To see the other types of publications on this topic, follow the link: Predatory crimes.

Journal articles on the topic 'Predatory crimes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Predatory crimes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Farabee, David, Vandana Joshi, and M. Douglas Anglin. "Addiction Careers and Criminal Specialization." Crime & Delinquency 47, no. 2 (April 2001): 196–220. http://dx.doi.org/10.1177/0011128701047002003.

Full text
Abstract:
For many drug users, the initiation of drug use and the subsequent transition to an addiction career is accompanied by criminal activities. However, the use of general crime and drug use categories often obscures important features of their relationship. In the present study, data from the national Drug Abuse Treatment Outcome Studies sample of 7,189 clients in substance abuse treatment were analyzed to explore the relationships between several addiction career variables and the likelihood of lifetime participation in predatory, victimless, and nonspecialized criminal behaviors. The order of initiation of addiction and criminal careers was significantly related to participation in certain types of crimes, with those beginning criminal careers after beginning their addiction careers being more likely to engage exclusively in victimless than in predatory crimes. Likewise, dependence on cocaine, heroin, or both, relative to alcohol, was associated with greater criminal diversity but a reduced likelihood of participating specifically in predatory crimes.
APA, Harvard, Vancouver, ISO, and other styles
2

Fucà, Romina, and Serena Cubico. "CuRbanIsME: A Photographic Self-Analysis to Evaluate the Likelihood of the Occurrence of Predatory Crimes in Downtown Hamburg." Sustainability 12, no. 19 (September 23, 2020): 7859. http://dx.doi.org/10.3390/su12197859.

Full text
Abstract:
In this study, a triangulation of (a) spatial data, (b) self-awareness, and (c) behavioral self-analysis seeks to provide an explanation from an innovative perspective for the likelihood of the occurrence of predatory crimes in the city center. This study does not examine the circumstances in which criminal acts occur. Instead, it focuses on a broader concept that combines both the configurational factors and the behavioral interconnections in which criminal acts occur. We orient the occurrence probability of crime towards appropriate objectives in the presence or absence of attractors/detractors, with interesting variation in the behavior of the acting subject—in our case, a random walker (also called the Random Movement–displacement Agent, or RDMA, in the text), which is the key variable that triggers the occurrence probability of predatory crimes. The relationship between spatial and/or behavioral observations and the probability of the crimes that may result from such observations is limited in this text to “predatory crimes,” which are the most common and light forms of crimes that endanger both human quality of life and the related safety in the city. Such crimes include theft, damage (specifically crime against public property and all similar offensive acts, such as littering and incivility), physical attacks (restrained to attempted violence against defenseless people), robberies, and car thefts (i.e., the most frequent crimes in urban areas). The theory of complexity, specifically as illustrated by the in-depth work of the 20th century German sociologist Niklas Luhmann, also suggests the importance of self-analysis in specific contexts to construct a mosaic of social phenomena. We conducted both a behavioral self-survey and a metric-based self-analysis by measuring random walks (RWs) to achieve some common behaviors—for example, buying food, shopping, or just looking at shop windows—on the streets of downtown Hamburg, Germany. RWs are used in our article to indicate random walks in the city center and any activities that may arise from them, such as protecting oneself from potentially hostile contexts, seeking information, or conforming oneself to official signals and customs. The hundreds of images taken by us in October 2019 during their RWs in Hamburg form a reservoir of our pictures, with the aim of showing the acceptable patterns of random movements–displacements that emerge. This method was primarily discursive but based on the ongoing search for a transformative conduit of behaviors that were intuitively established and observable for us but actually involved a complex process of imaginative ideation that was impossible to promote and pass on to the reader.
APA, Harvard, Vancouver, ISO, and other styles
3

Martin, Karen E., and James N. Maples. "Guardianship and Predatory Crimes among Incapacitated Persons in Kentucky." Journal of Evidence-Based Social Work 16, no. 1 (November 14, 2018): 54–69. http://dx.doi.org/10.1080/23761407.2018.1545619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Greer, Benjamin Thomas, Grace Cotulla, and Halleh Seddighzadeh. "Should sex traffickers be subject to sexually violent predator laws?" Journal of Criminal Psychology 6, no. 3 (August 1, 2016): 121–33. http://dx.doi.org/10.1108/jcp-03-2016-0008.

Full text
Abstract:
Purpose Protecting society from sex offenders has presented a challenge for state legislatures. Recent decades have seen a significant increase in sexually motivated crimes, especially sex trafficking. Effectively combatting sexual exploitation demands a range of legal strategies. As of 2012, 20 states have passed sexually violent predators (SVP) legislation. Human traffickers may exhibit the same deplorable characteristics as SVPs and should be subject to civil commitments. Traffickers are extremely skilled at exploiting their victim’s psychological pressure-points; knowing which cultural or personal experiences they can prey upon to extract compliance. The purpose of this paper is to discuss the overlapping predatory nature of sex traffickers and SVPs; the creation and purpose of sexual predator civil commitment statutes; and to dissect two cases which could give grounds for civil commitment. Design/methodology/approach Legal research and analysis. Findings Repeated human sex traffickers may suffer from an underlying mental illness which would render them a continued danger to society when released from jail. They should be evaluated and civility committed if medically appropriate. Practical implications A potential increase in civil commits. Social implications Keep society safe from repeat sexual predators. Originality/value The authors have vast experience in the field of human trafficking and this topic will be a pioneering initial discussion.
APA, Harvard, Vancouver, ISO, and other styles
5

Oikya, Upal Aditya. "Wartime Sexual Acts as Prosecutable War Crimes." DÍKÉ 2020, no. 2 (March 11, 2021): 108–23. http://dx.doi.org/10.15170/dike.2020.04.02.08.

Full text
Abstract:
Human history is littered with the mass rape of women particularly as a military strategy in warfare, dating back centuries from ancient Greek, Roman, and Hebrew concubines through the Middle Ages to the 20th century ‘comfort women’ of the 2nd World War. Ancient literature explicitly refers to rape or the seizure of vanquished women, who were regarded as the enemy’s property, to become wives, servants slaves, or concubines. The plight of women worsened in the twentieth century when civilian women suffered the most consequences of armed conflicts including rape. Rape served as an oppressive and humiliating tool to severe family identity to dominate, demoralize, and destroy the entire enemy society and way of life. In the past, there appeared to be no international law that specifically dealt with rape in armed conflicts. This was caused by the ambivalent relationship between the law of armed conflict and gender-based crimes. Rape was overlooked as an unfortunate yet inevitable by-product of war. Both international humanitarian and human rights laws did not initially recognize rape as a serious war crime and a fundamental breach of human rights. This deafening legal silence and gap are being addressed through an ongoing evolutionary process by criminalizing wartime predatory sexual acts as a war crime, crimes against humanity, and even genocide. However, with the developments of international law and its practice, for the first time in the history, mass rape and sexual enslavement in the time of war be regarded as ‘crimes against humanity’ in a landmark ruling from the Yugoslav War crime tribunal in the Hague on 22 February 2001. But, even before that, some prior legal instruments for example the Lieber Code, promulgated during the American Civil War regarded [wartime] rape as war crime with capital punishment. Thus, this paper aims to analyze how the historical legal instruments have articulated the extend of criminality and culpability of wartime rapes and other sexual violence and their nexus with crimes of humanity, genocide, and war crimes within the corpus of international norms and criminal prohibitions as well as the historical development of wartime sexual acts as prosecutable war crimes.
APA, Harvard, Vancouver, ISO, and other styles
6

Sacchini, Giovanni. "Reati e percezione della criminalitŕ nella zona di residenza: indifferenza o convergenza?" SOCIOLOGIA E RICERCA SOCIALE, no. 88 (December 2009): 45–73. http://dx.doi.org/10.3280/sr2009-088003.

Full text
Abstract:
- According to a common conception - among researchers as well - there is no apparent relation between crime perception (or insecurity) indicated in surveys and the crime trend (indicated by the police force), since the perception seems to be influenced above all by what mass-media conveys. Literature indicates two dimensions of crime perception: social concern about criminality and personal fear of the phenomenon. However resorting to a useful empirical indicator, a third dimension may be contemplated between these two: the evaluation of criminality in the residence area. This article considers data that refers to the twenty Italian regions, collected by the National Institution for Statistics - Istat, regarding the Multipurpose Survey on Families. It describes the strong correlation existing between criminality perception in the residence area and the diffusion of certain kinds of predatory crimes, in particular those in which there is a strong author-victim interaction (robbery and bag-snatching) and those in which crime authors are interested in citizens' relevant economical and symbolic goods (houses or cars).
APA, Harvard, Vancouver, ISO, and other styles
7

Koltsov, Mikhail. "On the issue of some problems of punishment for committing environmental crimes." Current Issues of the State and Law, no. 15 (2020): 348–55. http://dx.doi.org/10.20310/2587-9340-2020-4-15-348-355.

Full text
Abstract:
The relevance of this work is determined by the fact that that it addresses the problem of punishment for environmental crimes, which provide for criminal liability for the predatory destruction of flora and fauna, depletion of natural resources. We establish that the humanization of criminal liability, carried out in previous years, negatively affects the deterioration of the environmental situation, therefore, the legislator in 2018 and 2019 took certain measures to supplement and change certain provisions of Chapter 26 of the Criminal Code of the Russian Federation. We analyze the possibility of increasing the role of current domestic criminal law provisions designed to solve the problems of protecting the environment from illegal human actions. We note that the implementation of the most effective modern criminal law policy of the state in the analyzed relations requires the solution of such problems as the inclusion in the Criminal Code of the Russian Federation of new clauses on responsibility for socially dangerous human behavior in the field of ecology, a significant increase in sanctions if the clause for an environmental crime already exists, the transfer of some environmental crimes from a less serious category to a more serious category, and others.
APA, Harvard, Vancouver, ISO, and other styles
8

Alvarez, Alexander. "Adjusting to Genocide: The Techniques of Neutralization and the Holocaust." Social Science History 21, no. 2 (1997): 139–78. http://dx.doi.org/10.1017/s0145553200017697.

Full text
Abstract:
In recent years, as social scientists questioned the intellectual boundaries set by customary perceptions of criminality, their discourse expanded to incorporate more than purely legalistic definitions of crime. In addition to conventional street crimes, some scholars began examining both interpersonal and collective actions and behaviors that were once considered to be outside the scope of commonly accepted definitions of criminality. For example, criminologists now study crime categorized as occupational (Albanese 1987; Cressey 1953; Green 1990; Hollinger and Clark 1983; Horning 1979; Nettler 1974; Tracy and Fox 1989), environmental (Block and Bernard 1988; Brady 1987; Stone 1987; Tallmer 1987), political (Barak 1994; Block 1989; Block and Chambliss 1981; Chambliss 1993; Quinney 1970; Schwendinger and Schwendinger 1970; Tunnell 1993; Turk 1969), and corporate (Clinard and Yeager 1980; Clinard et al. 1979; Coleman 1994; Reiman 1979; Sutherland 1949), using methodology and terminology once reserved for predatory street crime. This trend can be traced to the pioneering work of Thorsten Sellin (1938) and Edwin Sutherland (1940, 1949), who argued for broader, more inclusive definitions of criminality and less conventional approaches to the study of crime.
APA, Harvard, Vancouver, ISO, and other styles
9

Ramos Corchado, Félix Francisco, Alan Christian López Fraga, Rafael Salazar Salazar, Marco Antonio Ramos Corchado, and Ofelia Begovich Mendoza. "Cognitive Pervasive Service Composition Applied to Predatory Crime Deterrence." Applied Sciences 11, no. 4 (February 18, 2021): 1803. http://dx.doi.org/10.3390/app11041803.

Full text
Abstract:
Pervasive service composition is useful in many scenarios, for instance, in urban planning or controlled harvest. Currently, there is no standard to develop solutions using pervasive service composition. However, big companies propose their frameworks to develop complex services, but their frameworks are appropriate in specific applications, such as home automation and agriculture. On the other hand, there are different very well-grounded academic proposals for pervasive service composition. However, these do not solve the problems of traditional approaches that are appropriate to specific areas of application, and adaptation is needed to deal with the dynamism of the environment. This article presents a cognitive approach for pervasive service composition where InfoCom devices and the implementation of cognitive functions interact to create pervasive composite services. Our central hypothesis is that cognitive theory can help solve actual problems requiring pervasive service composition, as it addresses the above-mentioned problems. To test our approach, in this article we present a case of urban insecurity. Specifically, in different countries, street robbery using firearms is one of the problems with a high impact because of its frequency. This article proposes to compose a pervasive service for deterring criminals from committing their crimes. The results obtained by simulating our proposal in our case study are promising. However, more research needs to be achieved before applying the proposed approach to actual problems. The research needed ought to address various problems, some of which are discussed in this article.
APA, Harvard, Vancouver, ISO, and other styles
10

Currie, Elliott. "Consciousness, Solidarity and Hope as Prevention and Rehabilitation." International Journal for Crime, Justice and Social Democracy 2, no. 2 (September 11, 2013): 3–11. http://dx.doi.org/10.5204/ijcjsd.v2i2.114.

Full text
Abstract:
This paper grapples with the question of how progressive criminologists might approach working with people who have committed violent or predatory crimes, or are ‘at risk’ of doing so. Progressives have often been uneasy about ‘intervention’ with people who offend: but in the face of the destructiveness of violence, especially in some parts of the world, a posture of simple non-intervention won’t suffice. I suggest three central principles – which I call consciousness, solidarity and hope – that may guide us in developing ways of working with offenders that are both progressive and effective.
APA, Harvard, Vancouver, ISO, and other styles
11

Moeller, Kim, Rasmus Munksgaard, and Jakob Demant. "Flow My FE the Vendor Said: Exploring Violent and Fraudulent Resource Exchanges on Cryptomarkets for Illicit Drugs." American Behavioral Scientist 61, no. 11 (October 2017): 1427–50. http://dx.doi.org/10.1177/0002764217734269.

Full text
Abstract:
A growing share of illicit drug distribution takes place using cryptomarkets that use encryption and anonymization technologies. The risks of law enforcement intervention and violence are lower here than in off-line traditional drug markets, but with the technological innovations follow new opportunities for stealing and fraud. The sites themselves fall prey to theft and hacking attempts, administrators abscond with users’ funds, and malicious sellers regularly cheat buyers. In this study, we explore the types of theft and fraud that occur on cryptomarkets using multiple data sources: formalized community resources (e.g., guides, tutorials), ethnographic observations of user forums, thematic identification of forum posts using unsupervised text classification, and an expert interview. We find system-based violent predatory resource exchange similar to robberies and process-based fraudulent resource exchange similar to rip-offs. We discuss these offenses conceptually as extensions of common drug-related crimes in the digital world. This contributes to the research on how cryptomarkets work and can improve crime-prevention efforts.
APA, Harvard, Vancouver, ISO, and other styles
12

Paes-Machado, Eduardo. "The deliveries cannot stop: Ecological (dis) advantages and socio-spatial safety tactics against predatory crimes among Brazilian couriers." Crime, Law and Social Change 54, no. 3-4 (July 24, 2010): 241–61. http://dx.doi.org/10.1007/s10611-010-9247-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Dickinson, Timothy, and Scott Jacques. "Drug Control Policy, Normalization, and Symbolic Boundaries in Amsterdam’s Coffee Shops." British Journal of Criminology 61, no. 1 (August 29, 2020): 22–40. http://dx.doi.org/10.1093/bjc/azaa059.

Full text
Abstract:
Abstract This study examines the relationship between drug control policy, normalization and symbolic boundary work among drug traders. Taking from interviews with 50 personnel in Amsterdam’s coffee shops, we find that Dutch drug policy shapes their understanding of what comprises morally acceptable drug use and sales. Conversely, the rules set by the state also guide personnel’s definitions of what is morally unacceptable: using hard drugs or committing predatory crimes. To normalize their own involvement with cannabis, personnel must identify potential rule breakers and criminals. To do so, they construct symbolic boundaries differentiating themselves from these persons. We conclude by discussing the theoretical implications of our findings for normalization and symbolic boundaries and by suggesting a potential negative secondary impact of cannabis decriminalization or legalization: the further marginalization of hard drug users.
APA, Harvard, Vancouver, ISO, and other styles
14

Lipton, Douglas S. "The Correctional Opportunity: Pathways to Drug Treatment for Offenders." Journal of Drug Issues 24, no. 2 (April 1994): 331–48. http://dx.doi.org/10.1177/002204269402400208.

Full text
Abstract:
The incarceration of persons found guilty of various crimes who are also chronic substance abusers presents an important opportunity for treatment. It is an important opportunity because they would be unlikely to seek treatment on their own, without treatment they are very apt to continue their drug use and criminality after release, and cost effective drug abuse treatment methods are now available to treat them while in custody (both during incarceration and aftercare) and significantly alter their lifestyles. Correctional authorities should now feel optimistic that chronic heroin and cocaine users with predatory criminal histories can be treated effectively. This article shares the success of the Stay'n Out and Cornerstone Programs that have been successful with serious drug abusing offenders, and the factors that make for success. It is the proper program components joined by thoughtful leadership in the right setting. These principles are generalizable and transferable to many locations.
APA, Harvard, Vancouver, ISO, and other styles
15

Walker, Sally E., and Carlton E. Brett. "Post-Paleozoic Patterns in Marine Predation: Was there a Mesozoic and Cenozoic Marine Predatory Revolution?" Paleontological Society Papers 8 (October 2002): 119–94. http://dx.doi.org/10.1017/s108933260000108x.

Full text
Abstract:
Mesozoic and Cenozoic evolution of predators involved a series of episodes. Predators rebounded rather rapidly after the Permo-Triassic extinction and by the Middle Triassic a variety of new predator guilds had appeared, including decapod crustaceans with crushing claws, shell-crushing sharks and bony fish, as well as marine reptiles adapted for crushing, smashing, and piercing shells. While several groups (e.g., placodonts, nothosaurs) became extinct in the Late Triassic crises, others (e.g., ichthyosaurs) survived; and the Jurassic to Early Cretaceous saw the rise of malacostracan crustaceans with crushing chelae and predatory vertebrates—in particular, the marine crocodilians, ichthyosaurs, and plesiosaurs. The late Cretaceous saw unprecedented levels of diversity of marine predaceous vertebrates including pliosaurids, plesiosaurs, and mosasaurs. The great Cretaceous-Tertiary extinction decimated marine reptiles. However, most invertebrate and fish predatory groups survived; and during the Paleogene, predatory benthic invertebrates showed a spurt of evolution with neogastropods and new groups of decapods, while the teleosts and neoselachian sharks both underwent parallel rapid evolutionary radiations; these were joined by new predatory guilds of sea birds and marine mammals. Thus, although escalation is sometimes cast as an ongoing “arms race,” in actuality the predatory record shows long interludes of relative stability puncturated by episodes of abrupt biotic reorganization during and after mass extinctions. This pattern suggests episodic, but generally increasing, predation pressure on marine organisms through the Mesozoic-Cenozoic interval. However, review of the Cenozoic record of predation suggests that there are not unambiguous escalatory trends in regard to antipredatory shell architecture, such as conchiolin and spines; nor do shell drilling and shell repair data show a major increase from the Late Mesozoic through the Cenozoic. Most durophagous groups are generalists, and thus it may be that they had a diffuse effect on their invertebrate prey.
APA, Harvard, Vancouver, ISO, and other styles
16

Chaiken, Jan M., and Marcia R. Chaiken. "Drugs and Predatory Crime." Crime and Justice 13 (January 1990): 203–39. http://dx.doi.org/10.1086/449176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Smith, Robert, and Gerard McElwee. "The “horse-meat” scandal: illegal activity in the food supply chain." Supply Chain Management: An International Journal 26, no. 5 (May 28, 2021): 565–78. http://dx.doi.org/10.1108/scm-08-2019-0292.

Full text
Abstract:
Purpose Food supply chain theory and practice generally assumes that the business practices and processes involved are ethical, legal and value-adding when this is not always so, as demonstrated by the ongoing 2013 horse-meat scandal. Although it is ostensibly a UK-based affair, it encompasses the meat processing industry across Europe. This study, thus, aims to examine supply chain criminality and to highlight “scandal scripts” which amplify underlying issues. Design/methodology/approach A systematic review of extant literature on the scandal adds to that body of work, updating the existing narrative to include a detailed analysis of convicted “industry insiders”, highlighting supply chain issues involved in the frauds. Micro-stories of businessmen involved are presented to enable an empirical exploration of their illegal involvement in the meat trade. Using storied data from accounts of the scandal as contemporary examples, emerging themes and issues are outlined through a mixed methods qualitative approach consisting of ethical covert research, using documentary research strategy underpinned by narrative inquiry. Findings Media coverage perpetuated various myths notably that the fraud was carried out by “shadowy”, Eastern European “mafia figures” exploiting the extended food supply chains. The analysis is aided by the use of media hypothesis. Far from being a mafia-inspired fraud, the criminal activity was organised in nature and committed by insider businessmen. The findings demonstrate that supply chains are complex and require an understanding of storied business practices, including the ethical and illegal. Research limitations/implications From an academic perspective, there are implications such as the dearth of academic research and policy-related studies into food fraud possibly because of the difficulty in obtaining data because of access to such enterprises and entrepreneurs necessitating reliance upon documentary sources and investigative journalism. Practical implications There are distinct policy implications, particularly the need to legislate against international criminal conspiracies and everyday ordinary organised food frauds perpetuated. Lax penalties do little to prevent such crimes which need to be taken more seriously by the authorities, and treated as major crime. In formulating food laws, rules and regulations, greater cognisance should be taken to consider how supply chains in the food industry could be better protected from predatory criminal actions. Originality/value This novel qualitative study will enable academics and practitioners to better understand illegal enterprise, food fraud and risk management from both operational and supply chain perspectives and will be useful to investigators by furthering our understanding of entrepreneurial practice and morality in the food industry.
APA, Harvard, Vancouver, ISO, and other styles
18

Zhao, Min, and Chuanjun Dai. "Nonlinear Dynamic in an Ecological System with Impulsive Effect and Optimal Foraging." Abstract and Applied Analysis 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/169609.

Full text
Abstract:
The population dynamics of a three-species ecological system with impulsive effect are investigated. Using the theories of impulsive equations and small-amplitude perturbation scales, the conditions for the system to be permanent when the number of predators released is less than some critical value can be obtained. Furthermore, because the predator in the system follows the predictions of optimal foraging theory, it follows that optimal foraging promotes species coexistence. In particular, the less beneficial prey can support the predator alone when the more beneficial prey goes extinct. Moreover, the influences of the impulsive effect and optimal foraging on inherent oscillations are studied using simulation, which reveals rich dynamic behaviors such as period-halving bifurcations, a chaotic band, a periodic window, and chaotic crises. In addition, the largest Lyapunov exponent and the power spectra of the strange attractor, which can help analyze the chaotic dynamic behavior of the model, are investigated. This information will be useful for studying the dynamic complexity of ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
19

CARLIN, BRUCE IAN, MIGUEL SOUSA LOBO, and S. VISWANATHAN. "Episodic Liquidity Crises: Cooperative and Predatory Trading." Journal of Finance 62, no. 5 (September 4, 2007): 2235–74. http://dx.doi.org/10.1111/j.1540-6261.2007.01274.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sollund, Ragnhild. "Wildlife Crime: A Crime of Hegemonic Masculinity?" Social Sciences 9, no. 6 (June 5, 2020): 93. http://dx.doi.org/10.3390/socsci9060093.

Full text
Abstract:
Scholarship within green criminology focusing on crimes and harms against nonhuman animals has been increasing. Little attention, however, has been directed at the gendered aspects of these crimes. For example, why is it that the great majority of offenders involved in wildlife trade and the illegal killing of endangered predators are male? The aim of this article is to fill the gap in the literature, relying on confiscation reports from Norwegian Customs of nonhuman animals—most of whom are listed in CITES (the Convention on International Trade in Endangered Species of Fauna and Flora)—as well as an analysis of verdicts in cases in Norwegian courts of “theriocides” (animal murders) of large predators. This article will assess the number of men and women involved in these crimes and harms, and will present some trends of theriociders. This article will employ ecofeminist and masculinities theories to better understand the gendered dynamics involved in wildlife trafficking and the theriocides of large carnivores.
APA, Harvard, Vancouver, ISO, and other styles
21

Kennedy, Margaret. "White collar crime: vulnerable women, predatory clergymen." Journal of Adult Protection 4, no. 4 (November 2002): 23–33. http://dx.doi.org/10.1108/14668203200200026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hook, John, and Dawn Devereux. "Sexual boundary violations: victims, perpetrators and risk reduction." BJPsych Advances 24, no. 6 (July 20, 2018): 374–83. http://dx.doi.org/10.1192/bja.2018.27.

Full text
Abstract:
SUMMARYSexual boundary violations by healthcare professionals is a subject that has largely been ignored in the UK. There has been little research into the field. It is rarely taught on professional training courses and practitioners appear to know very little about it. The history of sexual boundary violations is littered with failures to notice, failures to report and inadequate justice for victims and perpetrators alike. Perpetrators are commonly assumed to be predators. Given the many widely reported recent events in our media of both predatory and other sexual offenders, we believe it is timely for all healthcare and other professions working with vulnerable people to take the problem seriously, to provide appropriate services for victims, evaluation and assessment of perpetrators, and sanctions that fit the crime in order to regain public trust.LEARNING OBJECTIVES•Develop greater understanding of the problem of sexual boundary violations by professionals•Be able to manage the care of a patient who has been the victim of a sexual boundary violation•Understand factors in professionals that may lead to a sexual boundary violationDECLARATION OF INTERESTNone.
APA, Harvard, Vancouver, ISO, and other styles
23

Ruth, Terrance, Jonathan Matusitz, and Thomas T. H. Wan. "Understanding Predatory Organised Crime through Network Governance Theory." Social Change 45, no. 4 (December 2015): 587–604. http://dx.doi.org/10.1177/0049085715602790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hall, Matthew. "Book Review: Sex Crimes: Perpetrators, Predators, Prostitutes, and Victims." International Review of Victimology 14, no. 3 (September 2007): 366–67. http://dx.doi.org/10.1177/026975800701400312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wolak, Janis, and David Finkelhor. "Are Crimes by Online Predators Different From Crimes by Sex Offenders Who Know Youth In-Person?" Journal of Adolescent Health 53, no. 6 (December 2013): 736–41. http://dx.doi.org/10.1016/j.jadohealth.2013.06.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Block, Richard, and Wesley G. Skogan. "Resistance and Nonfatal Outcomes in Stranger-to-Stranger Predatory Crime." Violence and Victims 1, no. 4 (January 1986): 241–53. http://dx.doi.org/10.1891/0886-6708.1.4.241.

Full text
Abstract:
This article examines the consequences of encounters between strangers that might have resulted in robbery or rape and explores how the eventual outcomes of those incidents were related to the resistance offered by their potential victims. It is based on data from the National Crime Survey. Although the conclusions necessarily are tentative, it appears that forceful resistance was related to less frequent success by robbers, but robbery victims resisting forcefully had a greater risk of being physically attacked. Forceful resistance in potential rape incidents was related to higher risk of attack and bodily injury with no apparent reduction in risk of rape. On the other hand, victims who were able to offer nonforceful resistance reported a reduced risk of being robbed and suffered less frequent attack and injury. In rape incidents, nonforceful resistance was linked to lower risk of actual rape but was unrelated to risk of attack or other forms of injury.
APA, Harvard, Vancouver, ISO, and other styles
27

Korol, E. N., E. I. Varodi, V. V. Kornyushin, and A. M. Malega. "Helminths of Wild Predatory Mammals (Mammalia, Carnivora) of Ukraine. Trematodes." Vestnik Zoologii 50, no. 4 (August 1, 2016): 301–8. http://dx.doi.org/10.1515/vzoo-2016-0037.

Full text
Abstract:
Abstract The paper summarises information on 11 species of trematodes parasitic in 9 species of wild carnivorans of Ukraine. The largest number of trematode species (9) was found in the red fox (Vulpes vulpes). Alaria alata (Diplostomidae) appeared to be the most common trematode parasite in the studied group; it was found in 4 host species from 9 administrative regions and Crimea.
APA, Harvard, Vancouver, ISO, and other styles
28

Petrosino, Anthony J., and Carolyn Petrosino. "The Public Safety Potential of Megan's Law in Massachusetts: An Assessment from a Sample of Criminal Sexual Psychopaths." Crime & Delinquency 45, no. 1 (January 1999): 140–58. http://dx.doi.org/10.1177/0011128799045001008.

Full text
Abstract:
This article presents an exploratory assessment of the potential of Megan's Law to prevent subsequent sex offenses in Massachusetts. Using secondary data on 136 criminal sexual psychopaths, the authors found that 27 percent of the sample had a prior conviction that met the requirements of the Massachusetts Registry Law before their most recent sex crime. Of these 36 offenders who would have been eligible for the registry, 12 committed a stranger-predatory sex offense; the remaining 24 offended against family, friends, and coworkers. Assuming a registration and notification system of complete integrity, proactive police warnings could have potentially reached subsequent victims in 6 of the 12 stranger-predatory cases.
APA, Harvard, Vancouver, ISO, and other styles
29

Newhall, Kristine. "The Girls: An All-American Town, a Predatory Doctor, and the Untold Story of the Gymnasts Who Brought Him Down by Pesta Abigail, and: Start by Believing: Larry Nasser's Crimes, the Institutions That Enabled Him, and the Brave Women Who Stopped a Monster by Barr John and Murphy Dan." Michigan Historical Review 47, no. 1 (2021): 132–36. http://dx.doi.org/10.1353/mhr.2021.0017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Sung, Hung-En. "State Failure, Economic Failure, and Predatory Organized Crime: A Comparative Analysis." Journal of Research in Crime and Delinquency 41, no. 2 (May 2004): 111–29. http://dx.doi.org/10.1177/0022427803257253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Cullen, Francis T., John Paul Wright, and Mitchell B. Chamlin. "Social Support and Social Reform: A Progressive Crime Control Agenda." Crime & Delinquency 45, no. 2 (April 1999): 188–207. http://dx.doi.org/10.1177/0011128799045002002.

Full text
Abstract:
The near hegemony of conservative crime control policies is reinforced by a public idea or narrative about crime that citizens find persuasive: “Getting tough” with predatory offenders reduces lawlessness. Progressives have long criticized such ideology, but they have been less successful in advancing ideas capable of directing an alternative policy agenda. For three reasons, we suggest that social support may serve as a public idea that can help organize a progressive approach to crime control. First, the idea that we should increase social support to at-risk youths, families, and communities is good criminology because empirical evidence shows that social support is inversely related to individual offending and to macrolevel crime rates. Second, the claim that social support is beneficial makes sense because it resonates with Americans' personal and imagined experiences. Third, social support leads to specific policies that are humane and efficacious—that is, that will improve the lives of those at risk for crime and that will increase the safety of the public.
APA, Harvard, Vancouver, ISO, and other styles
32

Алейникова, Н. В., Т. С. Рыбарева, and Л. П. Ягодинская. "The assessment of resistance of the acarocomplex formed on apple tree against the background of pesticide treatments." Magarach Vinogradstvo i Vinodelie, no. 2(116) (June 25, 2021): 166–72. http://dx.doi.org/10.35547/im.2021.23.2.010.

Full text
Abstract:
Клещи-фитофаги ежегодно наносят существенный вред промышленным плодовым культурам, наиболее повреждаемой из них является яблоня. Многократное применение химических препаратов в защите от вредителей не только оказывает пестицидный прессинг на агроценоз, но и нарушает экосистему плодовых насаждений, что проявляется в смене одних видов другими, влияет на биоразнообразие, снижает численность полезных членистоногих и приводит к появлению резистентных к пестицидам рас клещей. Целью исследований являлась разработка и испытание системы защиты интенсивных яблоневых садов Красногвардейского и Нижнегорского районов Республики Крым от клещей сем. Tetranychidae - боярышникового Amphitetranychus viennensis (Zacher), красного плодового Panonychus ulmi (Koch) с помощью хищных клещей-фитосейид Phytoseiulus persimilis (Athias-Henriot), Neoseiulus californicus (McGregor) и Amblyseius andersoni (Chant). Производственные испытания системы проводились в 2019-2020 гг. на участках, где в 2015-2018 гг. был сформирован акарокомплекс методами наводнения и сезонной колонизации. После формирования акарокомплекса была проведена оценка его устойчивости к токсическому действию применяемых в хозяйствах средств защиты растений. Исследованиями установлено, что сформированный в течение трех лет акарокомплекс хищных клещей позволил снизить численность диапаузирующих самок A. viennensis на 87 % и плотность популяции вредителей в летний период, предотвратить вспышку численности фитофагов в весенний период 2019-2020 гг. Доказано, что препарат из класса пиретроидов с действующим веществом тау-флювалинат снижает численность хищников на 99 %. Частичное восстановление плотности популяции за счет миграции аборигенных видов хищников наблюдалось через 2-3 месяца. Вспышка численности клещей-фитофагов на участках, где был сформирован акарокомплекс хищных клещей, происходит из-за применения токсичных для них препаратов и появления резистентных к акарицидам рас клещей-фитофагов. Phytophagous mites annually cause significant damage to commercial fruit crops, the most damaged of which is the apple tree. Repeated use of chemical preparations in protection against pests does not only exert pesticide pressure on agrocenosis, but also affects the ecosystem of fruit plantings, replacing one species with others, influencing biodiversity, reducing the number of helpful arthropods and causing the emergence of pesticide-resistant mite races. The aim of the research was to develop and test the system of protecting intensive apple orchards of Krasnogvardeisky and Nizhnegorsky districts of the Republic of Crimea from mites of Tetranychidae family - hawthorn mite Amphitetranychus viennensis (Zacher), European red mite Panonychus ulmi (Koch) with the help of predatory phytoseiidae mites Phytoseiulus persimilis (Athias-Henriot), Neoseiulus californicus (McGregor) and Amblyseius andersoni (Chant). In-process system tests were carried out in 2019-2020 on plots where in 2015-2018 the acarocomplex was formed using methods of population development and seasonal colonization. After the acarocomplex formation, an assessment of its resistance to toxic effect of plant protecting agents used in farms was carried out. The studies confirmed that the acarocomplex of predatory mites developed in three years allowed to reduce the number of diapausing females of A. viennensis by 87% and the pest population density in the summer period, to prevent outbreak of phytophagous population in the spring period of 2019-2020. It was proven that pyrethroid class preparation with the active ingredient tau-fluvalinat reduced the number of predators by 99%. Partial recovery of the population density due to the migration of native species of predators was observed in 2-3 months. Outbreak of the number of phytophagous mites on the plots where the acarocomplex of predatory mites was developed was due to the use of toxic preparations and the appearance of resistant to acaricides phytophagous mite races.
APA, Harvard, Vancouver, ISO, and other styles
33

Gerard, F. Jeane, Norair Khachatryan, and Bethany Browning. "Exploration of Crime Scene Characteristics in Cyber-Related Homicides." Homicide Studies 24, no. 1 (August 13, 2019): 45–68. http://dx.doi.org/10.1177/1088767919868835.

Full text
Abstract:
Despite the alarming nature of homicides in which the offender meets the victim online, or cyber-initiated homicides, little empirical attention has been devoted to this phenomenon. The present study was designed to explore the behavioral patterns found prior to and during a cyber-initiated homicide event. Data on 61 homicide cases from various countries were collected through news media and legal sources. Smallest space analysis revealed that cyber homicides were characterized by four distinct themes: excessive violence, fatal escalation, crime-related incidents, and predatory behavior. Implications of the findings and avenues for future research are discussed.
APA, Harvard, Vancouver, ISO, and other styles
34

SHERMAN, LAWRENCE W., PATRICK R. GARTIN, and MICHAEL E. BUERGER. "HOT SPOTS OF PREDATORY CRIME: ROUTINE ACTIVITIES AND THE CRIMINOLOGY OF PLACE*." Criminology 27, no. 1 (February 1989): 27–56. http://dx.doi.org/10.1111/j.1745-9125.1989.tb00862.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ferraro, Vincent, and Saran Ghatak. "Expanding the Castle: Explaining Stand Your Ground Legislation in American States, 2005–2012." Sociological Perspectives 62, no. 6 (May 8, 2019): 907–28. http://dx.doi.org/10.1177/0731121419845877.

Full text
Abstract:
Although studies have analyzed the effects of “stand your ground” (SYG) laws on violent crime, the question of why states are more likely to take measures to allow gun violence (albeit in self-defense) in the public sphere remains understudied in the literature. Using a fixed-effects event-history analysis of a panel of longitudinal state-level data for the period 2005–2012, we expand upon recent research by testing three competing perspectives on the adoption of SYG laws: group threat, political partisanship, and crime. Despite rhetorical framing of SYG laws as a means of self-defense from predatory criminals by gun-rights organizations, we find no effect of crime on the passage of SYG laws. Nor do we find evidence for group threat. Implications of these findings and directions for future research are discussed. Instead, results support the political partisanship view, providing further evidence of the politicization of gun policy in the contemporary United States.
APA, Harvard, Vancouver, ISO, and other styles
36

Mesly, Olivier, Imed Chkir, and François-Éric Racicot. "Predatory cells and puzzling financial crises: Are toxic products good for the financial markets?" Economic Modelling 78 (May 2019): 11–31. http://dx.doi.org/10.1016/j.econmod.2018.09.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Riedel, B., M. Stachowitsch, and M. Zuschin. "Sea anemones and brittle stars: unexpected predatory interactions during induced in situ oxygen crises." Marine Biology 153, no. 6 (January 10, 2008): 1075–85. http://dx.doi.org/10.1007/s00227-007-0880-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hamilton, Kirk. "Wildlife conservation and environmental economics." Environment and Development Economics 19, no. 3 (June 2014): 299–302. http://dx.doi.org/10.1017/s1355770x14000229.

Full text
Abstract:
Conserving wildlife has been much in the news in early 2014, owing to the rapid growth of wildlife crime since 2000. This is now a problem measured in tens of billions of dollars, with large, organized and violent criminal activity pushing rhinos towards extinction, and losses of African elephants measured in the thousands per year. Tigers, lions and other top predators are under severe pressure as well.
APA, Harvard, Vancouver, ISO, and other styles
39

Schuberth, Moritz. "To engage or not to engage Haiti’s urban armed groups? Safe access in disaster-stricken and conflict-affected cities." Environment and Urbanization 29, no. 2 (July 18, 2017): 425–42. http://dx.doi.org/10.1177/0956247817716398.

Full text
Abstract:
International agencies responding to humanitarian crises in cities are increasingly faced with urban armed groups controlling neighbourhoods where the most vulnerable sections of society are located. In such settings, it is not clear how to deliver aid to those who need it the most without further strengthening predatory armed actors. Drawing on extensive fieldwork in Haiti, this article contributes to the emerging debate on the engagement of non-state armed groups in the context of disaster-stricken and conflict-affected cities, by presenting new empirical evidence on how humanitarian and development actors negotiate safe access in Port-au-Prince’s gang-ruled neighbourhoods in the aftermath of the 2010 earthquake. While some major development agencies have struggled to minimize the unintended – yet potentially harmful – consequences of their activities for beneficiaries, the approach of the Brazilian NGO Viva Rio offers important lessons for more effective humanitarian response to urban crises in comparable contexts.
APA, Harvard, Vancouver, ISO, and other styles
40

Hewitt, Ashley N., Eric Beauregard, and Garth Davies. "An Empirical Examination of the Victim-Search Methods Utilized by Serial Stranger Sexual Offenders: A Classification Approach." Journal of Interpersonal Violence 34, no. 21-22 (November 1, 2016): 4522–49. http://dx.doi.org/10.1177/0886260516675921.

Full text
Abstract:
Past research on the spatial mobility of serial offenders has generally found that these individuals make calculated decisions about the ways in which they come into contact with suitable victims. Within the geographic profiling literature, four victim-search methods have been theorized that describe how serial predatory offenders hunt for their victims: hunter, poacher, troller, and trapper. Using latent class analysis, the aim of this study is to test whether this theoretical typology can be empirically derived using data that were collected from both police files and semi-structured interviews with 72 serial sex offenders who committed 361 stranger sexual assaults. Empirical support is found for each of the aforementioned victim-search methods, in addition to two others: indiscriminate opportunist and walking prowler. Chi-square analyses are also conducted to test for associations between this typology and characteristics of the offense such as victim information, environmental factors, and the offender’s modus operandi strategies. Findings from these analyses suggest that the types of victims and environments targeted by the offender, as well as the behaviors that take place both before and during the offense, are dependent upon the offender’s victim-search strategy. Although the theoretical hunter, poacher, troller, and trapper were intended to describe the victim-search methods of serial violent predators more generally, the finding that these strategies exist along with two others in this sample of sexual offenders may indicate that search behavior is specific to certain crime types. Furthermore, these findings may be of assistance in the investigation of stranger sexual assaults by providing law-enforcement officials with possible clues as to the characteristics of the unknown suspect, the times and places likely targeted in any past or future events, and possibly even his base of operations.
APA, Harvard, Vancouver, ISO, and other styles
41

Rollman, Eli M. ""Mental Illness": A Sexually Violent Predator Is Punished Twice for One Crime." Journal of Criminal Law and Criminology (1973-) 88, no. 3 (1998): 985. http://dx.doi.org/10.2307/3491359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Henry, John F. "The Veblenian Predator and Financial Crises: Money, Fraud, and a World of Illusion." Journal of Economic Issues 46, no. 4 (December 2012): 989–1006. http://dx.doi.org/10.2753/jei0021-3624460408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Eberlein, Ruben. "On the road to the state's perdition? Authority and sovereignty in the Niger Delta, Nigeria." Journal of Modern African Studies 44, no. 4 (November 1, 2006): 573–96. http://dx.doi.org/10.1017/s0022278x06002096.

Full text
Abstract:
This article discusses the reorganisation and fragmentation of political rule in the Nigerian Niger Delta from the end of the 1990s until today. It details empirical evidence on the resources provided by transnational interventions, especially those connected to the changing security strategies of oil companies as well as intensified corporate social deployments, and on the appropriation of these resources by local actors. The continued drive from neopatrimonial to predatory rule, it is argued, has taken a decided twist towards localisation during recent years. Instead of constructing the crises in the Niger Delta as an example of ‘state failure’, the focus of this article is directed at the establishment of extra-state political formations, their legitimising discourses and social practices.
APA, Harvard, Vancouver, ISO, and other styles
44

Volkova, Marina, Elena Matveikina, Jakov Volkov, and Elena Stranisheshevskaya. "Organic viticulture as an important aspect of conserving biodiversity in Crimean agrocenoses." E3S Web of Conferences 175 (2020): 09004. http://dx.doi.org/10.1051/e3sconf/202017509004.

Full text
Abstract:
The current status of the global organic viticulture is discussed. The challenge of conservation of species and landscape biodiversity in the Crimea is actualized. The fauna of mites and other insects in the grape agrocenosis of the South Coast of the Peninsula is reported. Biodiversity of mites and other insects in commercial vineyards at different pesticide loads is shown. The role that wild-growing vegetation in territories adjacent to vineyards plays in the agrolandscape of grape agrocenoses is highlighted. The commonness of species diversity of predatory mites in a vineyard and on its outskirts is revealed. The possibility to rely on natural mechanisms for self-regulation of population numbers of phytophagous mites under conditions of organic viticulture is demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
45

FOSTER, E. A. D. "BOUNDARY CRISES ARISING FROM SADDLE-NODE BIFURCATIONS IN PERIODICALLY FORCED MODELS." International Journal of Bifurcation and Chaos 06, no. 04 (April 1996): 647–59. http://dx.doi.org/10.1142/s0218127496000321.

Full text
Abstract:
An identical bifurcation sequence is identified for models of predator-prey interaction and glycolytic reaction under strong periodic forcing. It is determined that a symmetric saddle-node bifurcation gives rise to local chaotic attractors. These attractors are annihilated by a boundary crisis, but a stable periodic orbit persists. When this remaining periodic orbit subsequently loses stability, an intermittency transition to chaos is observed. Through the construction of return maps, the essential flow behavior is reduced to that of one-dimensional noninvertible maps. The equivalent scenario in these maps is determined to be a tangent bifurcation, followed by a boundary crisis and a subcritical period halving. A remarkable feature of this previously unrecognized bifurcation sequence is the existence of a chaotic set that changes from attracting to nonattracting and back to attracting.
APA, Harvard, Vancouver, ISO, and other styles
46

Sibarov, K. D. "The space of lifestyles." Russian Journal of Legal Studies 2, no. 4 (December 15, 2015): 150–55. http://dx.doi.org/10.17816/rjls18091.

Full text
Abstract:
The paper proposed a new two-dimensional representation of the diversity of lifestyles of people living within the same society, an integral part of which is mature organized crime. The conditional title of the horizontal axis - «the intellect»; the vertical axis is«unite for good» - «unity for the sake of evil». On the plane defined by these axes is allocated 8 areas with conditional ahistoric names lifestyle: «ordinary people», «community members», «Guardians of people», «reasonable», «freedom lovers», «collective parasites», «collective predators» and «dropouts». Considered the interaction and confrontation between the representatives of these different lifestyles.
APA, Harvard, Vancouver, ISO, and other styles
47

Godwin, Maurice. "VICTIM TARGET NETWORKS AS SOLVABILITY FACTORS IN SERIAL MURDER." Social Behavior and Personality: an international journal 26, no. 1 (January 1, 1998): 75–83. http://dx.doi.org/10.2224/sbp.1998.26.1.75.

Full text
Abstract:
The situational context in which the serial killer targets his victims is critical to understanding the hunting patterns of a predator. However, police and researchers eschew victim target networks (VTN). Rather, their attention is overwhelmingly concerned with the offender's characteristics. As an alternative to traditional police investigations, this paper suggests that by directing attention to victim target networks, inferences about the decision-making process underlying the selection of crime locations, victims, and locating offenders' home bases can be made. The paper presents a decision-making model that the serial predator uses to scope out potential victim target networks and shows how proactive policing in victim target areas can deter the killer. The study also posits that by directing investigative attention to victim social networks, police can first identify a set of prospective victims targeted by a serial killer. The study closes with suggestions about the applicability of law enforcement use of victims' targeting networks and how victim social networks can be used to link serial murder victims.
APA, Harvard, Vancouver, ISO, and other styles
48

Cockbain, Ella. "Grooming and the ‘Asian sex gang predator’: the construction of a racial crime threat." Race & Class 54, no. 4 (March 28, 2013): 22–32. http://dx.doi.org/10.1177/0306396813475983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Porterfield, Amanda. "The Impact of Early New England Missionaries on Women's Roles in Zulu Culture." Church History 66, no. 1 (March 1997): 67–80. http://dx.doi.org/10.2307/3169633.

Full text
Abstract:
As missionaries from New England made initial forays into Zululand and Natal in the 1830s, the Zulu people were in a state of considerable stress. Dingan had come to power in 1828 after participating in the assassination of his brother Shaka, the notorious warrior king whose conquests after 1816 brought people from dozens of clans and chieftanships into a Zulu state. Ecological crises caused by drought and competition for scarce resources contributed to Shaka's ability to exert unprecedented authority, as did the predatory incursions of European traders seeking ivory, skins, and slaves in various parts of southeast Africa. Expanding on a tradition of religious initiation and military ranking known as ambutho, Shaka crated a system of loyalty to the state that built on but also compromised the loyalties to particular clans commanded by lesser chiefs.
APA, Harvard, Vancouver, ISO, and other styles
50

Krakowski, Krzysztof. "Colombian Paramilitaries Since Demobilization: Between State Crackdown and Increased Violence." Latin American Politics and Society 57, no. 4 (2015): 28–50. http://dx.doi.org/10.1111/j.1548-2456.2015.00287.x.

Full text
Abstract:
AbstractThis article addresses the puzzle of heterogeneous trends in paramilitary violence on the Colombian Pacific Coast since the beginning of the disarmament, demobilization, and reintegration (DDR) process in 2003. The usual explanations derived from political conflict theories are improved with insights from organized crime research. The article argues that the occasional escalation of post-DDR paramilitary violence at the subregional level cannot be explained by the weakness of the state argument. Instead, the article demonstrates the counterintuitive evidence that paramilitary violence correlates positively with the incidence of state repressive intervention against paramilitary groups. More specifically, paramilitaries challenged by the state use more violence, either to replace their nonviolent resources most affected by law enforcement activities or to respond to crackdown-related intensification of predatory tendencies within their respective organizations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography