966 resultados para Crime analysis
Resumo:
Includes bibliography
Resumo:
Many Caribbean youth are doing reasonably well. They live in loving and caring families, attend school and are involved in various social activities in their communities. The health and well-being of the children and youth1 in the Caribbean is, and has been, the centre of attention of many studies, meetings and policy directives set at the regional, subregional and national levels. Programmes have been put in place to address the basic needs of young children in the areas of health and education and to provide guidance and directives to youth and adolescents in the area of professional formation and transition to adulthood. Critical issues such as reproductive health and family planning combined with access to education and information on these topics have been promoted to some extent. And finally, the Caribbean is known for rather high school enrolment rates in primary education that hardly show any gender disparities. While the situation is still good for some, growing numbers of children and youth cannot cope anymore with the challenges experienced quite early in their lives. Absent parents, instable care-taking arrangements, violence and aggression subjected to at home, in schools and among their friends, lack of a perspective in schools and the labour-market, early sexual initiation and teenage pregnancies are some of those issues faced by a rising number of young persons in this part of the world. Emotional instability, psychological stress and increased violence are one of the key triggers for increased violence and involvement in crime exhibited by ever younger youth and children. Further, the region is grappling with rising drop-out rates in secondary education, declining quality schooling in the classrooms and increasing numbers of students who leave school without formal certification. Youth unemployment in the formal labour market is high and improving the quality of professional formation along with the provision of adequate employment opportunities would be critical to enable youth to complete consistently and effectively the transition into adulthood and to take advantage of the opportunities to develop and use their human capital in the process. On a rather general note, the region does not suffer from a shortage of policies and programmes to address the very specific needs of children and youth, but the prominent and severe lack of systematic analysis and monitoring of the situation of children, youth and young families in the Caribbean does not allow for targeted and efficient interventions that promise successful outcomes on the long term. In an effort to assist interested governments to fill this analytical gap, various initiatives are underway to enhance data collection and their systematic analysis2. Population and household censuses are conducted every decade and a variety of household surveys, such as surveys of living conditions, labour force surveys and special surveys focusing on particular sub-groups of the population are conducted, dependent on the resources available, to a varying degree in the countries of the region. One such example is the United Nations Children’s Fund (UNICEF)-funded Multi-Indicator Cluster Surveys (MICS) that assess the situation of children and youth in a country. Over the past years and at present, UNICEF has launched a series of surveys in a number of countries in the Caribbean3. But more needs to be done to ensure that the data available is analyzed to provide the empirical background information for evidence-based policy formulation and monitoring of the efficiency and effectiveness of the efforts undertaken.
Resumo:
The present thesis aims at proving the importance of cultural and literary contexts in the practice of translation: I shall show that, in the case of Northern Irish crime fiction, knowledge of both Northern Irish history and culture as well as of the genre of crime fiction are essential prerequisites for the production of a “responsible” translation. I will therefore offer a brief overview of the history of crime and detective fiction and its main subgenres; some of the most important authors and works will be presented as well, in an analysis that goes from the early years of the genre to the second half of the 20th century. I will then move the focus to Northern Ireland, its culture and its history, and particular attention will be paid to fiction writing in Ireland and Northern Ireland, with a focus on the peculiar phenomenon of “Troubles Trash”. I will tackle the topic of Northern Irish literature and present the contemporary scene of Northern Irish crime fiction; the volume from which the texts for the translation have been taken will be presented, namely Belfast Noir. Subsequently the focus will move on the theoretical framework within which the translations were produced: I will present a literary review of the most significative developments in Translation Studies, with particular attention to the “cultural turn” that has characterised this subject since the 1960s. I will then highlight the phenomenon of “realia” in translation and analyse the approaches of different scholars to the translation of culture-bound references. The final part represents the culmination and practical application of all that was presented in the previous sections: I will discuss the translation of culture-bound references according to the strategies presented in Chapter 4, referring to the proposed translations of two stories. Such analysis aims to show that not only expert linguistic knowledge, but also cultural awareness and a wide literary background are needed in order to make conscious choices in translation.
Resumo:
For crime scene investigation in cases of homicide, the pattern of bloodstains at the incident site is of critical importance. The morphology of the bloodstain pattern serves to determine the approximate blood source locations, the minimum number of blows and the positioning of the victim. In the present work, the benefits of the three-dimensional bloodstain pattern analysis, including the ballistic approximation of the trajectories of the blood drops, will be demonstrated using two illustrative cases. The crime scenes were documented in 3D, using the non-contact methods digital photogrammetry, tachymetry and laser scanning. Accurate, true-to-scale 3D models of the crime scenes, including the bloodstain pattern and the traces, were created. For the determination of the areas of origin of the bloodstain pattern, the trajectories of up to 200 well-defined bloodstains were analysed in CAD and photogrammetry software. The ballistic determination of the trajectories was performed using ballistics software. The advantages of this method are the short preparation time on site, the non-contact measurement of the bloodstains and the high accuracy of the bloodstain analysis. It should be expected that this method delivers accurate results regarding the number and position of the areas of origin of bloodstains, in particular the vertical component is determined more precisely than using conventional methods. In both cases relevant forensic conclusions regarding the course of events were enabled by the ballistic bloodstain pattern analysis.
Resumo:
Some examples of topics covered include undocumented immigrants, guns, and terrorism within Crime and Criminal Behavior, vigilantes, Miranda warnings, and zero-tolerance policing within Police and Law Enforcement; insanity laws, DNA evidence, and victims' rights within Courts, Law, and Justice; gangs and prison violence, capital punishment, and prison privatization within Corrections; and school violence, violent juvenile offenders, and age of responsibility within Juvenile Crime and Justice. Note that Sage offers numerous reference works that provide focused analysis of key topics in the field of criminal justice, such as the Encyclopedia of Crime and Punishment (2002), the Encyclopedia of Race and Crime (2009), the Encyclopedia of Victimology and Crime Prevention (2010), the Encyclopedia of White Collar & Corporate Crime (2004), and the Encyclopedia of Interpersonal Violence (2008), available in print or as e-books via Sage Reference online.
Resumo:
The project investigated the presentation of crime in the Lithuanian media and its possible impact on the general public's understanding of crime-related problems in society. Dobryninas concentrated on three main aspects of this problem: the development of the image of crime in the Lithuanian press and television, journalists' principles in presenting crime-related information, and the public attitude to the presentation of crime in the media. A content analysis of national newspapers from the period of 1992-1997 showed not only increasing interest in crime problems, but also the distorted nature of the image of crime in the media. In-depth interviews with Lithuanian journalists demonstrated that they understood their role in presenting crime-related information firstly as providing information oriented to high public demand, although at the same time they did not deny the commercial and entertainment aspects of crime reporting. Readership and audience research illustrated the clear influence of the media on the public understanding of crime problems in society. However, the virtual image of crime did not greatly affect the system of values and beliefs of Lithuanians, nor did it challenge their insistence that problems of crime could and should be managed within the framework of a civil and open society.
Resumo:
This paper asks: is it a fact that there is more violence in districts affected by Naxalite (Maoist) activity compared to those which are free of Naxalite activity? And can the existence of Naxalite activity in some districts of India, but not in others, be explained by differences in economic and social conditions? This study identifies districts in India in which there was significant Naxalite activity and correlating the findings with district-level economic, social, and crime indicators. The econometric results show that, after controlling for other variables, Naxalite activity in a district had, if anything, a dampening effect on its level of violent crime and crimes against women. Furthermore, even after controlling for other variables, the probability of a district being Naxalite-affected rose with an increase in its poverty rate and fell with a rise in its literacy rate. So, one prong in an anti-Naxalite strategy would be to address the twin issues of poverty and illiteracy in India.
Resumo:
One of the most influential statements in the anomie theory tradition has been Merton’s argument that the volume of instrumental property crime should be higher where there is a greater imbalance between the degree of commitment to monetary success goals and the degree of commitment to legitimate means of pursing such goals. Contemporary anomie theories stimulated by Merton’s perspective, most notably Messner and Rosenfeld’s institutional anomie theory, have expanded the scope conditions by emphasizing lethal criminal violence as an outcome to which anomie theory is highly relevant, and virtually all contemporary empirical studies have focused on applying the perspective to explaining spatial variation in homicide rates. In the present paper, we argue that current explications of Merton’s theory and IAT have not adequately conveyed the relevance of the core features of the anomie perspective to lethal violence. We propose an expanded anomie model in which an unbalanced pecuniary value system – the core causal variable in Merton’s theory and IAT – translates into higher levels of homicide primarily in indirect ways by increasing levels of firearm prevalence, drug market activity, and property crime, and by enhancing the degree to which these factors stimulate lethal outcomes. Using aggregate-level data collected during the mid-to-late 1970s for a sample of relatively large social aggregates within the U.S., we find a significant effect on homicide rates of an interaction term reflecting high levels of commitment to monetary success goals and low levels of commitment to legitimate means. Virtually all of this effect is accounted for by higher levels of property crime and drug market activity that occur in areas with an unbalanced pecuniary value system. Our analysis also reveals that property crime is more apt to lead to homicide under conditions of high levels of structural disadvantage. These and other findings underscore the potential value of elaborating the anomie perspective to explicitly account for lethal violence.
Resumo:
A limited but accumulating body of research and theoretical commentary offers support for core claims of the “institutional-anomie theory” of crime (IAT) and points to areas needing further development. In this paper, which focuses on violent crime, we clarify the concept of social institutions, elaborate the cultural component of IAT, derive implications for individual behavior, summarize empirical applications, and propose directions for future research. Drawing on Talcott Parsons, we distinguish the “subjective” and “objective” dimensions of institutional dynamics and discuss their interrelationship. We elaborate on the theory’s cultural component with reference to Durkheim’s distinction between “moral” and “egoistic” individualism and propose that a version of the egoistic type characterizes societies in which the economy dominates the institutional structure, anomie is rampant, and levels of violent crime are high. We also offer a heuristic model of IAT that integrates macro- and individual levels of analysis. Finally, we discuss briefly issues for the further theoretical elaboration of this macro-social perspective on violent crime. Specifically, we call attention to the important tasks of explaining the emergence of economic dominance in the institutional balance of power and of formulating an institutional account for distinctive punishment practices, such as the advent of mass incarceration in the United States.
Resumo:
The analysis and reconstruction of forensically relevant events, such as traffic accidents, criminal assaults and homicides are based on external and internal morphological findings of the injured or deceased person. For this approach high-tech methods are gaining increasing importance in forensic investigations. The non-contact optical 3D digitising system GOM ATOS is applied as a suitable tool for whole body surface and wound documentation and analysis in order to identify injury-causing instruments and to reconstruct the course of event. In addition to the surface documentation, cross-sectional imaging methods deliver medical internal findings of the body. These 3D data are fused into a whole body model of the deceased. Additional to the findings of the bodies, the injury inflicting instruments and incident scene is documented in 3D. The 3D data of the incident scene, generated by 3D laser scanning and photogrammetry, is also included into the reconstruction. Two cases illustrate the methods. In the fist case a man was shot in his bedroom and the main question was, if the offender shot the man intentionally or accidentally, as he declared. In the second case a woman was hit by a car, driving backwards into a garage. It was unclear if the driver drove backwards once or twice, which would indicate that he willingly injured and killed the woman. With this work, we demonstrate how 3D documentation, data merging and animation enable to answer reconstructive questions regarding the dynamic development of patterned injuries, and how this leads to a real data based reconstruction of the course of event.
Resumo:
Research on subjective punishment goals has focused on the perspective of third-party observers of criminal offenses and neglected the perspective of victims. This study investigates punishment goals among 174 adult crime victims (rape and nonsexual assault) for each participant’s real criminal case. Scales measuring support for punishment goals are constructed by factor analysis of an 18-item list. Results show that 5 highly supported goals can be distinguished: retaliation, recognition of victim status, confirmation of societal values, victim security, and societal security. Analysis of relations between punishment goal scales and personal variables, situational variables, and demanded punishment severity corroborates the view that the punishment goals revealed can be classified according to the two independent dichotomies of moral versus instrumental goals, and micro versus macro goals.
Resumo:
The issue of bias-motivated crimes has attracted consderable attention in recent years. In this paper, we develop an economic framework to analyze penalty enhancements for bias-motivated crimes. We extend the standard model by introducing two different groups of potential victims of crime, and assume that a potential offender's benefits from a crime depend on the group to which the victim belongs. We begin with the assumption that the harm to an individual victim from a bias-motivated crime is identical to that from an equivalent non-hate crime. Nonetheless, we derive the result that a pattern of crimes disproportionately targeting an identifiable group leads to greater social harm. This conclusion follows both from a model where disparities in groups' victimization probabilities lead to social losses due to fairness concerns, as well as a model where potential victims have the opportunity to undertake socially costly victimization avoidance activities. In particular, penalty enhancements can reduce the incentives for avoidance activity, and thereby protect the networks of profitable interactions that link members of different groups. We also argue that those groups that are covered by hate crime statutes tend to be those whose characteristics make it especially likely that penalty enhancement is socially optimal. Finally, we consider a number of other issues related to hate crimes, including teh choice of sanctions from behind a Rawlsian 'veil of ignorance' concerning group identity.
Resumo:
In order to prevent, suppress and punish human trafficking, bilateral agreements between origin of victim countries and destination countries are crucial, because their cooperation involves cross-border activities such as repatriation of victims, extradition of criminals and information-sharing. This article analyzes three bilateral legal instruments between The Government of The Kingdom of Thailand and her three neighboring countries, namely The Royal Government of Cambodia, The Government of Lao People's Democratic Republic and The Government of The Union of Myanmar. The analysis will examine the legal status of the victim, the victim as witness in criminal proceedings, the victim protection programs, the recovery and restitution of damages, the process of repatriating the victim, and the prosecution of the criminal.
Resumo:
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.
Resumo:
O estudo da problemática da admissibilidade jurídico-penal do crime de burla por omissão, enquadrando-se na órbitra dos crimes comissivos por omissão, impõe, a título de questão prévia, a análise do conteúdo e alcance da cláusula de equiparação da omissão à acção, ínsita no art. 10.º do C.P, e, bem assim, a indagação do seu fundamento e da sua compatibilidade com o princípio jurídico-constitucional da legalidade das normas incriminadoras e suas exigências de determinação típica decorrentes dos princípios nullum crimen sine (prævia) lege e nulla poena sine (prævia) lege., matéria a que nos debruçaremos na Parte I da presente dissertação e que deverá ser essencialmente entendida à luz do princípio da dignidade da pessoa humana e da necessidade de um equilíbrio entre a certeza e a segurança jurídicas com a tutela de determinados bens-jurídicos fundamentais, enquanto pilares essenciais de qualquer Estado de Direito Democrático. Na parte II, tentaremos determinar o significado e alcance da conduta enganosa e astuciosa do crime de burla, previsto e punido pelo n.º 1 do art.º 217.º do C.P., desbravando, antes de mais, a sua evolução normativa até aos tempos hodiernos, após o que definiremos a estrutura normativa do tipo. Buscaremos, de seguida, uma aproximação ao conceito de engano e a determinação das formas e modalidades que a conduta enganosa e astuciosa poderá assumir: Exigirá a conduta típica uma mise-en-scène perpetrada pelo agente ou poderá bastar-se com uma mera mentira? Alcançada a sua (possível) determinação, estaremos já em condições de nos debruçarmos sobre a problemática da admissibilidade jurídico-penal da burla por omissão, altura em que, sob uma perspectiva crítica e acompanhada da análise igualmente crítica de casos, avançaremos com argumentos favoráveis e contrários a essa admissibilidade, sem, naturalmente, deixarmos de auscultar a tendência de entendimento da nossa Jurisprudência.