首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
B.A., State University of New York, Old Westbury, 1981; J.D., Rutgers University School of Law, Camden, 1989.  相似文献   

4.
5.
6.
7.
8.
The present study analyzes Latino drug offenders sentenced in U.S. federal courts from 2006–2014 in order to assess whether any family ties effects were contingent on offenders’ citizenship status. The findings indicate that citizenship status conditions the influence of family ties on the decision to grant downward departures, but not the decision on the magnitude of the discount granted. The findings indicate the importance of conducting intra-ethnic examinations of sentencing outcomes for Latinos rather than assuming parity in treatment and solely comparing them to other groups.  相似文献   

9.
10.
11.
Fraudulent arson in Britain does not show a pattern of significant involvement by organised crime. This gives it a lower profile and, apart from a minority of cases prosecuted as crime, leaves most to be negotiated between insurers and insureds. Interviews with loss adjusters led to 71 cases being identified covering 1990–1995. The resources of the two sides in attempting to achieve and to resist payment of the claims and their success are evaluated. Because of the circumstantial nature of the evidence, lengthy negotiations are usual, along with an element of bluff, in what can be characterised as a process of private justice.The author gratefully acknowledges the support of the University of Liverpool Research Development Fund in connection with the field work on which this article is based.  相似文献   

12.
13.

Francis Allen, The Borderland of Criminal Justice: Essays in Law and Criminology Chicago: The University of Chicago Press, 1964

Francis Allen, The Crimes of Politics: Political Dimensions of Criminal Justice Cambridge: Harvard University Press, 1974

Francis Allen, Law, Intellect, and Education Ann Arbor: University of Michigan Press, 1979

Francis Allen, The Decline of the Rehabilitative Ideal: Penal Policy and Social Purpose New Haven: Yale University Press, 1981  相似文献   

14.
Cyber activity has become an essential part of the general public's everyday life. The hacking threats of Cyber-crime are becoming more sophisticated as internet communication services are more popular. To further confirm the final finding of Cyber-crime, this study proposes three analytical tools to clarify the Cyber-crime issues by means of Ideal Log, M-N model and MDFA (Multi-faceted Digital Forensics Analysis) strategy, where Ideal Log is identified as a traceable element of digital evidence including four elements of IP Address, Timestamp, Digital Action, and Response Message. M-N model applies a formal method for collating and analyzing data sets of investigation-relevant logs in view of connected time with ISP logs. MDFA strategy attempts to outline the basic elements of Cyber-crime using new procedural investigative steps, and combining universal types of evidential information in terms of Evidence, Scene, Victim, and Suspect. After researchers figure out what has happened in Cyber-crime events, it will be easier to communicate with offenders, victims or related people. SoTE (Strategy of Triple-E) is discussed to observe Cyber-crime from the viewpoints of Education, Enforcement and Engineering. That approach is further analyzed from the fields of criminology, investigation and forensics. Each field has its different focus in dealing with diverse topics, such as: the policy of 6W1H (What, Which, When, Where, Who, Why, and How) questions, the procedure of MDFA strategy, the process of ideal Logs and M-N model. In addition, the case study and proposed suggestion of this paper are presented to counter Cyber-crime.  相似文献   

15.
The article analyses the impact of post-2001 counterterrorism policies on the autonomy of law, focussing on American and British measures and adopting social systems theory as a theoretical framework. Contemporary societies are conceptualised as social systems in which law operates as an autonomous subsystem. Its autonomy primarily is based on constant reference by decisions to the binary coding “legal/illegal” associated with the application of specific legal principles and procedures. Following the terrorist attacks of 2001, the structure of societal differentiation has been under attack from a twofold risk. A political risk is posed by armed organisations such as Al-Qaeda because of their threats to states sovereignty. An additional risk in relation to law depends on extraordinary powers, such as those established by certain recent antiterrorism legislation and several executive provisions. States attempt to subordinate decisions related to the new counterterrorism policies to the test of their “efficiency/inefficiency” in guaranteeing security, at the expense of questions about their “legal/illegal” nature and legal constraints. An analysis of the special detention at Guantanamo Bay provides evidence of a complex set of decisions endangering the autonomy of law.  相似文献   

16.
17.
Analyzing data from the Institute of Forensic Medicine (IFM) in Rijeka, a total of 853 suicides were recorded in a 15 years period (1986–2000). Quantitative and qualitative features of suicides were analyzed in three intervals: pre-wartime, wartime and post-wartime. In the wartime period (1991–1995), the suicide rate increased by 20.9% in comparison with the pre-war period. In the post-wartime period, the suicide rate dropped by 26.2% in comparison with the war period. The results show a significant increase in suicide rates in the wartime. During the wartime period, a large number of suicide victims under the age of forty increased—45.3% in comparison with the pre-war period and 56.6% in comparison with the post-war period. The use of firearms as a means of committing suicide quadrupled during the war in comparison with the pre-war period. The level of alcohol intoxication of perpetrators at the moment of suicide significantly increased in the wartime period. War had a direct impact on quantitative and qualitative characteristics of suicides in Croatia.  相似文献   

18.
While most academic attention is currently being paid to the goals and to the merits of the Better Regulation initiative (BR), this article examines the most immediate legal implications stemming from reliance on the main tools of BR (such as systematic impact analysis and consultation procedures on proposed legislation) within the European legal order. Since the BR package boils down into a set of regulatory requirements, enforcement issues are likely to arise. For instance, what if the Commission omits to undertake (or badly performs) an impact assessment of a legislative proposal? Who is currently in charge of ensuring the Commission's compliance with these requirements? After illustrating the existing administrative oversight mechanisms designed to ensure effective compliance with BR requirements, by focusing notably on the recently established Impact Assessment Board, the article examines to what extent the European courts may be called upon to review the respect paid to the requirements of BR by the Commission services. To prevent the BR initiative from turning into a Trojan Horse within its own walls, the Commission is likely to comply with these regulatory requirements, thereby paving the way for the initiative's success.  相似文献   

19.
This paper critically analyses the importance of risk management techniques in the war on terror. From the protection of borders to international financial flows, from airport security to daily financial transactions, risk assessment is emerging as the most important way in which terrorist danger is made measurable and manageable. However, we argue that the risk-based approach results in the displacement of risk onto marginal groups, while its effectiveness in the war on terror remains questionable.  相似文献   

20.
分析木马源程序自身的特征,提出两种鉴别目标代码宿源的方法:根据其机器码和注册码的计算方式或者根据收信地址的保存方式和加密计算方式和参数进行鉴别。上述方法客观而高效。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号