首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
While reflective spectrophotometry is an established method for measuring macroscopic hair colour, it can be cumbersome to use on a large number of individuals and not all reflective spectrophotometry instruments are easily portable. This study investigates the use of digital photographs to measure hair colour and compares its use to reflective spectrophotometry. An understanding of the accuracy of colour determination by these methods is of relevance when undertaking specific investigations, such as those on the genetics of hair colour. Measurements of hair colour may also be of assistance in cases where a photograph is the only evidence of hair colour available (e.g. surveillance). Using the CIE L*a*b* colour space, the hair colour of 134 individuals of European ancestry was measured by both reflective spectrophotometry and by digital image analysis (in V++). A moderate correlation was found along all three colour axes, with Pearson correlation coefficients of 0.625, 0.593 and 0.513 for L*, a* and b* respectively (p-values = 0.000), with means being significantly overestimated by digital image analysis for all three colour components (by an average of 33.42, 3.38 and 8.00 for L*, a* and b* respectively). When using digital image data to group individuals into clusters previously determined by reflective spectrophotometric analysis using a discriminant analysis, individuals were classified into the correct clusters 85.8% of the time when there were two clusters. The percentage of cases correctly classified decreases as the number of clusters increases. It is concluded that, although more convenient, hair colour measurement from digital images has limited use in situations requiring accurate and consistent measurements.  相似文献   

2.
The High Court has recently delivered judgment on the judicial review of the Digital Economy Act 2010 (DEA) and the draft Costs Order1 on application by BT and Talktalk.2 Mr Justice Kenneth Parker rejected the application on all but one ground (one aspect of the cost sharing arrangement). See: The Queen on the Application of British Telecommunications Plc, Talktalk Telecom Group Plc v The Secretary of State for Business, Innovation and Skills [2011] EWHC 1021 (Admin), Judgment of 20. April 2011.  相似文献   

3.
On 6 October 2020, the Grand Chamber of the European Court of Justice rendered two landmark judgments in Privacy International, La Quadrature du Net and Others, French Data Network and Others as well as Ordre des barreaux francophones et germanophone and Others. The Grand Chamber confirmed that EU law precludes national legislation which requires a provider of electronic communications services to carry out the general and indiscriminate transmission or retention of traffic data and location data for the purpose of combating crime in general or of safeguarding national security.In situations where a Member State is facing a serious threat to national security which proves to be genuine and present or foreseeable, such State may however derogate from the obligation to ensure the confidentiality of data relating to electronic communications by requiring, by way of legislative measures, the general and indiscriminate retention of this data for a period which is limited in time to what is strictly necessary but which may be extended if the threat persists.1 In respect of combating serious crime and preventing serious threats to public security, a Member State may also provide for the targeted retention of this data and its expedited retention. Such an interference with fundamental rights must be accompanied by effective safeguards and be reviewed by a court or by an independent administrative authority. It is likewise open to a Member State to carry out a general and indiscriminate retention of IP addresses assigned to the source of a communication where the retention period is limited to what is strictly necessary or even to carry out a general and indiscriminate retention of data relating to the civil identity of users of means of electronic communication. In the latter case, the retention is not subject to a specific time limit.  相似文献   

4.
Herbert Packer’s models of the criminal process are criminal justice theorems, often the foundation of student introduction to the field in introductory textbooks. To date, there is little empirical analysis of the conceptual foundations of the process-based models, namely that courts are more efficient through the utilization of plea bargains, while an increase in trials necessarily decreases efficiency. The present results reveal wide variability in Florida circuit criminal court efficiency within and between circuits from 2004/05 to 2010/11. Regression analysis revealed that the year over year difference in both plea bargain (β?=?.14) and trial percentage (β?=?.13) significantly predicted (p?<?.05) year over year changes in efficiency, but explained a small amount of the variance (R 2?=?.026) controlling for other factors (total model R 2?=?.58–.62). These results show there is more capacity for trials within the Florida courts, and an increase in trials does not negatively impact court efficiency as expected but that other factors are far more relevant in explaining changes in efficiency outcomes. Furthermore, the Packer “assembly line” analogy, a basic tenet of the criminal process, is not found: plea bargains do not strongly predict or explain court efficiency, with structures playing a greater role in court outcomes than the processes conceptualized by Packer. The application to courts and impact on criminal justice education are discussed.  相似文献   

5.
The Art. 29 Working Party (hereinafter “Art. 29 WP”) is an influential body comprised of representatives from the Member State Data Protection Authorities2 established under the Data Protection Directive 95/46/EC, has recently issued an opinion with the Working Party on Police and Justice. This is quite significant, since the opinion sets out some of the issues that will need to be addressed in the lead up to the revision of the Data Protection Directive 95/46/EC.3 This comes at a time, when there have been discussions on the current application of the European Data Protection Directive to the internet,4 (such as social networking) and the recent European Commission’s consultation on the legal framework for the fundamental right to protection of personal data. Not least, there have been a number of cases brought before the European Court of Justice dealing with the partial implementation of the Data Protection Directive 95/46/EC.5The aim of this paper is to consider in detail the issues set out by the Art. 29 WP and the likely challenges in revising the Data Protection Directive 95/46/EC.  相似文献   

6.
7.
The 12 Member States of the European Economic Community (EEC) are legally obliged by the Treaty of Rome, as amended by the Single European Act, to abolish all of the remaining physical, technical and fiscal barriers between them by 31 December 1992. The Single European Act, which sets the 1992 deadline, defines the envisaged internal market as “an area without internal frontiers”.The creation of a common European market for telecommunications services and equipment is both an essential prerequisite and an important part of the “internal market”.In its Green Paper on the Development of the Common Market for Telecommunications Services and Equipment — “the Green Paper”1)) — and a follow-up Communication2), the Commission of the European Communities (“the Commission”) has set forth its main policy proposals in the telecommunications field. Implementation of these policy proposals by means of Community law directives is progressing rapidly, in particular with respect to terminal equipment. On 16 May 1988, the Commission issued a“Commission Directive on Competition in the Markets in Telecommunications Terminal Equipment” — “Terminal Equipment Directive”3) based on its regulatory powers under Art. 90(3) of the Treaty of Rome (“EEC Treaty”).This article explores the regulatory scope of the Terminal Equipment Directive which has recently been challenged by the French government before the European Court of Justice.  相似文献   

8.
On 16 July 2020, the Grand Chamber of the European Court of Justice rendered its landmark judgment in Case C-311/18 Data Protection Commissioner v. Facebook Ireland Ltd and Maximillian Schrems (“Schrems II”). The Grand Chamber invalidated the Commission decision on the adequacy of the data protection provided by the EU-US Privacy Shield. It however considered that the decision of the Commission on standard contractual clauses (“SCCs”) issued by the Commission for the transfer of personal data to processors established in third states was legally valid.The legal effects of the judgment should first be clarified. In addition, it has far-reaching implications for companies which transfer personal data from the EU to the US. The judgment of the Grand Chamber has also far-reaching implications for transfers of personal data from the EU to other third states. Last, it has far-reaching implications for the UK in the context of Brexit.© 2020 Published by Elsevier Ltd. All rights reserved.  相似文献   

9.
This paper scrutinises the legal protection of consumer rights in on-line contracts through the application of Khiyar al-??Aib (option of defect). Khiyar al-??Aib is a legal Islamic mechanism by which, one party, both parties or even a third party can nullify a contract, electronically or conventionally. Khiyar (option) means the authority to nullify a contract and Aib means defect. In fact, it is a right given to the purchaser to cancel the contract if he discovers that the object acquired has defect that diminishes its value. In on-line contracts, the consumer has no direct contact with the merchant and cannot easily verify the quality of the goods, thus creating a situation in which contracting parties are not at equal bargaining strength. Therefore, application of Khiyar al-??Aib (option of defect) would be helpful in protecting consumer rights in the virtual world. This paper explores the Islamic principles by taking Iranian laws as well as the European law as a point of reference.  相似文献   

10.
11.
InRegulating the Poor Piven and Cloward touched off controvery among academicians when they argued that the poor benefitted from civil turmoil. Those who believed that violence of any sort was wrong were inclined to believe that violence must also be ineffective. Studies done on the thesis repeatedly concluded that civil turmoil did help to advance the interests of the poor. Pluralists continued to argue that government responded to needs, not demands. For the twenty years following publication ofRegulating the Poor nothing like the urban riots of the sixties occurred in U.S. cities. Piven and Cloward had argued that “a placid poor hardly constitute a political constituency whose interests must be taken seriously”.1 To what extent has recent history shown that the state will respond to the needs of the poor even in the absence of turmoil?  相似文献   

12.
既判力相对性原则是既判力制度中的一项基本原则,是指判决的既判力在一般情形下仅发生于当事人之间.这一原则不仅有助于纠纷的终局解决,保障法律关系的稳定,同时能够为没有参加诉讼的案外第三人的民事权益提供程序保障.作为既判力相对性原则的例外,确定判决对于诉讼系属后的承继人及为当事人或其承继人占有请求之标的物者,亦有效力.为他人之利益而作为原告或被告者之确定判决,对于该他人也有效力.我国现行民事诉讼法尚未明确规定既判力相对性原则.这一原则的缺失导致了民事诉讼法在第三人权益的程序保障方面存有重大缺陷,也造成了实践中第三人撤销之诉适用的混乱局面.应当完善既判力制度,确立既判力相对性原则,将第三人撤销之诉的适用限制在确定判决既判力相对性的例外情形.  相似文献   

13.
On 5 April and 20 September 2022, the Grand Chamber of the European Court of Justice rendered three judgments in the cases of Dwyer, SpaceNet and VD and SR. It mainly reiterated its own applicable case law on the retention of and access to traffic and location data. In the VD and SR judgment, the Grand Chamber however expanded its scope to the area of market abuse.Legislation adopted by Member States and decisions rendered by most domestic courts, tribunals and judges do not fully comply with the case law of the Grand Chamber on the retention of and access to traffic and location data. In this particular context, the EU legislature should urgently adopt EU secondary legislation on the retention of personal data to provide legal clarity to all players involved.  相似文献   

14.
15.
Anonymisation of personal data has a long history stemming from the expansion of the types of data products routinely provided by National Statistical Institutes. Variants on anonymisation have received serious criticism reinforced by much-publicised apparent failures. We argue that both the operators of such schemes and their critics have become confused by being overly focused on the properties of the data itself. We claim that, far from being able to determine whether data is anonymous (and therefore non-personal) by looking at the data alone, any anonymisation technique worthy of the name must take account of not only the data but also its environment.This paper proposes an alternative formulation called functional anonymisation that focuses on the relationship between the data and the environment within which the data exists (the data environment). We provide a formulation for describing the relationship between the data and its environment that links the legal notion of personal data with the statistical notion of disclosure control. Anonymisation, properly conceived and effectively conducted, can be a critical part of the toolkit of the privacy-respecting data controller and the wider remit of providing accurate and usable data.  相似文献   

16.
The goal of this work was to optimize and validate a fast amplification protocol for the multiplex amplification of the STR loci included in AmpFlSTR® Profiler Plus® to expedite human DNA identification. By modifying the cycling conditions and by combining the use of a DNA polymerase optimized for high speed PCR (SpeedSTAR™ HS) and a more efficient thermal cycler instrument (Bio-RAD C1000™), we were able to reduce the amplification process from 4 h to 26 min. No modification to the commercial AmpFlSTR® Profiler Plus® primer mix was required. When compared to the current Royal Canadian Mounted Police (RCMP) amplification protocol, no differences with regards to specificity, sensitivity, heterozygote peak height ratios and overall profile balance were noted. Moreover, complete concordance was obtained with profiles previously generated with the standard amplification protocol and minor alleles in mixture samples were reliably typed. An increase in n − 4 stutter ratios (2.2% on average for all loci) was observed for profiles amplified with the fast protocol compared to the current procedure. Our results document the robustness of this rapid amplification protocol for STR profiling using the AmpFlSTR® Profiler Plus® primer set and demonstrate that comparable data can be obtained in substantially less time. This new approach could provide an alternative option to current multiplex STR typing amplification protocols in order to increase throughput or expedite time-sensitive cases.  相似文献   

17.
Human provenance studies employing isotopic analysis have become an essential tool in forensic and archaeological sciences, with multi-isotope approaches providing more specific location estimates compared to single isotope studies. This study reports on the human provenancing capability of neodymium isotopes (143Nd/144Nd), a relatively conservative tracer in the environment. Neodymium isotope ratios have only recently been determined on human remains due to low concentrations in human dental enamel (ppb range), requiring thermal ionisation mass spectrometry (TIMS) using 1013 Ω resistors. Dental elements (third molars) from 20 individuals born and raised in the Netherlands were analysed for Nd concentration (n = 12) and Nd isotope ratios (n = 15). The geological control on Nd isotope composition was examined using coupled Nd-Sr isotope analysis of the same third molar. Teeth from different geological environments were also analysed (Caribbean, Columbian, and Icelandic, n = 5). Neodymium elemental concentrations in dental elements ranged between 0.1 and 7.9 ppb (median 0.5 ppb). The Dutch 143Nd/144Nd ratios of the provinces of Limburg and Friesland were between 0.5118 and 0.5121, with Dutch 87Sr/86Sr ratios in agreement with the previously established local range (0.708–0.710). The current findings were compared to previously published results on Nd concentration and composition from Dutch individuals. The concentration of Nd and 143Nd/144Nd ratios were weakly correlated (R2 = 0.47, n = 17) in Dutch human dental enamel. The majority (n = 25, 83.3%) of individuals had Nd and Sr isotope values isotopically indistinguishable from the geological environment in which their third molars formed and mineralised. However, the Nd isotope ratios of the Icelandic individual and several Dutch individuals (n = 4) suggested that Nd in enamel is not solely influenced by geological environment. In order for neodymium isotopes to be quantitatively applied in forensic and archaeological settings further analyses of individuals from various geographical regions with well-defined dietary Nd isotope data are required.  相似文献   

18.
《Digital Investigation》2014,11(1):30-42
The pervasive availability of cheap cloud computing services for data storage, either as persistence layer to applications or as mere object store dedicated to final users, is remarkably increasing the chance that cloud platforms potentially host evidence of criminal activity. Once presented a proper court order, cloud providers would be in the best position for extracting relevant data from their platforms in the most reliable and complete way. However, this kind of services are not so widespread to date and, therefore, the need to adopt a structured and forensically sound approach calls for innovative weaponry which leverage the data harvesting capabilities offered by the low level program interfaces exposed by providers. This paper describes the concepts and internals of the Cloud Data Imager Library, a mediation layer that offers a read only access to files and metadata of selected remote folders and currently supports access to Dropbox, Google Drive and Microsoft Skydrive storage facilities. A demo application has been build on top of the library which allows directory browsing, file content view and imaging of folder trees with export to widespread forensic formats.  相似文献   

19.
Privacy by Design is now enjoying widespread acceptance. The EU has recently expressly included it as one of the key principles in the revised data protection legal framework. But how does Privacy by design and data anonymisation work in practise? In this article the authors address this question from a practical point of view by analysing a case study on EU Financial Intelligence Units (“FIUs”) using the Ma3tch technology as additional feature to the existing exchange of information via FIU.NET decentralised computer network. They present, analyse, and evaluate Ma3tch technology from the perspective of personal data protection. The authors conclude that Ma3tch technology can be seen as a valuable example of Privacy by Design. It achieves data anonymisation and enhances data minimisation and data security, which are the fundamental elements of Privacy by Design. Therefore, it may not only improve the exchange of information among FIUs and allow for the data processing to be in line with applicable data protection requirements, but it may also substantially contribute to the protection of privacy of related data subjects. At the same time, the case study clearly shows that Privacy by Design needs to be supported and complemented by appropriate organisational and technical procedures to assure that the technology solutions devised to protect privacy would in fact do so.  相似文献   

20.
Combining key attributes of GeneMapper® ID and FSS-i3 software packages with our internally created LIMS and some additional analytical programming has permitted us to increase quality checks on DNA profile data review while eliminating analysis time.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号