sensors would rarely move during the operation. Nowadays, many emerging applications relying on WSNs need the sensor mobility to enhance the application efficiency and usage flexibility. The location of deployed sensors needs to be dynamic. Also, each sensor would independently function and contribute its resources. Sensors equipped with vehicles for monitoring the traffic condition could be depicted as one of the prospective examples. The sensor mobility causes a transient in network topology and correlation among sensor streams. Based on static relationships among sensors, the existing methods for cleaning sensor data in static WSNs are invalid in such mobile scenarios. Therefore, a solution of data cleaning that considers the sensor movements is actively needed. This dissertation aims to improve the quality of sensor data by considering the consequences of various trajectory relationships of autonomous mobile sensors in the system. First of all, we address the dynamic network topology due to sensor mobility. The concept of virtual sensor is presented and used for spatio-temporal selection of neighboring sensors to help in cleaning sensor data streams. This method is one of the first methods to clean data in mobile sensor environments. We also study the mobility pattern of moving sensors relative to boundaries of sub-areas of interest. We developed a belief-based analysis to determine the reliable sets of neighboring sensors to improve the cleaning performance, especially when node density is relatively low. Finally, we design a novel sketch-based technique to clean data from internal sensors where spatio-temporal relationships among sensors cannot lead to the data correlations among sensor streams.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigates the historical influence of the criminal policy in the context that shapes the first specific law for children and adolescents in Brazil, the 1927 Children's Code, a standard that inaugurates the conceptual scission between children and "minor" and their different treatment by the State. The study addresses the demand for order in the context of changes in the working world in the transition from the slave system to the capitalist mode of production, and the corresponding disciplinary and punitive control mechanisms directed to the segment of childhood and adolescence. The theoretical route proposes a questioning of the political construction of law and justice, as well as the conformation of the punitive techniques, and the construction of the stereotype of the "delinquent", prime target of the criminal policy, focusing on the process of criminalization of the segment in question through the confrontation of the Critical perspective with the approaches of Classical and Positive schools. This research shows the imposition of a bourgeois morality that obscures the social conflict attributing it to people isolated by the criminalization of their conduct; and points out that the historical forms of selective social control were greatly influenced by psychiatry and psychology, either by the elaboration of the image of the "delinquent" or by the expected performance of custodial institutions. Finally, the developments and the permanence of the historical roots of the criminal policy are problematized, relating them to the difficulties currently encountered in the consolidation of the legal garantism paradigm proposed by the Children and Adolescent Statute.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigates the historical influence of the criminal policy in the context that shapes the first specific law for children and adolescents in Brazil, the 1927 Children's Code, a standard that inaugurates the conceptual scission between children and "minor" and their different treatment by the State. The study addresses the demand for order in the context of changes in the working world in the transition from the slave system to the capitalist mode of production, and the corresponding disciplinary and punitive control mechanisms directed to the segment of childhood and adolescence. The theoretical route proposes a questioning of the political construction of law and justice, as well as the conformation of the punitive techniques, and the construction of the stereotype of the "delinquent", prime target of the criminal policy, focusing on the process of criminalization of the segment in question through the confrontation of the Critical perspective with the approaches of Classical and Positive schools. This research shows the imposition of a bourgeois morality that obscures the social conflict attributing it to people isolated by the criminalization of their conduct; and points out that the historical forms of selective social control were greatly influenced by psychiatry and psychology, either by the elaboration of the image of the "delinquent" or by the expected performance of custodial institutions. Finally, the developments and the permanence of the historical roots of the criminal policy are problematized, relating them to the difficulties currently encountered in the consolidation of the legal garantism paradigm proposed by the Children and Adolescent Statute.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this Bachelor Thesis I want to provide readers with tools and scripts for the control of a 7DOF manipulator, backed up by some theory of Robotics and Computer Science, in order to better contextualize the work done. In practice, we will see most common software, and developing environments, used to cope with our task: these include ROS, along with visual simulation by VREP and RVIZ, and an almost "stand-alone" ROS extension called MoveIt!, a very complete programming interface for trajectory planning and obstacle avoidance. As we will better appreciate and understand in the introduction chapter, the capability of detecting collision objects through a camera sensor, and re-plan to the desired end-effector pose, are not enough. In fact, this work is implemented in a more complex system, where recognition of particular objects is needed. Through a package of ROS and customized scripts, a detailed procedure will be provided on how to distinguish a particular object, retrieve its reference frame with respect to a known one, and then allow navigation to that target. Together with technical details, the aim is also to report working scripts and a specific appendix (A) you can refer to, if desiring to put things together.