Abstract: The aim of study was to analyze the functioning the
new model of criminal corporate responsibility in Poland. The need
to introduce into the Polish legal system liability of corporate
(collective entities) has resulted, among others, from the Polish
Republic's international commitments, in particular related to
membership in the European Union. The study showed that responsibility of collective entities under
the Act has a criminal nature. The main question concerns the ability
of the collective entity to be brought to guilt under criminal law
sense. Polish criminal law knows only the responsibility of individual
persons. So far, guilt as a personal feature of action, based on the
ability of the offender to feel in his psyche, could be considered only
in relation to the individual person, while the said Act destroyed this
conviction. Guilt of collective entity must be proven under at least
one of the three possible forms: the guilt in the selection or
supervision and so called organizational guilt. In addition, research in
article has resolved the issue how the principle of proportionality in
relation to criminal measures in response of collective entities should
be considered. It should be remembered that the legal subjectivity of
collective entities, including their rights and freedoms, is an
emanation of the rights and freedoms of individual persons which
create collective entities and through these entities implement their
rights and freedoms. The whole study was proved that the adopted Act largely reflects
the international legal regulations but also contains the unknown and
original legislative solutions.
Abstract: DNA analysis has been widely accepted as providing
valuable evidence concerning the identity of the source of biological
traces. Our work has showed that DNA samples can survive on
cartridges even after firing. The study also raised the possibility of
determining other information such as the age of the donor. Such
information may be invaluable in certain cases where spent cartridges
from automatic weapons are left behind at the scene of a crime. In
spite of the nature of touch evidence and exposure to high chamber
temperatures during shooting, we were still capable to retrieve
enough DNA for profile typing. In order to estimate age of
contributor, DNA methylation levels were analyzed using EpiTect
system for retrieved DNA. However, results were not conclusive, due
to low amount of input DNA.
Abstract: Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having her own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.
Abstract: This study aims to investigate the possibility of crime
prevention through CCTV by analyzing the appropriateness of the
CCTV location, whether it is installed in the hotspot of crime-prone
areas, and exploring the crime prevention effect and transition effect.
The real crime and CCTV locations of case city were converted into
the spatial data by using GIS. The data was analyzed by hotspot
analysis and weighted displacement quotient (WDQ). As study
methods, it analyzed existing relevant studies for identifying the trends
of CCTV and crime studies based on big data from 1800 to 2014 and
understanding the relation between CCTV and crime. Second, it
investigated the current situation of nationwide CCTVs and analyzed
the guidelines of CCTV installation and operation to draw attention to
the problems and indicating points of CCTV use. Third, it investigated
the crime occurrence in case areas and the current situation of CCTV
installation in the spatial aspects, and analyzed the appropriateness and
effectiveness of CCTV installation to suggest a rational installation of
CCTV and the strategic direction of crime prevention. The results
demonstrate that there was no significant effect in the installation of
CCTV on crime prevention in the case area. This indicates that CCTV
should be installed and managed in a more scientific way reflecting
local crime situations. In terms of CCTV, the methods of spatial
analysis such as GIS, which can evaluate the installation effect, and the
methods of economic analysis like cost-benefit analysis should be
developed. In addition, these methods should be distributed to local
governments across the nation for the appropriate installation of
CCTV and operation. This study intended to find a design guideline of
the optimum CCTV installation. In this regard, this study is
meaningful in that it will contribute to the creation of a safe city.
Abstract: The transition period of Kosovo society brought
fundamental changes in all the spheres of organizing life. This was
the period when also in the cultural tradition the biggest movement
and an emerging from ‘isolation’ or from the ‘shell’ occurred.
Transformation of the traditional and embracing of the modern began
here. The same was experienced and is currently being experienced
also by Gjakova and its surrounding which is historically renowned
for its great tradition and culture.
The population of this region is actually facing a transition from
the traditional system into the modern one and quite often with huge
leaps.
These ‘movements’ or ‘evolutions’ of the society of this region,
besides the numerous positive things it ‘harvested’, also brought
things that do not at all correspond with their tradition as well as new
criminal occurrences which in the past were not present in this area.
Furthermore, some of the ‘new’ behaviors that are embraced from
other ‘cultures’ and ‘civilizations’, and which are often exceeded, are
quite perturbing. The security situation is also worrying, particularly
following the appearance of some new criminal occurrences.
Therefore, with this research paper we will strive to analyze the
new cultural “intersections” as well as the nature of the origin of
some new very worrying criminal occurrences. We will present there
also some factors inciting into these occurrences, which were
confessed by the persons involved in these criminal occurrences and
who come from this very region.
Abstract: Botnets are one of the most serious and widespread
cyber threats. Today botnets have been facilitating many
cybercrimes, especially financial, top secret thefts. Botnets can be
available for lease in the market and are utilized by the
cybercriminals to launch massive attacks like DDoS, click fraud,
phishing attacks etc., Several large institutions, hospitals, banks,
government organizations and many social networks such as twitter,
facebook etc., became the target of the botmasters. Recently,
noteworthy researches have been carried out to detect bot, C&C
channels, botnet and botmasters. Using many sophisticated
technologies, botmasters made botnet a titan of the cyber world.
Innumerable challenges have been put forth by the botmasters to the
researchers in the detection of botnet. In this paper we present a
survey of different types of botnet C&C channels and also provide a
comparison of various botnet categories. Finally we hope that our
survey will create awareness for forthcoming botnet research
endeavors.
Abstract: This research aims to critical analyze the feminine violent within Thai daily newspaper. This study was qualitative base; content analysis from two popular newspapers (Thairath and Dailynews) two qualitative newspapers (Thaipost and Mathichon). Purposive sampling was used to select eleven specialize news reporters to do in-depth interview. The result found that, popular newspapers, Thairath and dailynews have presented feminine violent news in their paper more than Thaipost and Mathichon the qualitative newspaper. Beside, majority of sample present the feminine violent within news under the code of ethic, The National Press Council of Thailand. Interesting, the age of feminine violent victim was the information that has been focused most. The popular newspaper have illustrated crime scene photo on their first-page while qualitative newspaper used only headline to present the same news.
Abstract: The Council of European Union (EU Council) has
stressed on several occasions the need for a concerted,
comprehensive and effective solution to delinquency problems in EU
communities. In the context of establishing a European Forensic
Science Area and the development of forensic science infrastructure
in Europe, EU Council believes that forensic science can significantly
contribute to the efficiency of law enforcement, crime prevention and
combating crimes. Lithuanian scientists have consolidated to
implement a project named “Conception of the vision for European
Forensic Science 2020 implementation in Lithuania” (the project is
funded for the period of 1 March 2014 - 31 December 2016) with the
objective to create a conception of implementation of the vision for
European Forensic Science 2020 in Lithuania by 1) evaluating the
current status of Lithuania’s forensic system and opportunities for its
improvement; 2) analysing achievements and knowledge in
investigation of crimes listed in conclusions of EU Council on the
vision for European Forensic Science 2020 including creation of a
European Forensic Science Area and the development of forensic
science infrastructure in Europe: trafficking in human beings,
organised crime and terrorism; 3) analysing conceptions of
criminalistics, which differ in different EU member states due to the
variety of forensic schools, and finding means for their
harmonization. Apart from the conception of implementation of the
vision for European Forensic Science 2020 in Lithuania, the Project
is expected to suggest provisions that will be relevant to other EU
countries as well. Consequently, the presented conception of
implementation of vision for European Forensic Science 2020 in
Lithuania could initiate a project for a common vision of European
Forensic Science and contribute to the development of the EU as an
area of freedom, security and justice. The article presents main ideas
of the project of the conception of the vision for European Forensic
Science 2020 of EU Council and analyses its legal background, as
well as prospects of and challenges for its implementation in
Lithuania and the EU.
Abstract: Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense.
In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.
Abstract: This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: 1) the supermarket profile (volume, location, standard and type of the store), 2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), 3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first, is "the well distributing of the duties and responsibilities between the employees especially for security purposes". Second "Installation of strong security system" and "Making well-designed store layout". Third is "giving training for general employees" and "to give periodically security skills training of employees". There are other suggestions in the study can be looked up in the text.
Abstract: In recent years, the number of the cases of information
leaks is increasing. Companies and Research Institutions make various
actions against information thefts and security accidents. One of the
actions is adoption of the crime prevention system, including the
monitoring system by surveillance cameras. In order to solve
difficulties of multiple cameras monitoring, we develop the automatic
human tracking system using mobile agents through multiple
surveillance cameras to track target persons. In this paper, we develop
the monitor which confirms mobile agents tracing target persons, and
the simulator of video picture analysis to construct the tracking
algorithm.
Abstract: Increasing use of cell phone as a medium of human interaction is playing a vital role in solving riddles of crime as well. A young girl went missing from her home late in the evening in the month of August, 2008 when her enraged relatives and villagers physically assaulted and chased her fiancée who often frequented her home. Two years later, her mother lodged a complaint against the relatives and the villagers alleging that after abduction her daughter was either sold or killed as she had failed to trace her. On investigation, a rusted cell phone with partial visible IMEI number, clothes, bangles, human skeleton etc. recovered from abandoned well in the month of May, 2011 were examined in the lab. All hopes pinned on identity of cell phone, for only linking evidence to fix the scene of occurrence supported by call detail record (CDR) and to dispel doubts about mode of sudden disappearance or death as DNA technology did not help in establishing identity of the deceased. The conventional scientific methods were used without success and international mobile equipment identification number of the cell phone could be generated by using statistical analysis followed by online verification.
Abstract: Computerized lip reading has been one of the most
actively researched areas of computer vision in recent past because
of its crime fighting potential and invariance to acoustic environment.
However, several factors like fast speech, bad pronunciation,
poor illumination, movement of face, moustaches and beards make
lip reading difficult. In present work, we propose a solution for
automatic lip contour tracking and recognizing letters of English
language spoken by speakers using the information available from
lip movements. Level set method is used for tracking lip contour
using a contour velocity model and a feature vector of lip movements
is then obtained. Character recognition is performed using modified
k nearest neighbor algorithm which assigns more weight to nearer
neighbors. The proposed system has been found to have accuracy
of 73.3% for character recognition with speaker lip movements as
the only input and without using any speech recognition system in
parallel. The approach used in this work is found to significantly
solve the purpose of lip reading when size of database is small.
Abstract: Minor law breaking seems more and more to be a part
of adolescence behavior. An important risk factor which seems to
influence delinquency appears to be the socio-economic one.
According to Romanian statistics, during the first six months of 2012,
1,378 minors have committed various crimes, the most common
being theft, sexual offenses and violent assaults. Drug-related
offenses did not reach the gravity of those from high income
countries of the European Union, but have a continuous upward
during the last years.
The aim of our research was to examine whether delinquency in
adolescence is correlated to mental disorders or socio-economic and
familial factors. Forensic psychiatric expertise was performed to 79
adolescents who committed offenses between 01 January 2012 and
31 December 2012. Teenagers, with ages between 12 and 17, were
examined by day hospitalization in the University Clinic of
Psychiatry Craiova.
Abstract: The need to implement intelligent highways is much
more emphasized with the growth of vehicle production line as well as vehicle intelligence. The control of intelligent vehicles in order to
reduce human error and boost ease congestion is not accomplished solely by the aid of human resources. The present article is an attempt
to introduce an intelligent control system based on a single central computer. In this project, central computer, without utilizing Global
Positioning System (GPS), is capable of tracking all vehicles, crisis management and control, traffic guidance and recording traffic
crimes along the highway. By the help of RFID technology, vehicles
are connected to computerized systems, intelligent light poles and
other available hardware along the way. By the aid of Wimax
communicative technology, all components of the system are
virtually connected together through local and global networks
devised in them and the energy of the network is provided by the
solar cells installed on the intelligent light poles.
Abstract: Phishing scheme is a new emerged security issue of
E-Commerce Crime in globalization. In this paper, the legal scaffold
of Malaysia, United States and United Kingdom are analyzed and
followed by discussion on critical issues that rose due to phishing
activities. The result revealed that inadequacy of current legal
framework is the main challenge to govern this epidemic. However,
lack of awareness among consumers, crisis on merchant-s
responsibility and lack of intrusion reports and incentive arrangement
contributes to phishing proliferating. Prevention is always better than
curb. By the end of this paper, some best practices for consumers and
corporations are suggested.
Abstract: There is a general feeling that Internet crime is an
advanced type of crime that has not yet infiltrated developing
countries like Uganda. The carefree nature of the Internet in which
anybody publishes anything at anytime poses a serious security threat
for any nation. Unfortunately, there are no formal records about this
type of crime for Uganda. Could this mean that it does not exist
there? The author conducted an independent research to ascertain
whether cyber crimes have affected people in Uganda and if so, to
discover where they are reported. This paper highlights the findings.
Abstract: The purpose of this study is to revisit the concept of
rape as represented by professionals in the literature as well as its
perception (beliefs and attitudes) in the population at large and to
propose methodological improvements to its measurement tool. Rape
is a serious crime threatening its victim-s physical and mental health
and integrity; and as such is legally prosecuted in all modern
societies. The problem is not in accepting or rejecting rape as a
criminal act, but rather in the vagueness of its interpretations and
“justifications" maintained in the mentality of modern societies -
known in the literature as the phenomenon of "rape-myth". The rapemyth
can be studied from different perspectives: criminology,
sociology, ethics, medicine and psychology. Its investigation requires
rigorous scientific objectivity, free of passion (victims of rape are at
risk of emotional bias), free of activism (social activists, even if wellintentioned
are also biased), free of any pre-emptive assumptions or
prejudices. To apply a rigorous scientific procedure, we need a solid,
valid and reliable measurement. Rape is a form of heterosexual or
homosexual aggression, violently forcing the victim to give-in in the
sexual activity of the aggressor against her/his will. Human beings
always try to “understand" or find a reason justifying their acts.
Psychological literature provides multiple clinical and experimental
examples of it; just to mention the famous studies by Milgram on the
level of electroshock delivered by the “teacher" towards the “learner"
if “scientifically justifiable" or the studies on the behavior of
“prisoners" and the “guards" and many other experiments and field
observations. Sigmund Freud presented the phenomenon of
unconscious justification and called it rationalization. The multiple
justifications, rationalizations and repeated opinions about sexual
behavior contribute to a myth maintained in the society. What kind of
“rationale" our societies apply to “understand" the non-consensual
sexual behavior? There are many, just to mention few:
• Sex is a ludistic activity for both participants, therefore –
even if not consented – it should bring pleasure to both.
• Everybody wants sex, but only men are allowed to manifest
it openly while women have to pretend the opposite, thus men have
to initiate sexual behavior and women would follow.
• A person who strongly needs sex is free to manifest it and
struggle to get it; the person who doesn-t want it must not reveal
her/his sexual attraction and avoid risky situations; otherwise she/he
is perceived as a promiscuous seducer.
• A person who doesn-t fight against the sexual initiator
unconsciously accepts the rape (does it explain why homosexual
rapes are reported less frequently than rapes against women?).
• Women who are raped deserve it because their wardrobe is
very revealing and seducing and they ''willingly'' go to highly risky
places (alleys, dark roads, etc.).
• Men need to ventilate their sexual energy and if they are
deprived of a partner their urge to have sex is difficult to control.
• Men are supposed to initiate and insist even by force to have
sex (their testosterone makes them both sexual and aggressive).
The paper overviews numerous cultural beliefs about masculine
versus feminine behavior and their impact on the “rape myth".
Abstract: Money laundering has been described by many as the lifeblood of crime and is a major threat to the economic and social well-being of societies. It has been recognized that the banking system has long been the central element of money laundering. This is in part due to the complexity and confidentiality of the banking system itself. It is generally accepted that effective anti-money laundering (AML) measures adopted by banks will make it tougher for criminals to get their "dirty money" into the financial system. In fact, for law enforcement agencies, banks are considered to be an important source of valuable information for the detection of money laundering. However, from the banks- perspective, the main reason for their existence is to make as much profits as possible. Hence their cultural and commercial interests are totally distinct from that of the law enforcement authorities. Undoubtedly, AML laws create a major dilemma for banks as they produce a significant shift in the way banks interact with their customers. Furthermore, the implementation of the laws not only creates significant compliance problems for banks, but also has the potential to adversely affect the operations of banks. As such, it is legitimate to ask whether these laws are effective in preventing money launderers from using banks, or whether they simply put an unreasonable burden on banks and their customers. This paper attempts to address these issues and analyze them against the background of the Malaysian AML laws. It must be said that effective coordination between AML regulator and the banking industry is vital to minimize problems faced by the banks and thereby to ensure effective implementation of the laws in combating money laundering.
Abstract: There is a real threat on the VIPs personal pages on
the Social Network Sites (SNS). The real threats to these pages is
violation of privacy and theft of identity through creating fake pages
that exploit their names and pictures to attract the victims and spread
of lies. In this paper, we propose a new secure architecture that
improves the trusting and finds an effective solution to reduce fake
pages and possibility of recognizing VIP pages on SNS. The
proposed architecture works as a third party that is added to
Facebook to provide the trust service to personal pages for VIPs.
Through this mechanism, it works to ensure the real identity of the
applicant through the electronic authentication of personal
information by storing this information within content of their
website. As a result, the significance of the proposed architecture is
that it secures and provides trust to the VIPs personal pages.
Furthermore, it can help to discover fake page, protect the privacy,
reduce crimes of personality-theft, and increase the sense of trust and
satisfaction by friends and admirers in interacting with SNS.