首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
2.
In 1674, the skeletons of two children were found in the Tower of London. They were believed to represent the remains of the "Princes in the Tower" (who had disappeared in 1483), and were reinterred as such in Westminster Abbey. Popular belief and conventional historical tradition held that the princes had been murdered by their uncle, King Richard III, to clear his path to the throne. In 1933, the bones in the Abbey were disinterred and examined, with the conclusion that they were indeed those of the princes. One skull was also thought to show evidence of death by suffocation, supporting another feature of popular legend. Later reviews of the investigation, however, revealed significant errors and omissions. This report summarizes the inconsistencies present in the scientific record and suggests that reexamination of the remains with improved techniques in both carbon dating and forensic science would provide a much more accurate analysis, thus helping to clarify the historical record.  相似文献   

3.
4.
The constitution is a living document, which being the case, there is a need to increase the understanding of the constitution through systematic research and teaching at various levels. This paper aims to be a catalyst that inspires creative action to claim and advance certain new constitutional rights encapsulated in various world's constitutions. It seeks to raise awareness of new constitutional rights. World's most constitutions have incorporated constitutional provisions that ensure the entrenched new fundamental human rights. The latest constitutions, including South African constitution of 1996 are advanced and have included significant number of rights which were left out in the old constitutions. The courts are given the widest possible powers to develop and forge new remedies for protection of constitutional rights and the enforcement of constitutional duties.  相似文献   

5.
With a reliance on the various forms of forensic science evidence in complex criminal investigations, the measures for ensuring its quality are facing increasing scrutiny. Improvements to quality management systems, to ensure both the robust application of scientific principles and the accurate interpretation and reporting of results, have arisen as a consequence of high-profile rebuttals of forensic science evidence, combined with process improvements driven by evaluation of current practice. These improvements are crucial to ensure validity of results as well as providing assurance for all those involved in the Criminal Justice System. This work first examines the quality management systems utilised for the examination and analysis of fingerprint, body fluid and DNA evidence. It then proceeds to highlight an apparent lack of comparable quality assurance mechanisms within the field of digital forensics, one of the newest branches of forensic science. Proposals are provided for the improvement of quality assurance for the digital forensics arena, drawing on the experiences of, and more well-established practices within, other forensic disciplines.  相似文献   

6.
The evaluation of forensic DNA expert opinions (in some countries expert witness testimonies) and the way it affects criminal judgement is of paramount importance. We have selected one of the largest challenges when it comes to the evaluation of forensic DNA evidence, contamination of DNA samples, and examined how it influences the decisions judges make about the credibility of DNA evidence in Hungary.  相似文献   

7.
The legal science of the People’s Republic of China has experienced the stages of formation, reinstating and innovation over the past 60 years. Today, the legal field is flourishing. While the construction of different branches of law has been accomplished, there is still a long way to go in realizing democracy and rule of law in China. Jurists need to develop a heightened awareness of their social responsibility and the urgency with which to adapt the development of law to Chinese societies. Only under these circumstances can we effectively promote democracy and rule of law in China.  相似文献   

8.
9.
As negotiations on the post-2012 climate regime are now taking off, it is time to look back and assess the experiences of the clean development mechanism (CDM) to this date. The CDM has been subject to extensive discussion in academic literature during the last few years, and this article reviews that literature in order to sum up its main themes. A common assessment is that the current structure of the CDM leads to a focus on cheap emissions reductions at the expense of sustainable development benefits for the host countries. Recently, the questionable additionality of many CDM projects has become a central issue. The article further argues that whereas a substantial body of work exists on the CDM, this work is mainly preoccupied with a ‘fine-tuning’ of the mechanism. As the CDM now becomes increasingly institutionalized, scholars should also take a step back and study the CDM in a more theoretically oriented way.
Emma PaulssonEmail:
  相似文献   

10.
Objectives

Begun in 1939, the Cambridge-Somerville Youth Study (CSYS) is recognized as the first delinquency prevention experiment and the earliest example of a longitudinal–experimental study with criminological outcomes. This paper aims to develop a historical understanding of the origins of the study’s research design.

Methods

The present study is guided by the socio-historical approach and informed by past historical research in criminology. It draws upon a wide array of archival records and published works from the late nineteenth century to the present day.

Results

Richard Clarke Cabot designed and directed the CSYS. Major influences on the study’s research design can be traced to Cabot’s medical practice and research, his advocacy for social work practice and research, and his professional relationship with the Gluecks. The beginnings of experimentation in the social sciences during the early twentieth century may have also played a role. Joan McCord’s early involvement in the study proved instrumental to its longitudinal component.

Conclusions

The rigorous and innovative research design of the CSYS marks an important chapter in the history of experimental criminology, and its influence continues to this day. New experimental studies on the prevention of crime and delinquency must continue to strive to advance scientific knowledge and improve public policy.

  相似文献   

11.
The United States enacted the Trafficking Victims Protection Act (TVPA) of 2000 to combat organized networks specializing in the illicit transport of human beings across political and geographical boundaries. This response has engendered conflicting definitions and competing agendas attributable to the definition set forth by the TVPA, which divides the crime into ‘sex’ verses ‘labor’ trafficking. The European Union (EU) adopted a different and detailed definition introduced by the United Nations. This paper explores the disparity in anti-trafficking policies of the United States and the EU. By contrasting these efforts, recommendations to strengthen U.S. policy by adapting certain EU practices to an American context are suggested.  相似文献   

12.
Examining the evolution of British and Australian policing, this comparative review of the literature considers the historical underpinnings of policing in these two countries and the impact of community legitimacy derived from the early concepts of policing by consent. Using the August 2011 disorder in Britain as a lens, this paper considers whether, in striving to maintain community confidence, undue emphasis is placed on the police's public image at the expense of community safety. Examining the path of policing reform, the impact of bureaucracy on policing and the evolving debate surrounding police performance, this review suggests that, while largely delivering on the ideal of an ethical and strong police force, a preoccupation with self-image may in fact result in tarnishing the very thing British and Australian police forces strive to achieve – their standing with the public. This paper advocates for a more realistic goal of gaining public respect rather than affection in order to achieve the difficult balance between maintaining trust and respect as an approachable, ethical entity providing firm, confident policing in this ever-evolving, modern society.  相似文献   

13.
The EU telecom regulation relies on a market-by-market sunset approach. In order to facilitate the market review of national regulatory authorities, the European Commission has offered two successive sets of recommended markets susceptible to ex ante regulation. The inclusion or exclusion of a recommended telecom market is analyzed on its competition conditions across the EU. Beginning in 2014 the European Commission published the draft third Market Recommendation. This article aims to give a critical evaluation of those recommended markets by surveying the competition situations on every telecom market in the EU Member States. It observes that while the drafted Third Recommendation makes a reasonable assessment for most telecom markets, it may not have appropriately addressed markets such as retail fixed access, wholesale call origination, wholesale fixed and mobile call termination, wholesale high-quality access, and wholesale broadcasting transmission.  相似文献   

14.
Abstract

Weapon focus is frequently cited as a factor in eyewitness testimony, and is broadly defined as a weapon-related decrease in performance on subsequent tests of memory for those elements of an event or visual scene concurrent to the weapon. This effect has been attributed to either (a) physiological or emotional arousal that narrows the attentional beam (arousal/threat hypothesis), or (b) the cognitive demands inherent in processing an unusual object (e.g. weapon) that is incongruent with the schema representing the visual scene (unusual item hypothesis). Meta-analytical techniques were applied to test these theories as well as to evaluate the prospect of weapon focus in real-world criminal investigations. Our findings indicated an effect of weapon presence overall (g= 0.53) that was significantly influenced by retention interval, exposure duration, and threat but unaffected by whether the event occurred in a laboratory, simulation, or real-world environment.  相似文献   

15.
16.

Objectives

We describe and explain how the findings from nonexperimental studies of the relationship between police force size and crime have changed over time.

Methods

We conduct a systematic review of 62 studies and 229 findings of police force size and crime, from 1971 through 2013. Only studies of U.S. policing and containing standard errors of estimates were included. Using the robust variance estimation technique for meta-analysis, we show the history of study findings and effect sizes. We look at the influence of statistical methods and units of analysis, and time period of studies’ data, as well as variation in police force size over time.

Results

Findings vary considerably over time. However, compared to research standards and in comparison to effect sizes calculated for police practices in other meta-analyses, the overall effect size for police force size on crime is negative, small, and not statistically significant. Changes in research methods and units of analysis cannot account for fluctuations in findings. Finally, there is extremely little variation in police force size per capita over time, making it difficult to estimate the relationship with reliability.

Conclusions

This line of research has exhausted its utility. Changing policing strategy is likely to have a greater impact on crime than adding more police.
  相似文献   

17.
A review of articles in the technical media between 2005 and 3Q 2011 disclosed reports on 49 outages involving 20 cloudsourcing providers. Several of these were major events. Many caused difficulties for user-organisations’ staff. Some caused lengthy suspension of services by user-organisations to their customers. A number of them involved irretrievable loss of data. Many user-organisations have failed to risk-assess their use of cloudsourcing, and are exposing their businesses to unmanaged risks.  相似文献   

18.
In the last decade, telepsychiatry – the use of telecommunications technologies to deliver psychiatric services from a distance – has been increasingly utilised in many areas of mental health care. Since the review by Khalifa and colleagues in 2007 the body of literature relevant to the forensic applications of telepsychiatry has grown substantially, albeit not by much in the United Kingdom. In the current review, we aim to provide an update summary of the literature published since 2007 to determine the effectiveness and feasibility of increasing telepsychiatry utilisation in forensic practice. The literature reviewed provides some encouraging evidence that telepsychiatry is a reliable, effective and highly acceptable method for delivering mental health care in forensic settings. There are also a number of papers that indicate the use of telepsychiatry may be cost effective for health providers in the longer term. Further research is required to consider the potential legal and ethical implications of using telepsychiatry in forensic settings.  相似文献   

19.
Organisations in both business and government face a considerable risk from inadequately secured information systems. In recognition of these risks, Directorate-General XIII (Telecommunications, Information Industries and Innovation) of the Commission of the European Communities commissioned a series of projects to examine security issues in the use of information technology. The results of one of these studies, concentrating on the security of network systems, is reviewed below.It was an objective of the study that its results should be seen as definitive, authoritative and applicable across the European Community as a whole. In order to meet this objective, the study, led by Coopers & Lybrand, drew upon the skills and experience of 44 organisations in seven European countries, including:
  • •⊎ Coopers and Lybrand practices in France, Germany, Italy, the Netherlands and the United Kingdom;
  • •⊎ Admiral Management Services Ltd;
  • •⊎ The Commission of the European Communities;
  • •⊎ 17 vendors of IT products and services in five European countries;
  • •⊎ 20 major users of network systems in seven European countries.
In particular, the study benefited from detailed case studies in each of the 20 large and sophisticated users of network systems and from assessments of 27 security products from twelve IT vendors.  相似文献   

20.
Underpinned by the United Nations Convention on the Rights of Persons with Disabilities (CRDP), Agenda 2030 and the Sustainable Development Goals (SDGs) is the international goal to ‘leave no one behind’. However, the World Federation of the Deafblind have argued that deafblind people have been excluded from international welfare and disability development programmes. Despite making up the majority of the deafblind population, it appears that older deafblind people are particularly invisible. The paper builds on the earlier work of others, which translated the UN Principles for Older Persons into the language of older visually impaired adults, by using them here as the lens for a narrative review of the literature on older deafblind people. It argues that existing research demonstrates that older deafblind people are not only being ‘left behind’ in benefitting from implementation of the UN Principles, but also that the focus of the UN Principles themselves risks maintaining or enhancing their exclusion. Further research and policy development with older deafblind people is required to ensure that international and national social welfare policies and provision are not nugatory to the older deafblind population.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号