To see the other types of publications on this topic, follow the link: Stolen goods.

Journal articles on the topic 'Stolen goods'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Stolen goods.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chang, Yun-chien. "The Good-Faith Purchase Doctrine in 247 Jurisdictions." European Property Law Journal 9, no. 2-3 (2020): 133–56. http://dx.doi.org/10.1515/eplj-2020-0005.

Full text
Abstract:
AbstractScholars have argued that reasonable persons can disagree on what the most sensible good-faith purchase doctrine is. Indeed, using hand-coded data on this doctrine in 247 jurisdictions, this article finds that this doctrine has hardly converged-there are at least 23 different variants of this doctrine, from “no good faith required” to “good faith is all the purchaser needs.” The 23 variants can be grouped into three clusters: the categorical approach, under which stolen goods always revert back to original owners; the binary approach, under which the distinction between stolen and non-stolen goods matters, but stolen goods do not always revert; and the unitary approach, under which there is no distinction between stolen and non-stolen goods.
APA, Harvard, Vancouver, ISO, and other styles
2

Thompson, Rebecca. "Portable Electronics and Trends in Goods Stolen from the Person." Journal of Research in Crime and Delinquency 54, no. 2 (2016): 276–98. http://dx.doi.org/10.1177/0022427816660743.

Full text
Abstract:
Objectives: To better understand theft of portable electronic goods, this study examined the type of goods stolen during theft and robbery in England and Wales over almost two decades. Methods: Using all sweeps of the Crime Survey for England and Wales between 1994 and 2011, the proportion of incidents where a particular item was stolen was calculated and then compared over time. Results: A small range of items accounted for the bulk of what was taken, namely, cash, purses/wallets, credit/debit cards, and mobile phones. Conclusions: Considerable changes to the stolen goods landscape were found, with a shift from more traditional items such as cash and purses/wallets to portable electronic items such as mobile phones. Recommendations are made for preventing the loss of the items most frequently stolen during offenses of theft and robbery.
APA, Harvard, Vancouver, ISO, and other styles
3

NEALE, MATT. "Making crime pay in late eighteenth-century Bristol: stolen goods, the informal economy and the negotiation of risk." Continuity and Change 26, no. 3 (2011): 439–59. http://dx.doi.org/10.1017/s026841601100021x.

Full text
Abstract:
ABSTRACTThis article examines the many ways that stolen goods were sold and circulated in late eighteenth-century Bristol. It argues that while historians have been correct to identify the contemporary importance of second-hand markets and the ‘informal economy’ to the sale of stolen property, some of the ways that stolen goods markets have been described and conceptualised are not fully supported by the evidence from Bristol. This raises questions about the extent to which models of crime based on London can be applied to cities in provincial England. The article also examines the influence that timing, appearance and location had on the way that stolen goods were sold.
APA, Harvard, Vancouver, ISO, and other styles
4

Allen Guttmann. "The “National Game” as Stolen Goods." Reviews in American History 38, no. 1 (2010): 160–62. http://dx.doi.org/10.1353/rah.0.0184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schneider, J. L. "Stolen-Goods Markets: Methods of Disposal." British Journal of Criminology 45, no. 2 (2004): 129–40. http://dx.doi.org/10.1093/bjc/azh100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adiyatma, Septhian Eka, Naufal Giri Purwoko, Finna Maessy Pangestika, and Dewi Kandiati. "Society and Law Enforcement Personnel in Trading Stolen Goods." Law Research Review Quarterly 6, no. 2 (2020): 101–16. http://dx.doi.org/10.15294/lrrq.v6i2.31107.

Full text
Abstract:
The existence of violating public order, as well as violation activities in accordance with article 480 of the Criminal Code are the characteristics of Kokrosono traders. The provisions of the article refer to criminal relief measures in terms of helping perpetrators of theft crimes obtain benefits from the results of their actions. The uniqueness of merchandise on Jalan Madukoro is that some traded goods are stolen goods. Capital of confidence in the thief makes the stock of stolen goods from the perpetrators of theft is always there. In this case, thieves and stolen merchants can automatically be subject to criminal penalties because there is an intentional element in them, different from the buyer who must be investigated first. This behavior can only be overcome with two channels, namely legal channels and non-legal channels. The legal route leads to regulations related to the detention activities in criminal law and to the extra-legal channels only as countermeasures before the event occurs. Significant differences regarding countermeasures between after and before are in their aftermath.
APA, Harvard, Vancouver, ISO, and other styles
7

Beranek, Ladislav. "Uncertain Reasoning for Detection of Selling Stolen Goods in Online Auctions Using Contextual Information." Advances in Decision Sciences 2014 (November 25, 2014): 1–14. http://dx.doi.org/10.1155/2014/891954.

Full text
Abstract:
This work describes the design of a decision support system for detection of fraudulent behavior of selling stolen goods in online auctions. In this system, each seller is associated with a type of certification, namely “proper seller,” “suspect seller,” and “selling stolen goods.” The certification level is determined on the basis of a seller’s behaviors and especially on the basis of contextual information whose origin is outside online auctions portals. In this paper, we focus on representing knowledge about sellers in online auctions, the influence of additional information available from other Internet source, and reasoning on bidders’ trustworthiness under uncertainties using Dempster-Shafer theory of evidence. To demonstrate the practicability of our approach, we performed a case study using real auction data from Czech auction portal Aukro. The analysis results show that our approach can be used to detect selling stolen goods. By applying Dempster-Shafer theory to combine multiple sources of evidence for the detection of this fraudulent behavior, the proposed approach can reduce the number of false positive results in comparison to approaches using a single source of evidence.
APA, Harvard, Vancouver, ISO, and other styles
8

Supriyono, Supriyono. "Criminology Study Of Crime Of Fencing The Stolen Goods." Jurnal Daulat Hukum 3, no. 1 (2020): 185. http://dx.doi.org/10.30659/jdh.v3i1.8407.

Full text
Abstract:
Criminal offense is regulated in Article 480 of the Criminal Code, Article 481 and 482 of the Criminal Code. Criminal detention is an act that is prohibited by law, because detention is obtained from crime. Criminology perspective plays an important role in studying fencing acts as a form of criminal action by looking at the elements inherent in criminal acts of detention. The formulation of the problem in this research is how Criminology review in the criminal act of holding stolen goods? In this study the authors used a normative juridical method with research specifications in the form of descriptive analysis. The data used for this research are primary and secondary data taken by field observation, interviews, and literature study. Based on the research, it can be concluded that the criminology point of view shows legal efforts for the crime in the form of composing legislation (criminalization process) in the form of legal products in the laws governing criminal offenses stipulated in Criminal Code Article 480-482, in the scope of criminology as criminal etiology in criminal offenses namely internal and external factors.Keywords: Criminology; Criminal Offense; Stolen Goods.
APA, Harvard, Vancouver, ISO, and other styles
9

Freiberg, Arie. "Regulating Markets for Stolen Property." Australian & New Zealand Journal of Criminology 30, no. 3 (1997): 237–58. http://dx.doi.org/10.1177/000486589703000303.

Full text
Abstract:
Each year, in Australia, property estimated to be valued at between two and three billion dollars is stolen from homes, shops, cars, factories and warehouses. Little of this property is recovered and returned to its owners or retained by burglars and thieves for their personal use. The remainder is sold or bartered, but the nature and extent of the re-distributional system for stolen property is little understood. This article is an attempt to understand property as a market for goods and services, which, like any other market, is subject to the influences of supply and demand and government regulation. First, it aims to analyse the interactions between the parties in marketing terms by regarding the participants not as individual burglars, thieves, receivers and accessories, as but as suppliers, distributors, retailers and purchasers. Secondly, it argues that current public knowledge of markets for stolen goods and their dynamics are impoverished. Finally, it suggests that a broad range of regulatory strategies can be brought to bear on these markets in order to influence the behaviour of actors within them.
APA, Harvard, Vancouver, ISO, and other styles
10

Shahin, Ayman Aly. "Sachfahndung nach einem Raubmord in Saqāwa." Der Islam 98, no. 1 (2021): 175–80. http://dx.doi.org/10.1515/islam-2021-0007.

Full text
Abstract:
Abstract This article presents the edition of a late 3rd/9th- or early 4th/10th-century search warrant for stolen goods (P.Cair.EgLib.inv. 536v). The scribe reports that two black men (aswadayn) were traveling on two donkeys, one of which was also loaded with a saddlebag of money, jewellery and clothes. Upon reaching the Upper Egyptian village of Saqāwa, the two black men were assaulted and murdered, and the goods and donkeys stolen. This document corroborates descriptions in historical works of frequent rebel attacks in various regions of Egypt in the 3rd/9th and 4rd/10th centuries.
APA, Harvard, Vancouver, ISO, and other styles
11

Gallagher, Steven. "“Purchased in Hong Kong”: Is Hong Kong the Best Place to Buy Stolen or Looted Antiquities?" International Journal of Cultural Property 24, no. 4 (2017): 479–96. http://dx.doi.org/10.1017/s0940739117000224.

Full text
Abstract:
Abstract:The looting of antiquities from archaeological sites has received widespread coverage in the media. Concerns about the loss of heritage have resulted in international multilateral and bilateral agreements intended to prevent the illicit trade in looted antiquities. China has suffered from the looting of its archaeological sites for centuries, but the problem has been exacerbated in recent years because of the increased demand for Chinese antiquities and the consequent sharp increase in market prices. China has requested international assistance to combat the illicit trade in its heritage. It is strange therefore that one of China’s special administrative regions—Hong Kong—also one of the world’s major art markets, retains a “legal absurdity,”1which may protect the buyer of stolen or looted goods from claims for the return of stolen items. This statutory provision may result in the bizarre outcome that goods stolen from a museum or looted from an archaeological site and then purchased from a shop or market in Hong Kong may be protected from claims for their return; this protection may apply even if the loser is the Chinese state.
APA, Harvard, Vancouver, ISO, and other styles
12

Kacprzak, Agnieszka. "SPRZEDAŻ RZECZY KRADZIONEJ." Zeszyty Prawnicze 2, no. 1 (2017): 93. http://dx.doi.org/10.21697/zp.2012.2.1.03.

Full text
Abstract:
THE SALE OF STOLEN GOODSSummary The most complex analysis of the legal consequences resulting fromthe sale of stolen goods can be found in the Digest 18,1,34,3. Paul frames three separate hypotheses, in which the solutions differ depending on whether the contracting parties, or at least one of them, when stipulating the contract, were aware that the goods for sale had been stolen. If both parties were aware that the object of sale was res furtiva, the contract was void, i.e. neither party was obliged towards the other. Where only the buyer was aware of the circumstances then the seler was not bound by the contract. However, only if he voluntarily delivered his performance, could he demand payment. If only party aware that the goods were stolen was the seller, whereas the buyer concluded the contract in good faith, the sale was valid as a whole. This judgement conforms with the opinion of earlier jurisprudence, especially that of Pomponius.The question of what reason underpinned the jurists’ decision on the invalidity of sale, which had res furtiva as an object and was concluded by the parties aware of this fact, appears the first problem to be solved. I would rather dismiss the notion that such a solution could have been based either on the idea of impossibility of performance or on the mere mala fides of the contracting parties.Given that the seller was not bound to transfer ownership to the buyer, the execution of the contract of sale, the object of which was res furtiva, had to be considered possible. Neither does it seem plausible that the invalidity of the contract was provoked merely by the mala fides of the parties. It would be difficult indeed to speak of one party’s bad faith, if there is no good faith to be protected on the other side of the contract.In all probability the objective the jurists had in mind when excluding the validity of a deliberate sale of res furtivae, was to stop the circulation of such goods and render it easier for the owners to recover them. Therefore a deliberate sale of a stolen thing must have been considered invalid on the ground that it tended to violate one of the principles of legal order and hence was contra bonos mores.From the analysis of the three hypotheses considered by Paul results, that the validity of the sale of res furtiva depended on the good faith of the purchaser. Wherever he was unaware that the object of sale had been stolen, the contract was valid, irrespective of the good or bad faith of the seller. On the contrary, if the purchaser was aware, that the object of sale was res furtivay the contract was void in principle. The seller however, if in good faith, was granted the possibility to convalidate it by spontaneous performance.The reason for such a differentiation was probably the fact, that of the two reciprocal performances, which constituted the substance of the contract of sale, only the one, to which the seller was obliged, could violate the legal order and thus was considered defective. Therefor it was precisely the claim of the purchaser, trying to force such an execution in spite of His knowledge of the status of the goods, that was contra bonos mores and hence invalid. In such a situation the seller was not obliged to deliver his performance. Considering the principle of reciprocity of the contract of sale, one must conclude, that the purchaser could not be obliged towards the seller either, and thus, in principle, the whole contract was void.On the other hand, even though the seller could not have been forced to deliver his performance, he did have the possibility to deliver it voluntarily. In such a case, on the basis of the principle of reciprocity, he could claim payment from the purchaser. On this basis the contract became valid.
APA, Harvard, Vancouver, ISO, and other styles
13

Patel, Tina G. "Hot Goods in Happy Hands: Occasional User Accounts and Motivations for Buying Stolen Goods." Journal of Human Behavior in the Social Environment 23, no. 4 (2013): 500–513. http://dx.doi.org/10.1080/10911359.2013.773202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hickey, Robin. "Stealing abandoned goods: possessory title in proceedings for theft." Legal Studies 26, no. 4 (2006): 584–601. http://dx.doi.org/10.1111/j.1748-121x.2006.00031.x.

Full text
Abstract:
Where it is accepted in proceedings for theft that ownership of the goods allegedly stolen had been abandoned at the time they were taken, criminal courts must make determinations about the possibility of any other prior title to those goods. If a conviction for theft of abandoned goods is to be safe, the court must find a proprietary right or interest in some person other than the relinquishing owner or the defendant. This paper reviews the criminal and civil law authorities on the problem of lost or abandoned goods, and argues for a uniform approach to resolving such questions of title using the ordinary common law rules of possession.
APA, Harvard, Vancouver, ISO, and other styles
15

Aniello, Sara, and Stefano Caneppele. "Selling stolen goods on the online markets: an explorative study." Global Crime 19, no. 1 (2017): 42–62. http://dx.doi.org/10.1080/17440572.2017.1418333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Battersby, Graham. "The Sale of Stolen Goods: A Dilemma for the Law." Modern Law Review 54, no. 5 (1991): 752–57. http://dx.doi.org/10.1111/j.1468-2230.1991.tb02669.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kammersgaard, Tobias, Marie Bruvik Heinskou, and Jakob Demant. "Buying stolen goods: the ambiguity in trading consumer-to-consumer." Journal of Scandinavian Studies in Criminology and Crime Prevention 18, no. 1 (2017): 93–100. http://dx.doi.org/10.1080/14043858.2017.1305039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Akmam, Noor Rashid Mir, and Siti Nursyakirah Yuslan. "INTERNATIONAL LAW OF SMUGGLING." International Journal of Law Reconstruction 3, no. 2 (2019): 96. http://dx.doi.org/10.26532/ijlr.v3i2.7792.

Full text
Abstract:
Smuggling is the act of carrying goods or people illegally and hidden, like out of a building, into jail, or through of border, Contrary to the law or other regulations. Smuggling encouraged various reasons. These include illegal trade, such as drugs, Immigration and illegal migration, avoid excise, Smuggling of illegal goods to prisoners, or smuggling stolen goods. Another example is the financial motive for it is not like bringing banned items past a security checkpoint (as in airfield) or removal of confidential documents from the state or government officials. Type the smuggling of goods, people and wild creatures.
APA, Harvard, Vancouver, ISO, and other styles
19

Papadakis, Nikos, Nikos Koukoulas, Ioannis Christakis, Ilias Stavrakas, and Dionisis Kandris. "An IoT-Based Participatory Antitheft System for Public Safety Enhancement in Smart Cities." Smart Cities 4, no. 2 (2021): 919–37. http://dx.doi.org/10.3390/smartcities4020047.

Full text
Abstract:
The risk of theft of goods is certainly an important source of negative influence in human psychology. This article focuses on the development of a scheme that, despite its low cost, acts as a smart antitheft system that achieves small property detection. Specifically, an Internet of Things (IoT)-based participatory platform was developed in order to allow asset-tracking tasks to be crowd-sourced to a community. Stolen objects are traced by using a prototype Bluetooth Low Energy (BLE)-based system, which sends signals, thus becoming a beacon. Once such an item (e.g., a bicycle) is stolen, the owner informs the authorities, which, in turn, broadcast an alert signal to activate the BLE sensor. To trace the asset with the antitheft tag, participants use their GPS-enabled smart phones to scan BLE tags through a specific smartphone client application and report the location of the asset to an operation center so that owners can locate their assets. A stolen item tracking simulator was created to support and optimize the aforementioned tracking process and to produce the best possible outcome, evaluating the impact of different parameters and strategies regarding the selection of how many and which users to activate when searching for a stolen item within a given area.
APA, Harvard, Vancouver, ISO, and other styles
20

Casola, Luca, Simon Kemp, and Alexander Mackenzie. "Consumer decisions in the black market for stolen or counterfeit goods." Journal of Economic Psychology 30, no. 2 (2009): 162–71. http://dx.doi.org/10.1016/j.joep.2008.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Montague, Dena. "Stolen Goods: Coltan and Conflict in the Democratic Republic of Congo." SAIS Review 22, no. 1 (2002): 103–18. http://dx.doi.org/10.1353/sais.2002.0016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sheley, Joseph F., and Kenneth D. Bailey. "New directions for anti-theft policy: Reductions in stolen goods buyers." Journal of Criminal Justice 13, no. 5 (1985): 399–415. http://dx.doi.org/10.1016/0047-2352(85)90041-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Librett, Jeffrey S. "Stolen Goods: Cultural Identity after the Counterenlightenment in Salomon Maimon's Autobiography (1792)." New German Critique, no. 79 (2000): 36. http://dx.doi.org/10.2307/488597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Callahan, Kathy. "On the Receiving End: Women and Stolen Goods in London 1783–1815." London Journal 37, no. 2 (2012): 106–21. http://dx.doi.org/10.1179/174963212x13345262125678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Merrett, Louise. "THE IMPORTANCE OF DELIVERY AND POSSESSION IN THE PASSING OF TITLE." Cambridge Law Journal 67, no. 2 (2008): 376–95. http://dx.doi.org/10.1017/s0008197308000354.

Full text
Abstract:
The dilemma facing the law when two innocent parties have suffered at the hands of a wrongdoer is well known and arises acutely in the context of the sale of goods. Typically, in the classic simple three party situation: the owner of goods either gives goods to or has goods stolen by a rogueseller who purports to sell them to an innocent third party buyer. Both the owner and buyer of the goods may well have a personal claim against the seller, but if the seller has either disappeared or has no money that personal claim may well be worthless. As a result, the question of who is entitled to the goods themselves is likely to determine which party will suffer as a result of the seller's actions. The crucial issue is who in this situation is entitled to the goods: this is a question of conflict of title or priority. Who has a better title to the goods, the owner or the buyer?
APA, Harvard, Vancouver, ISO, and other styles
26

Green, Stuart P. "Thieving and Receiving: Overcriminalizing the Possession of Stolen Property." New Criminal Law Review 14, no. 1 (2011): 35–54. http://dx.doi.org/10.1525/nclr.2011.14.1.35.

Full text
Abstract:
Historically, Anglo-American law has treated the offense of receiving stolen property in a variety of ways: it has regarded it as no crime at all; subjected it to accessory-after-the-fact liability; and treated it as a free-standing offense, subject, depending on the jurisdiction, to less punishment than theft, the same punishment as theft, or greater punishment than theft. To develop an analytical framework for determining which of these various approaches makes the most sense, we need to ask exactly what receiving statutes are meant to censure and deter. From a backward-looking perspective, receivers can be said to perpetuate the wrongful deprivation of the victim owner's property rights, effected in the first instance by the thief. From a forward-looking perspective, the act of receiving can, at least in some cases, be said to encourage the commission of future thefts by helping to create a ready market for stolen goods. The problem is that the offense in its current statutory formulation reflects only the backward-looking perspective, requiring nothing more than that the offender possess or receive stolen property (knowing that it is stolen), and saying nothing about the future effects of his act. And because perpetuating an owner's loss of property is a lesser wrong than causing him to lose his property to begin with (or so it will be argued), the receiver deserves less blame and punishment than the thief. Yet many modern statutes subject receiving to at least as much punishment as thieving. To avoid such disproportionality, various reforms in the law of receiving are recommended.
APA, Harvard, Vancouver, ISO, and other styles
27

Barber, Jill. "‘Stolen Goods’: The Sexual Harassment of Female Servants in West Wales during the Nineteenth Century." Rural History 4, no. 2 (1993): 123–36. http://dx.doi.org/10.1017/s095679330000025x.

Full text
Abstract:
‘How came I to be his property? What right has he in me, but such as a thief may plead to stolen goods?’ cried Pamela, the virtuous servant maid of Richardson's novel. Pamela was written in 1740, but the assumption that masters had sexual rights over their servants cast a long shadow. The questions Pamela raises about powerlessness and ‘worth’ are crucial to understanding the plight of female servants in the nineteenth century. This study examines why servants were particularly vulnerable to sexual harassment, the consequences of sexual abuse for victims and offenders, and underlying male attitudes which affected both the incidence of assaults and the justice meted out by the courts.
APA, Harvard, Vancouver, ISO, and other styles
28

KIM KYUNG RAK. "The Stealing on the Stolen Goods andthe Interests Protected by Law of Theft." Korean Lawyers Association Journal 65, no. 1 (2016): 90–128. http://dx.doi.org/10.17007/klaj.2016.65.1.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zize, Zhang. "Analysis on Criminal Governance of Bitcoin-related Corruption Cases." Economics, Law and Policy 4, no. 1 (2021): p37. http://dx.doi.org/10.22158/elp.v4n1p37.

Full text
Abstract:
Bitcoin is extremely easy to be used in corruption cases due to its pseudonym, easy circulation, easy cross-border and other characteristics. As a decentralized electronic account book, the circulation of regulatory funds is jointly confirmed by each node in the bitcoin network, which can ensure the authenticity of the criminal evidence and is not easy to be lost or damaged. It provides great convenience for evidence collection in bitcoin corruption cases. However, there are also shackles in criminal governance, such as how to prove the subjective intent of the bribe takers, the impact of fluctuations in market value on the identification of the case and, most importantly, how to effectively recover stolen goods across borders. Therefore, the difficulty of bitcoin-related cases does not lie in the “anonymity” that some scholars believe, but lies in the determination of subjective intent, the determination of the amount of the crime and the international judicial assistance in recovering the stolen money.
APA, Harvard, Vancouver, ISO, and other styles
30

Hulsewé, A. F. P. "The Wide Scope of Tao 盜 ‘Theft,” in Ch'in-Han Law". Early China 13 (1988): 166–200. http://dx.doi.org/10.1017/s0362502800005241.

Full text
Abstract:
This discussion of the different malfeasances subsumed under the general term “theft” in Ch'in-Han law is based on the Shih chi, the Han shu, and the Hou Han shu and their early commentaries, as well as on the Han commentaries to the Classics. Besides common theft and robbery, “theft” included bribery and corruption, receiving stolen goods, intimidation and embezzling, and, it seems, smuggling certain items. As far as possible, actual cases are quoted in illustration.
APA, Harvard, Vancouver, ISO, and other styles
31

Vilacheva, M. N., and N. V. Yashkova. "THEFT OF CARGO FROM RAILWAY ROLLING STOCK: ISSUES OF QUALIFICATION AND INVESTIGATION." Bulletin of Udmurt University. Series Economics and Law 29, no. 5 (2019): 668–72. http://dx.doi.org/10.35634/2412-9593-2019-29-5-668-672.

Full text
Abstract:
The questions of qualification and investigation of theft of goods from the rolling stock are revealed. The main factors causing qualification of such crimes under articles 158, 159 and 160 of the Criminal code of the Russian Federation are investigated. The obligatory signs of crimes, such as time, place, means of commission of crime, the size of the stolen property are revealed. Reasonable conclusions are made that the qualification of theft of goods from the rolling stock of railway transport, as well as the definition of the circle of persons potentially involved in the commission of the crime, is largely influenced by the place and time of the crime, the circumstances (type of car, other features), the amount of stolen property, means of committing the crime. The analysis of the practice of qualification of thefts from the rolling stock of railway transport shows that in various investigative situations it is necessary to speak about its private varieties that will allow to qualify a crime more precisely and to organize the process of proving more effectively. It is concluded that for the most complete qualification of crimes related to the theft of cargo from rolling stock cars a thorough analysis of the circumstances that influenced the initiation of a criminal case, as well as investigative situations, is of particular relevance. Proposals were made to improve the norms of the criminal law.
APA, Harvard, Vancouver, ISO, and other styles
32

Lowe, Corey, and Michelle Bebber. "Tracking Trafficked Antiquities." Practicing Anthropology 37, no. 2 (2015): 27–30. http://dx.doi.org/10.17730/praa.37.2.h116867832618422.

Full text
Abstract:
The primary aim of this paper is to relate the results of a test conducted by the authors designed to evaluate an idea proposed by Alexander (2008). He suggested creating facsimiles of archaeological artifacts and embedding them with tracking devices such as Radio Frequency Identification Devices (RFID). The duplicates would then be stolen or otherwise given to looters thinking them the genuine articles. By moving the tracked artifacts with genuine goods, the culprits would then unwittingly betray the location of their warehouses and trade routes.
APA, Harvard, Vancouver, ISO, and other styles
33

Kumala, Denny Lukianto, and Soetam Rizky Wicaksono. "RANCANG BANGUN SISTEM INFORMASI PERSEDIAAN BAHAN BAKU DAN ADMINISTRASI GUDANG MAJEMUK (STUDI KASUS KAROSERI PT. XYZ MALANG)." Jurnal Ilmiah Informatika 2, no. 2 (2017): 146–52. http://dx.doi.org/10.35316/jimi.v2i2.467.

Full text
Abstract:
In the manufacturing process Bus and Mini Bus, a lot of the raw materials required. Raw materials are stored at many warehouses (especially on Body PT. XYZ Malang). Materials / goods are highly vulnerable to lost or stolen. The most influential factor in it is the counting system inventory / materials and administration. These changes will have an impact on the process of goods more accurate calculation based on the demand of production. Losses will have a greater likelihood of being used if the system can not address the calculation of the goods/raw materials better.And administration system that can cope with the calculation of the goods/raw materials are better here is a system that can calculate expenditures for production based on the incoming bill alone, and can calculate the receipt of goods in accordance with the letter received by the supplier. The system can also provide reports based on existing transactions during a certain period.With the inventory system and the administration is then the difference between the goods that previously occurred can be minimized and raw material inventory accounting system can work better.
APA, Harvard, Vancouver, ISO, and other styles
34

Nababan, Roida, Martono Anggusti, and Sonya Lorensa Sirait. "PERLINDUNGAN HUKUM TERHADAP KONSUMEN YANG MENGALAMI KERUGIAN AKIBAT PENGIRIMAN BARANG OLEH PERUSAHAAN EKSPEDISI LAUT MENURUT UNDANG-UNDANG NOMOR 8 TAHUN 1999 TENTANG PERLINDUNGAN KONSUMEN." NOMMENSEN JOURNAL OF LEGAL OPINION 2, no. 01 (2021): 12–23. http://dx.doi.org/10.51622/njlo.v2i01.206.

Full text
Abstract:
The responsibility of the shipping company in reimbursing losses suffered by consumers in the delivery of goods resulting from damage to goods or loss of goods then looking for evidence that damage and loss of goods occur due to transportation of goods to the detriment of the consumer in accordance with Article 188 of Law No. 22 of 2009 concerning Road Traffic and Transportation and Article 1 number 1 of Law No.8 of 1999 concerning Consumer Protection.
 From the results of the study it can be concluded that first, if the goods transported are lost / stolen or damaged due to the fault of the transporting company, then he must be responsible. Second, the legal efforts undertaken by the consumer, namely the resolution of disputes outside the court, the peaceful settlement of disputes by the parties to the dispute is a legal remedy that was first attempted by the parties to the dispute, before the parties chose to settle the dispute through the Consumer Dispute Settlement Agency. The results of the study the authors provide advice to protect consumers, shipping companies responsible for compensation for goods / or services must be replaced with the actual price of goods in accordance with the law by looking at a written contract that is agreed between the business actor and the consumer.
APA, Harvard, Vancouver, ISO, and other styles
35

Radcliffe, Julian. "The Art Loss Register." Art Libraries Journal 29, no. 2 (2004): 37–40. http://dx.doi.org/10.1017/s0307472200013602.

Full text
Abstract:
Illuminated manuscripts, Islamic books, rare maps and first editions are amongst the many items registered on the Art Loss Register database of stolen art, antiques and collectibles. Once they have catalogued and recorded an object the company’s experienced art historians are able to search the database as part of the process of recovering missing goods. But to maximize the chance of recovery it is essential that each item is carefully and accurately described, and preferably accompanied by an image of the object, and to be most effective this of course needs to be done in advance of theft or other loss.
APA, Harvard, Vancouver, ISO, and other styles
36

Planojevic, Nina. "Acquisition of ownership by non-owners in the draft of common frame of reference study group for European Civil code." Zbornik Matice srpske za drustvene nauke, no. 135 (2011): 279–91. http://dx.doi.org/10.2298/zmsdn1135079p.

Full text
Abstract:
The subject of the paper is analysis of provisions concerning acquisition of ownership by non-owners from the recently presented Book VIII of the Draft of Common Frame of Reference of the Study group for European civil code. These regulative have been commented by the author and compared to the regulative of EU countries, pointing out to similarities, differences as well as discrepancies from solutions. Regulative of acquisition of property by non-owners he considers as divided in six parts: object; legal basis; delivery of goods; self-consciousness of the owner; ownership over the stolen goods and the fortune of the rights of third persons. With slight remarks, the author estimates this project as a complete, purposeful and quality decision. Comparing these decisions of EU countries and those from the Draft, he also estimates the reception of these decisions in Serbia as well, as prospective EU member.
APA, Harvard, Vancouver, ISO, and other styles
37

Chelcu, Cătălina. "Stolen wealth, perpetrators and punishments in Moldova (17th century – early 18th century)." Balcanica Posnaniensia. Acta et studia 26 (January 26, 2020): 105–29. http://dx.doi.org/10.14746/bp.2019.26.7.

Full text
Abstract:
For the historical period we refer to, no proper inventories have been made containing the unjustly appropriated goods. They are just mentioned as such or listed, if that was the case, according to the size of the damage. There are also documentary sources in which the object of the theft is less represented, the justice system focusing in those cases rather on the wrongdoers, than on the wrong actions. That is why, the blood money “paid for some reason”, with no other specific details, is quite frequently cited. Rare or frequent, these documents are complaints addressed by the victim to the Prince and his officials, documents in which the perpetrators admitted their fault, or deeds issued by the judicial authority subsequent to the investigation of the criminal act. In discussing the theft of/from the wealth, i.e. from the whole amount of the available goods, we are interested in clarifying some aspects pertaining to a reality that the historian should reconstruct, with all the complexity of its evolution: the motivations of the theft and its circumstances, the types of theft, the social categories involved, the time and space of the misdemeanour, the perpetrators’ punishment. Briefly, the study is about starting to write a history of the reprehensible acts liable to punishments for theft and robbery in 17th and early 18th century Moldavia.
APA, Harvard, Vancouver, ISO, and other styles
38

Stevenson, R. J. "The Stolen Goods Market in New South Wales, Australia: An Analysis of Disposal Avenues and Tactics." British Journal of Criminology 41, no. 1 (2001): 101–18. http://dx.doi.org/10.1093/bjc/41.1.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Szabados, Tamás. "In Search of the Holy Grail of the Conflict of Laws of Cultural Property: Recent Trends in European Private International Law Codifications." International Journal of Cultural Property 27, no. 3 (2020): 323–47. http://dx.doi.org/10.1017/s0940739120000223.

Full text
Abstract:
AbstractMost private international laws do not address cultural property specifically but, instead, apply the general lex rei sitae rule also to artifacts. Legal scholarship has revealed the flaws of the rigid application of the lex rei sitae principle to cultural goods and has proposed alternative connecting factors, such as the lex originis principle, to prevent forum and law shopping in this field. Reacting to the criticisms, some of the more recent private international law codifications have decided on the adoption of specific rules on stolen and illegally exported cultural goods that combine the lex rei sitae and the lex originis rules and provide room for the parties’ autonomy. This article draws the conclusion that these more recent legislative solutions do not necessarily promote legal certainty and predictability with regard to the governing law and are far from being a Holy Grail for the conflict of laws of cultural property, whether on a national level or within the European Union.
APA, Harvard, Vancouver, ISO, and other styles
40

Zwierz, Marta. "O przedmiocie ochrony prawnej przestępstwa paserstwa umyślnego." Problemy Prawa Karnego 30, no. 4 (2020): 39–72. http://dx.doi.org/10.31261/ppk.2020.04.02.

Full text
Abstract:
This paper addresses the problem of classifying the criminal offence of handling stolen goods under the Polish Criminal Code of 1997. Referring to two separate and contradictory views about the crime, the study looks at both of them and attempts to define the subject of legal protection of that criminal offence in the Polish legal system. To this end, the paper also discusses a judgment of 26 June 2014 of the Polish Supreme Court (I KZP 8/14), in which the Supreme Court could not conclusively resolve the issue, creating even more doubts. The author questions the position of the Polish Supreme Court, arguing that it is not supported by either logical or legal arguments which would stem from the long-standing legal tradition. The author further argues that all problems arising from the determination of the good legally protected by the criminal offence as defined in Article 291(1) of the Polish Criminal Code result from the erroneous classification of criminal offences by the Polish lawmaker.
APA, Harvard, Vancouver, ISO, and other styles
41

Frank Klaassen and Christopher Phillips. "The Return of Stolen Goods: Reginald Scot, Religious Controversy, and Magic in Bodleian Library, Additional B. 1." Magic, Ritual, and Witchcraft 1, no. 2 (2008): 135–76. http://dx.doi.org/10.1353/mrw.0.0004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Vargas, Michael A. "Pondering Dysfunctions in Heritage Protection: Lessons from the Theft of theCodex Calixtinus." International Journal of Cultural Property 21, no. 1 (2014): 1–21. http://dx.doi.org/10.1017/s0940739113000295.

Full text
Abstract:
Abstract:TheCodex Calixtinus, the 12th-century manuscript at the heart of Spain’s Camino de Santiago, was stolen, hidden for a year, and then found in a trash can wrapped in newsprint and plastic. The extraordinary theft highlights some dysfunctions in cultural heritage thought and practice. Explored here are questions about exemplars and copies, ambiguities in heritage protection law, problems of proprietorship and commercialization of heritage goods, and administrative negligence in the management of heritage assets. The focus is on Spain, but the questions have broad relevance. This article concludes that one way to better protect movable heritage assets like the codex is to recognize them as part of a broad heritage landscape in which their loss or mismanagement means damage to an entire ecosystem of culture and history.
APA, Harvard, Vancouver, ISO, and other styles
43

Uslaner, Eric M. "Trust but verify: social capital and moral behavior." Social Science Information 38, no. 1 (1999): 29–55. http://dx.doi.org/10.1177/053901899038001002.

Full text
Abstract:
Rational choice approaches suggest that decisions to behave morally depend largely on how people expect others to act. A social capital approach suggests that moral codes, rather than expectations of others, lead people to endorse strong standards of moral behavior. Using the 1981 World Values Study in the United States, I find strong support for the social capital perspective and at best limited backing for the rational choice approach in explaining why people endorse strong standards of moral behavior. Core values such as religion and trust in others, together with a belief that one adheres to the Ten Commandments, lead people to abjure a wide range of “immoral” acts from lying to buying stolen goods and claiming government benefits unfairly.
APA, Harvard, Vancouver, ISO, and other styles
44

Landau, Norma. "Indictment for Fun and Profit: A Prosecutor's Reward at Eighteenth-Century Quarter Sessions." Law and History Review 17, no. 3 (1999): 507–36. http://dx.doi.org/10.2307/744380.

Full text
Abstract:
In the early modern era, the business of England's criminal courts was founded upon charges brought and prosecuted by private individuals. And, as the English realized, private prosecutors posed a problem: how could the English ensure that private individuals would spend their own time and their own money in prosecuting an offender who had committed an offense against the peace of the realm? Parliament's solution was to proffer the carrot: sixteenth-century statute decreed that his prosecution of the thief was, in itself, action sufficient for the owner of stolen goods to recover those goods, while from 1692, statutes offered rewards to successful prosecutors of highway robbers, burglars, coiners, and other specified offenders. In contrast, England's magistrates wielded the stick, binding a plaintiff bringing an accusation of felony to prosecute an indictment against the alleged felon. As a result, private prosecutors of major offenses were both bribed and compelled to prosecute. Private prosecutors of more minor offenses were neither bribed nor compelled to prosecute, and yet they did, nonetheless, prosecute indictments. Why?
APA, Harvard, Vancouver, ISO, and other styles
45

Talvitie, Petri. "Black Markets and Desertion: Soldiers' Criminality in Helsinki 1748-1757." 1700-tal: Nordic Journal for Eighteenth-Century Studies 11 (August 17, 2014): 45–68. http://dx.doi.org/10.7557/4.3083.

Full text
Abstract:
By combining source material from both the military and civilian courts, this article seeks to broaden our view of soldiers’ criminality during the early modern period, especially in garrison towns. Earlier research has stressed soldiers’ propensity to violence and rowdiness. This article, however, highlights soldiers’activity in the urban black markets. The research focuses on mid- eighteenth century Helsinki, which became an important garrison town and naval base after the Russo-Swedish war (1741–1743), which had unfortunate consequences for Sweden. Thousands of soldiers from nearly all corners of Sweden were transported to the town to construct a new sea fortress, Sveaborg. Soldiers were paid badly and, consequently, they had to resort to illegal means, such as stealing and selling stolen goods, to support themselves and their families. Desertion was especially high among enlisted soldiers.
APA, Harvard, Vancouver, ISO, and other styles
46

d’Este, Rocco. "The Effects of Stolen-Goods Markets on Crime: Pawnshops, Property Theft, and the Gold Rush of the 2000s." Journal of Law and Economics 63, no. 3 (2020): 449–72. http://dx.doi.org/10.1086/707785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rasmussen, Josephine Munch. "Securing Cultural Heritage Objects and Fencing Stolen Goods? A Case Study on Museums and Metal Detecting in Norway." Norwegian Archaeological Review 47, no. 1 (2014): 83–107. http://dx.doi.org/10.1080/00293652.2014.899616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

HOWARD, SHARON. "Investigating responses to theft in early modern Wales: communities, thieves and the courts." Continuity and Change 19, no. 3 (2004): 409–30. http://dx.doi.org/10.1017/s0268416004005211.

Full text
Abstract:
This article makes use of the rich deposits of pre-trial documents in the court archives of early modern Wales, focusing on the county of Denbighshire, to investigate attitudes and responses to theft. Qualitative research on this subject tends to emphasize or privilege actively law-enforcing behaviour that led to trials; while that is the inevitable emphasis of court records, I argue that we need to examine witness testimonies more closely in order to understand responses that did not match up to the ideals of vigilance and communal responsibility. Drawing on modern criminological research, I explore ‘suspicion’ and the decision-making processes leading to various outcomes: non-action; investigation and prosecution; alternative resolutions that bypassed the courts. Finally, I explore the everyday ‘world of stolen goods’ and its social and economic rewards in local networks of reciprocal favours, gifts and alliances.
APA, Harvard, Vancouver, ISO, and other styles
49

배미란. "Review on the Constitution of a Crime of Intermediating Stolen Goods -Supreme Court May, 23, 2009 Adjudgment 2009Do1203 Ruling-." Journal of hongik law review 16, no. 4 (2015): 449–71. http://dx.doi.org/10.16960/jhlr.16.4.201512.449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Trianto, Manap, Nur Herjayanti, Moh Dahri Kisman, et al. "Public Perception on the Existence of Macaca hecki and Macaca tonkeana in Protected Forest and Pangi Binangga Nature Reserve of Central Sulawesi." Jurnal Biologi Tropis 21, no. 2 (2021): 534. http://dx.doi.org/10.29303/jbt.v21i2.2769.

Full text
Abstract:
Wildlife is one of the biological natural resources that can be use it sustainably and sustainably, because wildlife is a natural resource renewable or renewable biological (renewable resources). This study aims to determine public perception of the exixtence of Macaca hecki and Macaca tonkeana in Protected Forest and Pangi Binangga Nature Reserve of Central Sulawesi. This research was carried out along the Palu-Parigi trans road which is in the Protected Forest and Pangi Binangga Nature Reserve, Central Sulawesi Province in April - June 2021. The results showed that presence of endemic Sulawesi macaque (M. hecki and M. tonkeana) along the Palu-Parigi trans road which is in the Protected Forest and Pangi Binangga Nature Reserve area causes various problems such as people experiencing unpleasant events with the presence of macaque, stolen goods, enter into community plantations, and damage various types of agricultural crops (avocado, cloves, cocoa, and several other fruits).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography