To see the other types of publications on this topic, follow the link: Traditional Crime.

Journal articles on the topic 'Traditional Crime'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Traditional Crime.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Al-Khafagy, Ali HamzaAsal, and Ali Khudeer Abdul Zahra Hassoon. "أركان جريمة استغلال الوظيفة." Journal of University of Babylon for Humanities 26, no. 8 (November 15, 2018): 489–510. http://dx.doi.org/10.29196/jubh.v26i8.1872.

Full text
Abstract:
The crimes are different according to the different crimes, some of them are limited to traditional elements because they are consistent with the nature of the crime committed, including the need to add a special corner to the character of the actor and based on that idea, the crime of exploiting the job is not limited to traditional elements, but must be preceded by a special corner is the perpetrator, The law requires the offender to have a special status through which or through which to commit this crime. This is stated in the provisions of the Iraqi Penal Code No. (111) of 1969, the amendment of which indicates that the crime of exploiting the job is based on three The second element is the physical element of the conduct of the exploitation of the job and the obtaining of an illegal benefit or benefit under the public service, and the third pillar is the moral pillar (Criminal intent), especially that the crime of exploitation of the job is not limited to a specific country or society without a specific or a certain period of time, but rather linked this crime in various forms of the existence of human society has formed this crime is important and dangerous at various levels and in each country The world has called for the need to develop the appropriate legal formulas to deal with the provisions of this crim.
APA, Harvard, Vancouver, ISO, and other styles
2

Lindberg, Kirsten, Joseph Petrenko, Jerry Gladden, and Wayne A. Johnson. "Traditional Organized Crime in Chicago." International Review of Law, Computers & Technology 12, no. 1 (March 1998): 47–73. http://dx.doi.org/10.1080/13600869855568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Yicheng, Xinyan Zhu, Wei Guo, Ling Wu, and Yaxin Fan. "Anisotropic Diffusion for Improved Crime Prediction in Urban China." ISPRS International Journal of Geo-Information 8, no. 5 (May 20, 2019): 234. http://dx.doi.org/10.3390/ijgi8050234.

Full text
Abstract:
As a major social issue during urban development, crime is closely related to socioeconomic, geographic, and environmental factors. Traditional crime prediction models reveal the spatiotemporal dynamics of crime risks, but usually ignore the environmental context of the geographic areas where crimes occur. Therefore, it is difficult to enhance the spatial accuracy of crime prediction. We propose the use of anisotropic diffusion to include environmental factors of the evaluated geographic area in the traditional crime prediction model, thereby aiming to predict crime occurrence at a finer scale regarding spatiotemporal aspects and environmental similarity. Under different evaluation criteria, the average prediction accuracy of the proposed method is 28.8%, improving prediction accuracy by 77.5%, as compared to the traditional methods. The proposed method can provide strong policing support in terms of conducting targeted hotspot policing and fostering sustainable community development.
APA, Harvard, Vancouver, ISO, and other styles
4

van de Weijer, Steve G. A., Rutger Leukfeldt, and Wim Bernasco. "Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking." European Journal of Criminology 16, no. 4 (May 19, 2018): 486–508. http://dx.doi.org/10.1177/1477370818773610.

Full text
Abstract:
Although the prevalence of cybercrime has increased rapidly, most victims do not report these offenses to the police. This is the first study that compares associations between victim characteristics and crime reporting behavior for traditional crimes versus cybercrimes. Data from four waves of a Dutch cross-sectional population survey are used ( N = 97,186 victims). Results show that cybercrimes are among the least reported types of crime. Moreover, the determinants of crime reporting differ between traditional crimes and cybercrimes, between different types of cybercrime (that is, identity theft, consumer fraud, hacking), and between reporting cybercrimes to the police and to other organizations. Implications for future research and practice are discussed.
APA, Harvard, Vancouver, ISO, and other styles
5

KUMAR, S. S. KARTHIK. "Evolution and Growth of Cyber Crimes: An Analys on the Kerala Scenario." GIS Business 14, no. 3 (June 26, 2019): 196–201. http://dx.doi.org/10.26643/gis.v14i3.4669.

Full text
Abstract:
Crime is a common word that we always hereof in this era of globalization. Crimes refer to any violation of law or the commission of an act forbidden by law. Crime and criminality have been associated with man since time immemorial. Cyber crime is a new type of crime that occurs in these years of Science and Technology. There are a lot of definitions for cyber crime. It is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. In addition, cyber crime also includes traditional crimes that been conducted with the access of Internet. For example hate crimes, telemarketing Internet fraud, identity theft, and credit card account thefts. In simple word, cyber crime can be defined as any violence action that been conducted by using computer or other devices with the access of internet.
APA, Harvard, Vancouver, ISO, and other styles
6

Pan Dunmei. "Criminal Liability of Legal Entities in China: Traditional Approaches and Modern Choices." Russian Journal of Criminology 14, no. 4 (August 31, 2020): 613–22. http://dx.doi.org/10.17150/2500-4255.2020.14(4).613-622.

Full text
Abstract:
Crime committed by a legal entity is an unavoidable social phenomenon in the process of modern socio-economic development in different countries of the world. The crime of a legal entity in modern Chinese criminal law is called a corporate crime. Since the establishment of the people's Republic of China until 1979, only the criminal liability of individuals has been recognized in the field of Chinese criminal law and criminal law theory. Corporate criminal responsibility in the People's Republic of China was established in a completely new historical context: with the development of the commodity economy and market economy in the new China, corporate crimes appeared in public life and gradually spread in the middle and second half of the 1980s, so that regulation through laws became a requirement for the Chinese society to function normally. In this social context, the Standing Committee of the All-China People's Congress has passed a number of laws that provide for corporate crimes. Before the Criminal Code of the People's Republic of China came into force of in 1997, corporate crimes already accounted for about one third of all offences stipulated in specific criminal and non-criminal laws, which lead to the final establishment of corporate criminal responsibility in the new Criminal Code of China. The author analyzes the problem of criminal liability for corporate crimes in the criminal law of the People's Republic of China from the standpoint of traditional theory, as well as predicts the appropriate trends in the future development of theoretical approaches to bringing legal entities to criminal responsibility in a risk society. According to the author, in a risk society, effective prevention of risks in the activities of legal entities is inseparable from the efforts of legal entities themselves, and criminal law, as one of the tools for risk distribution, is aimed primarily not at punishment, but at increasing the motivation of legal entities to achieve this.
APA, Harvard, Vancouver, ISO, and other styles
7

Watt, Rochelle. "University students’ propensity towards white-collar versus street crime." SURG Journal 5, no. 2 (April 22, 2012): 5–12. http://dx.doi.org/10.21083/surg.v5i2.1570.

Full text
Abstract:
While several traditional criminological theories have been used to explain the causes of white-collar crime, few research studies have examined the role that personality plays in explaining the causes of these types of crimes. University students were measured on two personality scales, self-control and desire for control, to determine the extent to which these factors affect the propensity to commit either street crime or white-collar crime. The findings indicate that self-control has the most significant effect on offending, but only when students indicated that they were willing to commit both street crime and white-collar crime. On the other hand, desire for control did not predict a propensity towards committing either type of crime.
APA, Harvard, Vancouver, ISO, and other styles
8

Șinca, George Marius. "CYBERCRIMINOLOGY TRANSITION FROM TRADITIONAL CRIMINAL TECHNIQUES TO CYBERCRIME." Agora International Journal of Juridical Sciences 9, no. 1 (April 23, 2015): 63–70. http://dx.doi.org/10.15837/aijjs.v9i1.1910.

Full text
Abstract:
In the last decade innumerable profound analyses of the cybercrime phenomenon were carried out that have led to predicting a future cyber-attack called the cyber war. Until now there hasn't been a real threat of this kind. From a criminology point of view, these two worlds, the real one and the virtual one, are totally different, so it's up to us, the observers, theoreticians and practitioners to elucidate the connection between these two worlds. The transition to cybercrime by law breakers, made with a minimum effort, minimum investment and resources offered by the wide world users, sees that they could launch themselves into a no limits race.Investigating methods and techniques for traditional crime improved because of the technological evolution within the last years. Unfortunately the phenomenon of transition from traditional crime techniques to cybercrime has not been studied enough. Measures were taken regarding the law breaker and the crime but the research area of studying the cause of crime, remained untouched, which is a great disadvantage for the justice system, both for authority structures and civil ones, leaving behind an opened door for a new superior level of crime.
APA, Harvard, Vancouver, ISO, and other styles
9

Mishra, Banipriya, and Supriya Mishra. "Adaptiveness of Traditional Judicial Systems to Digital Forms of Evidence." International Journal of Engineering and Advanced Technology 10, no. 2 (December 30, 2020): 268–76. http://dx.doi.org/10.35940/ijeat.b2112.1210220.

Full text
Abstract:
“Digital India” scheme announced by current administration initially had many detractors. But with its finger on the correct pulse of Young, Emergent India, much facilitations were provided with the sole aim to bridge technology with the masses. Hence today smart phones, laptops and computers have become house-hold names even in previously inaccessible areas. But on the down-side we also see a severe increase in crimes committed using computers and internet. Technology is an ever-changing phenomenon. It keeps changing, updating and even reviving itself. Crime has parallelly evolved with the evolution of newer technologies and high-end equipments and tool. With the metamorphosis of criminal-activities from physical world to digital realm, a perpetrator can easily plan, execute and accomplish a crime without being actually physically present at the site of crime, thus making it difficult for investigators, law enforcement officials and traditional legal systems completely depending on physical evidence to recognize the real culprit or to determine guilt and decide the degree of punishment. Using a desktop system or a laptop or even a Smartphone, the criminal can exploit the power of internet, Bluetooth ,Wi-Fi technologies , 4G data-transfer speeds and web-servers to execute an unlawful act sitting miles away from the place where the actual crime happens thereafter leaving absolutely no physical trail of the execution of the offence. Under these conditions, it becomes imperative to utilize digital footprints as they are the only way to determine the factuality of execution of an unlawful act and to identify the real culprit. As the guiding principle of IPC goes "Innocent until proven guilty", digital footprints have to be given their rightful due in the existing Judicial system to help in confirming execution of an unlawful act, detecting the actual culprit and determining the amount of punishment. This paper attempts to highlight the significance of digital footprints and usage of the same by the existing Justice Systems to corroborate, attest and substantiate the execution of an unlawful act.
APA, Harvard, Vancouver, ISO, and other styles
10

Kadir, Rizgar Mohammed. "The Scope and the Nature of Computer Crimes Statutes - A Critical Comparative Study." German Law Journal 11, no. 6 (June 1, 2010): 609–32. http://dx.doi.org/10.1017/s2071832200018757.

Full text
Abstract:
When computer crime statutes had yet to be enacted, computer crimes were subjected to traditional criminal laws. This policy resulted in greater expense and other considerable difficulties. These problems and difficulties paved the way for the emergence of a consensus calling for legislators to intervene and enact specific computer crime legislation suited to confronting this new type of criminal activity. Many countries in the world responded by enacting new criminal legislation and many others are on their way to take similar legislative steps.For the legislative intervention to be sound and successful two major questions should be adequately addressed; the scope of legislative intervention and the nature of computer crime legislation enacted. Regarding the first question, new criminal provisions are needed only to cover those crimes that are unique to computers themselves, other crimes in which a computer is used simply as an instrument for perpetration are either covered by existing criminal provisions or can be covered by simple amendments of said provisions. Another step that should be taken by legislators is the amendment of existing criminal laws with an aim to cover some special cases such as the cases in which the computer is used as an instrument for committing known traditional crimes, making the perpetration of such crimes easier or resulting in more dangerous consequences compared to their more traditional forms and cases in which intangible digitized property comes under threat from criminal activities.While many countries in the world have soundly followed such a method in dealing with computer related misconducts legislatively, others have failed to do so. In some countries, the legislator has criminalized some criminal conducts that have long since been criminalized by that country's penal code. This creates conflict between criminal provisions, posing problems to prosecutors and courts alike.Regarding the nature of computer crime statutes, the legislator is presented with two options. The first is the inclusion of the aforementioned criminal provisions in one separate code as one specific computer crime statute. The second is inserting substantive criminal provisions related to computer crimes into the existing penal law of the country. While the first method preserves the unity of substantive criminal law of the country in one code and prevents the dispersion of criminal provisions into many separate laws, the second one would, by contrast, create much-needed public awareness of computer crime.
APA, Harvard, Vancouver, ISO, and other styles
11

Abramova, Irina. "THE FUNDING OF TRADITIONAL ORGANISED CRIME IN RUSSIA." Economic Affairs 27, no. 1 (March 2007): 18–21. http://dx.doi.org/10.1111/j.1468-0270.2007.00704.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Tade, Oludayo, and Faisol Olaitan. "Traditional structures of crime control in Lagos, Nigeria." African Security Review 24, no. 2 (April 3, 2015): 138–52. http://dx.doi.org/10.1080/10246029.2015.1023325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Shanti, Davina. "A New State of Organized Crime." Journal of Intelligence, Conflict, and Warfare 3, no. 1 (May 30, 2020): 13. http://dx.doi.org/10.21810/jicw.v3i1.2359.

Full text
Abstract:
Organized crime is often associated with traditional criminal groups, such as the mafia or outlaw motorcycle gangs; however, new research suggests that cybercrime is emerging as a new branch of organized crime. This paper is focused on the changing nature of organized crime and the factors that influence this shift, particularly in the online space. It will address the question: Can the law identify cybercrime as organized crime? The results of this paper are informed by an in-depth analysis of peer-reviewed articles from Canada, the United States (US), and Europe. This paper concludes that cybercrime groups are structured and operate similarly to traditional organized crime groups and should, therefore, be classified as a part of traditional organized crime; however, cybercrime groups are capable of conducting illicit activities that surpass those typically associated with traditional organized crime. This shift suggests that these groups may represent a larger threat creating a new challenge for law enforcement agencies.
APA, Harvard, Vancouver, ISO, and other styles
14

Campbell, Carol S., and James W. Robinson. "Family and Employment Status Associated with Women's Criminal Behavior." Psychological Reports 80, no. 1 (February 1997): 307–14. http://dx.doi.org/10.2466/pr0.1997.80.1.307.

Full text
Abstract:
Exploring the relationship between women's criminal behavior as evidenced in violence, type of crime, prior criminal history, and the fulfillment of traditional female roles delineated by marital status, employment status, or presence of children in the home of the woman was based on the evaluation of 141 female inmates, which indicated a limited relationship between fulfilling traditional female roles and the nature of female criminal activity. Married and previously married subjects tended to be involved primarily with murder and secondarily with theft Single subjects were involved primarily with theft and secondarily involved with robbery. Employed subjects were more likely to be involved with theft and nonviolent crime. Unemployed subjects were more likely to be involved in violent crimes.
APA, Harvard, Vancouver, ISO, and other styles
15

Stamatel, Janet P. "The influence of political and economic changes on macro-level property crime variation: The case of post-communist Central and Eastern Europe." Criminology & Criminal Justice 17, no. 5 (December 28, 2016): 526–45. http://dx.doi.org/10.1177/1748895816683990.

Full text
Abstract:
The goal of this article was to assess the extent to which major changes in the political and economic systems of Central and Eastern European countries after the fall of communism contributed to variations in property crime rates, controlling for other structural predictors. Data for 17 countries from 1990–2003 were collected for three types of property crimes: total theft; motor vehicle theft; and domestic burglary. Traditional predictors derived from modernization and routine activities theories produced inconsistent results, but political and economic changes due to the post-communist transformations were significant predictors of property crime variation. Economic changes toward liberalization, marketization, and privatization were strongly, positively related to higher property crime rates across all three types. Political changes toward democratization were only positively related to higher domestic burglary rates. The control variables were weak and inconsistent predictors of all three property crimes. The article discusses some of the implications of these findings for updating macro-level crime theories.
APA, Harvard, Vancouver, ISO, and other styles
16

Marine, Frank J. "The effects of organized crime on legitimate businesses." Journal of Financial Crime 13, no. 2 (April 1, 2006): 214–34. http://dx.doi.org/10.1108/13590790610660926.

Full text
Abstract:
PurposeThe purpose of this paper is to examine the development and nature of organized crime in the USA over the past 50 years, emphasizing organized crime's corruption and victimization of legitimate businesses and describing law enforcement's efforts to combat organized crime through specific case studies.Design/methodology/approachFirst, the paper analyzes the control over and corruption of legitimate businesses in the USA by the La Cosa Nostra (“LCN,” or the American Mafia), including the following industries: Las Vegas gaming; moving and storage; garment; waste – hauling; and, construction, and the following unions: the International Brotherhood of Teamsters; Laborers International Union of North America; and, the International Longshoreman's Association. The paper also describes law enforcement's successful efforts to combat such corruption through the use of criminal and civil racketeering laws and specific prosecutions. The paper then discusses the emergence in the mid‐1980s of non‐traditional organized crime groups in the USA, including various Asian ethnic groups and large‐scale human trafficking organizations that impact Europe and Asia as well as the USA.FindingsThe non‐traditional criminal groups not only prey on the legitimate businesses in ethnic Asian communities in the USA, but they also engage in complex crimes, alien smuggling, drug trafficking, credit‐card frauds, money laundering, and other financial crimes. There has emerged a new era for organized crime that began in the 1990s with the fall of the former Soviet Union and the emergence of transnational organized crime groups emanating from the nations comprising the former Soviet Bloc. These organized crime groups engage in a wide variety of economic crimes including extortion, fraud, illicit appropriation of natural resources, and public corruption. Such extensive corruption threatens the stability of some of these emerging nations.Originality/valueThis paper will be valuable to law enforcement offices and policy makers to assist them to understand the scope and nature of organized crime's adverse effects upon businesses and economic interests and to develop tools to combat such criminal activities.
APA, Harvard, Vancouver, ISO, and other styles
17

Gombiro, Cross, Mmaki Jantjies, and Nehemiah Mavetera. "A conceptual framework for detecting financial crime in mobile money transactions." Journal of Governance and Regulation 4, no. 4 (2015): 727–34. http://dx.doi.org/10.22495/jgr_v4_i4_c6_p8.

Full text
Abstract:
Mobile money has made it possible for the unbanked to access financial service to areas previous not accessibly to traditional banking systems. Africa in particular, has indeed seen a growth in use of such services owing to the high penetration of mobile phones. While traditional banking services have been well regulated and secured, mobile money services are still new and vulnerable. Also, attacks and crimes targeting the internet, new technologies and new methods of payments have become sophisticated. This scenario requires novel proactive, real time techniques and solutions to detect financial crimes in mobile money transactions (MMT). The Financial Action Task Force (FATF) 2012 requires mobile money to be subject for monitoring and for compliance. Payment systems have evolved from hard cash, to credit cards, debit cards and now to the M-money, there are several approaches that have been used to detect financial crime in platforms such as credit cards and in the traditional banking system. However, most of these approaches are not suitable for m-money methods. A conceptual framework for detection of mobile money financial crime is proposed. The framework incorporates data mining techniques, big data analytics, Know Your Customers, historical databases and a knowledge base among other things.
APA, Harvard, Vancouver, ISO, and other styles
18

Takyi, Emmanuel A., Seun Daniel Oluwajana, and Peter Y. Park. "Development of Macro-Level Crime and Collision Prediction Models to Support Data-Driven Approach to Crime and Traffic Safety (DDACTS)." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 33 (June 17, 2018): 56–66. http://dx.doi.org/10.1177/0361198118777356.

Full text
Abstract:
The number of violent crimes and fatal-injury collisions concerns many jurisdictions. Traditional enforcement tactics are often reactive, relying on historical crime and collision data to select locations for law enforcement. Advanced law enforcement tactics take a proactive approach. Such tactics include Data-Driven Approaches to Crime and Traffic Safety (DDACTS), which uses predicted numbers of crimes and collisions to identify locations for law enforcement. This DDACTS study was conducted in Regina, Saskatchewan, Canada. The research developed macro-level prediction models to predict violent crimes and collisions in each traffic analysis zone (TAZ) in Regina. The zonal nature of the analysis is important for overcoming confidentiality and privacy issues associated with violent crimes and fatal-injury collisions. Fifty-four input variables were used to describe each TAZ’s crimes, collisions, socio-demographic, road inventory, traffic, and land use characteristics. The analysis used negative binomial regression coupled with the empirical Bayes method (a popular approach in transportation, but relatively new to crime mapping) to develop two statistical models that predict the long-term mean value for the number of violent crimes/collisions per zone. Cumulative residual plots were used as the main goodness-of-fit test. The findings are summarized on a map showing the top ten hotzones for violent crimes, the top ten hotzones for fatal-injury collisions, and the zones where the crime and collisions zones overlap. The overlapping zones are the DDACTS zones. By focusing law enforcement in the DDACTS zones, it may be possible to reduce violent crimes and fatal-injury collisions simultaneously and use limited resources more cost effectively.
APA, Harvard, Vancouver, ISO, and other styles
19

Grabe, Maria Elizabeth. "Tabloid and Traditional Television News Magazine Crime Stories: Crime Lessons and Reaffirmation of Social Class Distinctions." Journalism & Mass Communication Quarterly 73, no. 4 (December 1996): 926–46. http://dx.doi.org/10.1177/107769909607300412.

Full text
Abstract:
In recent times, critics have charged that tabloid news emphasizes and sensationalizes criminal behavior - thereby violating the journalistic ideal of providing objective information to the citizens of a democratic society. Yet, these claims have not been subjected to systematic investigation. This study compares tabloid and traditional broadcast news magazine programs in terms of their emphasis on crime and the content of their crime narratives. Results indicate that tabloid shows are more likely than traditional shows to feature crime stories. Both types of programs give crime stories similar prominence, and the content is relatively similar. However, tabloid shows are more likely than traditional shows to present the criminal as belonging to the middle or upper class. By contrast, traditional shows are more likely to present the criminal as belonging to the working class.
APA, Harvard, Vancouver, ISO, and other styles
20

Castro Aniyar, Daniel. "‘Paintings for a Crime’: Composed Cognitive Maps for Measuring Crime and Situation." Journal of Victimology and Victim Justice 2, no. 2 (October 2019): 141–63. http://dx.doi.org/10.1177/2516606919841941.

Full text
Abstract:
The Ecuadorian State implemented policies to improve the quality and reliability of statistical material. Among these materials, composed cognitive maps were innovated and applied. These materials consist of drawings made by witnesses and victims of perceived hostile and dangerous territories that were analyzed through ethnographic and Grounded Theory Method. This process allowed for a deeper understanding of hotspots, associated criminal situations and large victimization patterns throughout the national territory, than traditional ones. The composed cognitive maps and resulting spatial dynamics of crime helped to overcome the gap between the micro and macro level problem in criminology and gave important insights to design crime policies. We briefly describe the experience, compare the method to the traditional ones and give an example of its diagnostic potential compared to regular information managed to day by the police.
APA, Harvard, Vancouver, ISO, and other styles
21

Lydia Jane G. and Seetha Hari. "Crime Prediction Using Twitter Data." International Journal of e-Collaboration 17, no. 3 (July 2021): 62–74. http://dx.doi.org/10.4018/ijec.2021070104.

Full text
Abstract:
As social media platforms are being increasingly used across the world, there are many prospects to using the data for prediction and analysis. In the Twitter platform, there are discussions about any events, passions, and many more topics. All these discussions are publicly available. This makes Twitter the ultimate source to use the data as an augmentation for the decision support systems. In this paper, the use of GPS tagged tweets for crime prediction is researched. The Twitter data is collected from Chicago and cleaned, and topic modelling is applied to the resultant set. Before topic modelling, an algorithm has been developed to identify tweets that are relevant to the crime prediction problem. Once the relevant tweets are identified, topic modelling is applied to find out the major crimes in the different beats of Chicago. Kernel density estimation (KDE) is applied to traditional data. The result of this and topic modelling are used to predict the crime count for each beat using logistic regression.
APA, Harvard, Vancouver, ISO, and other styles
22

Bulatovic, Aleksandra. "Restorative justice and the relationship of perpetrator and victim of crime." Temida 18, no. 3-4 (2015): 131–44. http://dx.doi.org/10.2298/tem1504131b.

Full text
Abstract:
Restorative justice as the theoretical foundation of social reaction to crime is one of the key themes of contemporary criminological discourse. The idea of crime as a conflict between perpetrator and victim of crime is included in the core ideas related to the concept of restorative justice, which differs from traditional understanding of crime as a relationship between the state and the individual. This change in perspective on crime points towards social reaction to crime that differs from traditional criminal justice system. As the restoration process of relationship damaged by crime is directly related to possibilities of participation in the very process, institutionalisation of that participation sets the scope of restorative process. In this article, the author points towards the traditional criminal justice and restorative justice processes, focusing the relationship of perpetrator and victim of crime and the process of conflict resolution. The aim of the article is to highlight the conflict perspective as a defining element of the relationship between offender and victim, and to underline the effectiveness of restorative justice as social reaction to crime, which contributes to optimisation of the relationship between the offender and the community.
APA, Harvard, Vancouver, ISO, and other styles
23

Sukhodolov, Alexander, Sergey Ivantsov, Tatiana Molchanova, and Boris Spasennikov. "Big Data as a Modern Criminological Method of Studying and Measuring Organized Crime." Russian Journal of Criminology 13, no. 5 (October 31, 2019): 718–26. http://dx.doi.org/10.17150/2500-4255.2019.13(5).718-726.

Full text
Abstract:
The paper is devoted to the study, measurement and assessment of organized crime in Russia, and to researching the possibility of using «big data» to analyze crime. As the task of counteracting crime is getting more and more complicated, it becomes necessary to reconsider both the traditional methods of researching crime, and the possibilities of going beyond the boundaries of such methods. The existing forms of state statistical reporting reflect only certain crimes committed by organized criminal groups and, in exceptional cases — by criminal communities. The use of official state statistics to measure the level of organized crime leads to numerous distortions in its evaluation. In some cases, all it can do is indicate the trend. There is no assessment of the actual condition of this criminological problem due to a high complexity of measurements, of choosing the technique of information collection and analysis, as well as the theoretical model of predicting organized crime, forecasting its future trends and regularities. In the last decade, the countries where digital technologies are developing actively have witnessed an intensified interest to the use of computing and intellectual methods of analyzing organized crime. The main achievement of science is that there is a widespread understanding among criminologists involved in research that the existing instruments, methods and programs for the intellectual analysis of structured and unstructured data are sufficient for the transition to computational criminology. «Big data» have a special place in the structure of information technologies. The development of data collection and analysis technologies makes it possible to measure criminality at a conceptually new level. A significant growth in the volume of data, the sources and dissemination tools of which are social objects, leads to the establishment of new technologies of processing the information on crimes. The presented article shows the necessity of using a large volume of structured and unstructured data to study and evaluate qualitative parameters of organized crime. This presents considerable opportunities for using «big data» to predict the trends of future changes in organized crime, as well as for applying new technologies to the theory and practice of preventing organized crime. The prediction and prevention of organized crime are considered to be rather difficult, and sometimes impossible when it concerns finding empirical proof and, moreover, obtaining prediction verification of some or other concept. Consequently, up to now traditional research approaches have not been effective in the sphere of researching organized crime. Meanwhile, law enforcement bodies need knowledge on the structure of crime, on the emergence of new forms of organizing criminal groups, on changes in criminal behavior connected with the technologies of the new technological revolution, etc.
APA, Harvard, Vancouver, ISO, and other styles
24

Sawatsky, Murray J., Rick Ruddell, and Nicholas A. Jones. "A quantitative study of Prince Albert’s crime/risk reduction approach to community safety." Journal of Community Safety and Well-Being 2, no. 1 (March 17, 2017): 3. http://dx.doi.org/10.35502/jcswb.38.

Full text
Abstract:
Faced with escalating crime rates and increasing demands for services, the Prince Albert Police Service led a mobilization effort to implement a crime/risk reduction strategy called Community Mobilization Prince Albert (CMPA). This study examines the evolution of crime prevention practices from traditional police-based practices that rely on focused enforcement practices, to the emerging risk reduction model, wherein police-led partnerships with community agencies are developing responses to the unmet needs of individuals and families facing acutely elevated risk (AER). These community mobilization strategies have resonated with justice system stakeholders throughout Canada, diffusing throughout the nation in a relatively short period of time. This study examines the outcomes of these crime prevention efforts and their results on reducing crime and social disorder and the associated costs of crime to society, after implementation of CMPA in 2011. In order to evaluate the crime reduction efficacy of this approach, crime rates and the costs of crime were examined prior to the adoption of the mobilization efforts and afterwards. We find a statistically significant decrease in the rates of violent and property crimes after the introduction of the community mobilization approach, and the costs to society of these offences also decreased. Given those findings, a number of implications for policy, practice, and future research are identified.
APA, Harvard, Vancouver, ISO, and other styles
25

Zikhali, Whitehead. "Community Policing And Crime Prevention: Evaluating The Role Of Traditional Leaders Under Chief Madliwa In Nkayi District, Zimbabwe." International Journal for Crime, Justice and Social Democracy 8, no. 4 (November 4, 2019): 109–22. http://dx.doi.org/10.5204/ijcjsd.v8i4.1179.

Full text
Abstract:
Community policing is a strategic consideration for contemporary policing, especially when police organisations worldwide increasingly seek cost-effective and sustainable methods of combating crime. The principle of community policing recognises the community and its leaders as equal partners in the prevention and reduction of crime. Hence, there is a need for research to interrogate how different police organisations have considered community policing as a panacea to their policing challenges. This study sought to evaluate the role of traditional leaders in community policing and crime prevention in the community of Chief Madliwa, Nkayi District in Matabeleland North Province of Zimbabwe. Interviews were carried out with eight village heads, four headmen and three key informants. Four focus group discussions were conducted to collect the villagers’ insight on the role of traditional leaders in community policing and crime prevention. Participants were identified using purposive and convenience sampling. The findings revealed that community policing is an effective strategy for crime prevention and that traditional leaders play a pivotal role in the success of community policing and crime prevention. Traditional leaders play an integral role in the recruitment of members of the Neighbourhood Watch Committee, assist with organising the business community to cooperate with the police in the fight against crime and play an important role in organising the community to attend crime awareness campaigns arranged by the police.
APA, Harvard, Vancouver, ISO, and other styles
26

Awais, Muhammad, Sohail Abbas, Farahat Ali, and Ali Ashraf. "Media Exposure and Fear About Crime: An Application of Mediated Fear Model." Journal of Social Sciences Research, no. 67 (July 30, 2020): 720–26. http://dx.doi.org/10.32861/jssr.67.720.726.

Full text
Abstract:
Social behavior can be troubled by the constant concern of crime. Research on the relationship between traditional media crime exposure, social media crime videos, and fear about the crime is scarce. The present study is designed to investigate whether social media exposure, TV news crime viewing, crime drama exposure is directly or indirectly associated to fear about crime. The theoretical framework of the study is based on the mediated fear model and cultivation theory. A sample of 371 university students was selected through a convenience sampling technique. SPSS 25 was used to analyze the data and Model 4 of Process Macro was used to examine the mediating role of the cognitive component of fear of crime (perceived seriousness, perceived risk, and perceived control). The results show that television news crime viewing, crime drama, and social media crime video exposure is positively associated with fear about crime. Moreover, three cognitive components of fear of crime played a mediatory role between traditional media exposure and fear of crime. In addition to this, the relationship between social media crime video exposure and fear about crime was mediated by the cognitive component of fear of crime.
APA, Harvard, Vancouver, ISO, and other styles
27

Vlachopoulos, Konstantinos, Emmanouil Magkos, and Vassileios Chrissikopoulos. "A Model for Hybrid Evidence Investigation." International Journal of Digital Crime and Forensics 4, no. 4 (October 2012): 47–62. http://dx.doi.org/10.4018/jdcf.2012100104.

Full text
Abstract:
With the advent of Information and Communication Technologies, the means of committing a crime and the crime itself are constantly evolved. In addition, the boundaries between traditional crime and cybercrime are vague: a crime may not have a defined traditional or digital form since digital and physical evidence may coexist in a crime scene. Furthermore, various items found in a crime scene may worth be examined as both physical and digital evidence, which the authors consider as hybrid evidence. In this paper, a model for investigating such crime scenes with hybrid evidence is proposed. Their model unifies the procedures related to digital and physical evidence collection and examination, taking into consideration the unique characteristics of each form of evidence. The authors’ model can also be implemented in cases where only digital or physical evidence exist in a crime scene.
APA, Harvard, Vancouver, ISO, and other styles
28

Holton, Richard. "Crime as Prime." Law & Ethics of Human Rights 9, no. 2 (November 1, 2015): 181–93. http://dx.doi.org/10.1515/lehr-2015-0007.

Full text
Abstract:
Abstract Traditional interpretations of legal doctrine have seen the actus reus and the mens rea as independent elements of a crime. Here it is argued that various puzzles surrounding the nature of intent and of attempt can be better addressed if we reject that idea. Following Williamson’s account of knowledge, it is suggested that the two are inseparable. The crime consists in the performance of an intentional act. It follows that an act has been performed and that the performer is in a certain mental state. But these cannot in general exist independently of each other.
APA, Harvard, Vancouver, ISO, and other styles
29

Okunola, Rashidi Akanji, and Adediran Daniel Ikuomola. "Festival of Curses: A Traditional Crime Control Method In Edo State –Nigeria." Issues in Ethnology and Anthropology 7, no. 1 (February 28, 2016): 85–106. http://dx.doi.org/10.21301/eap.v7i1.4.

Full text
Abstract:
Festivals and ceremonies are part and parcel of African culture, usually in all its pump, merriment and pageantry. However, with the increasing wave of criminal activities in Nigeria especially in Edo state, festivals and ceremonies are being redefined and conceptualized in practice. Only recently a new festival ‘Festival of Curses’ was brought to the fore in combating crime in Edo state. The study therefore seeks to explain the festival as a traditional mechanism in crime control, the nature of the festival, the factors that led to its emergence in the 21st century, the level of acceptance and its impact in reducing criminal activities in the State. The study employed principally secondary literature and in-depth interviews among a cross section of the Bini. Major findings revealed that immediately after the festival of curses, a lot of criminals in the state besieged the Bini Monarch’s Palace to confess their atrocities; and pleaded for forgiveness. There was an overwhelming acceptance of the festival irrespective of the people’s religious affiliations to Christianity and Islam as a result of the potency and sudden drop in crime during the period. The study concludes that the festival should be taken as a mechanism of crime control and policing in Nigeria.
APA, Harvard, Vancouver, ISO, and other styles
30

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Full text
Abstract:
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chips; or the subject of the crime, such as ‘hacking’ or ‘cracking’. The involvement of computers may challenge traditional criminal concepts, such as fraud, as well as facilitating particular types of crime, such as child pornography. This article is concerned with the computer as the subject of the crime and with laws that have been established to specifically address activities that attack the integrity of computer and communications networks, such as the distribution of computer viruses. This article examines various initiatives to harmonise substantive criminal law to address the threat of computer integrity crimes, focusing specifically on a draft Council Framework Decision on ‘attacks against information systems’. Consideration is given to the impact the Decision may have when transposed into UK law, through an amendment of existing legislation, the Computer Misuse Act 1990.
APA, Harvard, Vancouver, ISO, and other styles
31

Dănciulescu, Laurenţiu-Andrei. "Empirical Study on the Perception of Organized Crime in Romania." SHS Web of Conferences 95 (2021): 01008. http://dx.doi.org/10.1051/shsconf/20219501008.

Full text
Abstract:
The forms of manifestation of organized crime are threats that affect any society, the most vulnerable being the democracies in the process of formation. Concerning national security is the strategic context in which these non-traditional threats take place [1]. Internally, the new democracies are facing a series of changes: the transition from a totalitarian regime to a democratic regime, from a centralized economy to a market economy. Most strategic documents drawn up and adopted in developed countries to prevent and combat crime have as a priority the fulfillment of four major objectives: anticipation, prevention, deterrence and response. The aim of the paper is to develop methods for investigating organized crime, in order to develop effective strategies for preventing and combating related crimes. The information was collected between September 2019 and November 2019, being analyzed, processed and interpreted afterwards.
APA, Harvard, Vancouver, ISO, and other styles
32

Takata, Susan R., and Ko-lin Chin. "Chinese Subculture and Criminality: Non-traditional Crime Groups in America." Contemporary Sociology 20, no. 2 (March 1991): 272. http://dx.doi.org/10.2307/2072973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cottino, Amedeo. "Crime prevention and control: Western beliefs vs. traditional legal practices." International Review of the Red Cross 90, no. 870 (June 2008): 289–301. http://dx.doi.org/10.1017/s1816383108000258.

Full text
Abstract:
AbstractThis paper raises two main questions. The first concerns the current idea that punishment – conceived as the loss of liberty – has an effect in preventing unlawful behaviour. It can in fact be shown that, in general, sanctions have a poor individual preventive effect. As to general prevention, punishment may be expected to have a deterrent effect when the unlawful behaviour is the result of a rational decision, that is, a decision based on a cost–benefit analysis. However, a wide variety of factors, from group support to situational and systemic factors, may very well counteract the threatening effect of the sanction. The second question concerns the feasibility of non-stigmatizing ways to cope with crime. The few examples borrowed from legal anthropology seem to indicate that viable alternatives exist. But the transfer of a non-Western, indigenous problem-solving process to culturally different contexts is problematic and should be carried out with extreme caution.
APA, Harvard, Vancouver, ISO, and other styles
34

Badiora, Adewumi Israel, Olasunkanmi Habeeb Okunola, and Oluwole Samuel Ojewale. "Crime statistics in a Nigerian Traditional City: A Geographic Analysis." Journal of Asian and African Studies 51, no. 5 (July 28, 2016): 545–59. http://dx.doi.org/10.1177/0021909614552917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Graham, Amanda, Teresa C. Kulig, and Francis T. Cullen. "Willingness to report crime to the police." Policing: An International Journal 43, no. 1 (December 17, 2019): 1–16. http://dx.doi.org/10.1108/pijpsm-07-2019-0115.

Full text
Abstract:
Purpose The purpose of this paper is to understand the reporting intentions of traditional and cybercrime victimization, and the role of procedural justice in explaining sources of variation. Design/methodology/approach Using Amazon’s MTurk program for opt-in survey participation, 534 respondents across the USA considered ten victimization incidents and expressed their likelihood of reporting each incident to the police as well as their belief that the police would identify and arrest the offender. Findings As expected, reporting intentions increased with the seriousness of the incident for both traditional crime and cybercrime. However, reporting intentions were generally slightly higher for incidents that occurred in the physical world, as opposed to online. Likewise, beliefs that police could identify and arrest and offender were lower for cybercrime compared to traditional crime. Consistently, predictors of reporting to the police and belief in police effectiveness hinged heavily on procedural justice. Other predictors for these behaviors and beliefs are also discussed. Originality/value This study uniquely compares reporting intentions of potential victims of parallel victimizations occurring in-person and online, thus providing firm comparisons about reporting intentions and beliefs about police effectiveness in addressing traditional and cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
36

McVeigh, Rory, Carl Neblett, and Sarah Shafiq. "Explaining Social Movement Outcomes: Multiorganizational Fields and Hate Crime Reporting." Mobilization: An International Quarterly 11, no. 1 (February 1, 2006): 23–49. http://dx.doi.org/10.17813/maiq.11.1.g04l4t208770615h.

Full text
Abstract:
Social movement organizations and nonprofit organizations can affect local communities in numerous ways, some of which are intended and some of which are unintended. Assessing the influence of these organizations is complicated because the effect that an organization has on a community depends in part on the attributes of the community in which it is embedded. This article draws attention to the importance of multiorganizational fields in determining social movement consequences through an analysis of hate crime enforcement and reporting in U.S. counties. Qualitative Comparative Analysis (QCA), in combination with more traditional statistical techniques, identifies fifteen configurations of variable attributes that almost always result in reported hate crimes. The analysis shows how measures of civil rights activism, political opportunities, grievances, and multiorganizational fields combine in local settings to produce hate crime reporting with near certainty. Results indicate that the resourcefulness, heterogeneity, and funding sources of the nonprofit sector play a key role in determining whether hate crimes are reported.
APA, Harvard, Vancouver, ISO, and other styles
37

Mansoor, Taskeen, and Rukhsana Hasan. "Gender Differences In The Fear Of Crime Victimization And Precautionary Behaviours." Pakistan Journal of Gender Studies 12, no. 1 (March 8, 2016): 165–78. http://dx.doi.org/10.46568/pjgs.v12i1.206.

Full text
Abstract:
This quantitative study was conducted to explore the gender differences in the fear of crime victimization and associated precautionary behaviours. A questionnaire was designed and administered on 180 students of public and private universities in Islamabad and Rawalpindi. Data analyzed in SPSS showed a significant difference in the responses of males and females where females were more worried and felt more unsafe about being a victim of a crime than males. More females observed precautionary behaviours to avoid being a victim of a crime in relation to the males. The females were fearful of crime related to use of public transport, sexual and gender based attack whereas males feared verbal abuse by strangers or acquaintances. It was discussed that females, being members of a marginalized and vulnerable group, may consider themselves as potential victims to crimes, and therefore exhibit a high fear of crime along with higher incidence of precautionary behaviour. Furthermore, in the patriarchal structure of the Pakistani society, the socio-cultural norms and traditional gender role socialization teach the boys to be dominant, risk-takers and fearless and the girls to be submissive, risk avoiding and fearful which tends to restrict the mobility and freedom of females.
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, Poonam, and Saurabh Mittal. "The Perpetration and Prevention of Cyber Crime." International Journal of Technoethics 3, no. 1 (January 2012): 43–52. http://dx.doi.org/10.4018/jte.2012010104.

Full text
Abstract:
Cyber crime has become an integral part of the transnational threat landscape and conjures up pressing images of nefarious and increasingly complex online activity. More recently, the concept of ‘organized crime’ has been attributed to cyber criminality. There has been subsequent disagreement and confusion concerning whether such crime is a derivation of traditional organized crime or an evolution of such crime within the online space. This paper analyses the opaque state of affairs which has been exacerbated by the relative lack of clear evidence attesting to and supporting either scenario. Technological advances have always been used to the advantage of the criminal fraternity. The crucial question that remains is whether those advances have merely facilitated the commission of physical crime or whether in fact they have led to the creation of a new wave of traditional, but virtual, organized crime. The paper also explores the behavioral ramifications on cyber crime on the informational value of the internet and its usage in consumer with demographic analysis level of its threat and increasing crime rate thus eroding the attractiveness of internet as a viable marketing channel.
APA, Harvard, Vancouver, ISO, and other styles
39

Hauthal, Janine. "Rewriting ‘white’ genres in search of Afro-European identities." English Text Construction 10, no. 1 (June 15, 2017): 37–58. http://dx.doi.org/10.1075/etc.10.1.03hau.

Full text
Abstract:
Presuming that both travel and crime fiction can be described as traditionally ‘white’ genres, this article investigates how contemporary Black British authors appropriate these genres. Focusing on Mike Phillips’s A Shadow of Myself and Bernardine Evaristo’s Soul Tourists, the article examines how the two novels redeem and suspend the traditional racial and national coding of travel writing and crime fiction by rehabilitating black mixed-race characters. In both novels, moreover, the rethinking of traditional popular genres coincides with, and is partly enabled by, a transnational shift in focus from Britain to Europe. A closer look at the novels’ respective endings, finally, reveals how each conceptualises the relationship between Britain and Europe differently, and how this difference can be explained by the impact of genre.
APA, Harvard, Vancouver, ISO, and other styles
40

Newhouse, M. E. "TWO TYPES OF LEGAL WRONGDOING." Legal Theory 22, no. 1 (March 2016): 59–75. http://dx.doi.org/10.1017/s1352325216000112.

Full text
Abstract:
ABSTRACTThere are two distinct types of legal wrongdoing: civil and criminal. This article demonstrates in three ways that Immanuel Kant's Universal Principle of Right, properly interpreted, offers a plausible and resilient account of this important distinction. First, Kant's principle correctly identifies attempted crimes as crimes themselves even when they do not violate the rights of any individual. Second, it justifies our treatment of reckless endangerment as a crime by distinguishing it from ordinary negligence, traditionally thought to be only civilly wrong. Third, it explains and justifies differences between the features of traditional criminal punishments and the features of civil remedies. Moreover, the Universal Principle of Right yields a Kantian standard for criminal wrongdoing that is compelling enough to inform future philosophical inquiries into the nature and limits of the state's criminal lawmaking authority.
APA, Harvard, Vancouver, ISO, and other styles
41

Medina, Richard M., Emily A. Nicolosi, Simon Brewer, and Erin Moore. "A Geographical Analysis of Socioeconomic and Ideological Drivers of Hate Crime in the United States." International Journal of Applied Geospatial Research 12, no. 2 (April 2021): 39–56. http://dx.doi.org/10.4018/ijagr.2021040103.

Full text
Abstract:
Criminal activities motivated by hate are the most extreme form of bias against people. While hating a class of people and organizing in hate groups to express feelings against those people are not illegal, hate crimes, violent and non-violent, are illegal. However, there remains much to be learned about geographic patterns of hate crimes and facilitating environments. This exploratory research examines hate crime occurrences aggregated to counties in the conterminous United States and attempts to explain resulting patterns using socioeconomic and ideological correlates with traditional and spatial statistics. Geographical patterns of hate crimes in the Unites States are found to be a complicated phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
42

Schiks, Jim A. M., Steve G. A. van de Weijer, and E. Rutger Leukfeldt. "High tech crime, high intellectual crime? Comparing the intellectual capabilities of cybercriminals, traditional criminals and non-criminals." Computers in Human Behavior 126 (January 2022): 106985. http://dx.doi.org/10.1016/j.chb.2021.106985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Rostami, Bnafsheh, and Atefeh Jooj. "The Capacity of Police Organizations to Prevent Crime with an Emphasis on Interpol and Europol." International Journal of Multicultural and Multireligious Understanding 8, no. 3 (March 3, 2021): 200. http://dx.doi.org/10.18415/ijmmu.v8i3.2481.

Full text
Abstract:
The spread of organized crime with the advancement of transportation systems and the facilitation of transnational crime using the Internet are among the consequences of the age of communication, which makes it more difficult to deal with crime than in the past. Therefore, mutual cooperation between governments in the field of public security is essential given the current situation. Law enforcement and security officials have come to the conclusion that traditional crime control strategies and repression strategies will not have much of an effect on solving problems, and more than crime control, it must be prevented. This is the basis for the current research. One of the main objectives of this article is to review the cooperation agreements between international police organizations and various countries and the potential for preventive activities. This article is based on descriptive-analytical documents and references, using library resources. The International Criminal Police Organization (Interpol), as the most important international body after the United Nations and the European Union's criminal police, is one of the most influential international organizations in the field of police cooperation. As part of the goals of its charter adopted by the General Assembly of these organizations, these organizations have provided technical training and information and operational support in member countries in order to prevent the occurrence of crime. This goal is achieved by concluding international agreements in which these organizations are required to send troops to member countries, as well as to hold training workshops. Also, the production and dissemination of educational content to communities about the existence of crimes increases public awareness of the types of crimes that exist. The present paper addresses the organizational capacities of Interpol and Europol in crime prevention.
APA, Harvard, Vancouver, ISO, and other styles
44

Slobodenyuk, M. A. "Special Prevention of the Violent Crimes Committed by Minors and Youth on the National Hatred Grounds." Juridical Science and Practice 15, no. 3 (2019): 92–99. http://dx.doi.org/10.25205/2542-0410-2019-15-3-92-99.

Full text
Abstract:
The problem of special prevention of the violent crimes committed by minors and youth on the national hatred grounds is considered in article. Law enforcement agencies have a special role in the solution of the matter because they carry out the large quantities of work on special prevention of crimes committed by minors and youth. Acquisition of sociocultural skills by minors and youth directed to elimination of long term habits and stereotypes of antisocial behavior among youth is one of the most perspective measures of prevention the violent crimes committed by minors and youth on the national hatred grounds. The author pays attention to necessity of the earlier bringing legal information to minors, taking into account features of group dynamics. Modern information technologies (for example, the complex automated information-analytical system “Safe City”, which allows ensuring safety on city streets) are also more effective in preventing crime among minors and youth than traditional methods of preventing teenage and youth crime, as these categories most often commit violent crimes in the streets.
APA, Harvard, Vancouver, ISO, and other styles
45

Ivanova, Liliya V., and Galina V. Perezhogina. "THE DIGITAL SPACE AS A CRIME SCENE UNDER GLOBAL CONSTRAINTS." Tyumen State University Herald. Social, Economic, and Law Research 6, no. 4 (2020): 155–71. http://dx.doi.org/10.21684/2411-7897-2020-6-4-155-171.

Full text
Abstract:
COVID-19 pandemic has challenged many countries. Restrictive measures to curb the spread of the new coronavirus infection included self-isolation of citizens, as well as working and studying online, which was possible thanks to the development of information technology. However, the digital space has always attracted criminal attention. The pandemic was no exception: the number of cybercrimes has increased significantly. The digital space has no state borders, and locating the crime scene might be difficult. The concept of a “crime scene” is absent in criminal legislation that generates controversy in criminal legal science. The authors consider digital space as a criminal concept, analyze scientific views on the problem of determining the crime scene, highlight the features of the digital crime scene, and reveal the main types of cybercrimes. They conclude that the crime scene in the digital space is the place of information input and entrance into the information and telecommunication network with the subsequent implementation from this scene of the criminal act, regardless of the location of socially dangerous consequences. The research methodology includes traditional for criminal law science. The comparative legal approach allowed identifying the features of scientific and legal definitions, to define the digital space as a crime scene. The statistical method, through the analysis of crime statistics in the Russian Federation, helped showing the dynamics of crimes committed in the digital space, including during a pandemic. Using the method of analysis, the authors have studied the cybercrime cases.
APA, Harvard, Vancouver, ISO, and other styles
46

Abulaish, Muhammad, and Nur Al Hasan Haldar. "Advances in Digital Forensics Frameworks and Tools." International Journal of Digital Crime and Forensics 10, no. 2 (April 2018): 95–119. http://dx.doi.org/10.4018/ijdcf.2018040106.

Full text
Abstract:
Digital forensics science is a well-known initiative to unearth computer-assisted crimes. The thriving criminal activities using digital media have changed the typical definition of a traditional crime. Meanwhile, the means and targets of criminal activities have been transformed in a broader context due to the diverse nature of offenses associated with the multiple crime categories, affecting the way of investigations as well. In order to withstand the difficulties caused due to the crime complexity, forensics investigation frameworks are being tuned to adjust with the nature and earnestness of the felonies being committed. This article presents an in-depth comparative survey of fourteen popular and most cited digital forensics process models and various forensics tools associated with different phases of these models. The relationships among these forensics process models and their evolutions are analyzed and a graph-theoretic approach is presented to rank the existing process models to facilitate investigators in selecting an appropriate model for their investigation tasks.
APA, Harvard, Vancouver, ISO, and other styles
47

McShane, Marilyn D., and Frank P. Williams. "Radical Victimology: A Critique of the Concept of Victim in Traditional Victimology." Crime & Delinquency 38, no. 2 (April 1992): 258–71. http://dx.doi.org/10.1177/0011128792038002009.

Full text
Abstract:
Traditional victimology has not yet tapped the potential of radical criminology to assist in the explanation of social reactions to crime and crime victims. From the theoretical perspective of the radical framework it is possible to explore society's preference for truly innocent victims and the limited ability of the system to avenge them (i.e., through victim assistance programs). Other avenues of analysis from this perspective include the role of the victim in furthering the interests of police and prosecution agencies, as well as the interests of the media and capitalist business enterprises. A radical victimological approach can also be used to analyze the extended victimization of the offender's family by the criminal justice system.
APA, Harvard, Vancouver, ISO, and other styles
48

Kamalova, G. G. "SOME QUESTIONS OF CRIMINAL LEGAL RESPONSIBILITY IN THE FIELD OF APPLICATION OF ARTIFICIAL INTELLIGENCE SYSTEMS AND ROBOTICS." Bulletin of Udmurt University. Series Economics and Law 30, no. 3 (June 26, 2020): 382–88. http://dx.doi.org/10.35634/2412-9593-2020-30-3-382-388.

Full text
Abstract:
The article discusses the problems of improving criminal law in the context of the development of one of the types of breakthrough digital technologies - artificial intelligence. The author notes that the explosive development in this area has led to the growth of high-tech crime, a special place among which is occupied by crimes using tools of artificial intelligence technology. Since the subjects of criminal activity traditionally use advanced technologies, at present such crimes are already represented by fraud, computer information crimes, terrorism, violations in the field of road safety, violation of the right to privacy and a number of others. Although there are no special offenses related to artificial intelligence in the criminal law today, this does not mean that existing norms cannot be applied to traditional subjects. Given the current level of development of artificial intelligence technology, it is now necessary to strengthen criminal liability for the compositions provided for by the current Criminal Code of the Russian Federation by introducing an appropriate qualifying attribute. With the recognition of the legal personality of artificial intelligence systems and robots, one of the key issues of applying criminal law rules to them will be the question of the subjective side of the committed act. The lack of “strong” artificial intelligence and the current level of development of solutions and devices based on artificial technology allow us to limit ourselves to classifying the facts of their use as components of the objective side of the crime.
APA, Harvard, Vancouver, ISO, and other styles
49

Perri, Frank S. "Red Collar Crime." International Journal of Psychological Studies 8, no. 1 (December 20, 2015): 61. http://dx.doi.org/10.5539/ijps.v8n1p61.

Full text
Abstract:
<p>Traditional viewpoints held by academic and non-academic professional groups of the white-collar crime offender profile(s) are that they are non-violent. Yet research has begun to unveil a sub-group of white-collar offenders who are violent, referred to as red-collar criminals, in that their motive is to prevent the detection and or disclosure of their fraud schemes through violence. This article is the first to discuss the origin of the red-collar crime concept developed by this author coupled with debunking white-collar offender profile misperceptions that have persisted for decades by offering current research on the anti-social qualities displayed by this offender group that predates their violence. Secondly, the article applies behavioral risk factors, such as narcissism and psychopathy, which contributes to our understanding of why some white-collar offenders may resort to violence while other white-collar offenders do not. Case analysis also draws upon gender distinctions, workplace violence and homicide methods used to illustrate that red-collar criminals are not an anomaly to ignore simply because they may not reflect the street-level homicides typically observed by society, investigated by law enforcement and studied by academia.</p>
APA, Harvard, Vancouver, ISO, and other styles
50

Santen, Emma van. "Combatting organised crime and terrorism in Central Asia." Journal of Financial Crime 25, no. 2 (May 8, 2018): 309–19. http://dx.doi.org/10.1108/jfc-07-2017-0069.

Full text
Abstract:
Purpose This paper aims to examine the shift away from the traditional distinction between organised crime and terrorist groups towards their conceptual convergence under the crime-terror nexus narrative in the context of international security and development policy in post-Soviet Central Asia. It assesses the empirical basis for the crime-terror and state-crime nexus in three Central Asian countries – Kyrgyzstan, Tajikistan and Uzbekistan – and argues that the exclusion of the state from the analytical framework undermines the relevance of the crime-terror paradigm for policy-making. Design/methodology/approach This paper draws on a literature review of academic research, recent case studies highlighting new empirical evidence in Central Asia and international policy publications. Findings There is a weak empirical connection between organised crime and Islamic extremists, such as the Islamic Movement of Uzbekistan and Hizbut Tahrir, in Central Asia. The state-crime paradigm, including concepts of criminal capture, criminal sovereignty and criminal penetration, hold more explanatory power for international policy in Central Asia. The crime-terror paradigm has resulted in a narrow and ineffective security-oriented law enforcement approach to counter-narcotics and counter-terrorism but does not address the underlying weak state governance structures and political grievances that motivate organised crime and terrorist groups respectively. Originality/value International policy and scholarship is currently focussed on the areas of convergence between organised crime and terrorist groups. This paper highlights the continued relevance of the traditional conceptual separation of terrorist and organised crime groups based on their different motives, methods and relationship with the state, for security and democratic governance initiatives in the under-researched Central Asian region.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography