Academic literature on the topic 'Criminal databases'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Criminal databases.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Criminal databases"

1

Fredy, Humberto Troncoso Espinosa. "Cohesion index for investigate criminal organizations in criminal big databases." Indian Journal of Science and Technology 15, no. 16 (April 27, 2022): 750–59. http://dx.doi.org/10.17485/ijst/v15i16.2042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Humberto, Troncoso Espinosa Fredy. "Cohesion index for investigate criminal organizations in criminal big databases." Indian Journal of Science and Technology 15, no. 16 (May 2, 2022): 750–59. https://doi.org/10.17485/IJST/v15i16.2042.

Full text
Abstract:
Abstract <strong>Background:</strong>&nbsp;The disarticulation of criminal organizations reduces the rates of victimization and insecurity in the population. One of the main characteristics of a criminal organization is the cohesion among its members. This investigation proposes a cohesion index that allows identifying quickly in Big databases individuals suspect to belong to criminal organizations and focus investigation resources on them.&nbsp;<strong>Methods:</strong>&nbsp;To obtain the index, we analyze the information provided by the Criminal Analysis and Investigative Focus System from the Regional Public Prosecutor&rsquo;s Office in Biob&iacute;o and the Investigation Police of Chile.&nbsp;<strong>Findings:</strong>&nbsp;The results show that the suspects with a higher cohesion index and a higher number of criminal cases commit crimes associated with criminal organizations. <strong>Keywords:</strong> Criminal Cohesion; Crimes Against Property; Criminal Organization; Criminal Databases
APA, Harvard, Vancouver, ISO, and other styles
3

Aftab Ahmad, Dr Aftab Ahmad. "DNA Fingerprints Facial Prints and Other Digital Forensics as Evidence in Criminal Investigation and Court Proceedings." International Journal for Electronic Crime Investigation 2, no. 1 (March 8, 2018): 9. http://dx.doi.org/10.54692/ijeci.2018.02018.

Full text
Abstract:
The purpose of this paper is to focus on the legitimacy and importance of digital evidence such as fingerprints, DNA, polygraph, auto-radiography, and facial-prints and their admissibility in investigations and court proceedings. The extracts from criminal databases are also relevant in this context. The modus operandi of criminals, particularly in case of repetition of similar type of offence is also of immense significance. Normally, the criminals operate adopting a specific manner or method. The killers have their own way or mode of committing the offence. The modus operandi changes from person to person or groups to groups in committing the offences. It may determine that the offence is committed by a group or an individual. In view of its impotence, the modus operandi must be included in criminal databases as a separate column. The criminal images sketched by artists on the bases of description of witnesses present on scene of offence have relevance and must be included in the criminal databases for future reference and use.
APA, Harvard, Vancouver, ISO, and other styles
4

Erbaş, Rahime. "DNA Databases for Criminal Justice System: A Pathway towards Utopian or Dystopian Future?" Age of Human Rights Journal, no. 18 (June 23, 2022): 331–43. http://dx.doi.org/10.17561/tahrj.v18.6592.

Full text
Abstract:
Abstract: DNA evidence has increasingly become a widespread instrument in solving crime as well as crime prevention. As such, creation of DNA databases or expanding the existing ones have been on the rise in the world. On the one side, storing DNA profiles serves as a pivotal tool in crime solving, but on the other, privacy based on genome concerns occur. DNA databases appears as an example of biotechnology today and in the future that are argued in a spectrum ranging from utopia to dystopia. This methodical approach, of course, is nothing new or novel for a DNA database-related study. This study, however, aims to analyse the matter from the standpoint of criminal law and to discuss whether the modus operandi of criminal procedure on the use of DNA databases paves the way towards utopian or dystopian vision for future. As such, after introducing theme and indicating scope of the study (I), it provides an overview regarding the involvement of DNA as evidence and respectively database in criminal justice system in the world (II). Whether databases established for criminal justice system serve for dystopian.
APA, Harvard, Vancouver, ISO, and other styles
5

Schneider, Peter M., and Peter D. Martin. "Criminal DNA databases: the European situation." Forensic Science International 119, no. 2 (June 2001): 232–38. http://dx.doi.org/10.1016/s0379-0738(00)00435-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Doleac, Jennifer L. "The Effects of DNA Databases on Crime." American Economic Journal: Applied Economics 9, no. 1 (January 1, 2017): 165–201. http://dx.doi.org/10.1257/app.20150043.

Full text
Abstract:
Every US state has a database of criminal offenders' DNA profiles. These databases receive widespread attention in the media and popular culture, but there has been no rigorous analysis of their impact on crime. This paper intends to fill that gap. I exploit the details and timing of state DNA database expansions in two ways, first to address the effects of DNA profiling on individuals' subsequent criminal behavior and then to address the aggregate effects on crime rates. I show that DNA databases deter crime by profiled offenders, reduce crime rates, and are more cost-effective than traditional law enforcement tools. (JEL H76, K42)
APA, Harvard, Vancouver, ISO, and other styles
7

POONKUNTRAN, SHANMUGAM, R. S. RAJESH, and PERUMAL ESWARAN. "ENERGY AWARE FUZZY COLOR SEGMENTATION ALGORITHM — AN APPLICATION TO CRIMINAL IDENTIFICATION USING MOBILE DEVICES." International Journal of Wavelets, Multiresolution and Information Processing 06, no. 05 (September 2008): 707–18. http://dx.doi.org/10.1142/s0219691308002604.

Full text
Abstract:
Since its advent, the use of digital camera in mobile phones is getting more popular, where information retrieval based on visual appearance of an object is very useful when specific parameters for the object are not known. Though it is well-liked, it needs energy aware algorithms to carry out the various tasks such as segmentation and feature extraction. In this paper, a new energy aware fuzzy color segmentation algorithm is proposed and which has been applied for face segmentation in criminal identification using mobile devices. The criminals in the application are in three classes. They are New Criminal (NC), Suspected Criminal (SC) and Confirmed Criminal (CC). It is basically a mobile image-based content search engine that takes photographs of criminals as image queries and finds their relevant contents by matching them to the similar contents in the criminal databases. The energy aware fuzzy color segmentation is used to obtain the most significant parts of an image — facial regions of the persons and which are used in building image-based queries to the databases. Content search methodology in the application is also improved through the fuzzy modeling to make the application more flexible and simpler. Through the experiment conducted, it has been found that the proposed color segmentation algorithm is more robust and it reduces the computational time in searching process by minimizing the number of false cases. It could detect the faces in the images where the other known algorithms have failed to detect.
APA, Harvard, Vancouver, ISO, and other styles
8

Nersesyan, Armen. "Application of information systems and databases in pretrial investigation." Yearly journal of scientific articles “Pravova derzhava”, no. 35 (September 1, 2024): 627–37. https://doi.org/10.33663/0869-2491-2024-35-627-637.

Full text
Abstract:
In the modern conditions of the development of the information society in all areas of human life, the application of achievements and developments of scientific and technical progress, artificial intelligence becomes necessary in the implementation of all, without exception, the directions of the state policy of Ukraine. The field of criminal justice was no exception. But regulation at the legislative level of the use of information systems and databases in pre-trial investigation does not mean the absence of problems during the practical implementation of the legislation on the use of the latest information technologies in the specified field. The purpose of this study was to identify the problems of using information systems and databases in pre-trial investigation and propose measures to solve them. The generalized databases used in the pre-trial investigation are: information and search systems for forensic purposes (forensic registration); information and search systems for registration of citizens of general social purpose; corporate information and search systems; information systems that appeared under martial law: the information system «Book of Executioners of the Ukrainian People», the analytical application «War Criminals of the russian federation», online platforms for recording the crimes of the Russian Federation against the civilian population of Ukraine. These include: insufficient regulatory regulation of the creation of databases and their use; insufficient protection of such data from illegal use or theft; the need for the latest software and technical support; insufficient preparation of specialists. In order to solve these issues, it is proposed to: develop a regulatory and legal mechanism to ensure the creation and use of databases and the security of the information contained in them, by providing appropriate authorization documents to law enforcement officers and establishing responsibility for their unauthorized use or theft; personnel professional training and retraining of specialists who carry out pre-trial investigation and software and technical support of the needs of law enforcement officers in this area; establishment and development of international cooperation on information exchange through the creation of joint databases with access to law enforcement officers of different countries. This will make it possible to significantly increase the efficiency of the use of information systems in pre-trial investigation, which will contribute to the implementation of the state policy on fighting crime in the country. Key words: information system, database, pre-trial investigation, criminal proceedings, criminal justice, information society, implementation of technologies, inquiry, pre-trial investigation, information technologies, investigative activity, criminal justice, digitalization.
APA, Harvard, Vancouver, ISO, and other styles
9

Awofisayo, Oladoja Abosade, and Olorunfemi Abraham Eseyin. "Establishment of criminal/profile DNA database and use of forensic intelligence to combat nationwide insecurity issues in Nigeria." Bio-Research 20, no. 2 (June 1, 2022): 1513–21. http://dx.doi.org/10.4314/br.v20i2.2.

Full text
Abstract:
Criminal activity is on the rise in Nigeria. The nefarious activity of bandits is on the increase with kidnapping of students and attack on farmers. This creates fear in the terrorized communities. Armed robbery as well as rape of citizens going about their normal duties is also on the increase. The road is becoming increasingly unsafe for the citizenry as well as government officials. The government has mandated individuals to register in the National Identification Number NIN which is linked to the Bank Verification Number (BVN) (a database established to curb crime in the banking sector) and the Subscriber Identity module (SIM). The Establishment of such databases is pertinent however the NIN, BVN, SIM-NIN linkage and fingerprints may not be sufficient in solving criminal cases without DNA profiling of convicted individuals, establishment of forensic laboratories and the creation of criminal DNA profile database CRODER – a Criminal offender DNA Exert Repertoire. The role of DNA profiling as an additional measure is to keep a record of all convicted individuals and the CRODER will be an additional useful measure in profiling criminals and individuals can be adopted as a forensic tool in addition to the captured databases of NIN, BVN and NIN-SIM and will be on the watch list of security operatives. The CRODER forensic tool can be done stepwise by availability of an emergency number to dial for emergency, a dispatch personnel to respond to the call, and vigilante groups or other adhoc security officer in the vicinity of the emergency call to get to the vicinity and preserve the crime scene environment for investigators and detectives to work on. CRODER Forensic tool can then be adopted to solve the crime. Offenders trying to escape enroute the airport, can be checked via CRODER and fingerprint compared and matched with the collection in the database. The CRODER may be a necessary stride to bring kidnappers, bandits, and armed robbers to book in record time and curb the rise in criminal activity, insurgency, banditry, and insecurity in general. If properly done, Nigeria will be a haven for citizens and would-be investors.
APA, Harvard, Vancouver, ISO, and other styles
10

Ram, Natalie, Christi J. Guerrini, and Amy L. McGuire. "Genealogy databases and the future of criminal investigation." Science 360, no. 6393 (June 7, 2018): 1078–79. http://dx.doi.org/10.1126/science.aau1083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Criminal databases"

1

Briody, Michael, and n/a. "The Effects of DNA Evidence on the Criminal Justice Process." Griffith University. School of Criminology and Criminal Justice, 2005. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20050818.155533.

Full text
Abstract:
This research examines the effects of forensic deoxyribonucleic acid (DNA) evidence on decisions in the courts and on the conduct of criminal investigations. To assess effects on court decisions, quantitative analyses were conducted using primary data from the State of Queensland. A control-comparison method was used to assess the effects in court, and this was made within a context of other evidentiary and extra-legal factors that had a bearing on case outcomes. These other factors included defendant confessions, independent witness testimony and fingerprint and photographic evidence. A sample of 750 cases referred by police for prosecution and finalised past the appeal stage in court, was selected for examination. Half of these cases utilised DNA evidence, while the other half, as a control group, did not. Cases were selected in four categories: sexual offences, serious assaults, homicides and property crime. Data on the cases were analysed using advanced statistical methods and predictor models were developed to demonstrate how, given case configurations, the addition of DNA evidence could potentially alter court outcomes. Results for the three serious offence types were that DNA evidence emerged as a positive predictor that prosecutors would pursue cases in court, and it demonstrated a powerful influence on jury decisions to convict. Incriminating DNA evidence demonstrated no significant effect on inducing guilty pleas from defendants for serious crimes against the person. However, it did correlate significantly to cases reaching court and to guilty pleas being entered for property offence cases. The analysis of the effects on investigations relies on data from jurisdictions other than Queensland. Secondary data and the literature were used to assess the potential for strategically using forensic intelligence, along with dedicated investigative resources, to reduce property crimes like burglaries and car thefts. In the one study available that employed adequate research methods, three patrol areas in New South Wales, where a police operation was trialled, were compared to other areas that acted as a control. The police operation aimed at 100% attendance at property crime scenes, the use of intelligence from DNA and fingerprint identifications and specialised investigative resources to reduce crime levels. While the operation failed to achieve its goal, it did provide some valuable lessons. The effectiveness of the national criminal DNA database in the UK, reputed to lead the world, was then evaluated in relation to domestic burglaries. Its Australian CrimTrac counterpart did not commence operations until March 2003, and by 2004 was not operating at maximum capacity. Because no published studies were located that measured any effects of the UK database on crime levels, the criterion selected to measure performance was the proportion of convictions achieved through the database to reported crime. For domestic burglaries, this ratio was calculated from secondary official data to be close to one percent (0.01), a figure that included the additional convictions achieved through the intelligence that the database provided. The research also examined forensic DNA in relation to issues of privacy and civil liberties. Privacy issues are discussed beginning with an historical background to the use and misuse of genetic data. This includes the searches for a 'criminal gene' and for genetic links to criminal behaviour. DNA databases are contrasted with databanks, and it is questioned, since we leave our DNA wherever we go, whether it really is private. Civil liberties issues that are discussed include whether providing DNA is a form of self-incrimination; how DNA has helped exonerate the convicted innocent; wrongful convictions based on flawed DNA evidence; whether occasional 'mass screenings' with DNA are a reversal of the onus of proof; concerns with DNA databases and 'function creep', and the planting or 'forgery' of DNA evidence including the use of amplicon contamination. In the final chapter, a balance is sought between on one hand, the goal of police and government to provide a safe society, and on the other, the rights to privacy and civil liberties expected by individuals in Western liberal democracies. The chapter addresses the issues of concern raised in the earlier chapter about privacy and civil liberties, and makes recommendations on how these may be resolved. The general approach favoured is to increase police powers in specific situations, but to couple these with the protection of individual rights through greater regulation of those powers. The research also developed a case prioritising system aimed at helping clear laboratory backlogs.
APA, Harvard, Vancouver, ISO, and other styles
2

Briody, Michael. "The Effects of DNA Evidence on the Criminal Justice Process." Thesis, Griffith University, 2005. http://hdl.handle.net/10072/366784.

Full text
Abstract:
This research examines the effects of forensic deoxyribonucleic acid (DNA) evidence on decisions in the courts and on the conduct of criminal investigations. To assess effects on court decisions, quantitative analyses were conducted using primary data from the State of Queensland. A control-comparison method was used to assess the effects in court, and this was made within a context of other evidentiary and extra-legal factors that had a bearing on case outcomes. These other factors included defendant confessions, independent witness testimony and fingerprint and photographic evidence. A sample of 750 cases referred by police for prosecution and finalised past the appeal stage in court, was selected for examination. Half of these cases utilised DNA evidence, while the other half, as a control group, did not. Cases were selected in four categories: sexual offences, serious assaults, homicides and property crime. Data on the cases were analysed using advanced statistical methods and predictor models were developed to demonstrate how, given case configurations, the addition of DNA evidence could potentially alter court outcomes. Results for the three serious offence types were that DNA evidence emerged as a positive predictor that prosecutors would pursue cases in court, and it demonstrated a powerful influence on jury decisions to convict. Incriminating DNA evidence demonstrated no significant effect on inducing guilty pleas from defendants for serious crimes against the person. However, it did correlate significantly to cases reaching court and to guilty pleas being entered for property offence cases. The analysis of the effects on investigations relies on data from jurisdictions other than Queensland. Secondary data and the literature were used to assess the potential for strategically using forensic intelligence, along with dedicated investigative resources, to reduce property crimes like burglaries and car thefts. In the one study available that employed adequate research methods, three patrol areas in New South Wales, where a police operation was trialled, were compared to other areas that acted as a control. The police operation aimed at 100% attendance at property crime scenes, the use of intelligence from DNA and fingerprint identifications and specialised investigative resources to reduce crime levels. While the operation failed to achieve its goal, it did provide some valuable lessons. The effectiveness of the national criminal DNA database in the UK, reputed to lead the world, was then evaluated in relation to domestic burglaries. Its Australian CrimTrac counterpart did not commence operations until March 2003, and by 2004 was not operating at maximum capacity. Because no published studies were located that measured any effects of the UK database on crime levels, the criterion selected to measure performance was the proportion of convictions achieved through the database to reported crime. For domestic burglaries, this ratio was calculated from secondary official data to be close to one percent (0.01), a figure that included the additional convictions achieved through the intelligence that the database provided. The research also examined forensic DNA in relation to issues of privacy and civil liberties. Privacy issues are discussed beginning with an historical background to the use and misuse of genetic data. This includes the searches for a 'criminal gene' and for genetic links to criminal behaviour. DNA databases are contrasted with databanks, and it is questioned, since we leave our DNA wherever we go, whether it really is private. Civil liberties issues that are discussed include whether providing DNA is a form of self-incrimination; how DNA has helped exonerate the convicted innocent; wrongful convictions based on flawed DNA evidence; whether occasional 'mass screenings' with DNA are a reversal of the onus of proof; concerns with DNA databases and 'function creep', and the planting or 'forgery' of DNA evidence including the use of amplicon contamination. In the final chapter, a balance is sought between on one hand, the goal of police and government to provide a safe society, and on the other, the rights to privacy and civil liberties expected by individuals in Western liberal democracies. The chapter addresses the issues of concern raised in the earlier chapter about privacy and civil liberties, and makes recommendations on how these may be resolved. The general approach favoured is to increase police powers in specific situations, but to couple these with the protection of individual rights through greater regulation of those powers. The research also developed a case prioritising system aimed at helping clear laboratory backlogs.<br>Thesis (PhD Doctorate)<br>Doctor of Philosophy (PhD)<br>School of Criminology and Criminal Justice<br>Full Text
APA, Harvard, Vancouver, ISO, and other styles
3

Henschke, Adam. "An Evaluation of Forensic DNA Databases Using Different Conceptions Of Identity." Thesis, Linköping University, Centre for Applied Ethics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9163.

Full text
Abstract:
<p>Forensic DNA databases are expanding in both use and range. In particular, the U.K. and U.S. are developing new techniques and policies in regards to their forensic DNA databases with the hope of increasing the role of forensic DNA databases in criminal investigations. Despite the goal of reducing crime, there are ethical concerns that arise with the ways in which these forensic DNA databases are being developed. This paper outlines the technical aspects of forensic DNA databases and then describes different conceptions of identity, using race as an example of a constructed identity that is relevant in the use of forensic DNA databases. Then it explains how forensic DNA databases construct a unique identity with the goal of ascribing this to people and groups. This ascribed identity is problematic, and different problems that are related to identity are discussed. Despite the benefits of forensic DNA databases, these problems are ethically relevant and as such, a series of policy recommendations are made with the aim of balancing the harms and benefits of forensic DNA databases.</p>
APA, Harvard, Vancouver, ISO, and other styles
4

Twisdale, Jerry Allen. "Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5428.

Full text
Abstract:
Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies by Bandura and Jaishankar that might affect individual decision making in terms of employee risks created through internet use. This qualitative case study involved a participant interview and workplace observations to solicit a small rural business owner's knowledge of cybercriminal exploitation of employees through internet activities such as social media and the potential exploitation of workers by social engineers. Word frequency analysis of the collected data concluded that SME owners are ill equipped to combat employee exploitation of their business through social engineering. Qualitative research is consistent with understanding the decision factors for cost, technical support, and security threat prevention SME organizational leadership use and is the focus of this study as emergent themes. The expectation is that this study will aid in the prevention of social engineering tactics against SME employees and provide a platform for future research for SMEs and cybercriminal activity prevention.
APA, Harvard, Vancouver, ISO, and other styles
5

Mastros, James Lee. "Measuring Community Consensus in Facial Characterization Using Spatial Databases and Fuzzy Logic." VCU Scholars Compass, 2005. http://scholarscompass.vcu.edu/etd/683.

Full text
Abstract:
Spatial databases store geometric objects and capture spatial relationships that can be used to represent key features of the human face. One can search spatial databases for these objects, and seek the relationships between them, using fuzzy logic to provide a natural way to describe the human face for the purposes of facial characterization. This study focuses on community perception of short, average, or long nose length. Three algorithms were used to update community opinion of nose length. All three methods showed similar trends in nose length classification which could indicate that the effort to extract spatial data from images to classify nose length is not as crucial as previously thought since community consensus will ultimately give similar results. However, additional testing with larger groups is needed to further validate any conclusion that spatial data can be eliminated.
APA, Harvard, Vancouver, ISO, and other styles
6

Carnaz, Gonçalo José Freitas. "A graph-based framework for data retrieved from criminal-related documents." Doctoral thesis, Universidade de Évora, 2021. http://hdl.handle.net/10174/29954.

Full text
Abstract:
A digitalização das empresas e dos serviços tem potenciado o tratamento e análise de um crescente volume de dados provenientes de fontes heterogeneas, com desafios emergentes, nomeadamente ao nível da representação do conhecimento. Também os Órgãos de Polícia Criminal (OPC) enfrentam o mesmo desafio, tendo em conta o volume de dados não estruturados, provenientes de relatórios policiais, sendo analisados manualmente pelo investigadores criminais, consumindo tempo e recursos. Assim, a necessidade de extrair e representar os dados não estruturados existentes em documentos relacionados com o crime, de uma forma automática, permitindo a redução da análise manual efetuada pelos investigadores criminais. Apresenta-se como um desafio para a ciência dos computadores, dando a possibilidade de propor uma alternativa computacional que permita extrair e representar os dados, adaptando ou propondo métodos computacionais novos. Actualmente existem vários métodos computacionais aplicados ao domínio criminal, nomeadamente a identificação e classificação de entidades nomeadas, por exemplo narcóticos, ou a extracção de relações entre entidades relevantes para a investigação criminal. Estes métodos são maioritariamente aplicadas à lingua inglesa, e em Portugal não há muita atenção à investigação nesta área, inviabilizando a sua aplicação no contexto da investigação criminal. Esta tese propõe uma solução integrada para a representação dos dados não estruturados existentes em documentos, usando um conjunto de métodos computacionais: Preprocessamento de Documentos, que agrupa uma tarefa de Extracção, Transformação e Carregamento adaptado aos documentos relacionados com o crime, seguido por um pipeline de Processamento de Linguagem Natural aplicado à lingua portuguesa, para uma análise sintática e semântica dos dados textuais; Método de Extracção de Informação 5W1H que agrupa métodos de Reconhecimento de Entidades Nomeadas, a detecção da função semântica e a extracção de termos criminais; Preenchimento da Base de Dados de Grafos e Enriquecimento, permitindo a representação dos dados obtidos numa base de dados de grafos Neo4j. Globalmente a solução integrada apresenta resultados promissores, cujos resultados foram validados usando protótipos desemvolvidos para o efeito. Demonstrou-se ainda a viabilidade da extracção dos dados não estruturados, a sua interpretação sintática e semântica, bem como a representação na base de dados de grafos; Abstract: The digitalization of companies processes has enhanced the treatment and analysis of a growing volume of data from heterogeneous sources, with emerging challenges, namely those related to knowledge representation. The Criminal Police has similar challenges, considering the amount of unstructured data from police reports manually analyzed by criminal investigators, with the corresponding time and resources. There is a need to automatically extract and represent the unstructured data existing in criminal-related documents and reduce the manual analysis by criminal investigators. Computer science faces a challenge to apply emergent computational models that can be an alternative to extract and represent the data using new or existing methods. A broad set of computational methods have been applied to the criminal domain, such as the identification and classification named-entities (NEs) or extraction of relations between the entities that are relevant for the criminal investigation, like narcotics. However, these methods have mainly been used in the English language. In Portugal, the research on this domain, applying computational methods, lacks related works, making its application in criminal investigation unfeasible. This thesis proposes an integrated solution for the representation of unstructured data retrieved from documents, using a set of computational methods, such as Preprocessing Criminal-Related Documents module. This module is supported by Extraction, Transformation, and Loading tasks. Followed by a Natural Language Processing pipeline applied to the Portuguese language, for syntactic and semantic analysis of textual data. Next, the 5W1H Information Extraction Method combines the Named-Entity Recognition, Semantic Role Labelling, and Criminal Terms Extraction tasks. Finally, the Graph Database Population and Enrichment allows us the representation of data retrieved into a Neo4j graph database. Globally, the framework presents promising results that were validated using prototypes developed for this purpose. In addition, the feasibility of extracting unstructured data, its syntactic and semantic interpretation, and the graph database representation has also been demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
7

Richter, Vitor Simonis. "Identificação Genética e Crime : a introdução dos bancos de DNA no Brasil." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/178189.

Full text
Abstract:
Em 2012, o Brasil aprovou a lei 12.654 que regulamenta o uso dos bancos de perfis genéticos para fins de investigação criminal. Esta lei é um dos marcos nas discussões acerca do uso do DNA nas investigações criminais que se intensificaram no país a partir de 2009 quando o FBI doou ao Brasil o Combined DNA Index System (CODIS). A chegada dos bancos de dados de DNA ao Brasil faz parte de um processo de expansão internacional de bancos nacionais de perfis genéticos. Esta tese trata do processo de introdução desta tecnologia no Brasil. Através de entrevistas com especialistas de diferentes áreas, tais como perícia criminal, direito e bioética, da observação e participação em seminários e congressos de perícia criminal e das discussões travadas em publicações de revistas científicas esta pesquisa busca uma compreensão etnográfica dos nexos entre ciência, direito, tecnologia, segurança e poder em torno do processo de introdução dos bancos de perfis genéticos no Brasil. Na primeira parte, a tese descreve algumas relações e significados que fizeram a identificação genética vir a ser sinônimo de precisão científica acerca da identificação humana e o deslizamento para sua aplicação nas investigações criminais. Na segunda parte, aborda os primeiros efeitos do processo de introdução da tecnologia de bancos de perfis genéticos no Brasil a partir do processo de elaboração da lei dos bancos de DNA, da emergência de novas trajetórias de peritos criminais em genética forense e de alguns desafios do cotidiano da coleta, análise e armazenamento dos vestígios da cena do crime. Conhecer e entender como são colocadas em prática as diversas mediações que envolvem a estabilização do banco de DNA para fins de investigação criminal no Brasil permite refletir como a relação entre tecnociência, direitos, cidadania e políticas de segurança implicam em opções técnicas, éticas e políticas.<br>In 2012, Brazil approved the Federal Law 12.654, which regulates the use of genetic profiles for criminal investigations. Such law is one of the main landmarks in discussions concerning the use of DNA in criminal investigations that have intensified across the country since 2009, when the FBI donated to Brazil the Combined DNA Index System (CODIS). The arrival of these databases in Brazil is part of an international expansion process of national genetic profiles databases. This dissertation is about the introduction process of such biotechnology in Brazil. Through interviews with specialists from different areas, such as forensic sciences, law and bioethics, from observation and participation in forensics seminars and congresses and from discussions set in scientific publications this research aims for an ethnographic understanding of the nexus between science, law, technology, security and power around the introductory process of the genetic profile databases in Brazil. In its first part, the dissertation describes some relations and meanings that made genetic identification become a synonym of scientific precision concerning human identification and the transition for its application in criminal investigation. In its second part, it approaches the first effects of the introductory process of the technology in Brazil through the DNA database’s law elaboration process, from the emergency of new trajectories of genetic forensic experts and from a few challenges of the daily collection, analysis and storage of evidences of the crime scene. To know and to understand the mediations involved in the stabilization of the DNA databases for criminal investigation allow us to reflect on how the relation between technoscience, law, citizenship and safety politics affects and engenders technical options, ethics and policies.
APA, Harvard, Vancouver, ISO, and other styles
8

Forde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.

Full text
Abstract:
IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The data collection process included IT security manager interviews (n = 7), organizational documents and procedures (n = 14), and direct observation of a training meeting (n = 35). Data collection from organizational data and observational data were summarized. Coding from the interviews and member checking were triangulated with organizational documents and observational data/field notes to produce major and minor themes. Through methodological triangulation, 5 major themes emerged from the data analysis: avoiding social engineering vulnerabilities, avoiding weak encryption, maintaining customer trust, training to create a cloud security culture, and developing sufficient policies. The findings of this study may benefit information security managers by enhancing their information security practices to better protect their organization's information that is stored in the commercial cloud. Improved information security practices may contribute to social change by providing by proving customers a lesser amount of risk of having their identity or data stolen from internal and external thieves
APA, Harvard, Vancouver, ISO, and other styles
9

Ward, Gerald Lee. "Electronic Warrant Systems: The Effect of Advanced Technologies on Arrest Performance." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2703.

Full text
Abstract:
Public safety is negatively affected when arrest warrant information is not available to law enforcement officers, judges, prosecutors, and other criminal justice practitioners. The U.S. Government and the criminal justice community have advocated for electronic warrant systems (e-warrants). Peace officers know that when e-warrant systems deliver warrant information to them immediately from multiple jurisdictions, their safety is increased. However, the factors that cause these e-warrants systems to improve safety are not known. The purpose of this historical data analysis study was to determine if the use of e-warrant systems resulted in shorter clearance times than the use of legacy paper-based systems. Stakeholder theory, open systems theory, and service-oriented architecture theory were used to guide the quantitative research design. This study compared 2 years of historical arrest warrants from 6 sheriffs' departments organized into population matched sets. Two-way ANOVA tests and nonparametric tests were conducted to analyze the impact of the independent variables warrant system type and case type on the dependent variables mean service days and percent warrants served. The study showed that operating e-warrant systems in similar size sample agencies did not ensure shorter mean service days and higher percent warrants served over legacy systems, and it confirmed that more research is needed to determine other factors that will lead to an improvement in these variables. The findings of this study may assist agency executives and justice practitioners to identify other variables that may increase effectiveness of e-warrant systems, thereby improving public and officer safety, both important social benefits.
APA, Harvard, Vancouver, ISO, and other styles
10

Nwabuikwu, Christian. "Genetic Identity:National DNA Database : A Communitarian Approach to Criminals' Identification." Thesis, Linköping University, Centre for Applied Ethics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-6815.

Full text
Abstract:
<p>Abstract</p><p>Every new scientific or technological development is often met with reactions, some positive and some negative .Same is true for the advent of any new technological innovations that could be a replacement or new applications of an older one. The advent of DNA Database and the move for its continuous expansion attracts not only Champions but Critics as well .Although the Forensic application of the currently developing DNA profiling for criminals’ identification (DNA Data base), has been accepted as a worthy technological advancement in crime detection, there has not been a unanimous acceptance on its possible expansion to include the entire population (National DNA Database) .The controversy is partly because of the social values which the NDNAD seems to undermine and partly because the NDNAD ,is never a ‘child of legislation’ , in that there is no specific ‘National DNA database Act’ which established the database, and defined what details may be stored in it or how it may be used. Instead, the database was created as a result of The Criminal Justice and Police Order Act 1994, which, though amendment of the Police and Criminal evidence Act 1984 established the condition would allow the database to be created .</p><p>It is a debate basically on public utility vs private goods. Though the controversy rages, the insistence on NDNAD establishment is solidly backed up by the expectation that the endeavour will give a wealth of information that will be very vital to the society for criminals’ detections and social control. This work based on the communitarian usefulness of the programme, demonstrates that the wealth of social benefits accompanying the NDNAD programme, outweighs the hypothetical fears of having the programme initiated. I argued for the priority of the common well being over the individual good.</p>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Criminal databases"

1

Kiesbye, Stefan. DNA Databases. Detroit: Greenhaven Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Drake, Elizabeth. Washington State criminal records audit for adult felonies: Final report. Olympia, Wash: Washington State Institute for Public Policy, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Drake, Elizabeth. Washington State criminal records audit for adult felonies: Final report. Olympia, Wash: Washington State Institute for Public Policy, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Busser, Els De. Blueprint for an EU criminal records database: Legal, politico-institutional and practical feasibility ; advance copy final report. Antwerben: Maklu, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stefanou, Constantin. Towards a European criminal record. Cambridge: Cambridge University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stefanou, Constantin. Towards a European criminal record. Cambridge: Cambridge University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stefanou, Constantin. Towards a European criminal record. Cambridge: Cambridge University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Administrative Office of the United States Courts, ed. Bringing criminal debt into balance: Improving fine & restitution collection. [Washington, D.C.]: Administrative Office for the U.S. Courts, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tania, Simoncelli, ed. Genetic justice: DNA data banks, criminal investigations, and civil liberties. New York: Columbia University Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ray, Lewis, and Minnesota Planning (Agency). Criminal Justice Center., eds. Tracking crime: Analyzing Minnesota criminal history records. St. Paul, MN: MN Planning, Criminal Justice Center, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Criminal databases"

1

McCartney, Carole, Rafaela Granja, and Eric Töpfer. "Biometric Forensic Identity Databases in Europe." In Privacy, Technology, and the Criminal Process, 110–35. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003111078-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gill, P., A. Urquhart, E. Millican, N. Oldroyd, S. Watson, R. Sparkes, and C. P. Kimpton. "Criminal intelligence databases and interpretation of STRs." In 16th Congress of the International Society for Forensic Haemogenetics (Internationale Gesellschaft für forensische Hämogenetik e.V.), Santiago de Compostela, 12–16 September 1995, 235–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/978-3-642-80029-0_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dash, Hirak Ranjan, Kelly M. Elkins, and Noora Rashid Al-Snan. "Role of Forensic DNA Databases in Criminal Identification." In Advancements in Forensic DNA Analysis, 119–27. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-6195-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gutiérrez Zarza, Ángeles. "EU Information Systems and Databases." In Exchange of Information and Data Protection in Cross-border Criminal Proceedings in Europe, 117–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-40291-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Patrick S., K. C. Chang, Tai-Ping Hsing, and Shihchieh Chou. "Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database." In Intelligence and Security Informatics, 91–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734628_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Amelung, Nina, Rafaela Granja, and Helena Machado. "The United Kingdom (UK)." In Modes of Bio-Bordering, 119–36. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8183-0_8.

Full text
Abstract:
Abstract The UK is the possessor of the world’s oldest and largest DNA database by proportion of population: the National Criminal Intelligence DNA Database, established in 1995. As a nation-state that holds one of the world’s largest DNA databases, the UK has been dealing systematically with the societal effects triggered by various ethical controversies. In terms of bordering practices, the UK serves as an example of an ambivalent mode of re- and debordering. This ambivalence derives from the UK’s changing position regarding the Prüm system. In 2014, the UK government, driven by the parliament, decided to opt out of the Prüm Decisions. In 2015, after a Prüm-style pilot project run with other EU Member States, the UK decided to opt in. This decision, nonetheless, included the imposition of limits on other EU countries’ access to the UK’s data. Consequently, the UK’s debordering practices co-exist with rebordering attempts aimed at restricting access to their own data.
APA, Harvard, Vancouver, ISO, and other styles
7

Kester, Quist-Aphetsi. "Using Formal Concepts Analysis Techniques in Mining Data from Criminal Databases and Profiling Events Based on Factors to Understand Criminal Environments." In Computational Science and Its Applications – ICCSA 2016, 480–96. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42092-9_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Montaldo, Stefano. "Swords Shielding Security? The Use of Databases in Criminal Cooperation within the European Union: Challenges and Prospects." In Use and Misuse of New Technologies, 37–54. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05648-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Makri, Freideriki, Genny Dimitrakopoulou, Nikolaos Kapsalis, and George Kokkinis. "Policy Recommendations for Combating New Trends in Drug Trafficking." In Security Informatics and Law Enforcement, 509–16. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_41.

Full text
Abstract:
AbstractDrug trafficking is a serious threat to the security and well-being of the European Union’s citizens. Organised criminal groups involved in drug trafficking exploit new information and communication technologies to evade law enforcement agencies and use the profits from illegal drugs to fund other criminal activities. This chapter presents the findings and policy recommendations of the work performed by the Mediterranean and Black Sea Network of security practitioners. The research performed focuses on the operational challenges and the capability gaps experienced in the fight against drug trafficking, and specifically heroin trafficking from Asia to Europe through the Balkan route. The chapter outlines the methodology used by the network of practitioners to first identify and then analyse the security gaps and challenges they are currently experiencing. Research and academia support security practitioners to develop a series of policy recommendations required to overcome these challenges. The policy recommendations focused on interconnecting existing security databases, expanding the mandate of Passenger Information Units to other modes of transport, harmonising and advancing the lawful interception process, better regulating the end-to-end encryption in modern communication channels, and developing a framework for the seizure of cryptocurrencies. The chapter concludes that enhancing information exchange and cooperation between security stakeholders at the national and EU levels, as well as developing advanced technological solutions in the fields of intelligence analysis, scanning of freights and intercepting criminal communications, are essential for combating drug trafficking effectively.
APA, Harvard, Vancouver, ISO, and other styles
10

Amelung, Nina, Rafaela Granja, and Helena Machado. "Conclusion." In Modes of Bio-Bordering, 137–47. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8183-0_9.

Full text
Abstract:
Abstract The concluding chapter reviews and compares the modes of biobordering at the EU level and in Germany, the Netherlands, Poland, Portugal and the UK with a particular focus on the transnational exchange of DNA data within the Prüm system. This analysis reveals the multiplicity of heterogeneous biobordering regimes that enact different visions of Europe and nationhood and that have implications for de facto hidden integration and disintegration processes in the EU. ‘European integration’ is believed to be achievable by the harmonization of scientific and technical procedures in different countries. However, the mandatory elements of the Prüm Decisions were politically enforced without taking into consideration the significant differences between EU countries. Thus, hidden disintegration comes as a contingency regarding operational and organizational traditions, legislation, the nature of the criminal justice system, and national variations around the human and economic resources to invest in forensic DNA databases and DNA profiling technologies. The conclusion ends with a proposal of a typology systematizing biobordering dynamics derived from the empirical case studies.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Criminal databases"

1

Mandikel, Bhumika S., Arnitha Satish, and Sahana K. J. "From Words to Faces: Automated Suspect Image Synthesis and Retrieval from Criminal Databases." In 2024 Third International Conference on Artificial Intelligence, Computational Electronics and Communication System (AICECS), 1–6. IEEE, 2024. https://doi.org/10.1109/aicecs63354.2024.10956553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

R, Suganya, Ashok P, Lekshitha J, Shanmuga Priya S, Monica K, and Somasundaram K. "Criminal Identification Based On Database Management Using Blockchain." In 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS), 1–5. IEEE, 2024. https://doi.org/10.1109/icpects62210.2024.10780110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vettori, Barbara, and Boban Misoski. "DATABASES TO SUPPORT ASSET MANAGEMENT AND SOCIAL REUSE: THE CASE STUDY OF THE REPUBLIC OF NORTH MACEDONIA." In EU 2021 – The future of the EU in and after the pandemic. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18306.

Full text
Abstract:
Over the past decades, many EU and non EU countries have amended their legislative and institutional framework on proceeds of crime confiscation to deprive criminals of their assets more effectively and to better manage and dispose of them. There are still, however, some under-researched issues that could greatly enhance the effectiveness and efficiency of confiscation policies. A first topic is the contribution that databases can give to asset management and disposal; the second one deals with a particular asset disposal option which involves giving criminal proceeds back to the communities affected by crime and promoting their use in line with communal needs: social reuse. This article responds to this question: what is the current situation regarding these two key issues in the Republic of North Macedonia?
APA, Harvard, Vancouver, ISO, and other styles
4

Popović, Uroš. "Disruptivni potencijal blokčejn tehnologije za unapređenje međunarodne pravne saradnje u krivičnim stvarima." In Relation between International and National Criminal Law, 285–307. University of Belgrade, International Criminal Law Assotiation, 2024. https://doi.org/10.51204/zbornik_umkp_24150a.

Full text
Abstract:
Blockchain technology represents significant potential for enhancing international legal cooperation in the context of criminal justice. This innovative technology offers solutions to some of the most significant challenges faced by legal and judicial systems, such as slow processes, differences in legal systems, high costs, technical limitations, and language barriers. By utilizing blockchain, greater transparency, immutability of data, rapid information exchange, and increased security can be achieved, contributing to the efficiency and transparency of international judicial cooperation. The paper explores in detail the specific applications of blockchain in international cooperation in criminal matters, with a particular focus on the digitization and secure exchange of court decisions, the interconnection of national databases for information sharing, as well as the use of blockchain for the rapid and confidential transfer of evidence between states. Technical, legal, and organizational barriers to blockchain implementation will be considered, along with ways to overcome them. Additionally, the paper will analyze how blockchain enhances trust between judicial systems, eliminating the need for intermediaries and facilitating transnational cooperation. The anticipated benefits include accelerated court proceedings, reduced costs, enhanced data security and confidentiality, and facilitated cooperation between countries with different legal systems. Finally, potential barriers to implementation, such as regulatory challenges, technical limitations, and privacy issues, will be explored, along with possible solutions to overcome them.
APA, Harvard, Vancouver, ISO, and other styles
5

Bogićević, Dragana, and Branislava Popović-Ćitić. "Contribution of the Concept of Criminal Career to the Policy of Institutional Punishment." In International Scientific Conference “LIFE IN PRISON: Criminological, Penological, Psychological, Sociological, Legal, Security and Medical Issues”, 101–7. Institute of Criminological and Sociological Research, Belgrade, Serbia, 2024. https://doi.org/10.47152/prisonlife2024.28.

Full text
Abstract:
Introduction: The criminal career paradigm, which became accepted in criminology in the mid1980s, significantly improved knowledge about the patterns of criminal activities of individual delinquents and opened up a number of questions about crime control strategies, especially institutional punishment of offenders. Objective: The objective of this paper is to indicate, through a systematic review of literature, the importance of empirical findings on criminal careers for the policy of institutional punishment of offenders. Methods: Search of electronic databases within the service of the Serbian Library Consortium for Coordinated Acquisition (KOBSON) with key words and combinations thereof: criminal career paradigm, policy issues, crime control strategies, incapacitation, incarceration, law. Results: Data on the individual frequency and duration of a criminal career proved to be the most important parameters that need to be taken into account when deciding about the institutional punishment of offenders and the length of the prison sentence. Conclusion: Prison sentences for active offenders while taking into account the assessment of the frequency and duration of their criminal career can maximize the effects of institutional punishment of delinquents.
APA, Harvard, Vancouver, ISO, and other styles
6

Primorac, Damir, and Andrej Božinovski. "CORRECTING MISCARRIAGES OF JUSTICE IN CROATIA : ACCESSION AND TIME-LIMITED RETENTION OF DNA PROFILES IN THE JURISPRUDENCE OF THE EUROPEAN COURT OF HUMAN RIGHTS." In International Scientific Conference “Digitalization and Green Transformation of the EU“. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2023. http://dx.doi.org/10.25234/eclic/27459.

Full text
Abstract:
The emergence of Innocence Projects in Croatia in 2015 sparked an interest in the fate of wrongfully convicted individuals and the potential of post-conviction DNA examination. In 2020, the experimental Innocence Project was established at the Faculty of Law in Zagreb, funded by the Croatian Science Foundation to raise public awareness of miscarriages of justice, advocate for legal changes to make it easier for defendants to reopen their cases, and provide legal representation for those believed to be wrongfully convicted. This article delves into the use and handling of DNA information by law enforcement agencies and its treatment within the jurisprudence of the European Court of Human Rights and in the Croatian national criminal legislation. However, concerns have been raised regarding the retention, use, and time-limited frameworks of DNA data in law enforcement databases, particularly concerning the presumption of innocence for individuals who have not been convicted of a crime. The European Court of Human Rights adopted the “Marper” test to address this issue and to ensure that all DNA data is expunged from law enforcement databases when it is not relevant to criminal investigations. This test balances the government’s interests in crime prevention and criminal investigation against individual citizens’ privacy interests, making it essential in addressing wrongful convictions. Using the theoretical, comparative, case study, and dogmatic method The article examines the legal standards of the Council of Europe and the European Union, the jurisprudence of the European Court of Human Rights, as well as Croatian positive legal standards on the retention and use of DNA data and applicable databases. Finally, the article suggests potential legislative reforms in Croatia to improve the utilization, storage, and ramification of DNA data and the use of forensic DNA databases to address miscarriages of justice, particularly in “cold cases”.
APA, Harvard, Vancouver, ISO, and other styles
7

Matos, Helder, Samara Souza, Reginaldo Santos, João Weyl Costa, and Cleyton Costa. "A Supervised Classifier for Police Reports at the State of Pará, Brazil." In Escola Regional de Alto Desempenho Norte 2 e Escola Regional de Aprendizado de Máquina e Inteligência Artificial Norte 2. Sociedade Brasileira de Computação, 2022. http://dx.doi.org/10.5753/erad-no2.2022.228238.

Full text
Abstract:
This paper describes the development of a supervised classifier constructed upon knowledge extracted from police report public databases, in the years between 2019 and 2021 in the state of Pará, Brazil. The classifier achieved an accuracy of approximately 78% for the prediction of 463 unique labels related to public safety. The resulting model can be used to improve the statistical processes of criminal analysts, both in quantitative and qualitative terms.
APA, Harvard, Vancouver, ISO, and other styles
8

Kutzleb, C. D. "Rapid identification of anonymous subjects in large criminal databases: problems and solutions in IAFIS III/FBI subject searches." In Enabling Technologies for Law Enforcement and Security, edited by George Works. SPIE, 1997. http://dx.doi.org/10.1117/12.266294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jain, Aastha, Soumyajit Das, Anand Singh Kushwah, Tushar Rajora, and Shagun Saboo. "Blockchain-Based Criminal Record Database Management." In 2021 Asian Conference on Innovation in Technology (ASIANCON). IEEE, 2021. http://dx.doi.org/10.1109/asiancon51346.2021.9544655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Krstevska Savovska, Katerina. "PROTECTING THE ANIMAL WELFARE THROUGH THE CRIMINAL ACT “TORTURING ANIMALS” - MACEDONIAN LEGISLATION AND JURISPRUDENCE." In SECURITY HORIZONS. Faculty of Security- Skopje, 2023. http://dx.doi.org/10.20544/icp.8.1.23.p16.

Full text
Abstract:
The Chapter XXII of the Macedonian Criminal Code is dedicated to criminal acts against the environment and nature. Among the acts that fall under this chapter is the criminal act of “Torturing animals”, with a widely prescribed object of protection. By stipulating a provision that prohibits the torture of animals, the Criminal Code at the same time provides protection of the animals from cruel behavior. Therefore, the Paper shall elaborate on the provisions of the Criminal Code, as well as other relevant domestic legislation and legislation of other countries that address the issue of animal welfare. In addition, the Paper shall give special attention to the statistical data disposable to the Macedonian State Statistical Office, i.e. the statistical data of submitted criminal reports, initiated accusations and delivered judgments for sanctioning of the perpetrators of such criminal act. Also, the database of the Supreme Court’s portal, which provides access to the jurisprudence of the Macedonian courts, shall be used as a source for specific judgments that establish cases in which animals have been tortured.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Criminal databases"

1

Jenkins, Brian, Bruce Butterworth, and Sachi Yagu. Evolving Patterns of Violence in Developing Countries. Mineta Transportation Institute, August 2023. http://dx.doi.org/10.31979/mti.2024.2344.

Full text
Abstract:
In August 2022, MTI issued a report entitled Changing Patterns of Violence Pose New Challenges to Public Surface Transportation in the United States. That report analyzed the frequency and lethality of attacks on public surface transport in economically advanced countries. But what has been going on in non-economically advanced countries – the vast majority of countries in the world? Using the MTI database of Terrorist and Serious Criminal Attacks Against Public Surface Transportation, the authors analyzed attacks against passenger trains and train stations, buses and bus stations and stops, and all rail infrastructure and operating and security personnel in both sets of countries between January 1, 2004, and December 31, 2022. For this analysis, countries that are economically advanced are based mostly on OCED membership and are designated as Group 1, and those with developing economies and others that are not OECD members, are designated as Group 2. (Group 3 countries are Israel and territory controlled by the Palestinian authority, which MTI will address in a separate report). This report focuses on Group 2 countries, comparing them to Group 1 countries. Group 2 had more than 7 times the number of attacks, and the lethality of its attacks was 3 times greater than in Group 1. In Group 2, many countries have long-running insurgencies that produce frequent and lethal attacks. There are far more attacks on buses and bus depots and stops in Group 2, reflecting greater reliance on bus travel. Explosives dominate attack methods, and while jihadist attackers are responsible for only 9.7% of attacks, they create 33.7% of fatalities. Jihadists are the most lethal attackers in both Group 1 and Group 2 countries. Suicide attacks account for only about 3% of the attacks in both groups, but while that percentage has gone down in Group 1, it has gone up in Group 2.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography