Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 15
- Criminal justice, Administration of 6
- Law 5
- Criminal procedure 3
- Evidence, Criminal 2
- Admissible evidence 1
- Capital punishment 1
- Cases 1
- Crime 1
- Crimes against humanity (International law) 1
- Criminal Law 1
- Criminal Pleading 1
- Criminal Practice 1
- Criminal Procedure 1
- Criminal investigation 1
- Evidence 1
- Evidence (Law) 1
- Evidence, Hearsay 1
- Fraud investigation 1
- Human rights 1
- International criminal courts 1
- International criminal law 1
- Investigations 1
- LAW / International 1
- Language 1
- Law enforcement 1
- Philosophy 1
- Police 1
- Police-community relations 1
- Reputation (Law) 1
-
1361
Clearing the forest, adding social struggles: territorialities and alternatives in the Argentinian environmental disaster
Published 2021-05-01“…Likewise, it becomes evident how the State has criminalized these struggles in its attempts to break down the social coalitions built by the assemblies and social movements, involved in building a collective counter hegemony. …”
Get full text
Article -
1362
Information security of minors: individual subjects of the Russian Federation organization experience
Published 2023-02-01“…The following regions were studied: Komi Republic, Perm Krai, Orenburg Region, Republic of Tatarstan. The state of criminalization of minors has been recorded by region. …”
Get full text
Article -
1363
I segni della colpa: il giurista e la lettura del corpo a Venezia nella prima età moderna
Get full text
Article -
1364
Organization of minors’ protection from destructive information environment: Russian federal cities case study
Published 2023-04-01“…Cities of federal significance have been studied from the standpoint of the criminalization of minors. The regional legislation governing the protection of minors from the destructive information environment has been studied. …”
Get full text
Article -
1365
La migration clandestine mexicaine comme un crime : commentaires sur quelques effets de la loi SB. 1070 de l’État de l’Arizona
Published 2011-11-01“…However this Act is to first practical consequence criminalize a type of migratory situation and then condemn the Mexican population which, according to social representations xenophobic, embodies “better” (i.e. tort of faces), the figure of the underground railroad to the United States. …”
Get full text
Article -
1366
ABOUT THE PREREQUISITE SITUATION IN THE CASE OF THE OFFENSE OF MISAPPROPRIATION OF A WORK
Published 2024-05-01“…Article 197(1) of Law no. 8/1996 on copyright and related rights, republished, criminally sanctions the appropriation of a work or part of a work by a person who has not contributed to the creation of that work and who presents it as his/her own creation. …”
Get full text
Article -
1367
Dva příběhy z kriminálního podsvětí – padělatelé peněz na hradě Žampachu a přepadání Židů v roce 1542
Published 2010-07-01“…The statements of all four criminals were transcribed in the Achtbuch kept in Pardubice. …”
Get full text
Article -
1368
Analysing the manipulation of the youths, election violence and democratic retrogression in South Africa
Published 2025-01-01“…Several factors have been identified as the drivers of South African youths into different forms of criminalities. Prominent among them are the pauperization of the youths by the state, unemployment, and their manipulation by the political elite. …”
Get full text
Article -
1369
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01“…Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. …”
Get full text
Article -
1370
The icon of Ukrainian Nazis: on the question of the historical assessment of the «heroes» under the Protection of the Virgin Mary and their modern admirers
Published 2024-05-01“…The presence of specific common features in the biographies depicted on the icon of Nazi criminals has been established. The author emphasizes that people who publicly glorify Ukrainian nationalists through an icon are subject to Article 4 of the International Convention on the Elimination of All Forms of Racial Discrimination, which requires states parties to the Convention to prosecute them.…”
Get full text
Article -
1371
Beliefs about Pedophilia and the Attribution of Punishment for Child Sexual Abusers
Published 2024-12-01“…The majority of participants in the study believe that people with pedophilia do not have control over their actions, even if they are perceived as ill or criminals. The results of this study have shown that chemical castration is the most preferred punishment for persons who sexually abuse children. …”
Get full text
Article -
1372
“They Threw Her in with the Prostitutes!”: Negotiating Respectability between the Space of Prison and the Place of Woman in Egypt (1943–1959)
Published 2020-03-01“…The student demonstrations of 1945-46 presented the semi-colonial Egyptian state with a new and unique problem: up until that point women prisoners were thought of only as common criminals – drug-dealers, prostitutes (sic) and murderers. …”
Get full text
Article -
1373
Trauma, Justice, and Equity: Using Critical Theories and Concepts to Address Systemic Harm Among Youth Punishment System-Involved Black Girls
Published 2025-01-01“…This article argues that addressing the complex needs of this population requires recognition that Black girls’ harm is criminalized and, therefore, inextricably linked to their YPS-involvement, so a comprehensive, culturally responsive approach that includes trauma-informed care, healing-centered engagement, and holistic support systems are needed. …”
Get full text
Article -
1374
EVALUATING THREATS OF ARMED BANDITRY ON HUMAN AND FOOD SECURITY IN SHIRORO LOCAL GOVERNMENT AREA OF NIGER STATE, NIGERIA
Published 2023-12-01“…The focus was on Shiroro Local Government Area, situated near the border of Niger and Kaduna State, which has witnessed a notable increase in bandit criminalities. The study revealed a distressing percentage of human casualties, accompanied by a significant rise in hospitalizations and trauma resulting from frequent attacks in the region. …”
Get full text
Article -
1375
INVESTIGATING POPULATION BALANCE IN THE STATE OF GEORGIA USING SPATIAL CLUSTERING
Published 2024-11-01“…Identifying areas on geographic maps, where the concentration of points (elderly, sick, criminals, certain animal species, etc.) is significant, is important in many fields such as epidemiology, politics, criminology, zoology, and so on. …”
Get full text
Article -
1376
POLITICAL STRUGGLE OVER THE IMMIGRATION REFORM DURING G.W.BUSH PRESIDENCY
Published 2014-06-01“…Democrats made considerable concessions, while moderate Republicans were willing to meet them halfway, but the conservatives would not let the Congress adopt a new legislation, calling any attempt at comprehensive immigration reform an amnesty for the criminals. During the 107-110 Congresses the immigration reform was thoroughly worked through from both sides, but the proposed bills rarely got to the floor and never passed both Houses. …”
Get full text
Article -
1377
Penetration of Muamalah Jurisprudence into Indonesian Law
Published 2024-11-01“…Meanwhile, in terms of legal substance, the legal norms of muamalah have manifested into various laws and regulations related to economic and social activities, which are basically related to the determination of sharia principles as the main reference for the activities of financial institutions, the use of muamalah contracts in sharia economic activities, and the criminalization of violations of sharia principles.…”
Get full text
Article -
1378
The Ethics of Refusal in Terrence Malick’s A Hidden Life
Published 2025-02-01“…The film offers a nuanced and poetic depiction of Austrian peasant Franz Jägerstätter (1907–1943), who refused to give an oath of loyalty to Hitler (Führereid), and was subsequently imprisoned and executed under the Nazi laws criminalizing conscientious objection as an “offence of sedition.” …”
Get full text
Article -
1379
Survey on Ethereum phishing detection technology
Published 2023-04-01“…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
Get full text
Article -
1380
War crimes and spirituality: to prosecute or to forgive and reconcile
Published 2023-09-01“…But no matter what, the question is whether war crimes trials and punishments for war criminals will eliminate the consequences of those crimes, allow the victims to free themselves from that victimhood, and societies at war to find peace and rebuild.…”
Get full text
Article