首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Stewart and I have lived through the legal adversary system and we know what havoc it could have wrought on our family…. We were nuts. We were crazy. We were your average psychotic divorcing parents…. What you do not see is we get well. We bailed out of the adversary court system because we could see it was no help to us. We were the lucky ones…. There are thousands like us who could use your help before the war gets started.
—Parent at the 1978 Midwinter Association of Family and Conciliation Courts Conference, Los Angeles.  相似文献   

2.
We discuss the characteristics of academic “spin-off policies” in environments outside of high tech clusters and where technology transfer and entrepreneurship infrastructures have been weak. We explore whether the policies could explain the lack of growth potential of spin-off ventures that have repeatedly observed. We studied the case of Belgium, gathering data from nine of spin-off policies in the eight largest academic institutions and in 47 firms. We propose that spin-off policies in academic institutions significantly affect the growth potential of ventures.  相似文献   

3.
In this article, we use qualitative interviews with female inmates to examine how these women describe the consequences of girlfriend fights in prison. We find that they describe these fights as both social and pervasive. We also find that those who were counseled by staff members describe being empowered by the event. We argue that prison officials must use better methods of identifying and addressing partner violence in prison. We also recommend the use of widespread programs aimed at reducing partner violence.  相似文献   

4.
Postmodern analysis has suggested new directions in critical criminology. We first situate the development of postmodern analysis, particularly chaos, catastrophe, Lacanian psychoanalytic, and edgework theory. One more recent derivative of a postmodern approach, and as of yet undeveloped, is quantum holography. This article develops a process-informational paradigm rooted in quantum holography. We argue that the noosphere we operate within needs to be challenged. We argue, moreover, criminology lacks a subject, a viable agent. We offer Schema QD, an inter- and intra- subjective agent that is neither a transcendental nor passive subject. We provide short examples of applications in this area meant as suggestive not exhaustive, and conclude with future directions.  相似文献   

5.
We discuss measurement issues in crime rates in a cross-country comparative perspective. We show that while homicide and general crime rates follow quite similar patterns in the US this is not always the case in Europe. We provide an explanation of the observed patterns based on the use of fire harms.  相似文献   

6.
Criminal Law and Philosophy - We seem to be responsible for our beliefs in a distinctively epistemic way. We often hold each other to account for the beliefs that we hold. We do this by criticising...  相似文献   

7.
Abstract:  The behavioral patterns of nocturnal oviposition represent a window of time that potentially has a large impact on postmortem interval estimations. We investigated the behavioral patterns of carrion flies at night by exposing euthanized rats between sunset and sunrise to see if carrion flies oviposited upon the carrion over two consecutive summers. We investigated urban and rural locations, in both lit and unlit conditions with n  = 125. We found that nocturnal ovipositing did not occur in the Cincinnati metropolitan area. We conclude that nocturnal oviposition is an unlikely event in the Cincinnati metropolitan area.  相似文献   

8.
We provide a short overview on some current issues in the fields of forensic genetics and ancient DNA (aDNA) analysis. We discuss about the existence of the possible points of contact between the two disciplines, in terms of open problems and the inherent approach to their solution. We mainly focus on the problem of results authentication, its theoretical and technical aspects.  相似文献   

9.
We report here lessons learned from an autopsy case involving radioactive materials. We performed an autopsy of an unidentified mummified man with no available medical history whom from imaging findings we suspected had received radioactive seed implants for prostate brachytherapy. We returned the excised prostate and seeds to the body. A few days later, the body was identified by DNA matching and cremated. According to the man's medical record, he had undergone iodine‐125 seeds implantation for prostate cancer 11 months earlier. We should have removed the radioactive seeds from the body to prevent radiation exposure to the bereaved family and/or environmental pollution due to cremation. Surprisingly, one seed was found in the stored prostate specimen. Forensic experts should be cognizant of the risk of both radiation exposure in the autopsy room and environmental pollution. We must remain abreast of the latest advances in medicine.  相似文献   

10.
《Federal register》1990,55(50):9538-9610
This rule revises regulations for laboratories regulated under the Medicare, Medicaid and Clinical Laboratories Improvement Act of 1967 (CLIA '67) programs. The revisions recodify the regulations for these programs into a new part 493 in order to simplify administration and unify the health and safety requirements for all programs as much as possible. We will now have a single set of regulations for the three programs, with an additional subpart for the licensure procedures unique to the CLIA program. We are revising the regulations to remove outdated, obsolete and redundant requirements, make provision for new technologies and place increased reliance on outcome measures of performance. We provide for new uniform proficiency testing standards. We have also added requirements for additional specialties, such as clinical cytogenetics. We also implement the now and self-implementing provisions of the Clinical Laboratory Improvement Amendments of 1988 (CLIA '88).  相似文献   

11.
《Justice Quarterly》2012,29(4):683-695

We examine all 50 states' legal codes to determine the roles and tasks that state legislatures require of police. We find that law enforcement is most prevalent, followed by peacekeeping and service roles. We make suggestions for remedying the lack of the service role in state legislative definitions of police.  相似文献   

12.
We have analysed the information in 342 police reports of stranger sexual offences recorded in 2010. We have carried out a multiple correspondence analysis and a cluster analysis using modus operandi variables to identify differential profiles in these types of sexual offences. We have come up with three profiles of stranger sexual offences, which concur in the two techniques used. By analysing the personal variables of the offenders with such profiles, we have found differences in terms of the offender’s country of origin and age. We will discuss the consequences of these results on the police investigation of stranger sexual offences.  相似文献   

13.
Research and theorizing about communities and crime has largely focused on internal neighborhood dynamics, to the neglect of factors external to the community that may be important processes in shaping community crime rates. We argue that subprime lending practices and the foreclosures that result may result in higher crime rates. We utilize data from the Summit County Lending Study, the Akron Police Department, and the 2000 U.S. Census to test the hypothesis that subprime lending foreclosures increase crime in urban neighborhoods. We find that subprime lending foreclosures have substantial impact on crime counts, net of controls. We conclude that additional research and theorizing about the role of external factors in the disorganization model is required.  相似文献   

14.
The occurrence of germline mutations at microsatellite loci poses problems in ascertaining non-fatherhood status in paternity testing. We describe the appropriate probabilistic analysis for computing the likelihood ratio in favour of paternity while allowing for mutation, for all 18 relevant combinations of seemingly incompatible parental genotypes. We allow arbitrary and possibly different mutation rates in paternal and maternal germlines. We describe a stationary mutation model for expressing the required allele-specific transition mutation rates in terms of overall mutation rates, and compare the likelihood ratios calculated from this and from other mutation models suggested in the literature. We also show how to derive an upper bound on the likelihood ratio, depending only on the overall mutation rate.  相似文献   

15.
This paper examines the publicly visible aspects of counter-terrorism activity in pedestrian spaces as mechanisms of disruption. We discuss the objectives of counter-terrorism in terms of disruption of routine for both hostile actors and general users of public spaces, categorising the desired effects as 1) triangulation of attention; 2) creation of unexpected performance; and 3) choreographing of crowd flow. We review the potential effects of these existing forms of disruption used in counter-terrorism. We then present a palette of art, advertising, architecture, and entertainment projects that offer examples of the same disruption effects of triangulation, performance and flow. We conclude by reviewing the existing support for public art in counter-terrorism policy, and build on the argument for art as an important alternative to authority. We suggest that while advocates of authority-based disruption might regard the playfulness of some art as a weakness, the unexpectedness it offers is perhaps a key strength.  相似文献   

16.
We have developed a tool to extract the contents of volatile memory of Apple Macs running recent versions of OS X, which has not been possible since OS X 10.4. This paper recounts our efforts to test the tool and introduces two visualization techniques for that purpose. We also introduce four metrics for evaluating physical memory imagers: correctness, completeness, speed, and the amount of “interference” an imager makes to the state of the machine. We evaluate our tool by these metrics and then show visualization using dotplots, a technique borrowed from bioinformatics, can be used to reveal bugs in the implementation and to evaluate correctness, completeness, and the amount of interference an imager has. We also introduce a visualization we call the density plot which shows the density of repeated pages at various addresses within an image. We use these techniques to evaluate our own tool, Apple’s earlier tools, and compare physical memory images to the hibernation file.  相似文献   

17.
We estimate the degree of racial disparity in police vehicular stops separately for local and state police in North Carolina in the year 2000. We introduce four mechanisms that might produce racial disparities in police stops—racial profiling, race sensitive police deployment, cognitive bias and stereotyping, and prejudice. We then model the relative odds of police vehicle stops as a function of race, driving behavior, and other demographic statuses separately by police organization type, with controls for omitted variable bias at both the driver and spatial level. We find only weak evidence of racial disparity in stops by officers of the state highway patrol but stronger evidence in those made by local police officers.  相似文献   

18.
We report a patient with dementia due to B-12 deficiency and syphilis who presented to a forensic hospital after killing his ex-wife with a gun. Despite current awareness on the occurrence of aggression and violence in patients with dementia, there has been no report discussing dementia secondary to an infectious or nutritional origin causing homicide or severe violent behavior. We discuss possible mechanisms and several predisposing factors for violent behavior in the elderly. We also discuss use and access of a gun in demented patients and its complications. We recommend availability of neuropsychiatric assessments in the elderly, limitation of gun access to demented patients and inquiry about weapon possession in the elderly.  相似文献   

19.
Does the source of campaign funds influence legislative polarization? We develop competing theoretical expectations regarding the effects of publicly financed elections on legislative voting behavior. To test these expectations, we leverage a natural experiment in the New Jersey Assembly in which public financing was made available to a subset of members. We find that public financing exerts substantively negligible effects on roll‐call voting. We then find a similar result in an examination of state legislatures. We conclude that, counter to the logic of the US Supreme Court, pundits, and reformers, the source of campaign funds exerts minimal influence on polarization.  相似文献   

20.
We characterize optimal economic growth in an endogenous growth model in which production requires public capital (a stock) and public services (a flow) in addition to private capital and labor. We analyze the comparative static effects of changes in the fundamental technological and preference parameters of the model on the optimal values of several variables, such as the optimal rate of growth and the optimal allocation of resources among consumption, the provision of public services, and investment in public and private capital. We show that the general optimal path converges in finite time to the balanced growth optimal path. We relate our paper to important contributions to the existing literature by obtaining them as special cases of our model.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号