首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper has two objectives: to provide an exploratory analysis of the rationalities and constraints that shape consumption of private security within organizations and to discuss some of the issues and questions that need to be addressed in future empirical studies of private security use by organizations. It is based largely on seven semi-directed interviews conducted with security managers, six of whom work in the private sector. While these security managers distanced themselves from responsibility for actual security consumption, arguing that they lack the capacity to make such decisions, they exercise considerable influence over the demand for private security within their organizations. Although all participants noted the relative ease with which they can convince their superiors to invest in security, they also indicated that security must have a demonstrated value-added component for the organization (often in money terms). Furthermore, executives expect security to be minimally intrusive and/or disruptive. This paper reports preliminary results of research on an under-investigated topic; it also builds on the methodological decisions and findings in this research to provide useful information to scholars interested in researching private security consumption in organizations.  相似文献   

2.
《Global Crime》2013,14(3-4):471-486
While the Russian authorities may seek to talk up the role their security apparatus plays in combating organised crime, in fact, they are to a large extent falling prey to criminalisation. A culture of corruption and a decade of neglect have combined to create a situation in which not only do police, army, and security officers provide services to ‘civilian’ criminals but organised crime groupings have actually formed within them. These gangs tend to be defined by their location and legal powers, both of which can be abused for criminal ends, and they include police and military officers at the very apex of their respective command structures. There are grounds for hope now that President Putin is beginning to become aware of the practical dangers this poses for Russian national security, not least given the haemorrhage of weapons to criminal and insurgent hands, but, for the immediate future, the security apparatus will remain corrupted and criminalised.  相似文献   

3.
Based on interviews with facility managers in the electroplating and chemical industries, this study examines regulated firms’ perceptions of how various instrumental, normative, and social factors motivated their firms’ environmental actions. We found that “implicit general deterrence” (the overall effect of sustained inspection and enforcement activity) was far more important than either specific or general deterrence, and that deterrence in any form was of far greater concern to small and medium‐sized enterprises than it was to large ones. Most reputation‐sensitive firms in the environmentally sensitive chemical industry chose to go substantially beyond compliance for reasons that related to risk management and to the perceived need to protect their social license to operate. Almost half our respondents also provided normative explanations for why they complied. Overall, we conclude that there are various, often interwoven, strands that must be taken into account in understanding what motivates corporate environmental behavior, and how they play out depends very much on the size and sophistication of companies themselves and on the characteristics of the industry sector within which they are located.  相似文献   

4.
Although the modern placement facility can usually minimize problem behavior during the time that a juvenile offender is in residence, the lack of professional help afforded an adolescent upon returning home often leaves him all too prone to revert to his former behavior patterns. As a counteractive measure, it is suggested that the present approach of relying too heavily on placement to effect behavioral change be abandoned in favor of programs which view placement as only the initial phase of a more inclusive treatment approach which actively involves family members and the home environment as part of the therapeutic process. In effect, this would mean altering the present concept of aftercare, in that re-integration into home and family would be a gradual process which actually begins during the early weeks of placement. It is recommended that a home should be viewed as the main living environment in which new behaviors can be practiced, and that the present attitude that home visits are a privilege be abandoned. It is proposed that this approach, which would include counseling sessions within the home environment and first-hand observations by the staff of problems as they develop within the family or community, would not only be very practical but also quite effective in helping the adolescent and in combating recidivism.  相似文献   

5.
《Digital Investigation》2014,11(3):160-174
Immature IT security, increasing network connectivity and unwavering media attention is causing an increase in the number of control system cyber security incidents. For forensic examinations in these environments, knowledge and skills are needed in the field of hardware, networks and data analysis. For forensic examiners, this paper is meant to be a crash course on control systems and their forensic opportunities, focussing on the differences compared to regular IT systems. Assistance from experienced field engineers during forensic acquisition of control systems seems inevitable in order to guarantee process safety, business continuity and examination efficiency. For people working in the control system community, this paper may be helpful to get an idea about specific forensic issues about which they would normally not bother, but may be crucial as soon as their systems are under attack or become part of a law enforcement investigation. For analysis of acquired data, existing tools for network security monitoring have useful functionality for forensic applications but are designed for real-time acquisition and often not directly usable for post-mortem analysis of acquired data in a forensically sound way. The constant and predictable way in which control systems normally behave makes forensic application of anomaly-based threat detection an interesting topic for further research.  相似文献   

6.
Magnetic swipe card technology is used for many purposes including credit, debit, store loyalty, mobile phone top-up and security identification cards. These types of cards and the details contained on them are often relied upon as a form of identification and personal authentication. As such reliance is placed upon them it is surprising that they do not incorporate more stringent security features, and because of this lack of features it is not surprising that they attract the attention of people who wish to exploit them for illegal gain. The paper introduces the type of technology, and range of devices available for manipulating magnetic swipe card data. It proposes the use of Digital Evidence Bags as a suitable format for the evidential storage of information obtained from them, thus further illustrating the flexibility of the format and demonstrating the diverse range of devices that have to be handled within the digital investigation and law enforcement community.  相似文献   

7.
The patients at a state maximum security forensic facility were interviewed by a psychiatrist and their files reviewed. Only 43 of the 203 patients were judged to be suitable for the facility. Nearly 60% of the pretrial defendants were judged to be capable of proceeding to trial. Of the patients, 18% were judged to be malingering or avoiding trial or prison. The implications of these findings are discussed.  相似文献   

8.
The private security industry in the United States now has approximately twice as many personnel as does the public police. Private Security personnel have authority over the liberty, and sometimes the lives, of customers and employees. Often they exercise this awesome responsibility with little if any background and training. In most instances private security personnel are not considered law officers or peace officers and are, therefore, not bound by the same rules and regulations that apply to public police. More and more frequently, untrained or minimally trained, and basically unqualified security officers are taking actions against customers and employees which are excessive and unreasonable. Without the Constitutional protections which would be available if the act were committed by a public police officer, the only recourse for a private individual against reckless and wanton conduct on the part of private security personnel is a civil action, seeking compensation for the inconvenience caused or injuries received. The courts have found that companies and their security personnel have an obligation to be reasonable in their investigations of suspected criminal violations by employees and customers. Failure to conduct a proper and reasonable investigation will open the individual directing the investigation, and the company authorizing it, to liabililty for the injury their improper actions have caused. Civil liability suits have become the moral enforcer for improper and excessive conduct by private security personnel.  相似文献   

9.
ABSTRACT

The past two decades, a disproportionate growth of females entering the criminal justice system and forensic mental health services has been observed worldwide. However, there is a lack of knowledge on the background of women who are convicted for violent offenses. What is their criminal history, what are their motives for offending and in which way do they differ from men convicted for violent offenses? In this study, criminal histories and the offenses for which they were admitted to forensic care were analyzed of 218 women and 218 men who have been treated between 1984 and 2014 with a mandatory treatment order in one of four Dutch forensic psychiatric settings admitting both men and women. It is concluded that there are important differences in violent offending between male and female patients. Most importantly, female violence was more often directed towards their close environment, like their children, and driven by relational frustration. Furthermore, female patients received lower punishments compared to male patients and were more often considered to be diminished accountable for their offenses due to a mental illness.  相似文献   

10.
Previous research on suicide in United States prisons focused on the characteristics of inmates who commit suicide while largely ignoring the prison context surrounding these suicides. The following analyses used national data on 1,082 state prisons in the United States to examine how prison conditions (deprivation) and inmate composition (importation) predict prison suicide. Results of a negative binomial regression model showed that the number of suicides was significantly increased in supermaximum and maximum security prisons (relative to minimum), under conditions of overcrowding and violence, and in prisons where a greater proportion of inmates received mental health services. Although deprivation variables were overwhelmingly predictive of suicide, the results pointed to the combined effects of institutional conditions and inmate composition on prison suicide.  相似文献   

11.
Maximum security correctional officers play a crucial role in the establishment of order within their respective institutions of employment, yet they are also exposed to numerous occupational dangers that can threaten their general welfare. When they perceive high levels of injurious risk from workplace hazards, this cannot only jeopardize their job performance but lead to a poorly managed prison institution. Currently though, few studies have explored correctional officer perceptions of workplace dangers and risks, and even fewer have explored the factors that influence officer perceived risk of injury. Questionnaire data from a statewide population of maximum security correctional officers (N?=?649) were gathered in order to examine officer perceived risk of injury from workplace dangers, and the antecedents to this judgment. Results illustrated how officers perceived a high degree of injurious risk from their work, and that their risk perceptions were largely a product of psychological features of dangers. Theoretical and policy implications are discussed.  相似文献   

12.
董溯战  冯斌 《河北法学》2007,25(10):44-47
社会保障基本权是指公民所享有的依照宪法请求国家等公共主体提供援助以保障其基本生活或提高生活水平的基础性权利,它可被区分为缴纳性权利和非缴纳性权利、给付性权利和非给付性权利.由于社会保障基本权以维护人道主义价值为目标,并倚重于国家等公共机构,所以,它是一种社会基本权.不同社会保障基本权的实现对普通法的依赖程度有差别,但是,它们都具有对国家机关、社会组织及公民的直接效力.如果社会保障基本权未能被立法权、行政权具体化,或者具体化地不充分,或者具体化行为违宪,一旦该权利受到侵害,那么,就可通过宪法诉讼予以救济.  相似文献   

13.
Are the national laws regulating access to genetic resources that countries have enacted in exercise of their sovereign rights accorded by the Convention on Biological Diversity jeopardising food security by failing to take into account the distinctive features of genetic resources for food and agriculture? If so what can be done about it? What are the obstacles to doing so? And how can they be overcome, especially in the context of the present ongoing negotiations for an international regime on access and benefits sharing under the biodiversity convention? This article examines the impact of the national access laws and other instruments on the free access and exchange of these genetic resources and hence on the maintenance of agricultural biological diversity upon which food security hinges so critically. It highlights the obstacles that stand in the way of developing countries facilitating access to their genetic resources and proposes a multilateral non-market-orientated approach to overcome them.  相似文献   

14.
Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, business continuity, personnel and physical security, and security technology. Nevertheless, corporate security also has interrelationships with criminology, facility management, safety, and law. Such a framework provides clear boundaries for the practising domain of corporate security, better reflects the security experts’ view of their practising domain, allows directed tertiary pedagogy, and presents what could be considered the scholarly area of Security Science.  相似文献   

15.
《Justice Quarterly》2012,29(2):247-270
This article analyzes data from interviews with inmates to examine the correctional experiences of young men incarcerated through criminal (adult) courts in a large Northeastern state. The sample (N = 95) includes respondents from five correctional institutions; some of these inmates have been sentenced to adult department of corrections facilities, and some to juvenile facilities operated by the state's children's services bureau. Relative to the adult facilities, the juvenile facilities are smaller, have much lower inmate‐to‐staff ratios, and they place greater emphasis (in their official guidelines) on treatment, counseling, education, and mentoring of inmates. As a result, one might expect juvenile‐facility inmates to report a relatively more supportive, mentoring‐focused style of staff–inmate interactions than adult‐facility inmates. Yet surprisingly, inmates in adult facilities report better access to education and treatment/counseling services offered in their facilities.  相似文献   

16.
Height estimations based on security camera footage are often requested by law enforcement authorities. While valid and reliable techniques have been established to determine vertical distances from video frames, there is a discrepancy between a person's true static height and their height as measured when assuming different postures or when in motion (e.g., walking). The aim of the research presented in this report was to accurately record the height of subjects as they performed a variety of activities typically observed in security camera footage and compare results to height recorded using a standard height measuring device. Forty-six able bodied adults participated in this study and were recorded using a 3D motion analysis system while performing eight different tasks. Height measurements captured using the 3D motion analysis system were compared to static height measurements in order to determine relative differences. It is anticipated that results presented in this report can be used by forensic image analysis experts as a basis for correcting height estimations of people captured on surveillance footage.  相似文献   

17.
Conclusion Gary Marx' Undercover provides a fine basis for fuller sociological analysis of electronic surveillance in the late twentieth century. He is correct that new technology is implicated in a new surveillance, although the interplay between social and technological factors must constantly be in view. Above all it is computers, or, more properly, computers-plus-telecommunications that facilitate the new surveillance. They do so by allowing for the creation of novel categories of personal data, seen especially at present in computer matching. But they may also be enabling anather new departure, the integration of moments of surveillance once the province of quite distinct social institutions.The threat of a maximum security society emerging within the very liberal democratic contexts that cherish (above all economic) liberties is a reality. But fresh social analysis is called for, as the popularly-used and illuminative panoptic concept suffers from a number of basic flaws, and because we have yet to connect satisfactorily the equally pertinent themes of privacy and freedom. Modern social control seems to utilize several different disciplines, often acting in concert but in complex ways. The fact that some of the most potent arise in situations as apparently innocent as buying a restaurant meal with a credit card should not lull us into thinking that they are any less worrisome than certain undercover police tactics.  相似文献   

18.
The sexual abuse of children is not new, it's newly uncovered. The authorities are receiving more complaints. The media is showing interest. The public is becoming aware. Its details are not pretty, they can repel and disgust and bring on demands for retribution. The numbers are large, Patterns are beginning to take shape showing who the victims are and who the abusers, and why. The impact is becoming known and it is huge. What one father does to his three children can grow in geometric proportions as those children each do the same to their three children, and these to theirs. The impact on crime is just becoming known: sexually abused children are prone to criminal activities and may well be a major cause of crime. The impact of false reports is also becoming know. The Salem witch trials are always before us. The possibilities of false accusation out of revenge or on a dare, or in a pique are not new, accusations satisfy a child's need for attention and status, and other children may see the possibilities for themselves. But where the sexual abuse is within the family, a hard choice must be made: to punish the offender heavily or to work with the abuser and the family to prevent future abuse. You cannot do both. It appears that the courts can bring highly beneficial results: they can provide comfort for a child victim, but more, they can provide treatment for that child and reduce the pain and guilt and fears and for that child break the cycle of abused children abusing their children who abuse their children who abuse. The courts can provide comfort for a family, but more, they can provide rehabilitation for most families where there has been abuse, restoring their strength and security. The courts can prosecute the abuser and punish him, but more, they can instead often provide rehabilitation for the abuser which is a surer way of preventing a recurrence than the disgrace of a prison. Much needs to be discovered. But from what is now know, the courts and the police and the social agencies need to be sensitized to the problem in all of its aspects. The opportunities for positive accomplishment are great.  相似文献   

19.
The University of Tennessee Anthropology Research Facility (ARF) is known for its unique contribution to forensic science as a site of human decomposition research. Studies conducted at ARF are integral in our understanding of the processes of human decomposition. As such, the authors are interested in the long-term effects of continuous human decomposition on the soil environment. Soil samples collected from within and outside the ARF were evaluated for moisture content, pH, organic content, total carbon and nitrogen content, and biomass by lipid-bound phosphorus, and total extracted DNA. Analyses revealed no significant differences (p<0.05) among the sampled areas within the facility, and yet demonstrated a possible trend toward increased levels of total N, Lipid-P, and water, suggesting an influx of high-quality nutrients into the ARF soil. Furthermore, elevated pH readings, presumably resulting from ammonification of the soil, were observed in areas of high decomposition. The negative control samples proved significantly different from nearly all samples collected within the facility, the exceptions being total carbon content and extractable DNA. These findings indicate that while landscape samples inside may be similar to themselves, they are dissimilar to those taken in a similar temperate forest biome with no recorded history of human decomposition.  相似文献   

20.
At least half of the women inside prison have mental health problems, have experienced physical, sexual, or emotional abuse during their formative years and often in adulthood, and have addiction problems. Only a minority of these women receive treatment for their behavioral health problems associated with trauma while incarcerated, even though these problems are risk factors for returning to prison after release. This study focuses on the traumatic experiences and behavioral health problems of a group of female inmates who volunteered in August 2009, to be screened for admission into an integrated trauma-reentry program implemented at an adult female correctional facility. Of the 278 women who self-referred for screening, 196 preliminarily met the time eligibility criterion of residing at the prison for eight to 24 more months. Half of these women (n?=?97) were actually time-eligible for screening and agreed to be screened. Of this sample of treatment-seeking soon-to-be-released female prisoners, the vast majority (93%) reported significant and complex histories of traumatic event exposure and high rates of either posttraumatic stress disorder (PTSD) or sub-threshold PTSD, past alcohol and other substance abuse or dependence, other axis I psychiatric disorders, and subjective distress. Identifying trauma exposure histories and associated behavioral health problems within this population and providing effective interventions holds potential promise for preparing incarcerated women to manage their post-release lives in ways that will keep them safe, healthy, and in the community.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号