首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
法律   7篇
综合类   5篇
  2022年   1篇
  2014年   2篇
  2013年   1篇
  2011年   1篇
  2009年   1篇
  2008年   2篇
  2007年   1篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
排序方式: 共有12条查询结果,搜索用时 15 毫秒
1.
高校学生宿舍个人财物被盗,会给学生的学习和生活带来物质的损害,给学生和家长带来精神上的损害和引发学生与校方的争议。高校学生宿舍个人财物被盗有高校管理制度存在漏洞、宿舍管理人员管理制度不健全等6个原因。要解决这个问题,要加强宿舍的安全防范建设、建立"寝室联防"机制、加强高校学生思想道德教育和法制教育和加强公安机关的打击力度。  相似文献   
2.
在新刑事诉讼法实施背景下,传统摸排的侦查方法将逐渐失去其存在的法制土壤。由于入室盗窃案件的因果关联少,侦查工作只能从犯罪现场做起,更突出了现场勘查的重要性。掌握入室盗窃案件的勘查技巧,提高现场勘查质量,全面获取犯罪信息,是迅速侦破入室盗窃案件的前提条件。针对入室盗窃案件的特点,对现场进出口、中心部位以及外围部位等进行重点勘查,运用各种技术手段和经验技巧进行分析和取证是此类案件侦破的有效途径。  相似文献   
3.
There has been much work dedicated to crime analysis and intelligence in recent times. Independently, physical evidence has shown great potential for linking crimes and bringing solid informative data through the increased use of multiple databases. However, their informative potential is still often underestimated and has been poorly integrated into police information systems. We propose a framework that fully introduces this data into an intelligence based system. This framework is built on the study of inference structures extracted from investigators’ every day implicit reasoning processes. Five specific inferences are studied with the particular problem of serial burglary investigation across independent police and legal structures. On the basis of such an analytical approach, a computer prototype has been designed; it has shown great promise and has resulted in several operational successes.  相似文献   
4.
当前,入室盗窃发案的主要原因是存在建筑死角和心理死角等薄弱环节。遏制入室盗窃必须先从阻断入室着手,最终要坚持综合治理、专群结合。  相似文献   
5.
We develop a mathematical framework aimed at analyzing repeat and near-repeat effects in crime data. Parsing burglary data from Long Beach, CA according to different counting methods, we determine the probability distribution functions for the time interval τ between repeat offenses. We then compare these observed distributions to theoretically derived distributions in which the repeat effects are due solely to persistent risk heterogeneity. We find that risk heterogeneity alone cannot explain the observed distributions, while a form of event dependence (boosts) can. Using this information, we model repeat victimization as a series of random events, the likelihood of which changes each time an offense occurs. We are able to estimate typical time scales for repeat burglary events in Long Beach by fitting our data to this model. Computer simulations of this model using these observed parameters agree with the empirical data.
M. B. ShortEmail:
  相似文献   
6.
Despite their widespread implementation, there is a surprising absence of clear‐cut, unambiguous evidence concerning the effectiveness of situational crime prevention approaches (e.g. alarms, neighborhood watch, property‐marking) on residential burglary. This absence of evidence—which should not be confused with a presence of contradictory evidence—stems most notably from the fact that very few of the programs enacted to date have been evaluated under controlled, experimental conditions. The current article describes problems with previous evaluations and advocates the use of a place‐based, randomized experimental design—which this author argues should be easier to implement in Scandinavia than elsewhere.  相似文献   
7.
DNA from door handles on entry doors could provide a clue as to who last left the scene. However, after years of extensive research on DNA transfer and persistence it can be considered common knowledge that general claims like "the last who touched leaves the most DNA" do not hold true. But who's DNA do we find on door handles that are usually used several times per day by the inhabitants? To assess this question, we sampled inside door handles from real-life burglaries and at the same time collected reference samples from all the inhabitants, to determine if we can detect any (major) profiles from non-inhabitants. We also searched to evaluate how often we detect DNA from the person who last touched the door handle as a (major) contributor. Only small amounts of DNA were recovered from the handles, originating most often, but not always, from inhabitants or even the last inhabitant touching the handle.  相似文献   
8.
Crimes come in all shapes and sizes, but relatively little work has been done on offence structure – Robinson's recent functional analysis is perhaps the one obvious exception. This article concentrates on incidents of multiple wrongdoing and suggests that the current substantive law is both inconsistent and confusing. Burglary, for example, is unnecessarily narrowly defined and should be expanded to include broadly similar scenarios. The law is confusing because it conflates qualitatively very different incidents under the same umbrella – serial killers, for example, commit the same crimes as those who kill multiple victims by one act. Not only does the law fly in the face of common sense but it conflicts with the principle of fair labelling – that crimes be defined to reflect their wrongfulness and severity – which seeks to fulfil some important functions in the criminal justice system.  相似文献   
9.
当前,盗窃犯罪已成为阻碍新农村建设的一大不利因素。这类犯罪具有发案率高、侵害对象范围广等特征,左右着农村刑事案件的总量。因此,基层侦查部门应认真研究此类案件的高发原因和特点,采取有针对性的措施,提高打击这类犯罪的能力,为建设新农村、构建和谐农村社区创造良好的治安环境。  相似文献   
10.
Using epidemiological techniques for testing disease contagion, it has recently been found that in the wake of a residential burglary, the risk to nearby homes is temporarily elevated. This paper demonstrates the ubiquity of this phenomenon by analyzing space–time patterns of burglary in 10 areas, located in five different countries. While the precise patterns vary, for all areas, houses within 200 m of a burgled home were at an elevated risk of burglary for a period of at least two weeks. For three of the five countries, differences in these patterns may partly be explained by simple differences in target density. The findings inform theories of crime concentration and offender targeting strategies, and have implications for crime forecasting and crime reduction more generally.
Shane D. JohnsonEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号