To see the other types of publications on this topic, follow the link: Security measures (Criminal Law).

Dissertations / Theses on the topic 'Security measures (Criminal Law)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security measures (Criminal Law).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Funk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.

Full text
Abstract:
Thesis (LLM)--Stellenbosch University, 2004
ENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global communication and the accompanying legal problems. This is followed by an examination of the different functions Internet providers have. A survey of some of the important crimes affecting the Internet and also some Internet-specific offences put the more general issue of liability in a more specific context. Traditional and new forms of crimes are discussed. This section is followed by an analysis of Internet provider liability under German criminal law and Germany's Teleservices Act. From an international criminal law perspective some international instruments, like the Cybercrime Convention of the Council of Europe, is discussed. National legislation, especially in the context of the European Union, must always be put in the proper regional and international context. The thesis concludes with some thoughts on alternative, or perhaps complementary, methods to fight illegal and criminal conduct on the Internet. This is done not as a critique of the responses to Internet crime, but rather to strengthen the many hands trying to reduce Internet crime.
AFRIKAANSE OPSOMMING: Hierdie tesis handeloor die strafregtelike aanspreekliheid van Internet diensverskaffers. Die fokus val op Duitsland, maar die analise word ook geplaas in 'n wyer, vergelykende konteks. Dit word gedoen met verwysing na Suid-Afrika, sowel as Europa en die VSA. Die tesis demonstreer en bespreek die bestaande regsnorme wat Internet diensverskaffers reguleer met spesifieke verwysing na aanspreeklikheid vir onwettige inhoud op die Internet en internasionale pogings om hierdie probleem aan te spreek. Ter inleiding word daar aangetoon hoe die Internet aanleiding gee tot nuwe vorme van globale kommunikasie en die regsprobleme wat dit tot gevolg het. Dit word gevolg deur 'n ondersoek na die verskillende funksies van Internet verskaffers. 'n Ontleding en bespreking van Internet-spesifieke misdrywe plaas die meer algemene vraagstuk in 'n meer gefokusde konteks. Tradisionele en nuwe vorme van misdaad word bespreek. Hierdie afdeling word gevolg deur 'n ontleding van Internet diensverskaffer aanspreeklikheid ingevolge Duitse reg en die Duitse wetgewing op die terrein van telediens. Uit 'n internasionale strafreg oogpunt word sekere internasionale instrumente, soos die Cybercrime Convention van die Raad van Europa, bespreek. Nasionale wetgewing, veral in die konteks van die Europese Unie, word ook in die relevante regionale en internasionale konteks geplaas. Die tesis word afgesluit met sekere gedagtes oor alternatiewe, of moontlik komplimentêre, metodes in die stryd teen Internet-kriminaliteit. Dit moet nie gesien word as kritiek op die huidige stand van sake nie, maar eerder as 'n poging om die talle rolspelers in die stryd teen Internet misdaad se hande te sterk.
APA, Harvard, Vancouver, ISO, and other styles
2

Cia, Michele. "Periculosidade e medida de segurança em uma perspectiva foucaultiana." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21057.

Full text
Abstract:
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-05-04T13:39:33Z No. of bitstreams: 1 Michele Cia.pdf: 2227086 bytes, checksum: 76f6484ba46ba455d6ea486c9028a25e (MD5)
Made available in DSpace on 2018-05-04T13:39:33Z (GMT). No. of bitstreams: 1 Michele Cia.pdf: 2227086 bytes, checksum: 76f6484ba46ba455d6ea486c9028a25e (MD5) Previous issue date: 2018-03-16
The present paper, using the hypothetical-deductive method, tested the hypothesis that requiring an individual to no longer be considered a risk to society in order to suspend the execution of a safety measure is inadequate, since paragraph 1 of article 97 of the penal code is not compatible with the constitution. In order to try to defeat this hypothesis, the emergence of the concept of dangerousness was analyzed, within the scope of criminological positivism; the concepts of abnormality and pathology and their relationship to dangerousness were investigated in a Foucaultian perspective; the psychiatric concept of dangerousness was examined; the (in)existence of free will and its relationship with the dangerous category was analyzed; the use of the dangerous category by National Socialism was examined; the concept of dangerousness was analyzed critically, in the scope of legal-penal dogmatism; the purpose of safety measures and requiring the individual to no longer be considered a risk to society in order to suspend the execution of a safety measure were analyzed; the foundations of the Federative Republic of Brazil, constitutional principles of criminal law and individual guarantees, as well as the rights of persons with mental health disorders in the domestic legal system and in international human rights treaties were studied at length; the practical purposes of safety measures and the operability of the dangerous category in its` legitimization were examined. The hypothesis proved to be true, resulting in the recognition of the illegitimacy of the dangerous category in the Brazilian legal system and, consequently, of the safety measures. The paper proposes a legislative amendment in the sense of the impossibility of recognizing the exclusion of imputability due to psychological anomalities and the end of the dualism of criminal sanctions
A presente pesquisa, através do método hipotético-dedutivo, testou a hipótese de que é inadequada a exigência da cessação da periculosidade como requisito para o fim da execução da medida de segurança, não tendo sido recepcionado pela Constituição Federal o dispositivo presente no § 1º do art. 97 do Código Penal. Para tentar falsear a hipótese, analisou-se o surgimento do conceito de periculosidade, no âmbito do positivismo criminológico; investigou-se os conceitos de anormalidade e de patologia e sua relação com a periculosidade, em uma perspectiva foucaultiana; perscrutou-se a psiquiatrização do conceito de periculosidade; analisou-se a (in)existência do livre-arbítrio e sua relação com a categoria da periculosidade; examinou-se a utilização da categoria da periculosidade pelo nacional-socialismo; analisou-se criticamente o conceito de periculosidade, no âmbito da dogmática jurídico-penal; analisou-se as finalidades da medida de segurança, e sua compatibilidade com a exigência da cessação da periculosidade como requisito para o fim da execução da medida de segurança; estudou-se detidamente os fundamentos da República Federativa do Brasil, os princípios constitucionais penais e as garantias individuais, assim como os direitos dos portadores de transtornos mentais no ordenamento jurídico interno e nos tratados internacionais de direitos humanos; e investigaram-se as finalidades práticas da medida de segurança e a operacionalidade da categoria da periculosidade em sua legitimação. A hipótese mostrou-se verdadeira, o que redundou no reconhecimento da ilegitimidade da categoria da periculosidade no ordenamento jurídico brasileiro e, em consequência, da própria medida de segurança. A pesquisa propõe alteração legislativa no sentido da impossibilidade de reconhecimento de inimputabilidade em razão de anomalia psíquica.e do fim do dualismo das sanções penais
APA, Harvard, Vancouver, ISO, and other styles
3

Zouhal, Adra. "Le risque en droit pénal." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1G025.

Full text
Abstract:
La notion de risque est doublement incertaine : elle contient une part irréductible d’aléa quant à sa concrétisation en dommage d’une part, elle n’est pas définie par la loi d’autre part. Pourtant, cette lacune est en contradiction, tant avec le recours exponentiel à la notion de risque en droit pénal, qu’il soit de fond ou de forme, qu’avec le principe de légalité des délits et des peines, qui implique que le législateur définisse avec clarté et précision les notions et concepts auxquels il fait appel, de sorte que la légitimité de son usage en droit pénal peut être mise en doute. La présence d’une notion aussi incertaine dans une matière qui met en cause les droits fondamentaux de la personne est susceptible de mettre en péril les impératifs de l’État de droit. Au demeurant, ce droit pénal de l’anticipation, qui vise à prévenir la survenance d’une atteinte possible mais incertaine à une valeur protégée, essuie de nombreuses critiques. L’objet de cette démonstration est donc de savoir si le législateur emploie à bon escient ou non la notion de risque en droit pénal. La réponse à cette problématique nécessitera au préalable, de s’assurer que le droit pénal est effectivement légitime à s’intéresser à la notion de risque. Ce n’est pas parce que le législateur consacre une notion que sa prise en compte est forcément légitime. Plus encore, il faut garder à l’esprit que risque et droit pénal sont par nature contradictoires : le risque est incertain, immatériel et relève de la prévention tandis que le droit pénal est le droit de la répression, de la matérialité et de la certitude. Une étude approfondie de leurs natures respectives permettra néanmoins de dépasser la contradiction, attestant alors de ce que le droit pénal est théoriquement légitime à réceptionner la notion de risque. Cette légitimité n’en reste pas moins précaire. Pour la garantir, il ne pourra s’agir que d’un certain risque, c’est-à-dire un risque pourvu d’une certaine qualité, car le législateur, s’il prétend recourir à la notion de risque en droit pénal pour assurer à la société une protection pénale anticipée, ne peut se départir des principes qui y sont applicables. À partir de l’étude des principes fondamentaux du droit pénal, de ses concepts juridiques et de ses sources supralégislatives, cette recherche se proposera alors d’élaborer une définition pénale de la notion de risque, contenant les critères théoriques d’un risque pénalement saisissable en toute légitimité. Leur confrontation, ensuite, avec le droit positif, permettra de révéler si l’exploitation de la notion de risque par le législateur en droit pénal, fait perdre ou non à ce dernier sa légitimité
The notion of risk is doubly uncertain: it contains an irreducible part of hazard as its realization in damage on the one hand, and its lack of definition by the law on the other. However, this gap is at odds, both with the exponential use of the notion of risk in criminal law, whether substantive or form, and with the principle of legality of offences and sentences, which implies that the legislator defines clearly and precisely the notions and concepts to which it refers. That is the reason why the legitimacy of the use of the notion of risk in criminal law can be questionable. The presence of such an uncertain notion in a field involving the fundamental rights of the person is likely to jeopardize the imperatives of the State of laws. Moreover, the criminal law of anticipation, which aims to prevent the occurrence of possible but uncertain interference with a protected right, is criticized. The purpose of this demonstration is therefore to know whether or not the legislature uses wisely the notion of risk in criminal law. The answer to this issue will previously require to ensure that criminal law is actually legitimate to focus on the notion of risk. This is not because the legislature takes into account a notion that its account is necessarily legitimate. Moreover, it is important to keep in mind that risk and the criminal law are inherently contradictory: the risk is uncertain, immaterial and is linked to the concept of prevention while the criminal law is the right of repression, the materiality and the certainty. A deep study of their respective natures will nevertheless make it possible to overcome the contradiction, stating that the criminal law is theoretically legitimate to accept the notion of risk. This legitimacy stays nonetheless quite precarious. To secure this legitimacy, only a certain kind of risk, a risk with a managed level can be taken into account. If the legislator claims using the notion of risk in criminal law for anticipated criminal protection of society, he still cannot ignore the principles that are applicable in criminal law. From the study of the fundamental principles of criminal law, its legal concepts and its supralegislatives sources, this research will then offer a definition of the notion of risk in criminal law, containing the theoretical criteria of a legitimate criminally detectable risk. Its comparison with positive law, will emphasize whether the use of the notion of risk by the legislator in criminal law, makes him lose or not its legitimacy
APA, Harvard, Vancouver, ISO, and other styles
4

Salat, Paisal Marc. "La respuesta jurídico-penal a los delincuentes imputables peligrosos: especial referencia a la libertad vigilada." Doctoral thesis, Universitat de Lleida, 2014. http://hdl.handle.net/10803/285865.

Full text
Abstract:
En la present tesi doctoral s'analitza la mesura de seguretat de llibertat vigilada introduïda en el Codi Penal a través de la LO 5/2010. Amb aquesta finalitat, s'aborda un estudi de les principals causes que han motivat amb caràcter general la introducció de mesures penals tendents a contrarestar la perillositat dels delinqüents imputables perillosos. Atès que Espanya no ha estat un país pioner en la implementació d'aquest tipus de mesures, és igualment necessari conèixer la realitat jurídica comparada en alguns dels països del nostre entorn cultural. Complerts els anteriors subobjectius es realitza una anàlisi jurídica de la mesura de llibertat vigilada tant en relació amb la seva vigent regulació com en relació amb la que pretén efectuar-se mitjançant el Projecte de reforma del CP. Finalment, es proposen aquelles reformes legislatives que es consideren necessàries amb l'objectiu de millorar l'actual regulació del dret de sancions aplicables a delinqüents imputables perillosos.
En la presente tesis doctoral se analiza la medida de seguridad de libertad vigilada introducida en el Código Penal a través de la LO 5/2010. Con este fin, se aborda un estudio de las principales causas que han motivado con carácter general la introducción de medidas penales tendentes a contrarrestar la peligrosidad de los delincuentes imputables peligrosos. Dado que España no ha sido un país pionero en la implementación de este tipo de medidas, es igualmente necesario conocer la realidad jurídica comparada en algunos de los países de nuestro entorno cultural. Cumplidos los anteriores subobjetivos se realiza un análisis jurídico de la medida de libertad vigilada tanto en relación con su vigente regulación como en relación con la que pretende efectuarse mediante el Proyecto de reforma del CP. Finalmente, se proponen aquellas reformas legislativas que se consideren necesarias con el objetivo de mejorar la actual regulación del derecho de sanciones aplicables a delincuentes imputables peligrosos.
In this Ph.D. I analyze the Spanish supervised release introduced by the LO 5/2010. To this objective, a study of the major causes that have led to the introduction of a general nature aimed at counteracting the danger of dangerous criminal offenders measures is addressed. Since Spain has not been a pioneer in the implementation of such measures, it is also necessary to know the legal situation compared to some of the countries in our cultural environment. Once the above subgoals a legal analysis of the supervised release both in relation to its current regulations and in relation to the intended affected by CP Reform Project is done. Finally, those legislative reforms deemed necessary in order to improve the current regulation of the right of penalties to dangerous offenders are proposed.
APA, Harvard, Vancouver, ISO, and other styles
5

Kayuni, Steven William Stewista. "A policy oriented approach to witness protective measures at the international criminal court." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/68456/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Meini, Méndez Iván Fabio. "The penalty: function and requirements." Pontificia Universidad Católica del Perú, 2013. http://repositorio.pucp.edu.pe/index/handle/123456789/116002.

Full text
Abstract:
Legitimacy of criminal sanction is originated on its own purposes pursued in a state governed by the Rule of Law. That legitimacy should include the penalty as well as security measures, bearing in mind that both are imposed to someone breaking a rule of conduct, and therefore, someone capable to do it. Reviewing penal capacity or criminal liability concepts is required because if penal capacity means the capacity to understand the reality and adjust the behavior to it, and if every legitimate criminal sanction have to be imposed to someone who have the capacity of break it, then security measures also have to be imposed only to people responsible, capable to understand rules and act in accordance. With regard to people not subject to criminal liability they are standing outside Criminal Law and punish them would be illegitimate. In this line, criminal liability should be seen not only as a crime assumption but also as a basic statement for any dialogue the state shall have with the citizens: at the level of crime itself, proceedings and sentence execution .
La legitimación de la sanción penal se deriva de los fines que persigue en un Estado de derecho. Dicha legitimación debe abarcar tanto a la pena como a la medida de seguridad, y tener en cuenta que tanto la pena como la medida de seguridad se imponen a quien infringe una norma de conducta y, por tanto, a quien tiene capacidad para infringirla. Esto presupone revisar el concepto de capacidad penal o imputabilidad,pues si imputabilidad es capacidad para comprender la realidad y adecuar el comportamiento a dicha comprensión, y toda sanción penal legítima ha de imponerse a quien tiene dicha capacidad, también las medidas de seguridad han de ser impuestas solo a imputables. Los verdaderos inimputables son aquellos que están al margen del derecho penal y a quienes resulta ilegítimo imponer alguna sanción. En esta línea, la imputabilidad ha de ser vista no solo como presupuesto del delito, sino como presupuesto de cualquier diálogo que tenga el Estado con el ciudadano con respecto al delito, al proceso y a la ejecución de la pena.
APA, Harvard, Vancouver, ISO, and other styles
7

Money-Kyrle, Rebecca H. "Pre-charge detention of terrorist suspects and the right to liberty and security." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:5be1f686-3721-4706-9bf7-fd4dc85e245e.

Full text
Abstract:
This thesis assesses the UK Terrorism Act 2000’s stop and search and pre-charge detention powers against liberty and security rights. It proposes that criminalizing ‘terrorism’, and legitimacy of counter-terrorism laws, depends on moral and legal norms defining legitimate sovereign power. External norms of territorial sovereignty and non-intervention define and legitimize external defensive actions by the state to protect nation state security. Individual liberty and security rights, specifically pursuant to article 9, ICCPR and article 5 ECHR, have a special moral and legal status externally, but are not universally determinative of sovereign legitimacy. The thesis argues that these external norms accommodate contrasting paradigms of internal legitimacy, the ‘security state’ and the ‘liberal state’. Conceptually, sovereign legitimacy in the former is grounded on heteronymous collective or ideological values, grounding fundamental obligations legitimizing ‘balancing’ of individual liberty and security against security of those ultimate norms. The ‘balancing metaphor’ and exceptionalist theories are conceptually located within the security state paradigm. Conversely, political and individual autonomy (liberty and security of the person) circumscribe legitimacy of liberal state action, grounding fundamental obligations to prevent and punish harms, and to refrain from violating individual autonomy unless justified by those obligations. Liberal rule of law standards, including due process rights, are legitimized by the instrumental role of law as the primary source of justification in the liberal state. Evaluating the policy justifications, enactment, and scope of the TA provisions against those norms, the thesis concludes they contradict liberal norms, violate international norms and individual legal rights to liberty and security, and undermine the rule of law and due process rights. The pre-emptive counter-terrorism policy, balancing national security against individual liberty, and degradation of due process rights, belies a security state approach.
APA, Harvard, Vancouver, ISO, and other styles
8

Jung, Sang Yool 1965. "A legal analysis of aviation security under the international legal regime /." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82661.

Full text
Abstract:
The safety of civil aviation has been endangered not only by terrorism, but also by many other unlawful acts committed by persons with varying motivation. The international community has worked to provide a secure and safe air transportation system for general people and thus has developed aviation security systems in the legal and technical fields to combat and prevent the man-made intentional harm against civil aviation.
The legal instruments are mainly based on several multilateral conventions, resolutions and declarations. They are all focused on how to eliminate safe heavens for unlawful actors against civil aviation, secure the safety of passenger and crew, and facilitate the resumption of affected aircraft.
The technical instruments, dealing with specific preventive security measures to suppress the unlawful acts against civil aviation on a practical basis, have been developed by ICAO as "Standards and Recommended Practices" (SARPs) in the form of Annexes. In addition, to promote global aviation security, ICAO launched its "Universal Security Audit Programme" immediately following the tragic events of September 11, 2001.
This thesis critically analyses the legal and technical aviation security systems under current international legal regimes and provides several recommendations to improve the remaining problems in the international aviation security system.
APA, Harvard, Vancouver, ISO, and other styles
9

Alati, Daniel. "Domestic counter-terrorism in a global context : a comparison of legal and political structures and cultures in Canada and the United Kingdom's counter-terrorism policy-making." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2a37e08e-8463-4000-9fdc-389072bc5960.

Full text
Abstract:
Although both Canada and the United Kingdom had experienced terrorism prior to the attacks that occurred in the United States on September 11, 2001, Roach has argued that the events of that day ‘produced a horrible natural experiment that allows us to compare how international institutions and different countries responded’. Arguably, the most significant international response post-9/11 was the United Nations Security Council Resolution 1373, which set a 90-day deadline for states to implement measures in accordance with the Resolution. Despite the fact that both Canada and the United Kingdom already had in place extensive provisions to deal with terrorism, both countries responded swiftly and their legislative responses reflect the histories and legal, political and social cultures of each country. This thesis tests the hypothesis that national security remains a bastion of national sovereignty, despite the force of international legal instruments like UN Security Council Resolution 1373 and, as such, the evolution of counter-terrorism policies in different jurisdictions is best analyzed and understood as a product of local institutional structures and cultures. To test this hypothesis, this thesis engages in comparative analyses of legal and political structures and cultures within Canada and the United Kingdom. It analyses variations in the evolution of counter-terrorism policies in the two jurisdictions and explores the domestic reasons for them. In its analysis of security certificates and bail with recognizance/investigative hearings in Canada, and detention without trial, control orders and TPIMs in the UK, this thesis reveals how domestic structures and cultures, including the legal system, the relative stability of government, local human rights culture, and geopolitical relationships all influence how counter-terrorism measures evolve.
APA, Harvard, Vancouver, ISO, and other styles
10

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
APA, Harvard, Vancouver, ISO, and other styles
11

Yakstas, John Robert. "High technology cargo theft: A new multibillion dollar criminal industry." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/1987.

Full text
Abstract:
The central theme of this study is to explore the growth and causes of a relatively new form of "property crime" - the large scale theft of high technology products while the products are in transit from the point of manufacture to the point of market (retail stores, end users). For the purpose of this study, high technology products may be defined as computers, computer monitors, computer hard drives, microchips and other computer peripherals.
APA, Harvard, Vancouver, ISO, and other styles
12

Desai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.
The aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtfulness regarding corporate consistency. Legislature and policies have been set up to counter information security issues. This legislature and policies are not adequately addressing the compliance issues that arise, but are needed within organisations. Compliance targets are not met due to inconsistent guidelines that turns out to be significant in diminishing the financial position, reputation and security of information. This research further aims to explore whether employees comply with laws and regulations regarding information in an organisation. This is done in order to confirm whether governance and human factors play any significant part in compliance. The research is an exploratory study and specifically analyses the governance function and which stakeholders influence its operations in information compliance. The research investigates certain questions on organisational culture and the human factor, do influence employee’s compliance to laws and regulations. The objectives of the research are to investigate which factors, and how such factors influence compliance of information security policies and compliance with the goal of designing an integrated framework to assist in counteracting these findings. The research is underpinned by the Neo-institutional theory, Agency Theory and Rational choice theory. The Denison organisational cultural model and a framework proposed by von Solms are used as lenses to interpret the data of the research.
APA, Harvard, Vancouver, ISO, and other styles
13

Balfour, Abby Kealani. "Insights and Blind Spots: A Qualitative Analysis of Risk in Psychiatric Security Review Board Hearings." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/630.

Full text
Abstract:
The prevalence and consequences of the insanity plea, titled "guilty except for insanity" in the State of Oregon, are fraught with misconceptions. The use of the plea requires a complex set of interactions between the mental health and criminal justice systems, and comes with severe costs for people who use it. Most of the research on the psychological aspects of the insanity plea emphasizes empirical validity in the form of risk assessment instruments and/or the biomedical model with its focus on disease and illness. This thesis analyzes from community psychology and critical theory perspectives the decision process of hearings held by the Psychiatric Security Review Board. The critical analysis draws specifically on Michel Foucault's (1977) theory of knowledge and power to address three questions: 1. Are there identifiable prototypical narratives of risk that are constructed around evidence admitted to a hearing? 2a. Are these risk narratives deployed differently in public PSRB hearing as opposed to an individual interview? 2b. Do the District Attorney, Defense Attorney, and clinician deploy risk narratives differently? 3. As professionals that create, administer, and interpret risk assessment instruments, how do clinicians use these risk narratives to support or refute the arguments of each side? Transcripts and audio recordings of hearings were thematically content analyzed and compared to address these questions. One overarching theme and four subsidiary themes emerged from the data that describe how risk is indirectly discussed in the formal procedures of the hearings and in individual interviews. The overarching theme is Insight and the four subsidiary themes are Elopement, Compliance, Drug-use, and Treatment. Compared across settings, the hearings were highly structured whereas the individual interviews allowed for a more complex analysis and explication of positions. In the context of the PSRB hearings, the testimony of the clinician was of primary importance in determination of insight and the source of information on the patient along the subsidiary themes.
APA, Harvard, Vancouver, ISO, and other styles
14

Orre, Christoffer. "Misappropriation Sanctions : Discovering the Threshold for Freezing Assets of Ousted Kleptocrats with EU Restrictive Measures." Thesis, Uppsala universitet, Juridiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-393171.

Full text
Abstract:
The misappropriation sanctions refer to the European Union sanctions adopted against foreign kleptocrats to address the suspected theft of public funds. After the regimes had been successfully overthrown in the Arab Spring in Tunisia and Egypt in 2011 as well as the Maidan Revolution in Ukraine in 2014, the misappropriation sanctions were imposed, in all three cases, as the ousted leaders and their close associates were suspected of stealing vast amounts of public funds from their respective countries and hiding the misappropriated funds overseas. The misappropriation sanctions take the form of asset freezes against individuals considered being responsible for “misappropriation of state funds”. The sanctions in question have been extensively reviewed by the Court of Justice of the European Union as numerous of the targeted individuals have applied for annulment of the sanctions in the parts that concern them. The purpose of this thesis is to examine, on the basis of the case law of the CJEU, the threshold for legitimate listing of a targeted individuals in the misappropriation sanctions. It is concluded that threshold vis-à-vis the criteria or the listing grounds must be regarded as reasonable, while the threshold concerning the respect of fundamental rights is creating a heavy burden to bear.
APA, Harvard, Vancouver, ISO, and other styles
15

Polydorou, Stavros. "The role of international juridical process in international security and civil-military relations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FPolydorou.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, December 2002.
Thesis advisor(s): James Holmes Armstead, Thomas Bruneau. Includes bibliographical references (p. 129-134). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
16

Shan, Jia. "LEGAL REGULATION ON COUNTER-TERRORISM." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/307620.

Full text
Abstract:
Nowadays, terrorist crimes are still threatening global security. Since the 21st century, with the rapid development of modern science and technology, such as "Internet +", "big data" and "artificial intelligence", along with the changing political situation of international society, the global distribution of economic benefits, and the global flow of civilization and culture, it has brought about information sharing and a better life in human society. At the same time, it has spawned the form innovation of terrorist crimes. Terrorism is increasingly threatening non-traditional security areas. The non-traditional security theory transcends the concept of national boundaries and the limitations of national sovereignty, and examines the security construction of various countries from the perspective of global security. It focuses on a wider range of fields, a wider vision and a deeper depth, and is a kind of "shared security". Terrorist crimes challenge international authority, national sovereignty and tolerance for crimes, and affect the development of many fields in the world, which belongs to the non-traditional security field. Because of its inherent destructive, violent, dual-purpose, international and decentralized characteristics, for many years, the global defense against terrorist crimes has formed three paths: "war path", "criminal justice path" and "global governance path". From the reality, the path of war is a last resort in the current global counter-terrorism, but it is not worth vigorously promoting. Criminal justice path can effectively reduce the operation cost of counter-terrorism measures, is conducive to the realization of human rights protection, and is the main counter-terrorism means, but it is still insufficient to deal with terrorist crimes, and must be further improved and strengthened. The global governance path is put forward on the basis of effectively eliminating the threats and security problems brought by terrorism on a global scale. It relies on the global countries to form a community of common destiny for all mankind to effectively fight terrorism. Although this goal is far away, it is the fundamental way to completely eliminate terrorism. In the value choice of counter-terrorism, the theory of priority protection of national security and global security has become the main theory from the perspective of non-traditional security. Under the non-traditional security concept, counter-terrorism must first ensure national security, and then pursue individual freedom. Without national security, there is no individual freedom. But at the same time, we should give full consideration to the theory of safeguarding human rights and bottom line justice. The protection of human rights against terrorism from the perspective of non-traditional security must start from three levels: terrorist crimes and human rights protection; the protection of state power and human rights, as well as the protection of terrorists' rights. In a civilized society, even if terrorists are as evil as enemies, they cannot be treated like enemies, but must adhere to the rule of law and guarantee their basic rights. When dealing with terrorist crimes at the international level, we should see that international counter-terrorism faces practical problems such as inadequate legal system, imperfect cooperation mechanism and practical difficulties. By adhering to the main position of the United Nations in counter-terrorism, we should formulate the United Nations Comprehensive Counter-Terrorism Convention and improve the international unified counter-terrorism criminal policy, and finally achieve effective governance of terrorism. At the domestic level, it mainly focuses on the establishment of a comprehensive and effective counter-terrorism mechanism, starting from the counter-terrorism institution building, counter-terrorism platform building and counter-terrorism legal system. The most important thing is to build and perfect the counter-terrorism legal system. By combing our counter-terrorism legal system, we should further polish it from the aspects of defining the basic concepts of terrorism, improving the counter-terrorism substantive law and perfecting the counter-terrorism procedural law. In this process, we must carry out the criminal policy of combining punishment with leniency, and finally realize the balance between security and human rights protection. This thesis is divided into five chapters to study the terrorist crime in the field of non-traditional security, hoping to make a theoretical response to the causes of terrorism, extremism, terrorist crime, terrorist activity crime and the preventive countermeasures in China through such a theoretical review, combing and exploration, especially to provide a useful theoretical reference for the prevention, strike and elimination of such crimes. At the same time, it is also a theoretical clarification of the terrorist crimes, terrorist activities crimes and extremist crimes in the non-traditional security field. Chapter one: this chapter mainly clarifies the relevant concepts, and understands the traditional security theory, non-traditional security theory, terrorism, extremism and separatism from the most basic level; distinguishes terrorist activity crime, terrorist crime and extremist crime, including the discrimination of their concepts, characteristics, types and purposes. More importantly, terrorism, which has been debated over its concepts for a long time, is serious crimes not only endangering the international security, but also endangering the overall national security of China, such as political security, homeland security, military security, economic security, cultural security, social security, network security, science and technology security, information security, ecological security, resource security, nuclear security and so on. The safety of people's lives and property can be ensured only when such crimes are eliminated. The second chapter discusses the causes and harms of terrorist crimes. From the international political level, national religious belief, interest distribution and other perspectives, this chapter analyzes the causes and harms of terrorism. This kind of harm is analyzed from the aspects of international society and domestic society. As far as the harm of international society is concerned, it causes the internal disintegration of the country, causes the internal management of the country out of control, intensifies regional conflicts and wars, people living nowhere, the number of refugees increases sharply, all kinds of serious crimes rise, global economic development slows down, and the number of global crimes increases. As far as the harm of the domestic society is concerned, it intensifies the escalation of national conflicts and the rise of extreme forces, which leads to the instability of social management order, the destruction of social dynamic balance, the general lack of security and trust of the public, the reduction of trust of the whole people, the destruction of social integrity system, and the loss of moral concepts of social groups, which will form the vicious circle of everyone is in danger, or some scholars call it the so-called "mutual harm mode" of modern society. Finally, the terrorist crimes basically spread all over the world, endangering the international political environment and extending to China, resulting in the slow development of domestic economy, the destruction of the inheritance of local cultural system, endangering everyone's own development and individual survival, etc., causing unprecedented disasters in the whole human society, such as environmental degradation, food shortage, water pollution, and trust crisis. Chapter three: expound the value orientation and the path of counter terrorism. The biggest harm of terrorist crime lies in the destruction of global security. Therefore, the value of counter-terrorism in theory is mainly embodied in: the theory of human existence, the theory of international relations, the value theory of priority of global security interests, the theory of dynamic balance between the protection of basic human rights and the strengthening of state power, the theory of principles, rules and systems of international human rights law. Today's "counter-terrorism model" mainly adopts "war model" (military strike), "criminal justice model" (judicial governance) and "global governance model" (social governance) to control, eliminate and combat the spread and frequency of terrorist crimes. However, looking at these models, we can find that the war model basically failed because the United States withdrew its troops from Iraq and other countries, the judicial governance was in the stage of continuous attempt and improvement because of the poor connection of domestic laws of various countries, and the global governance was impressed by various factors among countries, and also became a theoretical system of continuous attempt to break through and improve. At present, the international community has not created a theoretical model that can completely eliminate terrorist crime and terrorist activity crime. Most countries adopt intelligence early warning, rapid elimination, post elimination and other ways to the occurrence of terrorist attacks, in order to effectively control the spread of terrorist extreme ideas, reduce the overall probability of terrorist attacks, and thus continuously weaken the viability of terrorist organizations around the world. Chapter four: the current situation and improvement of international response to terrorist crime. Due to the differences of political ideology and the restriction of interest pattern, the counter-terrorism legal system is not perfect, and it is difficult to form a systematic and effective "international unified criminal code system" or "international unified criminal policy" to regulate international terrorist crimes. In this regard, the international level of the regulation of terrorist crimes should mainly adopt international criminal cooperation, criminal judicial assistance, regional alliances, and other ways (such as the Shanghai Cooperation Organization).Therefore, the conclusion of international conventions is particularly important. Only with legal basis can we realize effective cooperation across national sovereignty. It can not only ensure respect for the sovereignty of all countries, but also help to carry out practical cooperation to deal with terrorist crimes of all countries. Chapter five: expound the path and system construction of dealing with terrorist crime in China. From the perspective of China’s society, it is generally in a period of stable development, but still unable to cope with sudden terrorist attacks. Terrorist attacks happen under the planning of terrorists, so it is urgent to improve the criminal law of China. Over the years, China has preliminarily constructed the main frame of counter-terrorism, and formed a three-dimensional prevention system in the aspects of counter-terrorism stance, counter-terrorism organization setting, counter-terrorism fund control and counter-terrorism Internet supervision. In terms of specific disposal, China has established counter-terrorism organization and platforms, such as information exchange platform, early warning and prevention platform and public division platform. But fighting terrorism according to law is always one of the goals pursued by the rule of law. Although China has established a relatively complete counter-terrorism legal system, the counter-terrorism legislation has certain defects and deficiencies in three aspects: basic concepts, anti-terrorism substantive law and anti-terrorism procedural law. It is found that there are some specific problems in China’s counter-terrorism legislation, such as unclear definition of basic concepts, poor convergence of laws in the field of counter-terrorism substantive law, confusion of identification subject and procedure in the field of counter-terrorism procedural law, confusion of administrative power and criminal investigation power, and poor procedural independence. The definition of the basic concept should strictly abide by the behavior theory of objectivism criminal law, and should be expanded in combination with international practice to cover specific cases from the literal and theoretical extension of the articles. In the field of counter-terrorism substantive law, the power boundary between administrative law and criminal substantive law should be clarified, and legislative conflict of jurisdiction should be solved, strictly implement the concept of modesty of criminal law, and correctly define the specific boundaries between administrative illegal activities and criminal activities, as well as between incriminating and discharging crimes. The choice of procedural legislation of mixed model in the field of counter-terrorism procedural law should conform to the trend of the world, clarify the compartmentalization of subjects, ensure the smooth internal connection of the whole procedure, and establish a special prosecution procedure. At the same time, we insist on using criminal policy of combining punishment with leniency to guide our counter-terrorism practice, and finally realize the balance between counter-terrorism and human rights protection In a word, based on the complexity of criminal phenomena, the diversity of criminal patterns and the differences of social development patterns, considering the rigor and diversity of the theoretical research of criminal law, we should take a dynamic and open concept to study the criminal law of terrorist crime and terrorist activity crime, and adopt a multi-dimensional research approach.
APA, Harvard, Vancouver, ISO, and other styles
17

Gottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.

Full text
Abstract:
Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identifying Critical Infrastructure and its interdependencies. The purpose of this research is to highlight the importance of protecting Critical Infrastructure as well as proposing a high level framework aiding in the identification and securing of Critical Infrastructure. To achieve this, key case studies involving Cyber crime and Cyber warfare, as well as the identification of attack vectors and impact on against Critical Infrastructure (as applicable to Critical Infrastructure where possible), were identified and discussed. Furthermore industry related material was researched as to identify key controls that would aid in protecting Critical Infrastructure. The identification of initiatives that countries were pursuing, that would aid in the protection of Critical Infrastructure, were identified and discussed. Research was conducted into the various standards, frameworks and methodologies available to aid in the identification, remediation and ultimately the protection of Critical Infrastructure. A key output of the research was the development of a hybrid approach to identifying Critical Infrastructure, associated vulnerabilities and an approach for remediation with specific metrics (based on the research performed). The conclusion based on the research is that there is often a need and a requirement to identify and protect Critical Infrastructure however this is usually initiated or driven by non-owners of Critical Infrastructure (Governments, governing bodies, standards bodies and security consultants). Furthermore where there are active initiative by owners very often the suggested approaches are very high level in nature with little direct guidance available for very immature environments.
APA, Harvard, Vancouver, ISO, and other styles
18

Horn, Maryke Eda. "Key safety, security, service and legal measures reuired for the successful management of a guest house." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1390.

Full text
Abstract:
The significant growth in the South African tourism industry in recent years has placed much focus on the hospitality sector in the country. The hospitably sector performs a vital role in the South African economy, as is the case globally, to provide accommodation to international and national tourists. Guest houses in particular have become one of the fastest growing components of the South African tourism industry. However, operating a guest house is not merely providing a bed, shower and breakfast facility for which a client pays and hopefully returns again in future. Rather, it involves significantly more than providing physical amenities. Not only does a potential entrepreneur require a suitable facility in a well-positioned location, but guest house owners and management must adhere to various strenuous safety, security and service measures, as well as municipal by-laws, in a tough and ever-changing business environment. The central theme and the main objective of this study was to investigate the safety, security, service and legal measures that need to be adhered for the successful management of a guest house in the Nelson Mandela Bay Metro. Together with an outline of the various steps required to start a guest house, a sub-objective was to compile a guest house manual that can be used by new and existing guest house owners and managers to improve their business. The target group was divided into two sections, namely guest house owners and managers on the one hand, and guest house clients on the other - hence two separate questionnaires were developed and used as measuring instrument for the empirical study. The results revealed that clients in the Metro are in general satisfied with the service they receive and safety they experience when staying in guest houses in the Metro. The premises are mostly neat and clean, the towels and bedding are regularly replaced and clean, while the parking bays are sufficient and safe, staff members friendly and approachable, and bookings are done promptly. Over and above the different by-laws to observe, it is the duty of owners and management to provide clients with a safe, secure environment with excellent service, and with sufficient lighting at the entrances, parking and reception areas. All staircases should be steady and iv non-slip, and swimming pools should have secured fencing around and/ or should be covered by safety nets. Staff should follow the correct procedures in emergencies, while concerted efforts should be made to adapt guest houses for the specific needs of disabled and elderly clients. To prevent the outbreak of food poisoning, and to ensure personal and kitchen hygiene, as well as the correct storing of food, are other important responsibilities of owners and management. Therefore, for a guest house to be managed successfully, the owners and management must take into consideration the required safety, security, service and legal measures.
APA, Harvard, Vancouver, ISO, and other styles
19

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pupavac, Mladen. "The international criminal tribunal for the former Yugoslavia : analysis of its contribution to the peace and security in the former Yugoslavia and the rule of law in international relations." Thesis, University of Nottingham, 2003. http://eprints.nottingham.ac.uk/11533/.

Full text
Abstract:
The aim of this study has been to explore the political and legal significance of the International Criminal Tribunal for the Former Yugoslavia, both within the territory of the former Yugoslavia and beyond. Within these parameters, the overall purpose of the study has been to examine, firstly, whether the ICTY has contributed to the restoration of peace and security in the territory of the former Yugoslavia, and secondly, whether, using the experience of the ICTY, it is reasonable to expect that the newly established International Criminal Court (ICC) will make a similar contribution to international peace and security and the rule of law in international relations more generally. Therefore, the academic aim of the thesis is to use the results of the empirical research on the ICTY as a basis for reasoned speculation about the ICC. In seeking to answer whether the ICTY has contributed to peace and security in the former Yugoslavia, the thesis analyses the cooperation of the actors within and outside the former Yugoslavia, both state and non-state, arguing that the ICTY has not achieved its main objective. Using the lessons of the ICTY, the thesis seeks to modify expectations about the potential of the ICC to contribute to the maintenance of international peace and security by helping to manage similar conflicts in the future. In answering whether the ICTY has contributed to the rule of law in international relations, the thesis has contextualised the ICTY within the history of similar attempts to use international law and international institutions to prohibit and/or regulate the use of force in international relations. The overall conclusion is that the ICTY has not achieved this goal either.
APA, Harvard, Vancouver, ISO, and other styles
21

Araújo, Susana Vieira de. "Necessidade de tipificação penal da alienação parental e a aplicação da lei de n.12.403/2011." Universidade Católica de Pernambuco, 2013. http://www.unicap.br/tede//tde_busca/arquivo.php?codArquivo=858.

Full text
Abstract:
O presente trabalho aborda a temática da necessidade de tipificação penal da alienação parental e a aplicabilidade da Lei de n 12403/11 que reflete toda a constituição da alienação parental pontuada dentro destes institutos, penal e processual penal. A referida alienação, que se materializa através de um litígio entre o genitor guardião e o outro progenitor, de modo que aquele que detêm a guarda usa os filhos para se vingar do genitor que tem o direito de visitação, mediante campanhas depreciativas, tão somente por não aceitar o fim do relacionamento conjugal. Refletindo esta também com os parentes, estendendo-se até os avós. Com o condão de estudar este fenômeno, assim como, a possibilidade da perda do poder familiar em decorrência do mesmo, é que se perpassa por um breve histórico sobre a família e alguns institutos que se referem à relação pais e filhos, como o poder familiar e as práticas processuais, esta buscando soluções aos casos concretos. Com a realização de estudos multidisciplinares, feitos por profissionais especializados da área de Direito, juntamente, com psicólogos, assistentes sociais e médicos é que se pode dar solução ao caso concreto, até mesmo evitar os seus efeitos. Os laudos técnicos advindos destes estudos fundamentam as decisões do judiciário. Desta feita, a perda do poder familiar reflete uma necessidade imposta ao alienador em face da alienação parental. Depois da abordagem civilista, passa-se a abordagem penalista, de modo que retrata a possibilidade de aplicação da Lei de n 12403/11 demonstrando que as medidas cautelares são medidas penais efetivas contra as ações do genitor alienador. Esta lei ao colocar a prisão preventiva como exceção, se coaduna com as razões do veto do artigo 10 da lei de alienação parental. A aplicação, ainda, do instituto da transação penal, o rito proposto na Lei de n 9099/95 cabe perfeitamente, também, para compelir a alienação parental. Demonstrando, categoricamente, que a penalização da alienação parental evitaria a crescente caracterização deste instituto nas famílias brasileiras. O trabalho se caracteriza por uma pesquisa bibliográfica obtendo informações através das fontes de jurisprudenciais, doutrinárias e Leis.
This paper addresses the issue of the necessity of criminal definition of parental alienation and the applicability of Law No. 12403/11 which reflects the whole constitution of parental alienation scored within these institutions, penal and criminal procedure. This sale, which is materialized through a dispute between the custodial parent and the other parent, so that those who hold the guard uses the children to avenge the parent who has visitation rights by disparaging campaigns, as not only accept the end of the marriage relationship. Reflecting this also with relatives, extending to the grandparents. With the privilege of studying this phenomenon, as well as the possibility of loss of power due to the same family, is that goes through a brief history of the family and some institutes which refer to the relationship parents and children, as the family power and procedural practices, this finding solutions to concrete cases. With the completion of multidisciplinary studies, done by professionals specialized area of law, together with psychologists, social workers and doctors is that one can give solution to this case, even prevent its effects. The technical reports arising from these studies underlie the decisions of the judiciary. This time, the loss of family power reflects a necessity imposed upon alienating in the face of parental alienation. After the tort approach, the approach is punitive, so that portrays the possibility of application of Law No. 12403/11 showing that precautionary measures are effective measures against the criminal actions of the alienating parent. This law put to the detention as an exception, is consistent with the reasons for the veto of Article 10 of the law of parental alienation. The application also institute criminal transaction, proposed in the rite of Law n 9099/95 fits perfectly, too, to compel parental alienation. Demonstrating, categorically, that the criminalization of parental alienation avoid the growing characterization of this institute in Brazilian families. The work is characterized by a bibliographical information obtained through the sources of jurisprudence, doctrinal and Laws.
APA, Harvard, Vancouver, ISO, and other styles
22

Jallow-Sey, Aisatou. "ICAO's aviation security programme post 911 : a legal analysis." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80931.

Full text
Abstract:
Unlawful interference with civil aviation has become a major concern for the world aviation community. The misuse of aircraft as a weapon of mass destruction has created new challenges. Air terrorism has moved from hijacking or unlawful seizure of aircraft to an in-flight explosion caused by sabotage and finally to September 11, 2001, to the use of a civil airplane as a weapon of destruction.
The events of September may be the biggest security challenge ever faced by the aviation industry. The impact of this tragic event on the global economy has been very harsh. The events have tended to obscure the fact that civil aviation continues to be an inherent safe mode of transport.
Great efforts are being made at the national and international levels to create a security net which is global in nature and so tight that not one further potential act of unlawful interference can slip through. However, the fact remains that, in weaving the net and designing measures with the objectives of preventing, combating and eradicating acts of terrorism involving civil aviation, it is prudent to be imaginative in assessing the threat, which could come from new directions and in new forms.
This thesis explores the implications of the 11 September 2001 events. A global strategy is initiated by ICAO and endorsed by the States, with the aim of protecting lives, restoring public confidence in air travel, and promoting the financial health of air transport. I will therefore examine the measures initiated by ICAO in response to the new challenges in aviation and which form the basis of the aviation security action plan. The perspective is that the events of 11 September have changed the world, and changed irrecoverably. Nothing will be the same for the aviation industry.
APA, Harvard, Vancouver, ISO, and other styles
23

Belevičius, Linas. "Techninių priemonių naudojimo baudžiamajame procese teoriniai pagrindai ir reglamentavimas." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2005~D_20051003_110123-65759.

Full text
Abstract:
Pastaraisiais metais Lietuvoje buvo priimti svarbiausieji baudžiamieji ir baudžiamojo proceso įstatymai- Baudžiamasis kodeksas, Baudžiamojo proceso kodeksas, Bausmių vykdymo kodeksas bei juos lydintys poįstatyminiai aktai. Šie įstatymai dar ilgai turėtų lemti valstybės nuostatas dėl formų ir procedūrų bei būdų, naudojamų tiriant nusikalstamas veikas bei nagrinėjant bylas teisme. Nusikalstamų veikų tyrimas, jas įvykdžiusių asmenų nustatymas ir nubaudimas yra itin svarbi valstybės veiklos rūšis, o kovos su nusikalstamumu sėkmingumas, rezultatyvumas turi didžiulės įtakos kitoms socialinio gyvenimo sferoms. Tačiau ši valstybės veikla dėl objektyvių ir subjektyvių priežasčių pakankamai ilgai trunka ir kainuoja brangiai, reikalauja didelių žmogiškųjų bei materialinių išteklių, bet to, nėra pakankamai rezultatyvi. Kuriant naująjį baudžiamojo proceso įstatymą buvo siekiama nustatyti optimalias procesines formas, užtikrinančias, kad teisingumas baudžiamosiose bylose būtų įgyvendinamas mažiausiomis procesinėmis sąnaudomis, siekiant sudaryti įstatymines prielaidas, įgalinančias “greičiau suktis teisingumo mašinai”. Tačiau siekiant supaprastinti, atpiginti ir pagreitinti baudžiamąjį procesą negalima nukrypti nuo pagrindinės baudžiamojo proceso paskirties - ginant žmogaus ir piliečio teises bei laisves, visuomenės ir valstybės interesus greitai, išsamiai atskleisti nusikalstamas veikas ir tinkamai pritaikyti įstatymą. Taigi siekiant užtikrinti greitą, ekonomišką ir maksimaliai... [to full text]
In recent years main criminal legislation and laws on criminal procedure together with the relevant regulatory enactments were adopted in Lithuania. These laws are considered to determine forms, procedures and methods of state’s position towards crimes. Moreover, those forms, procedures and methods shall be used in the investigation of crimes or hearing of cases in courts for a long time. Investigation of crimes is one of the most significant state’s activity fields. The success in combat against crime and its good results shave a great influence on other spheres of social life. However, due to various factors, this state’s activity field requires much time, considerable expenses and enormous human and material resources. However, this activity does not provide satisfactory results. When a new law on criminal procedure was adopted, the focus was on establishment of effective procedural forms that would ensure implementation of justice in criminal cases with the least procedural expenses and precondition a more accelerated operation of ‘the mechanism of justice’. Seeking to simplify and accelerate criminal procedure and decrease its expenses, the main purpose of criminal procedure, namely, to solve crimes in detail and in the shortest possible time, to apply an appropriate law at the same time regarding human rights and freedoms and interests of society and state should be regarded. Therefore, to ensure an accelerated, economical and good-resulting criminal justice, it is... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
24

Losis, Egidijus. "Procesinės prievartos priemonės baudžiamajame procese." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20110316_204530-44497.

Full text
Abstract:
Mokslo darbo temos aktualumas ir problematika. Žmogaus teisių varžymas baudžiamajame procese vykdomas Lietuvos Respublikos baudžiamojo proceso kodekse nustatytų prievartos priemonių forma ir nulemtas aplinkybės, kad baudžiamojo proceso dalyviai ne visuomet tinkamai vykdo baudžiamąjį procesą reglamentuojančių teisės aktų nustatytas pareigas. Tarptautiniuose ir nacionaliniuose teisės aktuose deklaruojami teisinės, demokratinės valstybės, žmogaus teisių apsaugos principai bei tarptautinių teisminių institucijų (Europos Žmogaus Teisių Teismo, Europos Teisingumo Teismo) formuojama praktika riboja prievartos taikymą nustatant proporcingumo principą, reikalaujantį įvertinti ir nustatyti tinkamą balansą tarp žmogaus teises varžančių priemonių ir šiomis priemonėmis siekiamų tikslų. Disertacijos temos aktualumą lemia prievartos priemonių taikymo procese egzistuojantys probleminiai klausimai, susiję su žmogaus teisių apsaugos užtikrinimu, į kuriuos atsakymų ieškoma šioje disertacijoje. Disertaciniame darbe tiriama problema susijusi su baudžiamajame procese vykdomu žmogaus teisių ir laisvių varžymu taikant prievartos priemones. Darbe siekiama nustatyti valstybės galių ribas baudžiamajame procese taikyti prievartos priemones, ištirti ir pasiūlyti mažiau žmogaus teises ir laisves varžančius būdus. Disertacinio darbo problematika apima tris aspektus: pirma, – prievartos priemonių sampratos, funkcijos baudžiamajame procese suvokimą, antra, – proporcingumo principo, jo turinio, kriterijų ir... [toliau žr. visą tekstą]
Topicality of the theme of the scientific work and the problems. Constriction of human rights in the criminal proceedings is exercised via the coercive measures, which are fixed in the Criminal Process Code (CPC), and is determined by the circumstance, i.e. that the participants of the criminal proceedings do not always appropriately fulfill their duties, which are fixed in the legal acts, regulating the criminal proceedings. The principles of protection of human rights, which are declared in the international and national legal acts of the lawful, democratic state, and the practice, which is being formed by the international justiciary institutions (the European Court of Human Rights, European Court of Justice) constrict application of coercion by setting the principle of proportionality, according to which the fair balance between the measures, which constrict human rights, and the goals, which are being pursued by these measures, must be considered and fixed. Topicality of the theme of the doctorial dissertation is conditioned by the problematic items, existing in the proceedings of application of the coercive measures, which are related with securing protection of human rights; the solutions of the latter are being searched for in the present dissertation. The problem, which is being investigated in the dissertation work, is related with constriction of human rights and freedoms, which is being exercised in the criminal proceedings via application of coercive measures... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
25

Morgan, Deanne. "Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4729/.

Full text
Abstract:
The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
APA, Harvard, Vancouver, ISO, and other styles
26

Webb-Yeates, Morgan. "Food Defense Among Meat Processing and Food Service Establishments in Kentucky." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1249.

Full text
Abstract:
Agroterrorism is the deliberate introduction of a plant or animal disease with thegoal of causing fear, economic instability, illness, or death. After the 2002 terroristattacks on the World Trade Center, the security of the food supply is of increasingconcern to the United States. A major incidence of agroterrorism or food tampering would have far reaching impacts on the economy and public health. The first objective of this project was to determine knowledge and concern of agroterrorism in meat processing facilities in Kentucky, and to determine knowledge and concern of food tampering and food defense in food service establishments in Warren County, Kentucky. The second objective was to determine security strategies that were being implemented by these facilities. Two separate surveys, one for meat processors and the other for food service establishments, were designed to meet these objectives. An observational study was conducted for meat processing facilities. It was found that these facilities were generally unconcerned with agroterrorism, although a reasonable amount of security implementations were in place at these facilities. A statistical comparison between restaurants and non-restaurant food service establishments, such as schools, hospitals, and hotels, was performed. Both types of food service establishments expressed little concern about a food tampering event. Non- restaurant food service establishments were slightly more concerned than restaurants about both food tampering and food defense.
APA, Harvard, Vancouver, ISO, and other styles
27

Harir, Said. "Les effets de la dangerosité sur la décision pénale." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST0049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Dixon, Henry George. "Email security policy implementation in multinational organisations with special reference to privacy laws." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/229.

Full text
Abstract:
In 1971, scientist Ray Tomlinson sent what is now considered the first email message. It was considered as “nothing short of revolutionary … deserv[ing] a spot in the list of great communication inventions such as the printing press, telegraph and telephone” (Festa, 2001). Whereas email was first used exclusively in the military (Arpanet) and in academic circles, it has now become almost ubiquitous, used widely for private, as well as for business correspondence. According to a Berkeley study (Berkeley, 2000), there were approximately 440 million corporate and personal [e-] mailboxes worldwide in 2001, of which more than a third was corporate mailboxes. As a result of the extensive use of email in the corporate environment, Information Officers have to ensure that the use of email adds business value. In an “always on” market place, the efficiency, immediacy and cost effectiveness of email communication are immediately evident. A study by Ferris Research, quoted by Nchor (2001), shows that there is “an overall productivity gain of US$9000 per employee as they send and receive emails to get projects done.” However, the use of email in the corporate envi-ronment also poses business risks that need to be uniquely addressed. Among these “key business risks” (Surfcontrol, 2001) are security risks, viruses, legal liability, pro-ductivity loss and bandwidth abuse. To address the risks mentioned above and to protect the business value of email, spe-cific policies have to be implemented that address email usage. Information Security Policies are defined in most corporate environments. In a study done by Elron Soft-ware (2001), 83% of respondents who have abused email have company policies regu-lating email usage. There appears to be a gap between policy conception and policy implementation. Various factors inhibit effective policy implementation – ethical, legal and cultural. The implementation of corporate policy becomes especially complex in multinational environments where differing information law Email usage is ubiquitous in the modern business environment, but few companies adequately manage the risks associated with email.
APA, Harvard, Vancouver, ISO, and other styles
29

Coskun, Asu. "Enforcement Of Intellectual Property Rights In A General Framework And Evaluation Of Enforcement Measures In The Eu Context." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/2/12608078/index.pdf.

Full text
Abstract:
This thesis analyzes the enforcement measures for the protection of intellectual property rights in an international and regional framework. The challenges posed by the digital technology
the difficulties faced by right holders, judiciary, public agencies, international and regional organizations in the implementation stages will be discussed by referring to the legal texts such as the TRIPS Agreement, the EU Enforcement Directive and Regulations. All dimensions of counterfeiting and piracy will constitute an important focus of this thesis. The thesis will seek to clarify uncertainties arising from the jurisdictional conflicts for the determination of the applicable law and competent courts in intellectual property cases involving foreign elements.
APA, Harvard, Vancouver, ISO, and other styles
30

Nichols, Lionel. "The International Criminal Court and the end of impunity in Kenya." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:34eab158-f675-492a-b844-f9a74e1a6ce6.

Full text
Abstract:
This thesis considers the extent to which the International Criminal Court's Office of the Prosecutor ('OTP') has been successful in realising its self-defined mandate of ending impunity in Kenya. In particular, it focuses on the OTP's attempts to encourage domestic investigations and prosecutions as part of its strategy of positive complementarity. This strategy has been hailed as being the best and perhaps the only way that the OTP may use its finite resources to make a significant contribution to ending impunity. Despite this, no empirical study has been published that evaluates the effectiveness of this strategy and the impact that it has on ending impunity in the targeted situation country. This thesis seeks to address this gap in the literature by conducting a case study on the OTP's implementation of its strategy of positive complementarity in Kenya following that country's post-election violence in 2007/08. In doing so, I also hope to make a modest contribution to existing debates over the effectiveness of the ICC as an institution as well as international criminal justice and transitional justice more generally.
APA, Harvard, Vancouver, ISO, and other styles
31

Vasilescu, Cristina. "Análisis de la ejecución de las medidas penales alternativas desde una perspectiva de género." Doctoral thesis, Universitat de Girona, 2021. http://hdl.handle.net/10803/672285.

Full text
Abstract:
The main goal of this PhD dissertation is analyse the implementation of community sentences in Catalonia from a gender-responsive and criminological approach. For this a mixed methodology is used. Firstly, is carried out a quantitative research in Catalan Probation System based on representative sample of 580 men and women that served a community sentence in Barcelona and Girona in 2017 through a bivariate descriptive analysis disaggregated by gender. Secondly, is carried out a qualitative research in Girona and Barcelona to analyse, on the one hand, the experiences of women serving community sentences and know what works, what does not work and what can be improve and on the other hand, to analyse the experiences of professionals, such as probation officers, supervising and intervening with men and women offenders. For this, 38 semi-structured interviews are analyzed: 23 with women offenders, 11 with probation officers and 4 other professionals from Probation System. This research shows that there are significant gender differences that the Probation System should take into account in order to achieve an implementation of community sentences from a gender-responsive approach. Likewise, once these differences, what works, what does not work and what could be improved are known, a possible gender-responsive design of community sentences, such as unpaid work and training programs, is presented
El principal objectiu d’aquesta tesi doctoral és profunditzar en el coneixement de la execució de les mesures penals alternatives des d’una perspectiva de gènere i criminològica. Per això, s’utilitza metodologia mixta. En primer lloc, es porta a terme una investigació quantitativa sobre una mostra representativa de 580 dones i homes que van finalitzar una mesura penal alternativa a Girona i Barcelona l’any 2017. Es realitza un anàlisi descriptiu bivariat entre la variable gènere i totes les altres variables recollides. En segon lloc, es porta a terme una investigació qualitativa a Girona i Barcelona. Per una banda, s’analitza com experimenten les dones penades el compliment de la mesura penal alternativa i què funciona, què no funciona i què podria millorar segons les mateixes entrevistades. Per altra banda, s’analitza com experimenten les persones delegades i els supervisors d’entitats de treball en benefici de la comunitat la supervisió i la intervenció amb dones i homes penats. Per això, s’analitzen 38 entrevistes semi estructurades en profunditat realitzades a 23 dones penades, 11 persones delegades i 4 supervisors. Aquesta investigació evidencia que existeixen diferències per gènere significatives que el sistema d’execució penal hauria de tenir en compte per aconseguir una execució sensible al gènere i a la diversitat existent. Tanmateix, després de conèixer aquestes diferències, allò que funciona, que no funciona i que podria millorar, es presenta un possible disseny de mesures penals alternatives com els treballs en benefici de la comunitat i els programes formatius, des d’una perspectiva de gènere
Programa de Doctorat Interuniversitari en Dret, Economia i Empresa
APA, Harvard, Vancouver, ISO, and other styles
32

Leloudas, Georgios. "Legal aspects of aviation risk management." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80937.

Full text
Abstract:
The thesis in the first part examines the notion of risk and describes the process of risk management with emphasis on the identification of emerging threats to civil aviation and on the adoption of new risk handling techniques.
In the second part, the role of law into the airlines' management regime is examined especially in the light of two prima facie conflicting trends: liberalization of market access and increased State involvement in war risk, safety and security issues. Furthermore, the contractual and tortious/delictual exposures of airlines are being scrutinized and the ways to handle them are being analyzed.
The main objectives are (i) to demonstrate that risk management is not restricted to insurance, but involves a number of techniques and procedures that have the potential not only to minimize risk but also to turn risk into opportunity and value and (ii) to identify the role of law as a management tool in the oncoming liberalized aviation environment.
APA, Harvard, Vancouver, ISO, and other styles
33

Adonis, Bongiwe. "Immunity for serving Heads of State for crimes under International Criminal Law: an analysis of the ICC-indictment against Omar Al Bashir." University of the Western Cape, 2011. http://hdl.handle.net/11394/2910.

Full text
Abstract:
Magister Legum - LLM
This paper analyses head of state immunity, a traditional rule of international law, in relation to the indictments by the International Criminal Court (ICC) in 2009 against the current Sudanese President Omar Hassan Ahmad Al Bashir. It can be agreed that the doctrine of immunity in international law attempts to overcome the tension between the protection of human rights and the demands of state sovereignty. The statutes and decisions of international criminal courts make it clear that no immunity for international crimes shall be attached to heads of states or to senior government officials. However, the case against the Sudanese President, where the jurisdiction of the ICC was triggered by the UN Security Council‟s referral of the situation in Darfur to the Court, represents the first case where a serving head of state has, in fact, been indicted before the ICC. From this case, a number of legal issues have arisen; such as the questions where the ICC‟s jurisdiction over an incumbent head of state, not party to the ICC Statute, is justified, and the obligations upon ICC state parties to surrender such a head of state to the requesting international criminal court. This paper gives an analysis of these questions.
South Africa
APA, Harvard, Vancouver, ISO, and other styles
34

Sizaire, Vincent. "La fragilité de l'ordre pénal républicain : la loi pénale à l'épreuve du bon sens répressif." Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100016/document.

Full text
Abstract:
Les bouleversements de plus en plus rapides et violents qui affectent la loi pénale ne sont que le symptôme d'un conflit normatif systémique qui travaille notre droit depuis la codification impériale. Dissimulé depuis l'origine du droit pénal moderne par le mythe de l'équilibre répressif, il voir l'ordre pénal républicain, formellement consacré par le Code pénal de 1810, confronté à une force constante d'érosion contrariant sa mise en œuvre effective et conséquente. Avançant sous l'apparence du bon sens répressif, cette opposition trahit en réalité une hostilité radicale à l'idée de Sûreté, assise sur la résurgence de certains traits saillants d'un absolutisme pénal singulièrement mâtiné des innovations de l'utilitarisme pénal. Sous l'effet d'une double instrumentation du procès pénal qui, sous l'influence du néolibéralisme, se mue progressivement en un outil de gestion coercitive de la déviance et de satisfaction symbolique de la victime, l'époque contemporaine voit le conflit normatif entrer dans une phase critique. Avec le passage du bon sens répressif au réalisme répressif, l'ordre pénal républicain est bientôt menacé d'implosion. De la nécessité de punir à l'émergence d'une impossible principe de précaution pénale, ce sont l'ensemble de ses principes directeurs qui se trouvent remis en cause en leurs fondements
The faster and faster and violent upheavals which affect the penal law are only the symptom of a systematic normative conflict which works our law since the imperial codification Hidden since the origin of the modern criminal law by the myth of the repressive balance, it to see the penal order republican, formally dedicated by the Penal code of 1810, confronted with a constant strength of erosion opposing its effective and consequent implementation. Moving forward under the appearance of the repressive common sense, this opposition betrays in reality a radical hostility at the idea of safety, based on the resurgence of certain striking lines of a penal absolutism strangely crossbred of the innovations of the penal utilitarianism. Under the influence of a double instrumentation of the penal trial which, under the influence of the neoliberalism, moved gradually one coercive management tool of the abnormality and the symbolic satisfaction of the victim, the contemporary time sees the normative conflict entering a critical phase. With the passage of the repressive common sense in the repressive realism, the republican penal order is soon threatened with implosion. Of the necessity of punishing in the emergence of one impossible principle of penal precaution, it is the set of its guiding principles which are questioned in their foundations
APA, Harvard, Vancouver, ISO, and other styles
35

Skolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.

Full text
Abstract:
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organisations have been hesitant to adopt Cloud solutions owing to a variety of inhibiting factors and concerns that have created mistrust in Cloud Computing. One of the top concerns identified is security within the Cloud Computing environment. The approaching commencement of new data protection legislation in South Africa, known as the Protection of Personal Information Act (POPI), may provide an ideal opportunity to address the information security-related inhibiting factors and foster a trust relationship between potential Cloud users and Cloud providers. POPI applies to anyone who processes personal information and regulates how they must handle, store and secure that information. POPI is considered to be beneficial to Cloud providers as it gives them the opportunity to build trust with potential Cloud users through achieving compliance and providing assurance. The aim of this dissertation is, therefore, to develop a framework for Cloud Computing adoption that will assist in mitigating the information security-related factors inhibiting Cloud adoption by fostering a trust relationship through compliance with the POPI Act. It is believed that such a framework would be useful to South African Cloud providers and could ultimately assist in the promotion of Cloud adoption in South Africa.
APA, Harvard, Vancouver, ISO, and other styles
36

Hamoir, Clement. "Le renseignement et la gendarmerie nationale : enjeux et perspectives." Thesis, Université Côte d'Azur (ComUE), 2019. http://www.theses.fr/2019AZUR0014/document.

Full text
Abstract:
Alors que la gendarmerie nationale exerce ses missions sur l’ensemble du spectre de la sécurité nationale, celle du renseignement est longtemps demeurée en retrait. La reconnaissance de cette compétence, enfin acquise en 2009 après d’âpres débats, lui a permis de revendiquer un nouveau positionnement dans l’organisation administrative des services. Dans un contexte marqué par la nécessaire prise en compte de la menace terroriste, elle est parvenue à créer son propre service de renseignement en 2013, la SDAO. Bien qu’intégrée depuis toujours à son organisation dans le cadre d’une approche généraliste de la sécurité, la fonction de renseignement de la gendarmerie est désormais incarnée dans sa structure. Sa reconnaissance par la loi de 2015 relative au renseignement permet de consacrer la gendarmerie nationale comme un acteur à part entière du renseignement. Dès lors, l’institution a progressivement adapté son organisation pour répondre aux enjeux posés par ce nouveau droit du renseignement et prendre en compte ses nouvelles prérogatives. Cependant, ces évolutions bouleversent les équilibres. En interne, le centre de gravité du renseignement de sécurité intérieure s’est détaché de la fonction de police judiciaire pour être repositionné au niveau de la SDAO. A l’extérieur, la création de cette nouvelle entité, en parallèle des problématiques posées par l’intégration de la gendarmerie au ministère de l’Intérieur, met en lumière le caractère à la fois central mais sensible de la coordination avec les autres services. Par les enjeux qu’il soulève, le renseignement questionne ainsi le modèle français de police autour de deux logiques opposées, celle du maintien de l’autonomie de chaque institution ou le renforcement de la complémentarité entre elles. Les choix qui seront pris feront en évoluer une au détriment de l’autre
While the national gendarmerie carries out its missions on the whole spectrum of the national security, that of the intelligence for a long time remained in withdrawal. The recognition of this competence, finally acquired in 2009 after bitter debates, allowed him to claim a new position in the administrative organization of services. In a context marked by the need to take into account the terrorist threat, it managed to create its own intelligence service in 2013, the SDAO. Although it has always been part of its organization as part of a global approach to security, the intelligence function of the gendarmerie is now embodied in its structure. Its recognition by the law of 2015 on the intelligence makes it possible to devote the national gendarmerie as a full actor of intelligence. Since then, the institution has gradually adapted its organization to respond to the challenges posed by this new intelligence law and to take into account its new prerogatives. However, these developments upset the equilibrium. Internally, the center of gravity of internal security intelligence broke away from the judicial police function to be repositioned at the level of the SDAO. Outside, the creation of this new entity, in parallel with the problems posed by the integration of the gendarmerie at the Ministry of the Interior, highlights the central but sensitive nature of coordination with other services. By the issues it raises, intelligence questions the French police model around two logics that currently oppose, that of maintaining the autonomy of each institution or reinforcing the complementarity between them
APA, Harvard, Vancouver, ISO, and other styles
37

Hannigan, Kerry. "Protection and security in a technologically advanced society : children and young people's perspectives." Thesis, University of Stirling, 2014. http://hdl.handle.net/1893/21562.

Full text
Abstract:
The continuous advancement of new technology, specifically in the area of internet technology, has led to an increase in concerns surrounding children and young people’s safety when online. The following thesis describes a study of protection and security on the internet from the perspective of children and young people and contributes and expands on the findings of my Masters Dissertation which examined parents’ perceptions of children at risk on the internet. The research focuses on young people’s perspectives about what risks they face and what would keep them safe and is set within literature on child sex abusers and internet grooming. The thesis is based on an online survey which gathered information about the behaviour and opinions of 859 children and young people living in Scotland. Findings were separated into four main topics: children and young people’s behaviour on the internet, children and young people’s perception of strangers both online and offline, children and young people’s opinion of education on internet safety and children and young people’s opinion of the government’s role in relation to their safety online. Respondents’ stated that they wanted to be protected when on the internet (whilst acknowledging their own responsibility when online), either by the government or through those responsible for the content of the internet. They also provided several suggestions on how schools and the government can do more to listen to their voices and improve internet safety education. There were a number of children and young people who reported that they disclosed personal information over the internet (their own and that of their friends and family) and that they were willing to meet people in the real environment whom they had been communicating with online: many respondents’ viewed internet ‘strangers’ as different from ‘strangers’ in the real environment. Vygotsky’s (1978) theory of the Zone of Proximal Development (ZPD) and Wood et al.’s (1976) development of the concept of scaffolding, which has been developed in an educational rather than criminological context, were identified as offering some promise for explaining the behaviour of both the victims and the offender as other theories of sexual offending (either specific theories or explanations developed from general theories) are incapable of fully providing an explanation that will encompass grooming in general and online grooming in particular. It is argued that if these theories are applied to internet safety education they have the potential to empower children and young people and make grooming tactics and approaches less effective. The findings also indicated that more child and young people-oriented protection measures may be needed. Perceptions of protection and security on the internet were wide ranging but respondents were keen to provide possible solutions and examples of how to improve their safety when online. This would suggest that communicating with children and young people when developing policy, legislation, research and educational materials is the way forward if we wish to improve their safety and eliminate or reduce the dangers they face when using the internet.
APA, Harvard, Vancouver, ISO, and other styles
38

McCord, Eric Steven. "The relationship between place management and physical environment in apartment crime." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2686.

Full text
Abstract:
The focus of this research is crime in multi-unit rental structures, Specifically, apartment complexes. It seeks to identify management policies and environmental attributes that are associated with lower crime and police calls for service rates.
APA, Harvard, Vancouver, ISO, and other styles
39

Beckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Roessing, Telma de Verçosa. "A execução penal alternativa no Brasil: paradigma de prevenção criminal e de proteção de direitos." Universidade Federal da Paraí­ba, 2011. http://tede.biblioteca.ufpb.br:8080/handle/tede/4353.

Full text
Abstract:
Made available in DSpace on 2015-05-07T14:27:01Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 1001202 bytes, checksum: 50531aa6fa8b88dc8e209c37d771d3a5 (MD5) Previous issue date: 2011-05-12
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
This master s dissertation aims to investigate how alternative sanctions are enforce in Brazil in order to identify if this practice constitutes a model for preventing criminal recurrence and protecting the fundamental rights of persons who have been sanctioned due to low and medium gravity crimes. The research starts by analyzing the State punitive power through the point of view of the Democratic State under the Rule of Law and the penalty principles in the Brazilian Constitution, situating the alternative sanctions and measures within the minimalist approach of Criminal Law. Subsequently it analyzes the public policies which approach the public security problem in a broader way, focusing mainly in the criminality prevention, and also points out the pendular character of Brazilian criminal law, which moves between greater and lesser strictness. Further on, it highlights the failure of imprisonment, and the alternative sanctions are presented as criminal sanctions with an educational and reintegrating character. From the treatment provided to alternative sanctions and measures in the United Nations Standard Minimum Rules for Non-custodial Measures (The Tokyo Rules), the research emphasizes the alternative sanctions and measures in the Brazilian legislation and analyzes such alternatives as an interaction process between the State, the community and individuals. Furthermore, it stresses the course taken by the Brazilian experience in the implementation of public policies aimed at the enforcement of alternative sanctions, highlighting the Alternative Sanctions and Measures Incentive Program from the Brazilian Ministry of Justice (Programa de Fomento às Penas e Medidas Alternativas do Ministério da Justiça). The sustainability of the support policy to alternative sanctions and measures in the states, taking into account experiences in several ones, is also analyzed, as well as the proposal for a public security policy with citizenship in the enforcement of alternative sanctions and measures; last, but not least, this research also evidences the possibility of structuring an autonomous alternative criminal justice system in the country.
A presente dissertação tem por objetivo perquirir a forma como as alternativas penais são executadas no Brasil a fim de identificar se essa prática constitui modelo de prevenção de reincidência criminal e proteção de direitos fundamentais de pessoas que foram sancionadas criminalmente pelo cometimento de delitos de pequena e média gravidade. A pesquisa parte da análise da pretensão punitiva a partir da ótica do Estado Democrático de Direito e dos princípios penais constitucionais brasileiros, situando as penas e medidas alternativas dentro da visão minimalista do Direito Penal. A seguir analisa as políticas públicas que enxergam o problema da segurança pública de maneira mais ampla, com foco principal na prevenção da criminalidade e evidencia o movimento pendular da legislação penal brasileira entre maior e menor rigor penal. Destaca o fracasso da pena de prisão e as penas alternativas são apresentadas como sanções penais de caráter educativo e reintegrador. A partir do tratamento dado às penas e medidas alternativas pelas Regras Mínimas das Nações Unidas para a Elaboração de Medidas Não Privativas de Liberdade (Regras de Tóquio), enfoca as penas e medidas alternativas na legislação brasileira e analisa as alternativas penais como processo de interação entre Estado, comunidade e indivíduos. Enfatiza, ainda, o percurso da experiência brasileira na implementação de políticas públicas voltadas para a execução penal alternativa, com destaque para o Programa de Fomento às Penas e Medidas Alternativas do Ministério da Justiça brasileiro. A sustentabilidade da política de apoio às penas e medidas alternativas nos estados, por meio da experiência de algumas unidades da federação, também é analisada, bem como a proposta de política de segurança pública com cidadania na execução das penas e medidas alternativas e, por fim, evidencia a possibilidade da estruturação de sistema penal alternativo autônomo no país.
APA, Harvard, Vancouver, ISO, and other styles
41

Durrieu, Roberto. "Rethinking money laundering offences : a global comparative analysis." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:a9511b88-fec2-40ce-86ec-e5ef380cb0ca.

Full text
Abstract:
Since the late 1980s, efforts made by the international community to deal with the complex and global problem of money laundering have stimulated the creation and definition of the so-called 'international crime of money laundering', which is included in various United Nations and Council of Europe international treaties, as well as European Union Directives. The Central purpose of this thesis is to investigate if the main goal of effectiveness in the adaptation of the international crime of money laundering at the domestic level, might undermine other values that international law is seeking to protect, namely the guarantee of due process and the adequate protection of human rights principles. Then, if the adoption of any element of the crime shows to be inconsistent with civil rights and guarantees, to propose how deficiencies could be remedied.
APA, Harvard, Vancouver, ISO, and other styles
42

Ah-Thion, Oona. "Contribution à l'étude du principe de précaution en droit pénal et en politique criminelle." Thesis, Paris 1, 2014. http://www.theses.fr/2014PA010303/document.

Full text
Abstract:
Le début du 21ème siècle a vu s'ériger de profondes réformes législatives qui continuent de bouleverser le droit pénal et la politique criminelle. Elles prennent corps dans une société de risque caractérisée par l'accélération de la modernisation et la production de risques multiformes qui lui sont rattachés. Progressivement, le principe de précaution, emprunté de manière pervertie à l'environnement, et sur un mode incantatoire et répétitif, s'immiscera dans ces matières jusqu'à produire des conséquences sur le principe de légalité qui structure la rationalité pénale moderne, imposer la révision de certains autres grands principes comme celui de la présomption d'innocence et celui de nécessité, et mettre au centre des décisions des notions critiques telle la dangerosité. Sous l'influence du principe de précaution, les concepts-mêmes d'infraction, de responsabilité pénale et de peine sont bousculés avec l'invitation à prendre toujours plus en considération le futur et sa potentialité de danger. Dans cette perspective, et comme pendant au principe de précaution, le droit à la sécurité tend à déplacer la focale sur une approche victimaire de la société au détriment d'une conception ancienne d'un droit pénal fondé sur un équilibre juridique entre sécurité et liberté. Et la politique criminelle guidant ces évolutions fonctionne sur un nouveau modèle qui, dans cette recherche poussée de la sécurité, fait de la précaution à la fois sa finalité interne et sa finalité externe. Cette thèse est donc consacrée à l'étude du principe de précaution appliqué au droit pénal et à la politique criminelle qu'elle examine à la lumière de théories et d'approches pluridisciplinaires. Elle s'attache surtout à travers l'analyse de l'évolution du droit pénal et de certaines thèses criminologiques, à mettre en évidence l'émergence aujourd'hui, et au contact d'une idéologie précautionniste, d'une nouvelle rationalité pénale de précaution fonctionnant selon une méthodologie et avec l'usage d'une terminologie spécifique
The beginning of the 21st century has seen the implementation of profound legislative reforms which have upset the criminal law and the criminal policy. They took place in a society of risk characterized by the acceleration of the modernity and the production of multiform risks which are linked to it. Gradually the precautionary principle, taken forcibly from the environmental perspective and as an incantation and a refrain, will interfere in those matters to such an extent as to generate consequences on the principle of legality which structures the modern legal rationality, to impose the revision of some other key principles like the presumption of innocence and the principle of necessity, and to place at the center of decisions critical notions such as the danger. Under the influence of the precautionary principle, the very concepts of infraction, of legal responsibility and of punishment are being dislocated by the urgent appeal to take more and more into consideration the future and its potentiality of danger. In this perspective and under the growing pressure of the precautionary principle, the right to security tends to focalize upon a victimizing approach of the society at the expense of an old conception of criminal law founded upon the legal balance between security and liberty. And the criminal policy guiding those developments operate as a new model, which in its obsessional quest of security, makes of the precautionary principle both its internal and external finality. This thesis is thus devoted to the study of the precautionary principle as it is applied to the criminal law and to the criminal policy which it examines through theories and multidisciplinary approaches .Its main objective is, by the examination of the evolution of the criminal policy and of some theories of criminology, and in contact with the ideology of precaution, to highlight the current emergence of a new legal rationality of precaution which operates according to a specific methodology and by the use of a specific terminology
APA, Harvard, Vancouver, ISO, and other styles
43

Simões, Fabrício Carlos Pichite dos Santos. "Atuação investigativa da polícia judiciária militar estadual em ocorrência de intervenção policial com resultado de óbito de civil em Salvador." Universidade Catolica de Salvador, 2017. http://ri.ucsal.br:8080/jspui/handle/prefix/368.

Full text
Abstract:
Submitted by Jamile Barbosa da Cruz (jamile.cruz@ucsal.br) on 2017-09-27T12:31:45Z No. of bitstreams: 1 DISSERTACAOFABRICIOCARLOS.pdf: 1187247 bytes, checksum: 7a5f5be435e09ade15f520faee511e68 (MD5)
Approved for entry into archive by Rosemary Magalhães (rosemary.magalhaes@ucsal.br) on 2017-10-02T17:20:32Z (GMT) No. of bitstreams: 1 DISSERTACAOFABRICIOCARLOS.pdf: 1187247 bytes, checksum: 7a5f5be435e09ade15f520faee511e68 (MD5)
Made available in DSpace on 2017-10-02T17:20:32Z (GMT). No. of bitstreams: 1 DISSERTACAOFABRICIOCARLOS.pdf: 1187247 bytes, checksum: 7a5f5be435e09ade15f520faee511e68 (MD5) Previous issue date: 2017-07-07
As intervenções policiais com resultado morte de civil constituem tema relevante, atual e constantemente debatido em âmbito nacional. Desta forma, a Segurança Pública, desponta como um dos Direitos Fundamentais carreados no texto constitucional vigente, enquanto a atividade policial militar um de seus desdobramentos para a realização do interesse coletivo. Por isso, revelam-se prementes as bases legais que fundamentam a atuação de Polícia Judiciária Militar e, em particular, pela Coordenação de Polícia Judiciária Militar – CPJM, da Corregedoria Geral da Polícia Militar da Bahia. Desta forma, o presente estudo se dedica à apreciação dos casos registrados na aludida seção no período de 2013 a 2014, desencadeados na Capital baiana. Através da metodologia de cunho exploratório quantitativa potencializou-se a análise do tema, com ênfase ao raciocínio dedutivo das informações obtidas. Por ora, a atuação da referida seção trouxe maior celeridade e qualidade dos inquéritos policiais, constituindo salvaguarda dos interesses da sociedade baiana, consoante preceitos da Constituição Federal de 1988.
Police interventions resulting in the death of civilians are a relevant, current and constantly discussed issue at the national level. In this way, Public Security emerges as one of the Fundamental Rights carried in the current constitutional text, while military police activity is one of its consequences for the realization of collective interest. Therefore, the legal bases that support the activities of the Military Judicial Police and, in particular, the Military Judicial Police Coordination (CPJM), of the General Internal Affairs of the Military Police of Bahia, are of paramount importance. In consequence, this study aims to assess the cases registered in the aforementioned section during the period from 2013 to 2014, unleashed in the Capital of Bahia. Through the quantitative exploratory methodology, the analysis of the topic was strengthened, with emphasis on the deductive reasoning of the information obtained. For the time being, the action of this section brought greater speed and quality of police investigations, constituting a safeguard of the interests of society in Bahia, according to the provisions of the Federal Constitution of 1988.
APA, Harvard, Vancouver, ISO, and other styles
44

Grégoire, Ludivine. "Les mesures de sûreté : essai sur l'autonomie d'une notion." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM1056.

Full text
Abstract:
À l'heure actuelle, deux formes de sanctions pénales s'opposent et se complètent : une forme classique et rétributive, la peine, et une forme plus moderne et essentiellement préventive, la mesure de sûreté. Ces deux sanctions pénales, si elles ne possèdent ni les mêmes fondements, ni les mêmes objectifs, sont pourtant parfois difficiles à différencier. La question des rapports qu'elles entretiennent est récurrente mais au regard de l'augmentation constante du nombre de mesures de sûreté dans la loi pénale depuis ces dernières années, elle mérite désormais une réponse. Cette dernière sera apportée à l'aune de la notion d'autonomie qui permettra d'une part d'identifier clairement les mesures de sûreté et d'autre part de dégager un ensemble de règles plus ou moins spécifiques destinées à clarifier leur régime juridique. De cette manière, la légitimité de l'existence des mesures de sûreté pourra être confirmée
At the moment, two forms of penalties oppose and complement each other: a classic shape and rétributive, the sentences, and a more modern and essentially preventive shape, the safety measures. These two criminal punishments, if they do not possess either the same foundations, or the same objectives, are nevertheless sometimes difficult to differentiate. The question of the relationships which they maintain is recurring but with regard to the constant increase of the number of safety measures in the penal law for these last years, it deserves from now on an answer. The latter will be brought in the form of the notion of autonomy which will on one hand allow to identify clearly safety measures and on the other hand to clear a set of more or less specific rules intended to clarify their legal regime. In this way, the legitimacy of the existence of safety measures can be confirmed
APA, Harvard, Vancouver, ISO, and other styles
45

Civello, Conigliaro Silvio. "Il diritto penale dell'unione Europea tra sicurezza e diritti fondamentali." Thesis, Paris 10, 2017. http://www.theses.fr/2017PA100036.

Full text
Abstract:
La recherche analyse le développement du droit pénal et des politiques criminelles de l'Union européenne, en supposant que la poursuite de buts sécuritaires et de protection des droits fondamentaux soient ses principales forces motrices et justifications pour la criminalisation de certains comportements au niveau européen. Elle vise donc à clarifier ce que «sécurité» et «droits fondamentaux» signifient dans ce contexte, et de montrer comment l'intervention de l'UE dans le domaine pénal, ait affecté et remodelé les principes et catégories traditionnels du droit pénal matériel. La recherche essayer d'identifier des coordonnées pour préciser la nature et les limites de la sécurité comme intérêt juridique protégé et le but de la protection des droits fondamentaux dans leurs interrelations complexes, et leur rôle dans l'espace commun de liberté, de sécurité et de justice - ce que va etre construit par l'Union aussi par l'harmonisation du droit pénal.Après quelques considérations préliminaires sur la société occidentale postmoderne “du risque", pour mettre en évidence les difficultés rencontrées par les hypothèses traditionnelles de la théorie libérale de jus puniendi, on évaluera l'évolution des principes et catégories fondamentales du droit pénal, dont la structure est mise sous pression par l'harmonisation européenne.La recherche fait partie du domaine du droit pénal et de la théorie du droit de l'UE. Il repose largement sur l'analyse scientifique développée dans ces domaines et sur l'analyse des dispositions pertinentes des traités et des sources européennes secondaires, ainsi que sur les décisions les plus pertinentes de la CJCE, en essayant de tirer quelques considérations générales forment la politique et le document institutionnel élaboré par la Commission, le PE et le Conseil de l'UE
The research analyses the development of criminal law and policies of the European Union, assuming that the pursuit of security and the protection of fundamental rights have been its main driving forces and principal justifications for criminalisation.It aims, therefore to clarify what “security” and “fundamental rights” mean in this context, and to show how EU intervention in criminal field, following security and fundamental rights policies, affected and reshaped the traditional principles and categories of substantive criminal law.The research try to identify some coordinates to clarify the nature and limits of security as a protected legal interest and the purpose of protection of fundamental rights in their complex interrelationship, and their role in the Common area of Freedom, Security and Justice - which is being built by the Union also through the harmonisation of criminal law.The starting point is the marked expansive trend in criminal matters due to the current conditions of the State and of representative democracy, typical of the contemporary society.After making some preliminary considerations on western postmodern “risk” society, to highlight the challenges faced by the traditional assumptions of the liberal theory of jus puniendi, I will evaluate the evolution of principle and fundamental categories of criminal law, whose structure is being put under pressure by European harmonisation.The research belongs to the field of criminal law and EU law theory. It extensively rely on influential scholarly analysis developed in those fields and on the analysis of the relevant provisions of the Treaties and secondary EU sources, as well as on the most relevant rulings from the ECJ, also trying to pull out some broad considerations form the political and institutional document produced by the Commission, the EP and the Council of the EU
APA, Harvard, Vancouver, ISO, and other styles
46

Ghaibi, Dhia Moslem Abd Alameer. "La protection pénale de la sécurité de l’information en Irak : Etude juridique au niveau national et international." Thesis, Lille, 2018. http://www.theses.fr/2018LIL2D013.

Full text
Abstract:
La sécurité des technologies de l'information, de la communication (TIC) et la question de la cybercriminalité ont été préoccupantes pendant un certain temps. Ce n'est que dans le passé récent, que les gouvernements ont commencé à comprendre l'importance de la sécurité des TIC. La criminalité informatique, comme toute forme de criminalité, est difficile à chiffrer, la cybercriminalité pourrait constituer la forme de comportement criminel la moins déclarée puisque la victime ignore souvent qu’une infraction a même eu lieu. De plus l'insuffisance des solutions de cybersécurité ainsi que l'absence d'une compréhension commune font des difficultés juridiques à l'échelle nationale et internationale. Il est incertain que les normes du droit-commun, notamment celles du droit pénal, soient suffisantes, d’une part pour couvrir les besoins d’une politique pénale efficace et, d’autre part, la nécessité d’affronter la diversité des crimes et l’évolution continuelle de leurs moyens. L'Irak, comme certains pays, a subi des infractions des systèmes d'information. Mais comment l’Irak peut-il faire face aux questions de la cybercriminalité ? Les lois traditionnelles sont-elles suffisantes pour encadrer la cybersécurité? L’Irak a-t-il besoin de règles juridiques nouvelles ? À cet égard, l’apport du droit international s’avère important pour la lutte contre la cybercriminalité. Les conventions internationales en matière de cyber sécurité ainsi que la législation des pays pionniers dans ce domaine peuvent inspirer le législateur irakien. L’intérêt de ce sujet de recherche vise, à la lumière du droit international, à proposer une protection juridique efficace et de développer le cadre juridique irakien de la cybersécurité
The security of information and communication technologies (ICT) and the issue of cybercrime has been a concern for some time. It is only in the recent past that governments have begun to understand the importance of ICT security. Computer crime, like any form of crime, is hard to quantify, and cybercrime may be the least reported form of criminal behavior since the victim often does not know that an offense has even occurred. In addition, the lack of cybersecurity solutions and the lack of common understanding make legal difficulties both nationally and internationally. It is doubtful that common law standards, including those of the criminal law, are sufficient, on the one hand to cover the needs of an effective criminal policy and, on the other hand, the need to deal with the diversity of crimes and the continual evolution of their means. Iraq, like some countries, has suffered information system breaches. But how can Iraq cope with the issues of cybercrime? Are traditional laws sufficient to frame cybersecurity? Does Iraq need new legal rules? In this respect, the contribution of international law is important for the fight against cybercrime. International cyber security conventions and pioneer legislation in this area can inspire the Iraqi legislator. The purpose of this research topic is, in the light of international law, to provide effective legal protection and to develop Iraq's legal framework for cybersecurity
APA, Harvard, Vancouver, ISO, and other styles
47

Hargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling the plug’ is not ideal since volatile data is relevant to the investigation; one of these situations is when the machine under investigation is using encryption. If encrypted data is encountered on a live machine, a live investigation can be performed to preserve this evidence in a form that can be later analysed. However, there are a number of difficulties with using evidence obtained from live investigations that may cause the reliability of such evidence to be questioned. This research investigates whether digital evidence obtained from live investigations involving encryption can be considered to be reliable. To determine this, a means of assessing reliability is established, which involves evaluating digital evidence against a set of criteria; evidence should be authentic, accurate and complete. This research considers how traditional digital investigations satisfy these requirements and then determines the extent to which evidence from live investigations involving encryption can satisfy the same criteria. This research concludes that it is possible for live digital evidence to be considered to be reliable, but that reliability of digital evidence ultimately depends on the specific investigation and the importance of the decision being made. However, the research provides structured criteria that allow the reliability of digital evidence to be assessed, demonstrates the use of these criteria in the context of live digital investigations involving encryption, and shows the extent to which each can currently be met.
APA, Harvard, Vancouver, ISO, and other styles
48

Hargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling the plug’ is not ideal since volatile data is relevant to the investigation; one of these situations is when the machine under investigation is using encryption. If encrypted data is encountered on a live machine, a live investigation can be performed to preserve this evidence in a form that can be later analysed. However, there are a number of difficulties with using evidence obtained from live investigations that may cause the reliability of such evidence to be questioned. This research investigates whether digital evidence obtained from live investigations involving encryption can be considered to be reliable. To determine this, a means of assessing reliability is established, which involves evaluating digital evidence against a set of criteria; evidence should be authentic, accurate and complete. This research considers how traditional digital investigations satisfy these requirements and then determines the extent to which evidence from live investigations involving encryption can satisfy the same criteria. This research concludes that it is possible for live digital evidence to be considered to be reliable, but that reliability of digital evidence ultimately depends on the specific investigation and the importance of the decision being made. However, the research provides structured criteria that allow the reliability of digital evidence to be assessed, demonstrates the use of these criteria in the context of live digital investigations involving encryption, and shows the extent to which each can currently be met.
APA, Harvard, Vancouver, ISO, and other styles
49

Riaubaitė, Eglė. "Sveikatos sutrikdymai ir baudžiamoji atsakomybė už juos." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060308_151729-16369.

Full text
Abstract:
Criminal offences against human health violate one of the most important values protected by the Criminal Law – people’s health. This Final Theses Health Disturbances/ bodily injuries and Criminal Liability for them presents a detailed analysis of the structures of health disturbances, measures of criminal liability for these acts, and main problems that arise after the new Criminal Code of the Republic of Lithuania has come into force. The main objective of the Theses is to reveal the problems related to the qualification of health disturbances and criminal liability for them as the new Criminal Code of the Republic of Lithuania has raised a number of novelties both by the introduction of a new concept Health Disturbances/bodily injuries and reformation of the penalty imposing provisions. The Theses distinguish the following problems: delimitation of criminal acts and their qualification after the changes of the Criminal Law, penalty imposition and application of other provisions related to the execution of criminal liability in the court practice.
APA, Harvard, Vancouver, ISO, and other styles
50

Cherem, Cristiane Goulart. "Medidas cautelares em face da lei 12.403/11." Pontifícia Universidade Católica de São Paulo, 2013. https://tede2.pucsp.br/handle/handle/6250.

Full text
Abstract:
Made available in DSpace on 2016-04-26T20:22:10Z (GMT). No. of bitstreams: 1 Cristiane Goulart Cherem.pdf: 643822 bytes, checksum: 434ea2c769e6c1d7df15697961e73d14 (MD5) Previous issue date: 2013-10-21
The present work aims to analyze the law 12.403/11, especially in view of the personal protective measures, others than prison, that became part of the criminal justice system. To achieve this purpose, was used the deductive methodology and technical literature, employing books, doctrines, scientific articles in journals, case law and legislation that involves knowledge and the subject's development. The study of the proposed topic is justified to the extent that the said law changes the paradigm of criminal procedure which focused primarily on the precautionary arrest and provisional freedom, with or without bail, setting several measures of none-jail which, if implemented effectively, tend to vent the Brazilian prison system, as well better suit the Criminal Procedure Code to the 1988 Constitution of the Federative Republic of Brazil. The precaution in criminal proceedings remains invigorated with legislative innovation, which also identifies the importance of the topic. Through the studies, it is seek to establish an overview about the possibility of efficiency of criminal procedure being adopted in the new precautionary measures. During the survey, it was found that, in general, the new law provides criminal procedural mechanisms compatible with a constitutional criminal procedure, allowing the realization of a just outcome. On the other hand, evince the need to implement the new law by the judiciary operators, otherwise, like so many other pieces of legislation become forgotten, providing a gap between theory and practice, losing great opportunity to perform a prosecution with proportionality
O presente trabalho tem como objetivo analisar a Lei 12.403/11, especialmente em vista das medidas cautelares pessoais diversas da prisão que passaram a integrar o sistema processual penal. Para a consecução de tal finalidade, utilizou-se o procedimento metodológico dedutivo e a técnica de pesquisa bibliográfica, com emprego de livros, doutrinas, artigos científicos de revistas especializadas, jurisprudências e a legislação que envolve o conhecimento e o desenvolvimento do assunto. O estudo do tema proposto justifica-se na medida em que a referida Lei altera o paradigma processual penal que se concentrava basicamente na prisão cautelar e na liberdade provisória, com ou sem fiança, estabelecendo várias providências descarcerizadoras, as quais, se efetivamente aplicadas, tendem a desafogar o sistema carcerário brasileiro, bem como melhor adequar o Código de Processo Penal à Constituição da República Federativa do Brasil de 1988. A cautelaridade no processo penal resta revigorada com a inovação legislativa, o que também identifica a relevância do tema. Por meio dos estudos realizados, busca-se estabelecer um panorama quanto à possibilidade de eficiência do processo penal, em sendo adotadas as novas medidas cautelares. Durante a verificação, detectou-se que, de modo geral, a nova Lei oferece mecanismos processuais penais compatíveis com um processo penal constitucional, propiciando a efetivação de um resultado justo. De outro lado, registra-se a necessidade de aplicação da nova Lei pelos operadores do Direito, sob pena de, como tantos outros textos legislativos, tornar-se esquecida, propiciando um abismo entre a teoria e a prática, perdendo-se grande oportunidade de realizar-se o processo penal com proporcionalidade
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography