首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Background: Although the prevalence of older patients in forensic psychiatric services is increasing, research around service provision for this population is very limited. We aimed to gather the views of members of staff on how well secure services are meeting the challenges of an ageing population.

Methods: Three focus groups were carried out with 13 members of staff working with older patients in secure services. A topic guide, based on the research team’s previous research, guided the sessions. The focus groups were audio-recorded, transcribed and analysed through thematic analysis.

Results: Two themes were identified: (1) Identifying patients’ needs, which focused on how promptly any emerging issues in the older patients are identified and reported; (2) addressing patients’ needs, which focused on how the unique needs of the older patients are addressed, once established.

Conclusions: There are unique age-related issues that may have an impact on the older patients’ opportunities for recovery, including a lack of specialist training for members of staff, prolonged stay in secure care and a limited number of age-relevant activities. Far from optimal, provision requires improvement through the active involvement of the primary stakeholders.  相似文献   


2.
《Peace Review》2019,31(1):127-129
First Run Features, The Film Center Building, 630 Ninth Avenue, Suite 1213, New York, NY, 10036. Website: https://www.firstrunfeatures.com/

Patrimonio (Directors: Lisa F. Jackson and Sarah Teale, 2018)  相似文献   


3.
While police work comes with a slew of dangers, little research has focused on deaths of police dogs in the line of duty. The purpose of this paper is to begin a conversation about violence toward police dogs and the treatment of animals working with the police.

To do so, a database of 96 police dogs that died in the line of duty in the United States between 2011 and 2015 was compiled, drawn from the Officer Down Memorial Page. More police dog deaths were reported in 2014 and 2015, during summer months, with half clustering in the Southern US. The victim police dogs were mostly younger and recently employed by the policing agency. The most frequent cause of death was heat exhaustion, followed by gunfire and automobiles. Most offenders were apprehended by police or shot.

Policymakers and researchers should encourage systematic data collection for a better understanding of the extent of the issue.  相似文献   


4.
Debates have grown in recent years concerning the realistic utility and application of international human rights law to a local context. Since 2000, the United Nations Security Council has issued eight Women, Peace, and Security resolutions geared toward promoting gender equality measures in conflict prevention during conflict and post-conflict settings. The first of these resolutions, United Nations Security Council Resolution (UNSCR) 1325, has been adopted by a number of UN Member States through National Action Plans (NAPs), which provide a framework and roadmap for integrating gender equality measures at the domestic level. Although NAPs were once considered promising, they have largely been unsuccessful.

By examining the implementation challenges facing other gender equality measures and localization programs that seek more effective implementation of the Women, Peace, and Security Resolutions, the following argues that a bottom-up approach rather than a top-down approach must be considered more seriously by international actors supporting implementation and integration of international human rights law, not only for the obvious reason that it emboldens local agency in the adoption process, but also because it is likely to produce outcomes that are meaningful and sustainable for the communities most affected by these provisions.

As such, continued emphasis on change that emanates from the top down in a given country often ignores the reality that gender equality measures in international human rights law are often perceived by governments and civil society actors as a serious disruption to domestic gender norms. Sole reliance on state institutions to deliver these commitments is flawed because it fails to recognize the necessary dialog and contestation among various stakeholders concerning the role of external norms in a local context.  相似文献   


5.
This study discusses student perspectives on visualisation used as a constructionist technique for learning the law in an authentic context. Student constructions of storyboards, comics, films and animation are explored as an authentic method for personalised learning of legal professional conduct and ethics. Undergraduate law students (n = 112) were asked to select a visual format for exploration of an ethical issue of their choice. The results of this study showed most students engaged with this highly creative visual task responding very positively to the exercise as a learning activity. This study discusses why students chose different forms of visualisation, what approach they took to developing their visualisation, the amount of effort devoted to visualisation versus legal elements of their artefacts and observations on the positive and negative aspects of their approach and how the technique could be improved.

A video abstract is also available at https://doi.org/10.1080/03069400.2018.1496313  相似文献   


6.
It is not uncommon in forensic psychiatry that the duty to care for the patient conflicts with the responsibility to the court, or the duty to protect the public from harm from the potentially dangerous patient-offender. This paper exemplifies the scenario of what happens when the line between forensic and clinical psychiatry is crossed and whether crossing that boundary can be justified. Ethical discussion also embodies and clarifies the issues of unjustified violation of the patients’ autonomy and an undue infringement on their right to liberty on the arbitrary basis of existing or perceived mental illness. The paper provides an in-depth analysis of the issues of physicians’ conflicting duties, vulnerability of patient-offenders, and their human rights in the light of court orders and involuntary hospitalizations.

I argue that in order to promote ethical decision-making we must establish clear rules and guidelines for psychiatric practice, separate conflicting roles, and provide sufficient training of health-care professionals regarding topics of human rights and legislation governing clinical and forensic psychiatric practice. Empowering patients and enhancing their rights to autonomy and liberty can also be potent tools of promotion and protection of their human rights and prevention of ethical breaches in practice.  相似文献   


7.
I first started thinking about anger and its role in the experiences of people who have fought in wars when I was in Sierra Leone, about a year after the cease-fire ended the civil war. I was working as a research assistant on a study with girls who had been child soldiers and who had given birth to children during the war. We were living in a community in the west, on the border with Guinea. At first, we met only a few young women. We listened to their stories—about the war, and about what life had been like for them and their children since the end of hostilities.

As days passed, word got around in this rural community that women had come to listen to the experiences of young mothers who had been child soldiers. Girls and young women living in small huts in the jungle surrounding the town, or sharing a house on the edge, began to come with their babies and introduce themselves and tell us their stories. Amid the grief and despair, the worry about how they would have enough food for the next day, I could hear a simmering rage from many young women: anger at not just what had occurred during the war, but how they had been treated when they returned.  相似文献   


8.
This research sampled 163 nations of the world to determine the use and non-use of capital punishment for 1980–85. The first conclusion was that the majority of the nations do have a legal device to administer capital punishment (77% with Yes; N = 126). The 22 nations who executed averaged 4.2 executions, per year. When the other nations are factored in, the average is 1.57 “official executions” per year (N = 163). Many nations have the legal device to execute, but few do. The top nations reporting were South Africa with 111, and Mauritius with 25 (per year 1980–85).

The average age for execution for the 42 reporting nations was 18. The United States of America was the only nation reporting for less than 16 years old. The following “methods of execution” were reported:

1.

Hanging (N = 26, 57%)

2.

Shooting (N = 11, 24%)

3.

Beheading (N = 7, 15%)

Nations also excluded from the death penalty for the following reasons:

1.

Mental Illness

2.

Juveniles

3.

Pregnant Woman

Only 7 nations reported “open” or “public” executions.  相似文献   


9.
Book reviews     
Handbook of Legal Information Retrieval Edited by J Bing, Norwegian Research Centre for Computers and Law, Oslo, in co‐operation with T Fjeldvig, T Harvold and R Svoboda North‐Holland 1984, US $96.25

Information Technology: The Challenge to Copyright. James Lahore, Gerald Dworkin and Yvonne Smyth Sweet & Maxwell and The Centre for Commercial Law Studies 1984, £12.00

Data Processing and the Law Edited by Colin Campbell Sweet and Maxwell 1984, £20.00

Le droit des Contrats Informatiques — Principes — Applications Centre de Recherches informatique et droit des Facultes Universitaires de Namur Maison Ferdinand Larder (Brussels), 1983, 45 FB

Computer Insecurity Adrian R.D. Norman Chapman and Hall 1983, £14.95

The Data Protection Act Richard Sizer and Philip Newman Gower Publishing, 1984, £16.95

The Data Protection Act 1984 Professor Bryan Niblett Oyez Longman Publishing, 1984, £18.00

The Data Protection Act 1984 — A Guide to the New Legislation J. A. L. Sterling CCH Editions, 1984, £15.00

Privacy and Data Protection — An International Bibliography Professor David H. Flaherty Mansell Publishing, 1984, £23.50

Computer Contracts R Morgan & G Stedman Oyez Longman Publishing 1984, 2nd Edition, £27.50

Computer Contracts Handbook Michele Rennie Sweet & Maxwell 1984, £15.00

Computer Contracts — An International Guide to Agreements and Software Protection Hilary Pearson Financial training 1984, £14.95  相似文献   


10.
Book reviews     
An Artificial Intelligence Approach to Legal Reasoning Anne Von Der Leith Gardner MIT Press 1987. £20.25

Design—The Modern Law and Practice Ian Morris and Barry Quest Butterworths. 1987. £45

Computers and the Law Richard Mawry and Keith Salmon BSP Professional Books,(Oxford, London, Edinburgh) 1988, £19.95

Television by Satellite—Legal Aspects Stephen de B. Bate (ed.) ESC Publishing Limited. 1987. £32.75.

Computer Software: Legal Protection in the United Kingdom Henry Carr E.S.C. Publishing Ltd 1987, £32.50.

Patents in Chemistry and Biotechnology Philip W Grubb Clarendon Press 1987. £12.50.

The International Handbook on Computer Crime Computer‐related Economic Crime and the Infringements of Privacy Ulrich Sieber John Wiley & Sons 1987. £24.95.

Computer Law: Theory and Practice Naomi Assia Advocate  相似文献   


11.
Book reviews     
Electronic Contracting, Publishing, and EDI Law Michael S Baum and Henry H Perritt, Jr Wiley Law Publications 1991. ISBN Q 471 53135 9

The Law of Electronic Commerce: EDI, Fax and E‐Mail Technology, Proof and Liability Benjamin Wright Little, Brown and Company 1991. ISBN Q 316 95632 5 $95

Crime and the Computer Martin Wasik Oxford University Press 1991. ISBN 0 19 825621 3 £35

Broadcasting: the New Law Nicholas Reville Butterworths ISBN 0 406 001375 £16

Regulating the Media Thomas Gibbons Sweet and Maxwell ISBN 0 421 37450 0 £27.50

Legal Protection of Computer Software Ranald Robertson Longman 1991. ISBN 0 851 21684 6 £35

The Computerised Lawyer: a Guide to the Use of Computers in the Legal Profession Philip Leith Springer‐Verlag 1991.

Winning with Computers: Trial Practice in the 21st Century John C Tredennick Jr, Editor ABA Section on Law Practice Management 1991. ISBN 0 89707 658 3 $90

The Age of Information Stephen Saxby Macmillan 1990. ISBN 0 333 54832 9 £25

Computer Security: Hackers Penetrate DOD Computer Systems: Testimony before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate (A General Accounting Office Report) James Brock, Jr 1991. GAO/T‐IMTEC‐92–5

Computer Contracts Morgan and Stedman (4th Edition) Longman Commercial Series 1991. ISBN 0–85121–6854 £60  相似文献   


12.
Book reviews     
Computer Law (4th edition) Colin Tapper Longman ISBN CSD 0 582 05932 1 £22.50 PPR 0 582 02491 1 £35.00

Further Computer Contracts M‐T Michèle Rennie Sweet and Maxwell 1989. ISBN 0 421 40330 6

Formalism in AI and Computer Science Philip Leith Ellis Horwood 1990. ISBN 1 3325549 2

Electronically Recorded Evidence ‐ A Guide to the Use of Tape and Video Recordings in Criminal and Civil Proceedings Sybil Sharpe Fourmat Publishing 1989. ISBN 1 85190 071 3

Computer Law Chris Reed(ed) Blackstone Press Limited 1990. ISBN 1 85 431037 2

EDI and American Law: A Practical Guide Benjamin Wright Electronic Data Interchange Association 1989. ISBN 0 96 238750 9

Computer Software Protection and Semiconductor Chips Dr Dirk Schroeder (Butterworth's Current EC Legal Developments Series) 1990. ISBN 0 406 04021 4

Computers and the Law David I Bainbridge (Pitman) 1990. ISBN 0 273 03170 8  相似文献   


13.
Book reviews     
Transborder Data Flows (Proceedings of an OECD Conference) Edited by Hans‐Peter Gassmann North Holland (Elsevier Science Publishers) 1985, US$74.00

Plastic and Electronic Money: New Payment Systems and Their Implications Patrick Frazer Woodhead Faulkner Limited 1985 £35

A User's Guide To Computer Contracting: Forms, Techniques and Strategies Davis, Allen, Bowman and Armstrong Harcourt Brace Jovanovich 1985, $75

Legal Protection of Computer Programs and Data C. Millard Sweet & Maxwell/Stevens 1985, £24

Piracy of Phonograms Gillian Davies ESC Publishing Ltd. 1986. 2nd edition. £17.95.

Biotechnology and Patent Protection—An International Review F. K. Beier, R. S. Crespi and J. Straus O.E.C.D. 1985, £5

Protecting Privacy in Two‐Way Electronic Services David H. Flaherty Mansell Publishing Company 1985, £23.50

High‐Tech Espionage Jay Tuck Sidgwick and Jackson Ltd 1980, £10.95  相似文献   


14.
15.
Book reviews     
Word Processing for Solicitors, Kevin Townsend and Kate Taphouse, Gower Publishing, 1983 £12.50

Computer Law, Colin Tapper, Longman, London and New York, 1983 Third Edition, £9.50

Understanding Computer Contracts, Martin Edwards, Waterlow Publishers, 1983 £6.50

Data Protection: Perspectives on Information Privacy, Edited by Colin Bourn & John Benyon, Department of Adult Education, University of Leicester, 1983 £5

The Computer in Court, Alistair Kelman and Richard Sizer, Gower Publishing Company, 1982 £15.50

Principles of Database Systems, Jeffrey D Ullman, Pitman Publishing Ltd, 1982 Second Edition £13.95

Computers and the Law Teacher, A report of the proceedings of a conference held at North Staffordshire Polytechnic, Edited by David V Marshall, North Staffordshire Polytechnic, 1983 £3  相似文献   


16.
Book reviews     
Computer Software — Legal Protection in the United Kingdom, 2nd edition Henry Carr and Richard Arnold Sweet and Maxwell 1992. ISBN 0 421 44380 4 £45

Legal Protection of Computer Programs in Europe — a Guide to the EC Directive Bridget Czarnota and Robert J Hart Butterworths 1991. ISBN 0 406 00542 7

Intellectual Property Rights in Sound Recordings, Film and Video J A L Sterling Sweet and Maxwell 1992. ISBN 0 421 4570 9

The European Market Place James Hogan Macmillan 1991. ISBN 0 333 51858 6

Intellectual Property D Bainbridge Pitman 1992. ISBN 0 273 034265 X  相似文献   


17.
A number of theorists have suggested that prison overcrowding produces greater tendencies toward violence and interpersonal aggression. Empirical studies of the effects of overcrowding on the prison population have been conducted on individual inmate buffer zones, or have focussed on specific institutions within a state or federal prison system.

This paper reevaluates the relationship between prison overcrowding and inmate violence using official data reported for fifty-one (N = 51) Departments of Corrections reported in the Sourcebook of Criminal Justice Statistics.

Results of the analysis indicate that although overcrowding relates to the number of suicides and homicides in expected directions, these connections reverse themselves as indicators of inmate violence are translated into percentages of respective inmate populations.

The number of suicides reported explains a significant (R2 = .27) portion of the variance in the number of homicides and clearly suggests that both forms of violence tend to occur together in state reporting areas.  相似文献   


18.
Book reviews     
D. Leebart (ed.), The Future of Software, The MIT Press, 1995. Hardcover, £19.95, 300 pp, ISBN 0‐262‐12184‐0

David Bainbridge, Software Copyright Law, 2nd edn, Butterworths, 1994. Softcover £35.00, 272 + xvi pp. ISBN 0‐406‐04841‐X

Andrew Christie, Integrated Circuits and Their Contents: International Protection, Sweet & Maxwell, 1995. Hardcover, £85.00. ISBN 0‐421‐48380‐6

S. White, S. Bate and T. Johnson, Satellite Communications in Europe: Law & Regulation, 2nd edn, FT Tax and Law, 1996. Hardcover, £135.00 xlvi + 456 pp. ISBN 0‐752‐002119‐8

A. Valente, Legal Knowledge Engineering: a Modelling Approach. Frontiers in Artificial Intelligence and Applications, Volume 30, IOS Press, 1995. Softcover, £52.00, 227 pp. ISBN 90‐5199‐23‐0

Professor Christopher Arnold, Outsourcing Contracts, Pearson Professional, 1995. 114 pp.  相似文献   


19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号