首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 16 毫秒
1.
2.
3.
4.
5.
6.
7.
8.
Some psychiatrists misuse theoretical concepts beyond their generally accepted dimensions in an attempt to support a conclusion favorable to a litigant or defendant. In the case presented, the concept of identification with the aggressor was used in an attempt to eliminate or minimize the effect of a confession and to buttress the claim that the confession itself was false. Quotations from the actual reports and testimony are used to reflect both this tactic and the context in which these issues were pursued, including a rather startling admission by the psychiatrist dealing with the thoroughness of his professional effort. A brief history of "identification with the aggressor" is presented, a history which contrasts with its application to rather routine police questioning. Similarly, skepticism is clearly merited when a psychitrist testifies as to truthfulness or falsity of a statement.  相似文献   

9.
10.
11.
12.

Objective

Crime prevention has entered a new, more robust phase of research activity and holds greater relevance to policy and practice today than ever before. It stands as an important component of an overall strategy to reduce crime. This paper sets out a modest proposal for a new crime policy to help build a safer, more sustainable society.

Materials and methods

Narrative meta-review of the crime prevention literature.

Results

The central features include: ensuring that the highest quality scientific research is at center stage in the policy-making process; overcoming the “short-termism” politics of the day; and striking a greater balance between crime prevention and crime control. Both simulation studies and experiences in Washington State show that early prevention can reduce crime, save money, and reduce the need for costly incarceration.

Conclusions

Quality criminological research should be used to strike a policy balance between crime prevention and crime control.  相似文献   

13.
The 2015 Hatton Garden Heist was described as the ‘largest burglary in English legal history’. However, the global attention that this spectacular crime attracted to ‘The Garden’ tended to concentrate upon the value of the stolen goods and the vintage of the burglars. What has been ignored is how the burglary shone a spotlight into Hatton Garden itself, as an area with a unique ‘upperworld’ commercial profile and skills cluster that we identify as an incubator and facilitator for organised crime. The Garden is the UK’s foremost jewellery production and retail centre and this paper seeks to explore how Hatton Garden’s businesses integrated with a fluid criminal population to transition, through hosting lucrative (and bureaucratically complex) VAT gold frauds from 1980 to the early 1990s, to become a major base for sophisticated acquisitive criminal activities. Based on extensive interviews over a thirty year period, evidence from a personal research archive and public records, this paper details a cultural community with a unique criminal profile due to the particularities of its geographical location, ethnic composition, trading culture, skills base and international connections. The processes and structures that facilitate criminal markets are largely under-researched (Antonopoulos et al. 2015: 11), and this paper considers how elements of Hatton Garden’s ‘upperworld’ businesses integrated with project criminals, displaced by policing strategies, to effect this transition.  相似文献   

14.
15.
16.
17.
ABSTRACT

This article investigates the role of crime scene technicians in the Swedish criminal justice system, and particularly how Swedish crime scene technicians not only examine crime scenes but also facilitate the criminal justice system’s joint production of forensic evidence. It proposes thinking about the criminal justice system as a conglomeration of epistemic cultures, that is, of communities with different ways of producing and understanding forensic evidence. Such a perspective makes it possible to understand interprofessional frictions as epistemic frictions as well as to draw attention to the facilitations, mediations and translations that crime scene technicians perform. This perspective also makes it possible to illuminate how the crime scene technicians’ professionalization – a professionalization from the outside – affects both their future crime scene work and their facilitations.  相似文献   

18.
Abstract

Jurors are often provided with confession evidence and must determine whether the confession was true, false, coerced, or voluntary. As more juveniles are tried in adult criminal court, jurors must increasingly make these determinations about minors’ statements. In this study, mock jurors read an actual interrogation of a child suspect that included confession evidence, and then provided judgments regarding the coerciveness of the interrogation, the child's and police's knowledge and behaviors, and guilt. Child age (11 versus 14 years) and gender were manipulated and examined in relation to participant gender and pre-existing sympathy levels for juvenile offenders. Factors external to the suspect – participant gender and sympathy for juvenile offenders – interacted with child suspect factors to influence perceptions of the child, the interrogation, and guilt. When multiple factors were considered, perceptions of suspect credibility and police fairness were the strongest predictors of guilt and perceived culpability. The findings have implications for decision-making in cases involving juvenile defendants and confession evidence.  相似文献   

19.
The intention of this paper is to serve in part as a warning to the international community concerned about corruption, to keep the focus based on the critical analysis of empirically verifiable information. In ways similar to how theorists spoke about organized crime in the 1960's and 1970's, articles today attempt to refer to corruption as if there were one agreed upon definition. However, like the concept “organized crime”, the term “corruption” involves diverse processes which have different meanings within different societies. Corruption (or a focus on corruption), may be the means toward very diverse ends and each may have a different impact on the society. While in some societies corruption may correctly be seen to be the “cause” of forms of social disorganization, in other situations corruption may be the “result” of larger changes. Understanding the processes within a specific context allows one to understand the nature of the corruption. Corruption rhetoric may too easily become apolitical platform for ranking and evaluating nations as to their worth based on criteria that lose meaning when applied across jurisdictions. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   

20.
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号