Showing 1,361 - 1,380 results of 1,414 for search '"criminal"', query time: 0.06s Refine Results
  1. 1361

    Clearing the forest, adding social struggles: territorialities and alternatives in the Argentinian environmental disaster by Joaquin Ulises Deon

    Published 2021-05-01
    “…Likewise, it becomes evident how the State has criminalized these struggles in its attempts to break down the social coalitions built by the assemblies and social movements, involved in building a collective counter hegemony. …”
    Get full text
    Article
  2. 1362

    Information security of minors: individual subjects of the Russian Federation organization experience by S. E. Titor

    Published 2023-02-01
    “…The following regions were studied: Komi Republic, Perm Krai, Orenburg Region, Republic of Tatarstan. The state of criminalization of minors has been recorded by region. …”
    Get full text
    Article
  3. 1363

    I segni della colpa: il giurista e la lettura del corpo a Venezia nella prima età moderna by Manuela Bragagnolo

    “…In fact, jurists dealt more and more with physiognomy, not only in the Practicae criminals – for example the one by Francesco Casoni – but also through the drafting of treatises on physiognomy, as in the case of Giovanni Ingegneri. …”
    Get full text
    Article
  4. 1364

    Organization of minors’ protection from destructive information environment: Russian federal cities case study by S. E. Titor

    Published 2023-04-01
    “…Cities of federal significance have been studied from the standpoint of the criminalization of minors. The regional legislation governing the protection of minors from the destructive information environment has been studied. …”
    Get full text
    Article
  5. 1365

    La migration clandestine mexicaine comme un crime : commentaires sur quelques effets de la loi SB. 1070 de l’État de l’Arizona by Philippe Schaffhauser

    Published 2011-11-01
    “…However this Act is to first practical consequence criminalize a type of migratory situation and then condemn the Mexican population which, according to social representations xenophobic, embodies “better” (i.e. tort of faces), the figure of the underground railroad to the United States. …”
    Get full text
    Article
  6. 1366

    ABOUT THE PREREQUISITE SITUATION IN THE CASE OF THE OFFENSE OF MISAPPROPRIATION OF A WORK by Ciprian Raul ROMIȚAN

    Published 2024-05-01
    “…Article 197(1) of Law no. 8/1996 on copyright and related rights, republished, criminally sanctions the appropriation of a work or part of a work by a person who has not contributed to the creation of that work and who presents it as his/her own creation. …”
    Get full text
    Article
  7. 1367

    Dva příběhy z kriminálního podsvětí – padělatelé peněz na hradě Žampachu a přepadání Židů v roce 1542 by František Šebek

    Published 2010-07-01
    “…The statements of all four criminals were transcribed in the Achtbuch kept in Pardubice. …”
    Get full text
    Article
  8. 1368

    Analysing the manipulation of the youths, election violence and democratic retrogression in South Africa by Ibrahim Yusuf Didamson

    Published 2025-01-01
    “…Several factors have been identified as the drivers of South African youths into different forms of criminalities. Prominent among them are the pauperization of the youths by the state, unemployment, and their manipulation by the political elite. …”
    Get full text
    Article
  9. 1369

    VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION by E. V. Batueva

    Published 2014-06-01
    “…Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. …”
    Get full text
    Article
  10. 1370

    The icon of Ukrainian Nazis: on the question of the historical assessment of the «heroes» under the Protection of the Virgin Mary and their modern admirers by A. V. Sushko

    Published 2024-05-01
    “…The presence of specific common features in the biographies depicted on the icon of Nazi criminals has been established. The author emphasizes that people who publicly glorify Ukrainian nationalists through an icon are subject to Article 4 of the International Convention on the Elimination of All Forms of Racial Discrimination, which requires states parties to the Convention to prosecute them.…”
    Get full text
    Article
  11. 1371

    Beliefs about Pedophilia and the Attribution of Punishment for Child Sexual Abusers by Gabriela GROZA, Codruța Anamaria RÎNDAȘU

    Published 2024-12-01
    “…The majority of participants in the study believe that people with pedophilia do not have control over their actions, even if they are perceived as ill or criminals. The results of this study have shown that chemical castration is the most preferred punishment for persons who sexually abuse children. …”
    Get full text
    Article
  12. 1372

    “They Threw Her in with the Prostitutes!”: Negotiating Respectability between the Space of Prison and the Place of Woman in Egypt (1943–1959) by Hannah Elsisi

    Published 2020-03-01
    “…The student demonstrations of 1945-46 presented the semi-colonial Egyptian state with a new and unique problem: up until that point women prisoners were thought of only as common criminals – drug-dealers, prostitutes (sic) and murderers. …”
    Get full text
    Article
  13. 1373

    Trauma, Justice, and Equity: Using Critical Theories and Concepts to Address Systemic Harm Among Youth Punishment System-Involved Black Girls by Camille R. Quinn

    Published 2025-01-01
    “…This article argues that addressing the complex needs of this population requires recognition that Black girls’ harm is criminalized and, therefore, inextricably linked to their YPS-involvement, so a comprehensive, culturally responsive approach that includes trauma-informed care, healing-centered engagement, and holistic support systems are needed. …”
    Get full text
    Article
  14. 1374

    EVALUATING THREATS OF ARMED BANDITRY ON HUMAN AND FOOD SECURITY IN SHIRORO LOCAL GOVERNMENT AREA OF NIGER STATE, NIGERIA by DR MUSA EMMANUEL UMARU, DR ALIYU MOHAMMED BELLO, DR CHARLES O. OKWUWA

    Published 2023-12-01
    “…The focus was on Shiroro Local Government Area, situated near the border of Niger and Kaduna State, which has witnessed a notable increase in bandit criminalities. The study revealed a distressing percentage of human casualties, accompanied by a significant rise in hospitalizations and trauma resulting from frequent attacks in the region. …”
    Get full text
    Article
  15. 1375

    INVESTIGATING POPULATION BALANCE IN THE STATE OF GEORGIA USING SPATIAL CLUSTERING by Ali Abolhassani, Somayyeh Tari

    Published 2024-11-01
    “…Identifying areas on geographic maps, where the concentration of points (elderly, sick, criminals, certain animal species, etc.) is significant, is important in many fields such as epidemiology, politics, criminology, zoology, and so on. …”
    Get full text
    Article
  16. 1376

    POLITICAL STRUGGLE OVER THE IMMIGRATION REFORM DURING G.W.BUSH PRESIDENCY by A. A. Filippenko

    Published 2014-06-01
    “…Democrats made considerable concessions, while moderate Republicans were willing to meet them halfway, but the conservatives would not let the Congress adopt a new legislation, calling any attempt at comprehensive immigration reform an amnesty for the criminals. During the 107-110 Congresses the immigration reform was thoroughly worked through from both sides, but the proposed bills rarely got to the floor and never passed both Houses. …”
    Get full text
    Article
  17. 1377

    Penetration of Muamalah Jurisprudence into Indonesian Law by Husni Husni, Miftahul Khairat

    Published 2024-11-01
    “…Meanwhile, in terms of legal substance, the legal norms of muamalah have manifested into various laws and regulations related to economic and social activities, which are basically related to the determination of sharia principles as the main reference for the activities of financial institutions, the use of muamalah contracts in sharia economic activities, and the criminalization of violations of sharia principles.…”
    Get full text
    Article
  18. 1378

    The Ethics of Refusal in Terrence Malick’s A Hidden Life by Marguerite La Caze, Magdalena Zolkos

    Published 2025-02-01
    “…The film offers a nuanced and poetic depiction of Austrian peasant Franz Jägerstätter (1907–1943), who refused to give an oath of loyalty to Hitler (Führereid), and was subsequently imprisoned and executed under the Nazi laws criminalizing conscientious objection as an “offence of sedition.” …”
    Get full text
    Article
  19. 1379

    Survey on Ethereum phishing detection technology by Zhao CAI, Tao JING, Shuang REN

    Published 2023-04-01
    “…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
    Get full text
    Article
  20. 1380

    War crimes and spirituality: to prosecute or to forgive and reconcile by Goran Šimić

    Published 2023-09-01
    “…But no matter what, the question is whether war crimes trials and punishments for war criminals will eliminate the consequences of those crimes, allow the victims to free themselves from that victimhood, and societies at war to find peace and rebuild.…”
    Get full text
    Article