To see the other types of publications on this topic, follow the link: Physical burglary.

Journal articles on the topic 'Physical burglary'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Physical burglary.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shupyana, M. Y. "Criminal liability for burglary in the Republic of Poland." Analytical and Comparative Jurisprudence, no. 4 (April 28, 2022): 298–302. http://dx.doi.org/10.24144/2788-6018.2021.04.51.

Full text
Abstract:
Article is devoted to the nature and content of the crime under art. 279 "Theft with penetration" of the Criminal Code of the Republic of Poland. The author emphasizes that this crime is a qualified corpus delicti, which is selected taking into account the method of theft of property. The author also notes that the essence of penetration is to overcome obstacles to access to property, which is contrary to the clear will of the victim, who uses them to protect their belongings, and which must be effective and real. Such obstacles can be not only physical but also informational. The means of protection established by the owner to protect his movable property from theft will be considered effective and real even when they do not require significant physical effort, but have the appropriate knowledge, skills or means. Analyzed issues related with the content of the concept of penetration, court practice on this issue, as well as separating the main aspects which must be taken into account by the court when establishing the presence or absence of the crime. The author emphasizes that the Polish legislator did not establish a clear "framework" about the object into which penetration can occur and the fact that it is to overcome both physical and informational obstacles. As for the object that can be penetrated, the author emphasizes that the Polish legislator has not established a clear "framework" in this matter. Therefore, intrusion is considered to be intrusion into a dwelling or other premises intended for living, as well as intrusion into any other protected facility. The author also emphasizes the main aspects of the concept of theft, as the basis of the concept of theft. the concept of theft, which should be understood as taking possession of someone else's thing, which consists in removing the thing from the possession of the owner.
APA, Harvard, Vancouver, ISO, and other styles
2

Townsley, Michael, Ross Homel, and Janet Chaseling. "Repeat Burglary Victimisation: Spatial and Temporal Patterns." Australian & New Zealand Journal of Criminology 33, no. 1 (April 2000): 37–63. http://dx.doi.org/10.1177/000486580003300104.

Full text
Abstract:
To date there has been little Australian research on repeat victimisation. This is a study of repeat burglary in an area of Brisbane using police calls for service data. We demonstrate: (a) the prevalence of residential repeat victim addresses (‘hot dot’) is of a similar magnitude to that found in studies in the United Kingdom; (b) the time distributions of revictimisation are identical with those found in studies in the UK and elsewhere; (c) ‘hot spots’ (small areas with high crime density) can be identified by statistical analyses of spatial concentrations of incidents; (d) unstable hot spots tend to be temporary aggregations of hot dots, whereas stable hot spots seem to reflect more the social and physical characteristics of certain localities; and (e) the overall incidence of burglary could be reduced by at least 25 per cent if all repeat victimisation could be eliminated. There are a number of areas where concepts and techniques for repeat victim research could potentially be strengthened: (a) clarifying the connections between hot dots and hot spots, particularly through exploration of the concept of a ‘near repeat address’; (b) applying survival analysis to the data on the time periods between victimisations; and (c) using moving average techniques to examine changes in the spatial distributions of burglary over time.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhou, Hanlin, Lin Liu, Minxuan Lan, Bo Yang, and Zengli Wang. "Assessing the Impact of Nightlight Gradients on Street Robbery and Burglary in Cincinnati of Ohio State, USA." Remote Sensing 11, no. 17 (August 21, 2019): 1958. http://dx.doi.org/10.3390/rs11171958.

Full text
Abstract:
Previous research has recognized the importance of edges to crime. Various scholars have explored how one specific type of edges such as physical edges or social edges affect crime, but rarely investigated the importance of the composite edge effect. To address this gap, this study introduces nightlight data from the Visible Infrared Imaging Radiometer Suite sensor on the Suomi National Polar-orbiting Partnership Satellite (NPP-VIIRS) to measure composite edges. This study defines edges as nightlight gradients—the maximum change of nightlight from a pixel to its neighbors. Using nightlight gradients and other control variables at the tract level, this study applies negative binomial regression models to investigate the effects of edges on the street robbery rate and the burglary rate in Cincinnati. The Akaike Information Criterion (AIC) of models show that nightlight gradients improve the fitness of models of street robbery and burglary. Also, nightlight gradients make a positive impact on the street robbery rate whilst a negative impact on the burglary rate, both of which are statistically significant under the alpha level of 0.05. The different impacts on these two types of crimes may be explained by the nature of crimes and the in-situ characteristics, including nightlight.
APA, Harvard, Vancouver, ISO, and other styles
4

Mercan, Boran Ali. "The making of the professional criminal in Turkey." Ethnography 21, no. 1 (May 28, 2018): 92–112. http://dx.doi.org/10.1177/1466138118779604.

Full text
Abstract:
This article explores how the subject becomes a professional criminal, setting out the life experiences of a group of (ex-)offenders in Turkey who have desisted from crime for 15 years. By analysing the socially-individuated trajectories of offenders, it analytically traces out how the primary habitus inherited from lower-class, migrant, doorkeeper cosmology fits in with the secondary criminal habitus: a bodily-mental, informally-trained capacity to carry out burglary. The formation of criminal habitus is dissected into conative, cognitive and affective components to demonstrate how specialist (physical) breaking and entering skills, maintaining composure, self-confidence, resourcefulness and fluency in the Turkish subcultural language of the street are developed in such a way as to professionalise the modus operandi of burglary. Undertaking the dispositional theory of action, the primary contribution lies in exploring the formative principles of the bodily and mental dispositions necessary to commit a criminal action in a non-Western context.
APA, Harvard, Vancouver, ISO, and other styles
5

Doss, Daniel Adrian, and Daniel Scherr. "Quantitatively examining the interaction between cybercrime and physical crime." Society Register 7, no. 3 (September 26, 2023): 7–20. http://dx.doi.org/10.14746/sr.2023.7.3.01.

Full text
Abstract:
This study examined the differences and relationships between reported incidents of cybercrime and physical crime within U.S. society nationally. The examined period encompassed the years between 2001 and 2020. The study outcomes showed that a relationship existed between reported incidents of cybercrime and reported incidents of physical crime (p = 0.00; α = 0.05). More specifically, it appeared that relationships existed between the reported incidents of cybercrime and the reported incidents of physical crimes representing robbery rate (p = 0.01; α = 0.05), burglary rate (p = 0.00; α = 0.05), and larceny theft rate (p = 0.00; α = 0.05). It also appeared that a difference (p = 0.00; α = 0.05) existed between reported incidents of cybercrime and physical crime, wherein greater quantities of physical crime were exhibited societally during the examined period.
APA, Harvard, Vancouver, ISO, and other styles
6

Uesugi, Masaya, and Kimihiro Hino. "Neighborhood Type Classification by the Associations between Residential Burglary and Physical / Social Environment." Reports of the City Planning Institute of Japan 14, no. 3 (December 4, 2015): 196–201. http://dx.doi.org/10.11361/reportscpij.14.3_196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gu, Tae-Yeon, Kyung-Ran Jang, Myung-Sik Lee, and Sung-Won Jung. "How Visibility Related Physical Elements of Street affects Burglary? - in Low-rise Residential areas -." Journal of the architectural institute of Korea planning & design 32, no. 7 (July 30, 2016): 13–20. http://dx.doi.org/10.5659/jaik_pd.2016.32.7.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

TN. Moorthy and M. Baskaran. "Challenge to forensic podiatry crime scene report: Footprint-based gait analysis in homicide case revealed the perpetrator as the deceased victim's wife who was also the complainant." Asian Journal of Legal Studies 1, no. 1 (August 27, 2022): 42–45. http://dx.doi.org/10.53402/ajls.v1i1.132.

Full text
Abstract:
To identify the offender and unravel the mystery, physical evidence must be found at the crime scenes. When it is first taken from crime scenes, the relevance of some pieces of evidence is unclear or seems inconsequential, but as the investigation goes on, it seems to gain significance. Although footprints are a common physical indicator of a crime, including homicide, burglary, and sexual assault, they are frequently overlooked or dismissed as inconsequential during the early stages of an investigation. Currently, individual identification is done through gait pattern analysis based on footprints. A branch of forensic science known as forensic podiatry examines foot-related evidence in the course of a criminal investigation using specific podiatric knowledge, including the foot and lower limb. Analysis of footprints and gait is most consistent with other pattern-based forms of evidence, such as blood pattern analysis. Most cases of homicide and burglary involve the gait pattern evidence. Additionally, detectives frequently disregard crime scenes due to their familiarity. Science in podiatry is lacking. The current crime scene report, which was researched by the corresponding author (Prof. T. Nataraja Moorthy, henceforth referred to as "TN") in India, highlighted the importance of footprint and gait pattern evidence in a distinctive homicide crime scene. In India, a woman reported her husband's murder to the police, but a footprint-based gait pattern analysis proved she was the murderer, not the unidentified assailant. She committed murder while hiding the crime, which is known as "crime concealment".
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Navjot, Amrita Ranjan, Hassan Majeed, and Kunal Singla. "Burgler Alarm Using IOT." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (January 31, 2023): 735–38. http://dx.doi.org/10.22214/ijraset.2023.48661.

Full text
Abstract:
Abstract: IoT refers to the structure of connected physical bias which is growing at a rapid-fire rate as a huge number of biases and objects are getting associated with the Internet. The Internet of effects can prove that technology has fleetly evolved. currently, the operation of the internet had been extensively used around the world. still, as technology advanced the need for home security systems using the Internet of effects had come more pivotal. Home security is a veritably useful operation of IoT and we're using it to produce an affordable security system for homes as well as artificial use. Besides that, the current home security system on the request was too precious due to the complexity of the bias which occasionally used a precious microcontroller or microprocessor. The Purpose of this trouble was to develop all of the Burglar Alarm system factors which were preliminarily linked and specified as a result of the system design phase conducted earlier . After a brief preface, an executive summary of the results of the development effort is presented . this is followed in a complete description of the overall Burglary Alarm System (BAS), It’s installation , operation, and the tackle details of each of the Individual Subsystems. The test proves that this system is dependable with low- cost, so it can be extensively applied to ultramodern places.
APA, Harvard, Vancouver, ISO, and other styles
10

Jobi, Akinfolarin, Bolawole Ogunbodede, and Samuel Tongo. "DESIGN CHARACTERISTICS AND CRIME EXPERIENCE IN UNIVERSITY STUDENTS’ HALLS OF RESIDENCE." Kufa Journal of Engineering 13, no. 4 (October 14, 2022): 1–12. http://dx.doi.org/10.30572/2018/kje/130401.

Full text
Abstract:
Provision of accommodation for students is one of the primary responsibilities of the managements of Federal Government owned universities in Nigeria. The designs of these students’ halls of residence are institutional in nature, possessing certain common physical design features. The study focuses on 17 halls of residence in 4 federal universities in Southwest, Nigeria. The data collected on the physical design features (hall size, dwelling floor level, corridor length and loading) were analyzed in relation to crime experienced in the halls of residence. The findings suggest that residents in larger hall sizes experienced more crime and a significant relationship established between dwelling floor level and assault/beaten-up [λ² (6, N=618) = 17.46, p= .008] and between corridor loading and burglary/break-in [λ² (2, N=567) = 8.93, p= .012]. Hence architects and other professionals should take a critical look at these physical design features when dealing with crimes in future student housing design.
APA, Harvard, Vancouver, ISO, and other styles
11

Mohamed Izzharif Abdul Halim, Izyan Hani Imran, Adlina Syafura Ahmad Sabri, Mohd Muzamir Mahat, Umi Kalsum Abdul Karim, and Mohamed Sazif Mohamed Subri. "Forensic Investigation to Retrieve 3D Shoe Impression: A Review." Journal of Advanced Research in Applied Sciences and Engineering Technology 37, no. 2 (January 16, 2024): 104–12. http://dx.doi.org/10.37934/araset.37.2.104112.

Full text
Abstract:
In crime scenes such as burglary and murder, the search for physical trace evidence left behind by the suspect is a priority for forensic investigators. A shoe impression is a type of trace evidence that can link the crime scene and the suspect. However, 3D shoe impressions are often neglected at crime scenes due to the complexities of retrieving and preserving the evidence. Shoe impressions are typically retrieved using the standard method of casting. Various techniques have been introduced to retrieve 3D shoe impressions which are reviewed in this paper, including recently introduced techniques that focus on casting using different materials, Structured from Motion (SfM), and 3D light scanning. Additionally, this review discusses alternative techniques to uncover shoe impressions, including each technique's benefits, drawbacks, and gaps.
APA, Harvard, Vancouver, ISO, and other styles
12

Abbas Malik, Hafiz Muhammad, and Kamran Bashir. "The detection and identification of footprint impressions at the scene of crime – A mini review." 1, no. 1 (September 30, 2023): 11–16. http://dx.doi.org/10.56770/fi2023113.

Full text
Abstract:
In order to identify the offender and solve a mystery crime like Footprint, forensic investigators hunt for physical evidence at crime scenes or the place of the crime. Forensic science is based on physical evidence. Even in the early stages of the inquiry, the footprint is simply overlooked since it is thought to be unimportant, even though it is essential physical evidence found at many crime scenes, including those of homicide, burglary, and sexual assault. The most similar kind of pattern-based evidence to fingerprint and gait analysis are blood pattern analysis. The most crucial aspect of forensic science is the analysis and comparison of the footprint impressions. The investigation officer or forensic science specialist usually follows the parameters, such as the design, size, or shape of a footprint, when taking footprint impressions. In a criminal investigation, a footprint impression can be helpful evidence that steers the case in the wrong way. In comparison to the footprints left by walking, those left by standing are smaller. In this review paper, we demonstrate how to quickly analyze the footprint imprint found at the crime scene using the scientific method.
APA, Harvard, Vancouver, ISO, and other styles
13

Agbabiaka, Hafeez Idowu, Oluwole Philip Daramola, and Abiola Aminat Adesanya. "Residents perception of crime characteristic and its causation across residential densities in Mushin, Lagos Nigeria." Journal of Criminological Research, Policy and Practice 8, no. 1 (December 16, 2021): 28–44. http://dx.doi.org/10.1108/jcrpp-09-2021-0052.

Full text
Abstract:
Purpose The purpose of this study is to examine crime characteristics and its causation in Mushin Lagos Nigeria. The incidence of urban crime in Nigeria has been associated with increasing urbanization, high poverty level, congestion, unemployment, deprivation, income inequality, poor physical planning and design, political democratization, disorganization and moral decadence and breakdown in infrastructure. Hence, tackling urban crimes in selected communities within Lagos state will address several issues, creating inclusiveness and safer communities. Design/methodology/approach Primary data were collected through questionnaire administration on three income groups, cutting across 14 communities in the study area. Multistage sampling techniques were adopted to select six communities (Idi Araba, Idi Oro, Fadeyi, Ilasamaja Papa Ajao and Ilupeju), 60 streets and 144 respondents for this study. Respondents selected for this study are individuals who have stayed in the communities for more than five years. Findings This study reports no statistically significant variation in the crime occurrence by type across the selected communities. However, residents experienced a high occurrence of crime against a person in robbery, assault and pocket-picking, especially among the low-income earners. The same trend was observed in crimes against property such as theft, burglary and store breaking in the low- and middle-income areas, whereas burglary, theft and car theft have high occurrence in the high-income areas. In addition, crimes against morality inform of gambling, prostitution and offences against public peace were high in the low- and high-income areas, whereas gambling, prostitution and bribery are common in the middle-income areas. Practical implications This study identifies appropriate policies for combating crime. Collective values promote citizen participation and encourage Do It Yourself in the communities. Stakeholders’ crime prevention mechanism will create safer communities. Social crime prevention and environmental design is an instrument for creating safer cities. Originality/value The outcome of this study addresses goal 11 of the SDGs if properly managed.
APA, Harvard, Vancouver, ISO, and other styles
14

Ren, Jinnan, Madison Sauerteig-Rolston, Mallory Bell, and Kenneth Ferraro. "DOES CRIMINAL VICTIMIZATION RAISE THE RISK OF IADL LIMITATIONS AMONG OLDER ADULTS?" Innovation in Aging 7, Supplement_1 (December 1, 2023): 1023–24. http://dx.doi.org/10.1093/geroni/igad104.3289.

Full text
Abstract:
Abstract Many studies have analyzed the effect of victimization on children and young adults, but relatively few have explored its impact on older adults’ well-being. Drawing from cumulative inequality theory, this study analyzed a sample of 11,860 respondents aged 50 and older from the Health and Retirement Study (HRS) to examine whether victimization experiences, measured by physical attack/assault, robbery/home burglary, and fraud, raise the risk of limitations in performing instrumental activities of daily living (IADLs). The analysis, which used zero-inflated negative binomial models to examine the onset and severity of IADL limitations, revealed that criminal victimization was associated with a higher likelihood of IADL limitations (IRR=0.735, p< 0.01), even after adjusting for demographic and health-related factors. Additional analyses examining the influence of each type of victimization showed that the experiences of a physical attack and robbery were related to IADL limitations. These findings demonstrate that criminal victimization experiences are associated with compromised IADL function, especially when the encounter involves an intentional act of immediate harm. There is a need for (a) additional research on the consequences of criminal victimization on the health and well-being of older adults and (b) interventions to help older adults who experience a personal or property crime.
APA, Harvard, Vancouver, ISO, and other styles
15

Amemiya, Mamoru. "Relationship between time series variations of residential burglary rates and the social and physical environments of local districts in Tokyo's 23 wards." Journal of the City Planning Institute of Japan 48, no. 3 (2013): 351–56. http://dx.doi.org/10.11361/journalcpij.48.351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Zagar, Robert John, John Russell Hughes, Kenneth G. Busch, and Jack Arbit. "Comparing Early and Late Twentieth-Century Boston and Chicago Male Juvenile Offenders: What Changed?" Psychological Reports 104, no. 1 (February 2009): 185–98. http://dx.doi.org/10.2466/pr0.104.1.185-198.

Full text
Abstract:
To investigate changes in characteristics of delinquents over time, randomly selected contemporary delinquents (Zagar, et al., 1980–1988; n = 2,031) were compared with 3 historical Chicago and Boston samples (Healy & Bonner, 1909–1915, n = 2,000; Healy & Bonner, 1917–1923, n = 2,000; Glueck & Glueck, 1917–1922, n = 1,000). All underwent physical, psychiatric, psychological, school, and social examinations. Contemporary delinquents had more assault, burglary, homicide, alcohol and substance abuse, gang membership, head injury, overdose, and single parents. Historical delinquent samples had more thieves and families with both biological parents. Historical delinquent mean IQ was 5 points below standardization average; modern delinquents were 22 points lower. Contemporary offenders were a greater portion of the county public school-aged population. Current more sensitive and specific examinations account for increases in observed overdoses and head injuries in the 1980s sample. Other demographic differences between contemporary and 3 historical delinquent samples were robust. Findings are discussed with respect to a need for early actuarial assessment and empirical treatment of the costliest delinquents: the dropouts, alcoholics, addicts, career delinquents-criminals, and homicide-prone youth.
APA, Harvard, Vancouver, ISO, and other styles
17

Pompeii, Lisa, Elisa Benavides, Oana Pop, Yuliana Rojas, Robert Emery, George Delclos, Christine Markham, Abiodun Oluyomi, Karim Vellani, and Ned Levine. "Workplace Violence in Outpatient Physician Clinics: A Systematic Review." International Journal of Environmental Research and Public Health 17, no. 18 (September 10, 2020): 6587. http://dx.doi.org/10.3390/ijerph17186587.

Full text
Abstract:
Workplace violence (WPV) has been extensively studied in hospitals, yet little is known about WPV in outpatient physician clinics. These settings and work tasks may present different risk factors for WPV compared to hospitals, including the handling/exchange of cash, and being remotely located without security presence. We conducted a systematic literature review to describe what is currently known about WPV in outpatient physician clinics. Six literature databases were searched and reference lists from included articles published from 2000–2019. Thirteen quantitative and five qualitative manuscripts were included which all focused on patient/family-perpetrated violence in outpatient physician clinics. No studies examined other violence types (e.g., worker-on-worker; burglary). The overall prevalence of Type II violence ranged from 9.5% to 74.6%, with the most common form being verbal abuse (42.1–94.3%), followed by threat of assault (14.0–57.4%), bullying (2.5–5.7%), physical assault, (0.5–15.9%) and sexual harassment/assault (0.2–9.3%). Worker consequences included reduced work performance, anger, and depression. Most workers did not receive training on how to manage a violent patient. More work is needed to examine the prevalence and risk factors of WPV in outpatient physician clinics for purposes of informing prevention efforts in these settings.
APA, Harvard, Vancouver, ISO, and other styles
18

Azad, S., and M. Ghandehari. "SPATIO-TEMPORAL STUDY OF THE DETERMINANTS OF RESIDENTIAL SATISFACTION IN NEW YORK CITY DURING COVID-19 USING CROWDSOURCED DATA." ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences VIII-4/W1-2021 (September 3, 2021): 3–10. http://dx.doi.org/10.5194/isprs-annals-viii-4-w1-2021-3-2021.

Full text
Abstract:
Abstract. Residential satisfaction, an indicator of the quality of life, can be conceptualized with the objective and subjective evaluation of the physical and ecological characteristics of dwellings and neighbourhoods. The majority of the New Yorkers remained indoors during the COVID-19 pandemic, increasing the importance of the residential environment and satisfaction like never before. Noise and safety are two major determinants of residential satisfaction that changed much during the pandemic lockdown. We used citizen-generated non-emergency (NYC311) and emergency (NYPD911) complaint data to investigate the spatial and temporal change dynamics of complaints related to noise and safety. In the noise domain, we focused on NYC311 complaints associated with the noise from neighbours, streets, and illegal fireworks. In the safety domain, we examined the change of both physical and economic safety. For physical safety, we used the NYPD 911 data related to burglary and vehicle larceny, where for economic safety, we used NYC311 complaints correspond to price gouging. We spatially aggregated the complaints at the census tract level (total = 2123) and performed Welsch’s t-test to identify the change dynamics of the satisfaction during the pandemic for different socioeconomic factors. We found the overall residential satisfaction decreased during the pandemic with extreme noise exposure and inadequate safety. The study also found the economic and racial disparity in residential satisfaction during the pandemic, as with statistical significance, the complaints regarding noise, physical and financial safety generated from the Black, Latinx, and impoverished communities were significantly higher than White, Asian and affluent communities.
APA, Harvard, Vancouver, ISO, and other styles
19

Silva, Patrik, and Lin Li. "Urban Crime Occurrences in Association with Built Environment Characteristics: An African Case with Implications for Urban Design." Sustainability 12, no. 7 (April 10, 2020): 3056. http://dx.doi.org/10.3390/su12073056.

Full text
Abstract:
Empirically, the physical spatial arrangement of places provides us with a clue about the likelihood for crime opportunities based on the principles of crime prevention through environmental design (CPTED). Although we know that the quality of the urban built environment influences people’s behavior, its measurement as a variable is not an easy task. In this study, we present and develop a set of urban built environment indicators (UBEIs) based on two datasets: building footprints and road networks at the neighborhood level in the city of Praia, Cape Verde. We selected the four most relevant UBEIs to create a single urban built environment indicator (CUBEI), and then, explored their relationships with five types of crime (i.e., burglary, robbery, mugging, residential robbery, and crimes involving weapons) using correlation and regression analysis. Our results showed a consistent and statistically significant relationship between different types of crimes with both the UBEIs and CUBEI, suggesting that a poor urban built environment is associated with an increase of all types of crimes investigated in this study. Thus, to minimize crime incidents, urban planners should rehabilitate or design neighborhoods from the earlier stage, considering the principles of CPTED and broken window theory (BWT).
APA, Harvard, Vancouver, ISO, and other styles
20

Kim, Dahee, Seung-Wan Hong, and Yongwook Jeong. "Crime Prevention Effect of the Second Generation Crime Prevention through Environmental Design Project in South Korea: An Analysis." Social Sciences 8, no. 6 (June 13, 2019): 187. http://dx.doi.org/10.3390/socsci8060187.

Full text
Abstract:
In Yeomni-dong Sogeum-gil, Korea, the first generation CPTED (Crime Prevention Through Environmental Design) project was implemented in 2012, focusing on improving the physical environment. Later, spreading nationwide, it was developed into the second generation CPTED, emphasizing the role of resident participation and improving upon the weak points of the first project. This study makes a comparative analysis of crime reduction and diffusion before and after the second generation CPTED conducted in S-dong, Dongjak-gu, Seoul, Korea, using crime location data to verify the crime prevention effect. Most previous studies on Korean CPTED projects sought verification through surveys that involved subjective opinions of the researchers or participants, creating the need for verification through quantitative and objective analysis based on crime data. This follow-up research examines the effects of the first generation CPTED Project by making an objective analysis of the differences in crime prevention effects between the first and the second project. Findings revealed that the second CPTED had a positive effect in reducing the rate of burglary and violent crime. The second generation CPTED project also led to the crime control benefits of crime diffusion, in contrast to the earlier project, where crime displacement occurred.
APA, Harvard, Vancouver, ISO, and other styles
21

DeHart, Jasmine, Makya Stell, and Christan Grant. "Social Media and the Scourge of Visual Privacy." Information 11, no. 2 (January 21, 2020): 57. http://dx.doi.org/10.3390/info11020057.

Full text
Abstract:
Online privacy has become immensely important with the growth of technology and the expansion of communication. Social Media Networks have risen to the forefront of current communication trends. With the current trends in social media, the question now becomes how can we actively protect ourselves on these platforms? Users of social media networks share billions of images a day. Whether intentional or unintentional, users tend to share private information within these images. In this study, we investigate (1) the users’ perspective of privacy, (2) pervasiveness of privacy leaks on Twitter, and (3) the threats and dangers on these platforms. In this study, we incorporate techniques such as text analysis, analysis of variance, and crowdsourcing to process the data received from these sources. Based on the results, the participants’ definitions of privacy showed overlap regardless of age or gender identity. After looking at the survey results, most female participants displayed a heightened fear of dangers on social media networks because of threats in the following areas: assets and identity. When the participants were asked to rank the threats on social media, they showed a high concern for burglary and kidnapping. We find that participants need more education about the threats of visual content and how these privacy leaks can lead to physical, mental, and emotional danger.
APA, Harvard, Vancouver, ISO, and other styles
22

Putri, Anggraini, Chairul Murimann, and Ezra Aminanto. "Evaluation of Physical Security of Indonesian Formed Police Units' Garuda Camp in the Perspective of Crime Prevention Through Environmental Design." Technium Social Sciences Journal 22 (August 9, 2021): 725–40. http://dx.doi.org/10.47577/tssj.v22i1.4112.

Full text
Abstract:
Indonesia is one of the Police Contributing Countries (PCC) in the United Nations Peacekeeping Operations. Since 1989, Indonesia has deployed their police officers into various peacekeeping missions, either individually or in the units called Formed Police Units (FPU). In deploying the FPU, Indonesia as the PCC is not only responsible for preparing the personnel, but also equipping the FPU in logistics and infrastructure, which includes appropriate camps in the mission area. These camps have an important role as the operational and administrative base of the FPU, personnels accommodation, assets storage facility, and notably as the symbol of Indonesia’s commitment to its contribution to world peace. Garuda Camp Indonesian FPU in MINUSCA, Central African Republic, was built in 2018 by the International Relations Division of The National Police with total assets more than 500 billion rupiahs. During the 2 years of placing the Indonesian FPU in MINUSCA, several security threats have occurred in this camp, such as theft and burglary. In this case, the camp security is an important element to ensure the Unit's success in performing its mission mandate. Therefore, the author sees the need for an evaluation using the perception of Crime Prevention Through Environmental Design (CPTED) to increase the level of security at Garuda Camp. This is based on CPTED which has a basic idea that proper and effective design in the use of the built environment can lead to a reduction in crime and fear of crime, as well as an improvement in the quality of life in an environment. The author explores threats and use qualitative methods to identify the compliance of physical security requirements in the camp. The result of the study shows that Garuda Camp is included in the medium level threat category. Thus, a threat prevention strategy is needed.
APA, Harvard, Vancouver, ISO, and other styles
23

Bele, Dominikus Mau, Sanggar Kanto, and Edi Susilo. "Model Penguatan Kelembagaan Lokal dalam Penanggulangan Kemiskinan di Wilayah Perbatasan RI-DTL." SOSIOHUMANIORA: Jurnal Ilmiah Ilmu Sosial Dan Humaniora 7, no. 2 (August 10, 2021): 49–62. http://dx.doi.org/10.30738/sosio.v7i2.10351.

Full text
Abstract:
The RI-RDTL border became an area of conflict between the communities in Makir Village and Lamaksenulu Village. This conflict often results in several criminal acts such as burglary, theft of livestock, confiscation of water to rice fields. Coupled with low physical development conditions, for example, the unavailability of clean water and heavily damaged road access, increase the poverty rate. This conflict factor is also caused by the lack of attention from the government, both in terms of education. Through this case study, the social reality of the border conflict in the RI-RDTL Border Region of the Belu Regency will be revealed. By using the theory of democracy as a theoretical framework, the purpose of this study is to propose a model for strengthening local institutions in disaster management. Data collection techniques used in this study include observation, interviews, and documentation. Focus Group Discussions (FGD) using technical comparison data were also conducted to increase the validity of the data obtained. The findings of this study are in the form of a model for strengthening local indigenous peoples' institutions in the form of Ti'sian Tak Ni'an in Makir and Lamaksenulu Villages. This model is expected to create a sense of togetherness, mutual cooperation, and community participation in sustainable development planning. Empowerment and capacity building of these communities can encourage them to lead a better and more prosperous life.
APA, Harvard, Vancouver, ISO, and other styles
24

Branas, Charles C., Eugenia South, Michelle C. Kondo, Bernadette C. Hohl, Philippe Bourgois, Douglas J. Wiebe, and John M. MacDonald. "Citywide cluster randomized trial to restore blighted vacant land and its effects on violence, crime, and fear." Proceedings of the National Academy of Sciences 115, no. 12 (February 26, 2018): 2946–51. http://dx.doi.org/10.1073/pnas.1718503115.

Full text
Abstract:
Vacant and blighted urban land is a widespread and potentially risky environmental condition encountered by millions of people on a daily basis. About 15% of the land in US cities is deemed vacant or abandoned, an area roughly the size of Switzerland. In a citywide cluster randomized controlled trial, we investigated the effects of standardized, reproducible interventions that restore vacant land on the commission of violence, crime, and the perceptions of fear and safety. Quantitative and ethnographic analyses were included in a mixed-methods approach to more fully test and explicate our findings. A total of 541 randomly sampled vacant lots were randomly assigned into treatment and control study arms; outcomes from police and 445 randomly sampled participants were analyzed over a 38-month study period. Participants living near treated vacant lots reported significantly reduced perceptions of crime (−36.8%, P < 0.05), vandalism (−39.3%, P < 0.05), and safety concerns when going outside their homes (−57.8%, P < 0.05), as well as significantly increased use of outside spaces for relaxing and socializing (75.7%, P < 0.01). Significant reductions in crime overall (−13.3%, P < 0.01), gun violence (−29.1%, P < 0.001), burglary (−21.9%, P < 0.001), and nuisances (−30.3%, P < 0.05) were also found after the treatment of vacant lots in neighborhoods below the poverty line. Blighted and vacant urban land affects people’s perceptions of safety, and their actual, physical safety. Restoration of this land can be an effective and scalable infrastructure intervention for gun violence, crime, and fear in urban neighborhoods.
APA, Harvard, Vancouver, ISO, and other styles
25

Abubakar, Aminu Abbas. "Decolonizing the Concept of Penal Sanction Under the Nigerian Criminal Law." American Journal of Society and Law 2, no. 2 (May 3, 2023): 1–5. http://dx.doi.org/10.54536/ajsl.v2i2.1475.

Full text
Abstract:
The conscientious pursuit of crime prevention is a worthy objective of every criminal law and criminal justice system as a whole, and many evidences prove that law and order would break down in the absence of the criminal justice system. Withmuchemphasis onpunishment,however, victims of criminal offencesmore oftenbecome alienatedand end up getting immersed in a complex physical and psychological trauma under a criminal proceedingthat does not include them as a formal party. This paper presents adebate on whether the state is a better agent to pursue breaches of individual rights such as murder, rape, burglary, and theft, which are tagged as criminal offences. Or is the individual victim better equipped to decide on taking on the case for justice through either retribution or compensation?The paper examines the concept of punitive sanction throughthe postcolonial theory lens and argues forthe decolonization of the coloniallyinherited criminal law and a shift towards a System in which the victim is capable of being empowered by invoking processes that place him within proximity to criminal proceedings. This perspective questions the foundational assumption of the State ordered punishmentas intrinsic to the functions of the criminal justice system.There is a wide array of potential methodologies for studies of this nature, but this paper adopts a basic historical survey through secondary sources. The findings of the paper reveal that the pursuit of justice in all its nuanced forms will be much better served under a justice system that promotes the victim’s right to apply for compensation, damages and restitution in criminal cases through personal remedies.
APA, Harvard, Vancouver, ISO, and other styles
26

Стецька, Х. С. "CRIMINOLOGICAL APPROACHES TO THE DEFINITION OF SELFISHING VIOLENT CRIME AND ITS SIGNS." Juridical science 2, no. 4(106) (April 3, 2020): 36–43. http://dx.doi.org/10.32844/2222-5374-2020-106-4-2.04.

Full text
Abstract:
The relevance of the article is that according to the Constitution of Ukraine, the main social priorities and the highest social values include a person, his life and health, honor and dignity, inviolability and security. That is why the implementation of state policy in the field of child protection has long been of concern not only to legal scholars and law enforcement practitioners, but also to the general public. In order to implement European standards for the protection of children’s rights in Ukraine, our state has undertaken a number of international legal obligations to ensure the proper mental and physical development of young people, their protection from any deviations from regulatory behavior. The article presents the concept of mercenary violent crimes committed by children and highlights its features as a set of specialized scientific information, which includes the social conditionality of criminal liability for a certain type of mercenary violent crimes; public danger of a certain type of crime; illegality of the act and its place in the system of normative definition of prohibition of selfish violent type of socially dangerous behavior; the composition of a particular type of crime; socially dangerous consequences and other circumstances of committing crimes that are outside the scope of a certain type of crime, but are inherent in their commission; the identity of the offender. Based on the analysis of the materials of criminal proceedings and the practice of police activity, it was found that the characteristic mercenary violent crimes of children are premeditated murder, robbery, burglary, extortion, illegal possession of a vehicle. These crimes combine selfish motives and violence or the threat of their use and encroach on human life and health, property. The system-forming property that combines selfish motive and violent achievement is criminal illegal activity, where selfish motive determines the nature, content and nature, and the violent form of its implementation specifies the direction of this specific criminal activity.
APA, Harvard, Vancouver, ISO, and other styles
27

Clare, Joseph, John Fernandez, and Frank Morgan. "Formal Evaluation of the Impact of Barriers and Connectors on Residential Burglars' Macro-Level Offending Location Choices." Australian & New Zealand Journal of Criminology 42, no. 2 (August 2009): 139–58. http://dx.doi.org/10.1375/acri.42.2.139.

Full text
Abstract:
Previous research evaluating burglars' offending location choices has produced mixed findings about the influence of physical barriers and connectors on offender movement patterns. Consequently, this article utilises the discrete spatial choice approach to formally evaluate the impact of barriers and connectors on residential burglars' macro-level offending location choices. Data from Perth, Western Australia, demonstrated that physical barriers and connectors exert significant influence on offender decision-making at this level, and that the influence of impermeable barriers increases with proximity of these obstacles to the offender's point of origin. These findings provide formalised evidence for the independent importance of physical barriers and connectors in offender movement and are discussed with respect to current environmental criminology theory.
APA, Harvard, Vancouver, ISO, and other styles
28

Zvakova, Zuzana, Martin Boros, Lucia Figuli, and Andrej Velas. "Evaluation Process of the Burglary Resistance When Explosives Are Used to Create an Opening in the Barriers." Symmetry 13, no. 9 (September 18, 2021): 1740. http://dx.doi.org/10.3390/sym13091740.

Full text
Abstract:
Burglary resistance expresses the time required to overcome the barriers to cause the damage in order to unlawfully enter a place for the purposes of stealing property or committing a felony (i.e., disruption of important assets, e.g., critical infrastructure). Damage to the object protection system means damage to the symmetry of the system—the balance between protection measures and security threats. Barriers are considered to be the walls of buildings or secure storage units (safe, safe, etc.), i.e., passive barriers that separate asset (protected value) from the security threat. The role of barriers in the security system is also to slow down the attack and create a time reserve for the intervention of a security service. There is no uniform approach to express the burglary resistance of such barriers using explosives; however, burglary by explosion are present. Explosives in the article are a tool that can be used by the offenders. The article uses mainly Delphi method and Saaty method. These methods have made it possible to identify and expertly evaluate scenarios for the use of explosives to break a barrier. Logical methods and interviews were also used. The result of the article is the identification and evaluation of the possibilities of using explosives to overcome barriers and expressing the blast burglary resistance of barriers. The universal assessment approach allows the inclusion of explosives to the burglary resistance protection system assessment schemes.
APA, Harvard, Vancouver, ISO, and other styles
29

BOYI MAIRIGA, Murna Joy Dawarga, Mustapha Yusuf, Taimanda Keren Ezekiel, Frichi Bilham, and Kabati Danjuma Madaki. "Crime mapping and hot spot analysis using geospatial data in Jalingo metropolis of Taraba State, Nigeria." World Journal of Advanced Research and Reviews 20, no. 1 (October 30, 2023): 510–21. http://dx.doi.org/10.30574/wjarr.2023.20.1.2051.

Full text
Abstract:
Crime mapping and hot spot analysis are topical and significant research across the fields of criminology, data digging, city planning and law enforcement for crime control. This study seeks to identify high crime areas which require an officer presence and predicting the possible response demand to increase the efficiency of response officer patrols. Crime type and patterns exist on a spatial level; these patterns and type can be grouped geographically by physical location, and analyzed contextually based on the region in which crime occurs. The study aimed at analyzing crime hotspots using geospatial data in Jalingo metropolis by identifying the different kinds of crime in the study area, determine the spatio-temporal variation of crime occurrences in the study area and determine the high crime density area (hotspot).This study proposed a method to identifying level crime, localize crime hotspots, identify relationship between spatiotemporal crime patterns and social trends, and analyze the resulting data for the purposes of knowledge discovery and anomaly detection. Several types of crime were analyzed in this dataset, including burglary, bribery, forgery ,murder ,rape ,theft drug abuse, assault, and robbery analysis, several interesting findings were drawn about crime in Jalingo metropolis, including: Crime mapping and hotspots with steadily increasing crime levels, hotspots with unstable crime levels, synchronous changes in crime trends throughout Jalingo metropolis as a whole, individual months in which certain hotspots behaved anomalously, and a strong relationship between crime hotspot locations. This type of statistical and correlative analysis of crime patterns will help law enforcement agencies predict criminal activity, allocate resources, and promote community awareness to reduce overall crime rates in Jalingo metropolis. Policing approaches like patrolling and response to crime incidents can be more effective if proper crime mapping and crime hot spot analysis data are available for policing is used to make decisions on crime control in the study area. Predictive policing in crime management use information such as historical crime data to predict crime patterns and response demand. Historical crime data is used to identify high crime areas through kernel density estimation. It is also used to anticipate the levels of response demand. Both of these factors are used to determine how to direct police patrols. This study revealed how kernel density estimation is used for crime mapping and hot spot.
APA, Harvard, Vancouver, ISO, and other styles
30

Xiao, Luzi, Stijn Ruiter, Lin Liu, Guangwen Song, and Suhong Zhou. "Burglars blocked by barriers? The impact of physical and social barriers on residential burglars' target location choices in China." Computers, Environment and Urban Systems 86 (March 2021): 101582. http://dx.doi.org/10.1016/j.compenvurbsys.2020.101582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

김대권, 김양현, and kim soon seok. "A Study on Target Selection of Burglars - Focused on Physical Environment Factors." Journal of Korean Public Police and Security Studies 7, no. 1 (May 2010): 209–33. http://dx.doi.org/10.25023/kapsa.7.1.201005.209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Malleson, Nick, and Mark Birkin. "Towards victim-oriented crime modelling in a social science e-infrastructure." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 369, no. 1949 (August 28, 2011): 3353–71. http://dx.doi.org/10.1098/rsta.2011.0142.

Full text
Abstract:
The National e-Infrastructure for Social Simulation (NeISS) is a multi-disciplinary collaboration between computation and social science within the UK Digital Social Research programme. The project aims to develop new tools and services for social scientists and planners to assist in performing ‘what-if’ scenario predictions in a variety of policy contexts. A key part of the NeISS remit is to explore real-world scenarios and evaluate real policy applications. Research into the processes and drivers behind crime is an important application area that has major implications for both improving crime-related policy and developing effective crime prevention strategies. This paper will discuss how the current e-infrastructure and available microsimulation tools can be used to improve an existing agent-based burglary simulation (BurgdSIM) by including a more realistic representation of the victims of crime. Results show that the model produces different spatial patterns when individual-level victim data are used and a risk profile of the synthetic victims suggests which types of people have the largest burglary risk.
APA, Harvard, Vancouver, ISO, and other styles
33

Zvaková, Zuzana, and Štefan Jangl. "Blast Resistance of Selected Barriers." Key Engineering Materials 755 (September 2017): 112–20. http://dx.doi.org/10.4028/www.scientific.net/kem.755.112.

Full text
Abstract:
This article is focused on the burglar resistance of object. The explosives were identified as a potential tool for an access into the mechanical barriers as parts of the shell protection. Mechanical barriers were selected according to the process of the evaluation security measures of the physical security and object security of the National Security Authority. Military regulation Žen-2-6 and mathematical relation for calculation of the maximum pressure generated by the explosion were used for analytical part of the article. The using of the explosives for the breaking of the selected barriers as well as destruction effect of the explosion are presented in the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
34

Kahraman, Hilal, Fatma Köybaşı Şemin, and Celal Teyyar Uğurlu. "Okul Güvenliği: Türkiye’de Basına Yansıyanlar / School Security: Reflected to the Press in Turkey." Journal of History Culture and Art Research 8, no. 1 (April 1, 2019): 392. http://dx.doi.org/10.7596/taksad.v8i1.1923.

Full text
Abstract:
<p><strong>Abstract </strong></p><p>The purpose of this study is to reveal school safety problems in Turkey reflected to the newspaper topics. In this study which is designed according to qualitative research method, document analysis technique is used. A total of 362 news related to school security problems with the keyword of “school” in the 2017-2018 academic year constitute the data of this study which is accessed from the search engines of Hürriyet and Sabah newspapers. In the analysis of the data, content analysis was performed to determine the dimensions of the events that reflect the news about school security problems. In the content analysis, in accordance with the sub-objectives of the research; Analyzes were made based on the topics related to physical, psycho-social and external threats which are reflections of school safety problems. As a result of the analysis in regard to the physical security of schools; four different categories were reached: building, transportation, hygiene factors and security related to infrastructure. Building category is divided into two sub-categories namely outdoor and indoor categories. Outdoor category involves structural problems of the buildings while the indoor category deals with the emergency situation. In the case of psycho-social security, the events in newspapers were collected in five different categories as violence, abuse, suicide, substance abuse and security events related to negligence. In the sub-dimension of psycho-social security, it is observed that most of the security incidents are seen in the category of violence and abuse in schools; It is interesting to note that in these categories, harming of others and sexual harassment are the most intense security incidents in schools. Finally, events related to external threats in the schools were collected in seven different categories as follows: school environment events, school environment structure and system, abuse, psychological attacks, terrorism, burglary and violence. It is possible to say that the school-related incidents as a result of the sale of drugs and unhealthy foods and the theft of schools' equipment are the most common external threats.</p><p><strong>Öz</strong></p><p>Bu çalışmanın amacı; Türkiye’de okul güvenliği sorunlarını gazete haberlerine yansıyan kısmıyla açığa çıkarmaktır. Nitel araştırma yöntemine göre desenlenen bu çalışmada, dokuman analizi tekniği kullanılmıştır. Hürriyet ve Sabah gazetelerinin internet ortamındaki arama motorlarından ulaşılan, 2017-2018 eğitim-öğretim yılındaki ‘‘okul’’ anahtar kavramıyla okul güvenliği sorunları ile ilgili yaşanmış olaylara ait 362 adet haber, bu çalışmanın verilerini oluşturmaktadır. Verilerin analizinde okul güvenliği sorunlarına ilişkin haberlere yansıyan olayların hangi boyutlarda yaşandığının belirlenmesi amacıyla içerik analizi yapılmıştır. İçerik analizi yapılırken araştırmanın alt amaçları doğrultusunda; okul güvenliği sorunlarının yansımaları olan fiziksel, psiko-sosyal ve dış tehditlilerle ilgili başlıklarına dayalı olarak analizler yapılmış, bu başlıklar altında tema ve kategorilere ulaşılmış ve ulaşılan tema ve kategoriler sınıflandırılarak, frekansları gösteren şekillerle sunulmuştur. Yapılan analizler sonucunda okulların fiziksel güvenliğine ilişkin; <em>bina, ulaşım, hijyen etkenleri </em>ve<em> altyapı</em> ile ilgili güvenlik olayları olmak üzere dört farklı kategoriye ulaşılmıştır.<strong> </strong>Bu kategorilerden <em>bina</em> kategorisi altında öne çıkan dış mekân başlığı altında <em>binaların yapısal sorunları </em>ve iç mekân da ise <em>acil durumlar</em> kategorileri, önemli güvenlik olayları olarak karşımıza çıkmaktadır. Psiko-sosyal güvenliğe ilişkin olarak ise gazete haberlerinde yer alan olaylar; <em>şiddet, istismar, intihar, madde bağımlılığı </em>ve<em> ihmal</em> ile ilgili güvenlik olayları olmak üzere beş farklı kategoride toplanmıştır. Psiko-sosyal güvenlik alt boyutunda okullarda <em>şiddet </em>ve <em>istismar</em> kategorisinde güvenlik olaylarının en fazla yaşandığı görülürken; bu kategorilerde <em>kişiye zarar verme</em> ve <em>cinsel tacizin</em> okullarda en yoğun olarak yaşanan güvenlik olayları olması dikkat çekicidir. Son olarak okullarda dış tehditler ile ilgili yer alan olaylar, <em>okul çevresi olayları, okul çevresi yapı ve sitemi, istismar, psikolojik saldırılar, terör, hırsızlık </em>ve<em> şiddet</em> ile ilgili güvenlik olayları olmak üzere yedi farklı kategoride toplanmıştır. Bu kategorilerden <em>uyuşturucu madde</em> ve <em>sağlıksız gıdaların satışı</em> sonucunda yaşanan <em>okul çevresi olayları</em> ile okulların donanım ve araç gereçlerine yönelik yapılan <em>hırsızlık</em> olaylarının okullarda en sık yaşanan dış tehditler olduğunu söylemek mümkündür.</p>
APA, Harvard, Vancouver, ISO, and other styles
35

Robison, Bruce H. "Bioluminescence in the benthopelagic holothurian Enypniastes eximia." Journal of the Marine Biological Association of the United Kingdom 72, no. 2 (May 1992): 463–72. http://dx.doi.org/10.1017/s0025315400037826.

Full text
Abstract:
Enypniastes eximia (Echinodermata: Holothuroidea) is a prominent member of the benthic boundary layer community in deep Caribbean waters. Like most holothurians it feeds on benthic sediments. Feeding is episodic and after collecting food on the bottom it returns to the water column at altitudes within about 50 m of the sea floor. Direct observations from submersibles and laboratory studies of living specimens have shown how bioluminescence is produced. Light production in E. eximia is triggered mechanically, and is produced by hundreds of granular bodies within the gelatinous integument of the animal. Local stimulation yields a localized response which gradually spreads to the entire surface of the animal. Broad impact yields a whole-body luminescent response. The integument of E. eximia is quite fragile, and strong physical contact readily causes the skin to be sloughed off in a glowing cloud. The degree of luminous response is a function of the severity of contact. In the laboratory the skin of E. eximia, along with its luminescent capability, regenerated rapidly. The anti-predatory role of bioluminescence in this species is apparently a ‘burglar alarm’ strategy. In the dark, near-bottom habitat, physical contact by a predator elicits light production which reveals the presence of the attacker to its own visually-cued predators.
APA, Harvard, Vancouver, ISO, and other styles
36

Miller, Ted R., Mark A. Cohen, David I. Swedler, Bina Ali, and Delia V. Hendrie. "Incidence and Costs of Personal and Property Crimes in the USA, 2017." Journal of Benefit-Cost Analysis 12, no. 1 (2021): 24–54. http://dx.doi.org/10.1017/bca.2020.36.

Full text
Abstract:
AbstractTotal cost estimates for crime in the USA are both out-of-date and incomplete. We estimated incidence and costs of personal crimes (both violent and non-violent) and property crimes in 2017. Incidence came from national arrest data, multi-state estimates of police-reported crimes per arrest, national victimization and road crash surveys, and police underreporting studies. We updated and expanded upon published unit costs. Estimated crime costs totaled $2.6 trillion ($620 billion in monetary costs plus quality of life losses valued at $1.95 trillion; 95 % uncertainty interval $2.2–$3.0 trillion). Violent crime accounted for 85 % of costs. Principal contributors to the 10.9 million quality-adjusted life years lost were sexual violence, physical assault/robbery, and child maltreatment. Monetary expenditures caused by criminal victimization represent 3 % of Gross Domestic Product – equivalent to the amount spent on national defense. These estimates exclude the additional costs of preventing and avoiding crime such as enhanced lighting and burglar alarms. They also exclude crimes against businesses and most white-collar and corporate offenses.
APA, Harvard, Vancouver, ISO, and other styles
37

Ajitha, P., Malemarpuram Chaitanya Sai, Dheeraj, and A. Sivasangari. "A Joint Optimization Approach to Security- and Insurance Management System on Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 11 (November 1, 2020): 4944–48. http://dx.doi.org/10.1166/jctn.2020.9245.

Full text
Abstract:
The fundamental point of this undertaking is to joined way to deal with protection and cyber insurance provisioning in the cloud based assets. Right now have introduced a joint way to deal with security and cyber insurance provisioning in the cloud. Utilizing a stochastic improvement, introduced a technique for ideally provisioning the two administrations despite vulnerability in regards to future valuing, approaching traffic and digital assaults. Hence, an application may make preparations for assaults by provisioning security administrations from suppliers, for example, Vast and Trend Micro. These administrations may take different structures; for example, secure information stockpiling, Identity Access Management (IAM), and interruption location administrations to mirror approaching traffic. And afterward cyber insurance is utilized to give express if malignant movement prompts money related misfortune. Protection inclusion might be first or outsider with, for example, burglary of cash and advanced resources, business interference, and digital blackmail, security breaks, loss of outsider information.
APA, Harvard, Vancouver, ISO, and other styles
38

Woodworth, J. T., G. O. Mohler, A. L. Bertozzi, and P. J. Brantingham. "Non-local crime density estimation incorporating housing information." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 372, no. 2028 (November 13, 2014): 20130403. http://dx.doi.org/10.1098/rsta.2013.0403.

Full text
Abstract:
Given a discrete sample of event locations, we wish to produce a probability density that models the relative probability of events occurring in a spatial domain. Standard density estimation techniques do not incorporate priors informed by spatial data. Such methods can result in assigning significant positive probability to locations where events cannot realistically occur. In particular, when modelling residential burglaries, standard density estimation can predict residential burglaries occurring where there are no residences. Incorporating the spatial data can inform the valid region for the density. When modelling very few events, additional priors can help to correctly fill in the gaps. Learning and enforcing correlation between spatial data and event data can yield better estimates from fewer events. We propose a non-local version of maximum penalized likelihood estimation based on the H 1 Sobolev seminorm regularizer that computes non-local weights from spatial data to obtain more spatially accurate density estimates. We evaluate this method in application to a residential burglary dataset from San Fernando Valley with the non-local weights informed by housing data or a satellite image.
APA, Harvard, Vancouver, ISO, and other styles
39

Kiran Kumar, T., and K. Niveditha. "Water Budget Estimation in Water Resources Management in Drought Prone Areas in Rayalaseema Region, South India." Journal of Physics: Conference Series 2089, no. 1 (November 1, 2021): 012063. http://dx.doi.org/10.1088/1742-6596/2089/1/012063.

Full text
Abstract:
Abstract Water is a valuable natural resource, fresh water is vital for health and to the economy, and reliable access to it is becoming increasingly important as the India’s population rises. Yet its availability is limited, per capita accessibility of useable water is depleting, but with increasing living standard of people, all around fast industrial development and expansion, necessity of fresh water is raising high continuously. Water audit is a successful tool for minimizing losses, working on different utilizations and in this way empowering water conservation in irrigation, domestic, power and industrial as well. Water audit controls the measure of water lost from a distribution system because of spillage and different reasons like burglary, unapproved withdrawals from the organizations and the cost of such misfortunes to the utility. Water budget is a bookkeeping of all the water that streams into and out of an undertaking region of project area. Water budget gives the financial aspects on the distribution of quantity of water in Rayalaseema region. The study area this paper to calculate the water budget in the study area of 51 Mandal of Rayalaseema region and based on the water quantity analysis to prepare water, soil conservation structures in study area, for effective water management
APA, Harvard, Vancouver, ISO, and other styles
40

Chamdun, Muhammad, Adian Fatchur Rochim, and Eko Didik Widianto. "Sistem Keamanan Berlapis pada Ruangan Menggunakan RFID (Radio Frequency Identification) dan Keypad untuk Membuka Pintu Secara Otomatis." Jurnal Teknologi dan Sistem Komputer 2, no. 3 (August 31, 2014): 187–94. http://dx.doi.org/10.14710/jtsiskom.2.3.2014.187-194.

Full text
Abstract:
This final project aims to design a door security device using RFID technology (Radio Frequency Identification) and the keypad as a method of access into the room. The system will automatically give warning when the code is entered incorrectly or burglars entered by breaking the door. The microcontroller that is used as the central data processing is ATMega 16 microcontroller ATMEL production and security sensors are used PIR (Passive Infra Red) and magnetic switches.The design begins with a schematic device hardware and software design using CodeVisionAVR programming. Implementation phase includes the implementation of the physical tools, programs, and sensors. The testing phase is done by testing the input sensors and exit switches, siren output devices, DC motor, LCD (Liquid Crystal Display), the RFID reader, keypad, and system controller.The results of room layered security system works according to design. PIR sensors can detect human activities and turn the LED lamp indicator on. Magnetic switch sensors will provide input to the microcontroller to enable or disable the DC motor as the room locking system. Admin menu that is accessed from the keypad is to add users, remove users, see registered users and change the password. User menu which is also accessed using the keypad, work as the room access using a username and password.This study resulted in the layered security. Room access is done using RFIDTag and password. The room piercing detection is done by sensor PIR (Passive Infra Red) and magnetic switches. Alarm used as a piercing action warning. This layered room safety device produces a better security system.
APA, Harvard, Vancouver, ISO, and other styles
41

Al-Khalli, Najeeb, Saud Alateeq, Mohammed Almansour, Yousef Alhassoun, Ahmed B. Ibrahim, and Saleh A. Alshebeili. "Real-Time Detection of Intruders Using an Acoustic Sensor and Internet-of-Things Computing." Sensors 23, no. 13 (June 21, 2023): 5792. http://dx.doi.org/10.3390/s23135792.

Full text
Abstract:
Modern home automation systems include features that enhance security, such as cameras and radars. This paper proposes an innovative home security system that can detect burglars by analyzing acoustic signals and instantly notifying the authorized person(s). The system architecture incorporates the concept of the Internet of Things (IoT), resulting in a network and a user-friendly system. The proposed system uses an adaptive detection algorithm, namely the “short-time-average through long-time-average” algorithm. The proposed algorithm is implemented by an IoT device (Arduino Duo) to detect people’s acoustical activities for the purpose of home/office security. The performance of the proposed system is evaluated using 10 acoustic signals representing actual events and background noise. The acoustic signals were generated by the sounds of keys shaking, the falling of a small object, the shrinking of a plastic bag, speaking, footsteps, etc. The effects of different algorithms’ parameters on the performance of the proposed system have been thoroughly investigated.
APA, Harvard, Vancouver, ISO, and other styles
42

Alothman, Basil, Chibli Joumaa, Abdulrahman Alotaibi, Bandar Alotaibi, Bashayer Almutairi, Asmaa Aldhafairi, and Murad Khan. "Development of an Electronic Smart Safe Box Using Private Blockchain Technology." Applied Sciences 12, no. 13 (June 24, 2022): 6445. http://dx.doi.org/10.3390/app12136445.

Full text
Abstract:
Effective security has become a vital part of our daily routine, for example securing cash, jewelry, documents, and other valuables. One way is to protect these items by keeping them in a safe box. However, current safe boxes are vulnerable to a number of security attacks such as physical, repudiation, anonymously modifying, etc. In this regard, this paper presents a robust smart safe box using the blockchain solution to ensure each transaction and secure it from unauthorized access. Also, it traces back the local safe items by reading back to blockchain data transactions and protecting them from thieves by tracking the burglar with a real-time tracking location Global Positioning System (GPS) tracker and capturing a picture and video recording through the external camera. Similarly, with more security enhancement using the TensorFlow framework to analyze optical detection and identify things inside the box using an internal camera. At the same time, each transaction is stored by using Write Once and Read Many (WORM) patterns saved in local private blockchain data block logs. Finally, it uses three-way authentication mechanisms to unlock the safe box that authenticates the users, (1) face recognition, (2) fingerprint and (3) the keypad password. The performance of the proposed smart safe box is tested by a number of hardware and blockchain tests. The results reveal that the proposed smart safe box ensures safe and authenticated access to the box and records each transaction using blockchain technology. Further, the performance evaluation of the private blockchain significantly improved the integrity and safeness of the proposed smart safe box.
APA, Harvard, Vancouver, ISO, and other styles
43

Abdul Aziz, N. H., M. H. Mohd Fodzi, K. K. Mohd Shariff, and M. A. Haron. "LTE-based passive forward scattering radar for drone detection and classification." Journal of Physics: Conference Series 2250, no. 1 (April 1, 2022): 012003. http://dx.doi.org/10.1088/1742-6596/2250/1/012003.

Full text
Abstract:
Abstract Passive forward scattering radar is a system that consists of a transmitter that generates microwaves domain, and at the receiver part, receives LTE-based signal from the transmitter, which will result in the Doppler signature of any object. This system can actually be used for detecting the presence of guided missiles, human, aircraft and drone that pass through between the transmitter and receiver. For this study, the main objective is to detect a drone, which are mainly used by humans to trespass or enter secure and private areas. Recently, there have been a few cases of burglary in several states where they have made use of drones to monitor the owner of the house before entering that house. For that reason, this study can help to increase the security and protection against drone trespassing. Specifically, the detection of a drone was carried out by determining the Doppler signature of the drone at two different heights, which are 2 meters (lower) and 3 meters (upper) from the ground by using passive scattering radar. All of the experimental data collected from this study were processed using the MATLAB software to compare the result of drone detection at different heights through Principal Component Analysis (PCA) results. This analysis, from the upper and lower heights, shows a good detection and classification of the drone, however lower height indicated better performance in PCA and confusion matrices analysis. This is due to the bigger cross-sectional area for lower height compared to the upper height of drone that passed through the forward scatter region. This is useful for border protection and monitoring.
APA, Harvard, Vancouver, ISO, and other styles
44

Halford, Eric. "Linking Foraging Domestic Burglary: An Analysis of Crimes Committed Within Police-Identified Optimal Forager Patches." Journal of Police and Criminal Psychology, February 4, 2022. http://dx.doi.org/10.1007/s11896-022-09497-8.

Full text
Abstract:
AbstractCrime linkage is a systematic way of assessing behavioural or physical characteristics of crimes and considering the likelihood they are linked to the same offender. This study builds on research in this area by replicating existing studies with a new type of burglar known as optimal foragers, who are offenders whose target selection is conducted in a similar fashion to foraging animals. Using crimes identified by police analysts as being committed by foragers this study examines their crime scene behaviour to assess the level of predictive accuracy for linking crimes based on their offending characteristics. Results support previous studies on randomly selected burglary offence data by identifying inter-crime distance as the highest linking indicator, followed by target selection, entry behaviour, property stolen and offender crime scene behaviour. Results discuss distinctions between this study and previous research findings, outlining the potential that foraging domestic burglary offenders display distinct behaviours to other forms of offender (random/marauder/commuter).
APA, Harvard, Vancouver, ISO, and other styles
45

Othman, Fazzami, Zaharah Mohd Yusoff, and Siti Aekbal Salleh. "THE IMPACT OF PHYSICAL FEATURES AND ENVIRONMENT ON CRIME IN URBAN NEIGHBOURHOOD AREAS." PLANNING MALAYSIA 18, no. 14 (November 25, 2020). http://dx.doi.org/10.21837/pm.v18i14.818.

Full text
Abstract:
The physical design of features and environment will stimulate a safe and sustainable development of the neighbourhood. Despite possessing a proper form, a private space which does not control and keep could even raise fear and crime incident. Therefore, this study planned to analyse the fear, perception and potential feature that caused the crime event in neighbourhoods. Three years of burglary data got from the Royal Malaysia Police helped to explain the crime trend and pattern. Besides, a statistical analysis conducted to examine the fear level and perception towards crime incident using a set of questionnaires. Next, the potential features and visibility level examined in the unit of a house that has experienced the burglary event. The purpose is to find any element that can affect crime event. Results prove that actual crime data not associated with fear and perception of the crime. Besides, accessibility, visibility and crime pattern were the key elements to consider for crime prevention.
APA, Harvard, Vancouver, ISO, and other styles
46

Iliyasu, Idris Isah, Aldrin Abdullah, and Massoomeh Hedayati Marzbali. "Spatial pattern of burglary in residential neighbourhoods: a case study of Abuja, Nigeria." Journal of Facilities Management, October 21, 2022. http://dx.doi.org/10.1108/jfm-04-2022-0033.

Full text
Abstract:
Purpose Abuja, the capital city of Nigeria, is one of the fastest growing capital cities in sub-Saharan Africa. Recently, the city is experiencing an alarming rate of burglary and violent crimes, while the city planning management frameworks lacks adequate and effective crime mapping, monitoring and management techniques necessary for achieving liveable and safe environment for habitation despite its grandiose spatial planning and aesthetically appealing architectural design as a modern city. Based on police crime records (2007–2018) and geospatial analysis, this paper aims to provide adequate understanding on the interplay of land use configuration and burglary crime formation in residential neighbourhoods of Abuja, Nigeria. Design/methodology/approach The methods used for the purpose of data collection includes; field survey, Block Environmental Inventory, while inferential statistics and Geographic Information System tools was used for data analysis. The analysis established that Lagos, Nsukka and Enugu Streets are hotspots; while Chief Palace street, Ladoke Akintola and Oka-Akoko streets were found to be cold spots. Findings This study, however, established the applicability of crime pattern, opportunity theory and routine activity theory in understanding the rising burglary crime events in the study areas and the link between physical characteristics of street block typology and burglary crime pattern. The results of the analysis has in a way affirmed the positions of the theories, while disagreed with them in cases where the results indicated contrary outcome. Originality/value This paper concluded with inference drawn from the results that supported mixed-use development but with built-in crime prevention through environmental design strategies as effective burglary crime prevention mechanisms that contribute to crime rate reduction.
APA, Harvard, Vancouver, ISO, and other styles
47

Pullerits, Merili, and Jessica Phoenix. "How Priority Ordering of Offence Codes Undercounts Gendered Violence: An Analysis of the Crime Survey for England and Wales." British Journal of Criminology, September 8, 2023. http://dx.doi.org/10.1093/bjc/azad047.

Full text
Abstract:
Abstract The Offence Classification System (OCS) of the Crime Survey for England and Wales (CSEW) applies a priority order of offences that undercounts violence. By prioritizing burglary and criminal damage above some types of assault, physical violence that co-occurs with property crimes is discounted from official counts of incidents and victims of violence. Analyzing CSEW data from 2010/11 to 2019/20, we find the OCS omits approximately 210,000 incidents of violence every year. Out of these incidents, 51 per cent are domestic violence against women, contributing further evidence to the CSEW’s gendered data gap. Socioeconomically disadvantaged victims are also disproportionately undercounted. Whilst prior research has highlighted the undercounting of violence prevalence and repetition in the CSEW, the OCS undercounts the concurrency of violence.
APA, Harvard, Vancouver, ISO, and other styles
48

Button, Mark, David Shepherd, Dean Blackbourn, Lisa Sugiura, Richard Kapend, and Victoria Wang. "Assessing the seriousness of cybercrime: The case of computer misuse crime in the United Kingdom and the victims’ perspective." Criminology & Criminal Justice, October 10, 2022, 174889582211281. http://dx.doi.org/10.1177/17488958221128128.

Full text
Abstract:
The reform of the Crime Survey of England and Wales (a national victim survey) has exposed a very high number of individuals who fall victim to computer misuse cybercrimes such as hacking, computer viruses and ransomware. These crimes receive very little attention from the criminal justice system and very few are brought to justice, partly because of the nature of them (global crimes), but also because of a lack of capability among the police. This paper draws on official statistics, an empirical survey and interview research with computer misuse victims. The paper juxtaposes the low priority and lack of resources given to this crime by political and police leaders against many victims’ perceptions and experiences of the crime as equivalent if not more serious than physical counterparts such as burglary, where there is greater interest. The increasing prominence of the virtual world in human life and the impacts of these crimes call for a reappraisal of the official assessment of seriousness in order to raise the priority and increase the capacity of criminal justice towards such offences.
APA, Harvard, Vancouver, ISO, and other styles
49

Goyal, Nancy. "Impact of Environmental Design in Interception of Crime." International Journal of Current Science Research and Review 04, no. 05 (May 8, 2021). http://dx.doi.org/10.47191/ijcsrr/v4-i5-06.

Full text
Abstract:
Crime has become one among the most important issues in cities round the world. This issue has given rise to varied issues in terms of worry of crime and has become a significant disturbance for residents in urban areas. Crimes like devastation, terrorism, burglary, shoplifting, employee theft, assault, and espionage endanger lives and threaten the built environment. This has subsequently led to the need for crime prevention action to be taken. Architectural and urban designs that take into account safety from crime, and security against criminal damage or terrorism is what termed as security designs, which mainly focuses on the specific element of security and crime prevention that relates to the physical opportunity for victimization, damage and harm. By improving environmental design, it can be prevented to some extent. This paper includes the outline of ways like, crime prevention through environmental design (CPTED), defensible space, and building security. This paper also includes about the creating of safe cities, safe work environments, and safe places to live and play. The main aim of this paper is to know how the crime prevention methods could be linked more closely to developments in architecture and design. This approach to a security design recognizes the intended use of space in building and is totally different from traditional security practice, which focuses on denying access to a crime target with barrier techniques.
APA, Harvard, Vancouver, ISO, and other styles
50

Patowary, Plabita, and Rejani Thudalikunnil Gopalan. "The Qualitative Analysis of Psychosocial Profile of Juvenile Offenders and Exploration of Their Perception towards Delinquent Behaviors." International Neuropsychiatric Disease Journal, February 14, 2020, 1–12. http://dx.doi.org/10.9734/indj/2019/v13i3-430110.

Full text
Abstract:
Juvenile delinquency or juvenile offending generally means the failure of children to meet certain obligations expected of them by the society. The study aimed for qualitative analysis of psychosocial factors which played a crucial role in exhibiting the delinquent behavior of juveniles and also explored the perception towards their offences. Cross sectional research design was used and thirty juveniles within the age range of 10-17 years involved in delinquent activities were selected by the use of purposive sampling method. Out of 30 juveniles, fifteen of them had committed heinous crimes like rape and murder and the remaining fifteen juveniles had committed non-heinous offenses like burglary, theft, kidnapping, physical assault and cybercrime. The qualitative analysis found many factors like poor tolerance level, anger management and school performance, media influence, low socio-economic status, presence of illness in the family and crime in neighborhood as risks for juvenile delinquency. It was also noticed that juvenile offenders had poor sense of responsibility, understanding or comprehension and awareness related to the delinquent act. Majority of them attributed their delinquent act to the external factors and denied having any positive feelings towards the victim. The exploration of risk factors and offenders understanding and perception toward crime would help in prevention and intervention programs. Implication and limitations of the study were discussed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography