To do so, a database of 96 police dogs that died in the line of duty in the United States between 2011 and 2015 was compiled, drawn from the Officer Down Memorial Page. More police dog deaths were reported in 2014 and 2015, during summer months, with half clustering in the Southern US. The victim police dogs were mostly younger and recently employed by the policing agency. The most frequent cause of death was heat exhaustion, followed by gunfire and automobiles. Most offenders were apprehended by police or shot.
Policymakers and researchers should encourage systematic data collection for a better understanding of the extent of the issue. 相似文献
Methods: Three focus groups were carried out with 13 members of staff working with older patients in secure services. A topic guide, based on the research team’s previous research, guided the sessions. The focus groups were audio-recorded, transcribed and analysed through thematic analysis.
Results: Two themes were identified: (1) Identifying patients’ needs, which focused on how promptly any emerging issues in the older patients are identified and reported; (2) addressing patients’ needs, which focused on how the unique needs of the older patients are addressed, once established.
Conclusions: There are unique age-related issues that may have an impact on the older patients’ opportunities for recovery, including a lack of specialist training for members of staff, prolonged stay in secure care and a limited number of age-relevant activities. Far from optimal, provision requires improvement through the active involvement of the primary stakeholders. 相似文献
Patrimonio (Directors: Lisa F. Jackson and Sarah Teale, 2018) 相似文献
To cite some examples, in 1972 male arrests outnumbered female by almost six to one in the United States, and only 18 percent of the arrests for Crime Index offenses were women. According to an F.B.I. report approximately 20 per cent of total property crime arrests in 1972 were female. Yet it should be noted that some crimes are committed more by females than by males, such as offenses against chastity and common decency, prostitution, embezzlement and fraud, forgery and counterfeiting, larceny and theft. Recently the F.B.I. reported a rise in female offenses, particularly among those under the age of 18. According to this report, well over half the runaways apprehended are young women.
As a result of a higher educational level among women, more women remaining single due to professional and occupational interests, and the Contemporary Women's Liberation movement, a gradual increase in criminality among women is anticipated, although this is disputed by the French correspondent in the following article who argues for a reverse trend. Yet with more women competing with men in the future and becoming more active politically to achieve equality, crime as a predominantly male pattern of behavior may change.
Crime among women has yet to be thoroughly studied. Some criminologists maintain that female criminality is “masked” or “suggestive” behavior because to a great extent female criminals are hidden or unreported, or in some instances men commit crime on behalf of women. Any meaningful assessment of female criminality must take into account complex physiological, psychological and socio-cultural factors.
The meeting of the International Council of Women in conjunction with the Third United Nations Congress on the Prevention of Crime and the Treatment of Offenders in 1965 marked only a small beginning in the understanding of this segment of criminal behavior. This article deals only with recidivism among women offenders, and readers are advised to discover how other societies treat female criminals. Although several recommendations are made as to how women offenders can best be served, much more research into female criminality must be done before reaching any definite conclusions. Some causal factors paralleled the male counterpart, but before this segment of criminality can be treated effectively, causal elements of a more general nature must first be established. [Source: “Measures Tending to Combat Recidivism Among Women Offenders,” article submitted by the International Council of Women, Standing Committee for Social Welfare to the 3rd United Nations Congress on the Prevention of Crime and the Treatment of Offenders, Stockholm, A/CONF. 26/NGO/2, 4 May 1965.] 相似文献
This article substantially deepens extends previous research on ex-post oversight, by developing a more comprehensive index to measure ex-post oversight, by using more up-to-date data bases and by including more countries. We can partially confirm the emerging consensus that ex-post budget oversight is stronger in parliamentary – and especially Westminster – systems than in countries with other forms of government, thereby somewhat offsetting the previously identified weaknesses of Westminster parliaments in budget formulation.
When used in combination Wehner’s [2006. Assessing the power of the purse: An index of legislative budget institutions. Political Studies, 54, 767–785] index of ex-ante legislative oversight, this index provides a comprehensive picture of legislative power of the purse regarding the budget process. 相似文献
The average age for execution for the 42 reporting nations was 18. The United States of America was the only nation reporting for less than 16 years old. The following “methods of execution” were reported:
1.Hanging (N = 26, 57%)
2.Shooting (N = 11, 24%)
3.Beheading (N = 7, 15%)
Nations also excluded from the death penalty for the following reasons:
1.Mental Illness
2.Juveniles
3.Pregnant Woman
Only 7 nations reported “open” or “public” executions. 相似文献
Further Computer Contracts M‐T Michèle Rennie Sweet and Maxwell 1989. ISBN 0 421 40330 6
Formalism in AI and Computer Science Philip Leith Ellis Horwood 1990. ISBN 1 3325549 2
Electronically Recorded Evidence ‐ A Guide to the Use of Tape and Video Recordings in Criminal and Civil Proceedings Sybil Sharpe Fourmat Publishing 1989. ISBN 1 85190 071 3
Computer Law Chris Reed(ed) Blackstone Press Limited 1990. ISBN 1 85 431037 2
EDI and American Law: A Practical Guide Benjamin Wright Electronic Data Interchange Association 1989. ISBN 0 96 238750 9
Computer Software Protection and Semiconductor Chips Dr Dirk Schroeder (Butterworth's Current EC Legal Developments Series) 1990. ISBN 0 406 04021 4
Computers and the Law David I Bainbridge (Pitman) 1990. ISBN 0 273 03170 8 相似文献
A representative mail survey collected in Finland as part of Scandinavian sense of justice research was used as empirical data. Respondents were presented with six criminal cases and asked to determine sentences for them. All respondents received the same vignettes, but the background attributes of the offenders varied randomly.
This study showed that all the background attributes had a clear connection to the sentence decisions. Considering these results, the idea of a ‘general punitive attitude’, which is commonly used in academic literature, appears to be too simple of a way to look at the relationship between attitudes and punishment decisions. 相似文献
Method: Drawing on existing evidence, the group was developed and piloted on a sample of 12 male Young Offenders (mean age 19.85 years) in custody with a history of SI. Participants were measured on observable SI behaviour, SI thoughts and urges and psychological distress. A within subject design was utilised with measures at baseline, 6 months and 1 year.
Results: At 12 months follow-up, a significant reduction in SI acts, time spent on SI monitoring, severity of urges and difficulty resisting SI. Psychological distress was also reduced.
Conclusions: SIGPI could be a potentially promising intervention and further investigation into its efficacy is warranted. 相似文献
Complex litigation is an area of legal practice particularly apt to benefit from the use of modern information technology both before trial and during the trial. Complex litigation involves such a diversity of issues, allegations of fact, and divergent opinions as to be difficult to retain within the short term memory of one human brain for the length of time taken by the exposition of the evidence and argument followed by judicial analysis and expression of the judgment.
This type of litigation also benefits from intervention by the Court in the preparations for trial, and in that endeavour information technology would also be most helpful.
In this article I shall try to review in very general terms what is done and what could be attempted. I shall generally concentrate on civil rather than criminal litigation.
The views expressed are my views alone. 相似文献
Information Technology: The Challenge to Copyright. James Lahore, Gerald Dworkin and Yvonne Smyth Sweet & Maxwell and The Centre for Commercial Law Studies 1984, £12.00
Data Processing and the Law Edited by Colin Campbell Sweet and Maxwell 1984, £20.00
Le droit des Contrats Informatiques — Principes — Applications Centre de Recherches informatique et droit des Facultes Universitaires de Namur Maison Ferdinand Larder (Brussels), 1983, 45 FB
Computer Insecurity Adrian R.D. Norman Chapman and Hall 1983, £14.95
The Data Protection Act Richard Sizer and Philip Newman Gower Publishing, 1984, £16.95
The Data Protection Act 1984 Professor Bryan Niblett Oyez Longman Publishing, 1984, £18.00
The Data Protection Act 1984 — A Guide to the New Legislation J. A. L. Sterling CCH Editions, 1984, £15.00
Privacy and Data Protection — An International Bibliography Professor David H. Flaherty Mansell Publishing, 1984, £23.50
Computer Contracts R Morgan & G Stedman Oyez Longman Publishing 1984, 2nd Edition, £27.50
Computer Contracts Handbook Michele Rennie Sweet & Maxwell 1984, £15.00
Computer Contracts — An International Guide to Agreements and Software Protection Hilary Pearson Financial training 1984, £14.95 相似文献
The Law of Electronic Commerce: EDI, Fax and E‐Mail Technology, Proof and Liability Benjamin Wright Little, Brown and Company 1991. ISBN Q 316 95632 5 $95
Crime and the Computer Martin Wasik Oxford University Press 1991. ISBN 0 19 825621 3 £35
Broadcasting: the New Law Nicholas Reville Butterworths ISBN 0 406 001375 £16
Regulating the Media Thomas Gibbons Sweet and Maxwell ISBN 0 421 37450 0 £27.50
Legal Protection of Computer Software Ranald Robertson Longman 1991. ISBN 0 851 21684 6 £35
The Computerised Lawyer: a Guide to the Use of Computers in the Legal Profession Philip Leith Springer‐Verlag 1991.
Winning with Computers: Trial Practice in the 21st Century John C Tredennick Jr, Editor ABA Section on Law Practice Management 1991. ISBN 0 89707 658 3 $90
The Age of Information Stephen Saxby Macmillan 1990. ISBN 0 333 54832 9 £25
Computer Security: Hackers Penetrate DOD Computer Systems: Testimony before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate (A General Accounting Office Report) James Brock, Jr 1991. GAO/T‐IMTEC‐92–5
Computer Contracts Morgan and Stedman (4th Edition) Longman Commercial Series 1991. ISBN 0–85121–6854 £60 相似文献
Design—The Modern Law and Practice Ian Morris and Barry Quest Butterworths. 1987. £45
Computers and the Law Richard Mawry and Keith Salmon BSP Professional Books,(Oxford, London, Edinburgh) 1988, £19.95
Television by Satellite—Legal Aspects Stephen de B. Bate (ed.) ESC Publishing Limited. 1987. £32.75.
Computer Software: Legal Protection in the United Kingdom Henry Carr E.S.C. Publishing Ltd 1987, £32.50.
Patents in Chemistry and Biotechnology Philip W Grubb Clarendon Press 1987. £12.50.
The International Handbook on Computer Crime Computer‐related Economic Crime and the Infringements of Privacy Ulrich Sieber John Wiley & Sons 1987. £24.95.
Computer Law: Theory and Practice Naomi Assia Advocate 相似文献
The study included a review of the records of 400 men convicted of homicide, which was 43 percent of those serving time in Mexico City prisons for such crimes. Our sample also included the 50 women prisoners in Mexico City convicted of homicide. We enjoyed full access to files regarding the prisoners and conducted in‐depth interviews with all of the women in an effort to reconstruct their life stories. We undertook this review in an effort to record the types of homicide most frequently committed by men and contrasted those with trends among the women prisoners. We also hoped to determine whether differences existed in the way the system of justice dealt with men and women. In both cases we uncovered relevant information that had not been dealt with in previous Mexican studies, such as the fact that in homicide cases in Mexico City women draw sentences that are 25 percent longer than that of their male counterparts. 相似文献
By examining the implementation challenges facing other gender equality measures and localization programs that seek more effective implementation of the Women, Peace, and Security Resolutions, the following argues that a bottom-up approach rather than a top-down approach must be considered more seriously by international actors supporting implementation and integration of international human rights law, not only for the obvious reason that it emboldens local agency in the adoption process, but also because it is likely to produce outcomes that are meaningful and sustainable for the communities most affected by these provisions.
As such, continued emphasis on change that emanates from the top down in a given country often ignores the reality that gender equality measures in international human rights law are often perceived by governments and civil society actors as a serious disruption to domestic gender norms. Sole reliance on state institutions to deliver these commitments is flawed because it fails to recognize the necessary dialog and contestation among various stakeholders concerning the role of external norms in a local context. 相似文献
Computer Law, Colin Tapper, Longman, London and New York, 1983 Third Edition, £9.50
Understanding Computer Contracts, Martin Edwards, Waterlow Publishers, 1983 £6.50
Data Protection: Perspectives on Information Privacy, Edited by Colin Bourn & John Benyon, Department of Adult Education, University of Leicester, 1983 £5
The Computer in Court, Alistair Kelman and Richard Sizer, Gower Publishing Company, 1982 £15.50
Principles of Database Systems, Jeffrey D Ullman, Pitman Publishing Ltd, 1982 Second Edition £13.95
Computers and the Law Teacher, A report of the proceedings of a conference held at North Staffordshire Polytechnic, Edited by David V Marshall, North Staffordshire Polytechnic, 1983 £3 相似文献
Plastic and Electronic Money: New Payment Systems and Their Implications Patrick Frazer Woodhead Faulkner Limited 1985 £35
A User's Guide To Computer Contracting: Forms, Techniques and Strategies Davis, Allen, Bowman and Armstrong Harcourt Brace Jovanovich 1985, $75
Legal Protection of Computer Programs and Data C. Millard Sweet & Maxwell/Stevens 1985, £24
Piracy of Phonograms Gillian Davies ESC Publishing Ltd. 1986. 2nd edition. £17.95.
Biotechnology and Patent Protection—An International Review F. K. Beier, R. S. Crespi and J. Straus O.E.C.D. 1985, £5
Protecting Privacy in Two‐Way Electronic Services David H. Flaherty Mansell Publishing Company 1985, £23.50
High‐Tech Espionage Jay Tuck Sidgwick and Jackson Ltd 1980, £10.95 相似文献
Legal Protection of Computer Programs in Europe — a Guide to the EC Directive Bridget Czarnota and Robert J Hart Butterworths 1991. ISBN 0 406 00542 7
Intellectual Property Rights in Sound Recordings, Film and Video J A L Sterling Sweet and Maxwell 1992. ISBN 0 421 4570 9
The European Market Place James Hogan Macmillan 1991. ISBN 0 333 51858 6
Intellectual Property D Bainbridge Pitman 1992. ISBN 0 273 034265 X 相似文献