Academic literature on the topic 'Criminals'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Criminals.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Criminals"

1

Nordstrom, Benjamin R., and Charles A. Dackis. "Drugs and Crime." Journal of Psychiatry & Law 39, no. 4 (December 2011): 663–87. http://dx.doi.org/10.1177/009318531103900407.

Full text
Abstract:
Drug law violations and other crimes related to substance abuse incur dire costs in terms of both financial outlay and human suffering. This review of the current professional literature addresses the identification of risk factors and the longitudinal course of addiction and criminal behavior. Results indicate that neither criminally active drug users nor drug users in general are monolithic groups in terms of manifestations of criminal behavior. Drug use and criminal activity are depicted as mutually facilitative behaviors, with research outcomes tending to convey that although drug addiction does not turn nonviolent criminals into violent criminals, active addiction does increase the frequency of criminal activity.
APA, Harvard, Vancouver, ISO, and other styles
2

Чан Тхи Ту Ань and Chan Tkhi Tu An. "CRIMINAL LIABILITY AS PROVIDED FOR UNDER THE LAWS OF THE RUSSIAN FEDERATION AND THE REPUBLIC OF VIETNAM: AGE LIMITATIONS." Journal of Foreign Legislation and Comparative Law 1, no. 5 (December 2, 2015): 0. http://dx.doi.org/10.12737/16142.

Full text
Abstract:
Criminal responsibility is one of the types of legal responsibility. State agencies apply it to persons for the commission of a crime. Imposing of criminal penalties on a juvenile who has committed a socially — dangerous act is a challenging problem in criminal legislations in all countries. Age is one of a criminal’s mandatory basic characteristics that influences the differentiation of criminal responsibility for persons, who committed crime. The issue of determining the minimum and general age threshold for juveniles’ criminal responsibility is recognized to be a challenging problem. The article analyzes the importance of the age of criminals and the age of juveniles who commit crimes, for differentiation of their criminal responsibility, regulated by the Criminal Codes of the Russian Federation and the Socialist Republic of Vietnam. The author analyzes the problem of age determining when a person becomes criminally liable. The author provides recommendations on making alterations and amendments, related to determination of age limits for criminals, into the criminal legislations of Russia and Vietnam. The purpose of this article is the analysis of the age for criminal responsibility and the age of juveniles, the problem of lowering the minimum age of a criminal, and also the issue of dividing juveniles into several age groups. On the basis of the analysis, the author proposes improvements to the provision about the age of criminal responsibility in general, and the age of juveniles in particular.
APA, Harvard, Vancouver, ISO, and other styles
3

Nikam, Prof R. A. "Automatic Face Recognition and Detection for Criminal Identification Using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 5599–603. http://dx.doi.org/10.22214/ijraset.2023.52959.

Full text
Abstract:
Abstract: With the use of machine learning technologies, discovering connections and patterns among various types of data has gotten much easier. Finding out what kind of crime might happen given the location where it has previously occurred is the main goal of this research. We have created a model utilizing the machine learning concept using a training set of data that has been cleaned up and transformed. In contemporary civilization, criminal activity is growing dramatically. Effectively identifying criminals to stop crime is the police's principal challenge, but there aren't enough policemen to go around. There are numerous technical approaches to apprehend criminals, yet many of them are ineffective. In this project, a face detection and recognition system for criminal identification is created using a machine learning algorithm. This system will be able to instantly differentiate the 3D faces of criminals and recognize their faces. This system's one-shot learning method only requires a single image of the criminal to identify him. The objective is to identify the criminal from a distance, extract the criminal's information from the database, and notify the police personnel of the location where the criminal was being observed by a camera.
APA, Harvard, Vancouver, ISO, and other styles
4

Gottschalk, Petter. "White-Collar Criminals in Modern Management." Modern Management Science & Engineering 1, no. 1 (January 31, 2013): p1. http://dx.doi.org/10.22158/mmse.v1i1.5.

Full text
Abstract:
Criminal behavior among executives is a complicated challenge in human resource management.Based on a sample of 305 convicted white-collar criminals in Norway, four groups of criminals arediscussed in this paper: criminal entrepreneurs, corporate criminals, criminal followers, and femalecriminals. There are significant differences between these groups. Crime amount in terms of Norwegiankroner is highest for corporate criminals and lowest for female criminals. It is interesting to note thaneven if crime amount for corporate criminals is higher than for criminal entrepreneurs, corporatecriminals receive a shorter jail sentence than criminal entrepreneurs. It seems that crime on behalf ofthe business is treated more mildly in court, when compared to crime on behalf of the person himself.When followers are involved in the crime, there are more persons participating in the crime. The lowestnumber of participants is found in cases of criminal entrepreneurship.
APA, Harvard, Vancouver, ISO, and other styles
5

Cartwright, Anna, and Edward Cartwright. "Ransomware and Reputation." Games 10, no. 2 (June 10, 2019): 26. http://dx.doi.org/10.3390/g10020026.

Full text
Abstract:
Ransomware is a particular form of cyber-attack in which a victim loses access to either his electronic device or files unless he pays a ransom to criminals. A criminal’s ability to make money from ransomware critically depends on victims believing that the criminal will honour ransom payments. In this paper we explore the extent to which a criminal can build trust through reputation. We demonstrate that there are situations in which it is optimal for the criminal to always return the files and situations in which it is not. We argue that the ability to build reputation will depend on how victims distinguish between different ransomware strands. If ransomware is to survive as a long term revenue source for criminals then they need to find ways of building a good reputation.
APA, Harvard, Vancouver, ISO, and other styles
6

Kiran Amjad, Prof Dr. Aftab Ahmad Malik, and Dr. Sumet Mehta. "A Technique and Architectural Design for Criminal Detection based on Lombroso Theory Using Deep Learning." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 3 (September 25, 2020): 47–63. http://dx.doi.org/10.54692/lgurjcsit.2020.040398.

Full text
Abstract:
Crimes and criminal activities are increasing day by day and there are no proper criteria to search, detect, identify, and predict these criminals. Despite various surveillance cameras in different areas still, crimes are at a peak. The police investigation department cannot efficiently detect the criminals in time. However, in many countries for the sake of public and private security, the initiation of security technologies has been employed for criminal identification or recognition with the help of footprint identification, fingerprint identification, facial recognition, or based on other suspicious activity detections through surveillance cameras. However, there are limited automated systems that can identify the criminals precisely and get the accurate or precise similarity between the recorded footage images with the criminals that already are available in the police criminal records. To make the police investigation department more effective, this research work presents the design of an automated criminal detection system for the prediction of criminals. The proposed system can predict criminals or possibilities of being criminal based on Lombrosso's Theory of Criminology about born criminals or the persons who look like criminals. A deep learning-based facial recognition approach was used that can detect or predict any person whether he is criminal, or not and that can also give the possibility of being criminal. For training, the ResNet50 model was used, which is based on CNN and SVM Classifiers for feature extracting from the dataset. Two different labeled based datasets were used, having different criminals and noncriminals images in the database. The proposed system could efficiently help the investigating officers in narrowing down the suspects' pool.
APA, Harvard, Vancouver, ISO, and other styles
7

Chiniev, Dilshod, and Umidaxon Sobitova. "CRIMINOLOGICAL CHARACTERISTICS OF THE IDENTITY OF THE INVADER IN THE CRIME OF HOSTAGE." Criminology and Criminal Justice 3, no. 1 (April 29, 2023): 4–15. http://dx.doi.org/10.51788/tsul.ccj.3.1./gxja5889.

Full text
Abstract:
This article examines the concept and content of the criminological characteristics of the criminal invader. The characteristic features of the criminal invader in the crime as hostage-taking, and forming a criminogenic and criminal personality, are considered. The structure of the criminal’s personality has been studied, which includes three groups: socio-demographic, socio-role (functional) and socio-psychological. The article also examines the types of persons who committed hostage-taking and puts forward the following types: politicized, criminal and unbalanced. The transitions from the criminal type of criminals to the politicized type and, conversely, from the politicized to the criminal type are explained by example. In addition, the experience of the FBI conducted by the staff of this bureau related to the division of criminals taking hostages into four specific categories is analyzed. Thus, the specialists of this bureau note that more than 50% of all cases of hostage-taking are committed by mentally ill people. This means that a large and solid part is made up of the mentally ill. For a comprehensive approach, along with determining the motives for hostage-taking and studying the psychological characteristics of criminals in preparation for the negotiation process, the types of situations associated with hostage-taking are considered in detail. A table is presented in the form of an appendix, which includes examples of responses of law enforcement officers to the questions of the hostage-taking questionnaire.
APA, Harvard, Vancouver, ISO, and other styles
8

Herings, P. Jean-Jacques, Ana Mauleon, and Vincent Vannetelbosch. "Horizon-K Farsightedness in Criminal Networks." Games 12, no. 3 (July 5, 2021): 56. http://dx.doi.org/10.3390/g12030056.

Full text
Abstract:
We study the criminal networks that will emerge in the long run when criminals are neither myopic nor completely farsighted but have some limited degree of farsightedness. We adopt the horizon-K farsighted set to answer this question. We find that in criminal networks with n criminals, the set consisting of the complete network is a horizon-K farsighted set whenever the degree of farsightedness of the criminals is larger than or equal to (n−1). Moreover, the complete network is the unique horizon-(n−1) farsighted set. Hence, the predictions obtained in case of completely farsighted criminals still hold when criminals are much less farsighted.
APA, Harvard, Vancouver, ISO, and other styles
9

Новікова, Катерина. "Акцентуації характеру злочинців з насильницькою спрямованістю." Теоретичні і прикладні проблеми психології, no. 1(57)Т2 (2022): 60–67. http://dx.doi.org/10.33216/2219-2654-2022-57-1-2-60-67.

Full text
Abstract:
Стаття присвячена розгляду акцентуацій характеру злочинців з насильницькою спрямованістю, засуджених за повторні насильниці злочини. Висвітлено результати дослідження характерологічних особливостей даної категорії злочинців. Запропоновано портрет рецидивіста, характерологічними ознаками якого є емотивне реагування, яке він намагається компенсувати застряганням на захисній педантичній впорядкованості, побоюючись небезпечних наслідків неконтрольованих актів через власну збудливу гіпертимну екзальтованість, яка, внаслідок демонстративності на тлі дистимічних, а інколи й дисфоричних перепадів настрою, може призводити до необдуманих вчинків. При цьому його демонстративна екзальтованість є набутою характеристикою, інтеріоризованою в ході соціалізації у відповідних традиціях кримінальної субкультури. Однак саме вони часто й стають пусковим механізмом неконтрольованої поведінки, яка призводить до вчинення правопорушень. Застрягання також характеризує не лише злопам’ятність, але й стійку фіксацію асоціальних установок педантичного дотримання норм кримінального світу. Загальна ж нестійкість емоційних реакцій породжується накопиченням негативних переживань (проблемних сфер життя, нереалізованих соціальних бажань, мрій та прагнень, виключно викривленій можливості задовольняти базові потреби, негативний досвід відбування покарань, конфлікти з соціумом тощо), що проявляється у генералізованій виснажливій дисфоричній дистимії. Будучи закріпленим на рівні установочних реакцій, такі характерологічні особливості мало того що видко фіксуються, але й стають стійкими якостями, що обумовлюють стереотипність відтворюваної з разу у раз асоціальної поведінки. Ключові слова: акцентуації характеру, злочинці з насильницькою спрямованістю, особистість злочинця, повторні насильницькі злочини.
APA, Harvard, Vancouver, ISO, and other styles
10

Waghchoure, Prof V. N., Vedant B. Thakur, Prathamesh D. Raul, and Rishik P. Khandelwal. "FACE IDENTIFICATION SYSTEM FOR IDENTIFYING THE CRIMINALS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (March 1, 2024): 1–13. http://dx.doi.org/10.55041/ijsrem28948.

Full text
Abstract:
We all know that our Face is a unique and crucial part of the human body structure that identifies a person. Therefore, we can use it to trace the identity of a criminal person. With the advancement in technology, we are placed CCTV at many public places to capture the criminal’s crime. Using the previously captured faces and criminal’s images that are available in the police station, the criminal face recognition system of can be implemented. In this paper, we propose an automatic criminal identification system for Police Department to enhance and upgrade the criminal distinguishing into a more effective and efficient approach. Using technology, this idea will add plus point in the current system while bringing criminals spotting to a whole new level by automating tasks. Technology working behind it will be face recognition, from the footage captured by the CCTV cameras; our system will detect the face and recognize the criminal who is coming to that public place. The captured images of the person coming to that public place get compared with the criminal data we have in our database. If any person’s face from public place matches, the system will display their image on the system screen and will give the message with their name that the criminal is found and present in this public place. This system matching more than 80% of the captured images with database images. keywords: Face Detection, Face Recognition, Open-CV, Image Processing
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Criminals"

1

Krusen, Richard Montgomery 1954. "Cognitive Indices of Criminal Thought: Criminals Versus Non-Criminals." Thesis, University of North Texas, 1988. https://digital.library.unt.edu/ark:/67531/metadc330871/.

Full text
Abstract:
The ability of several psychometric instruments to differentiate between criminal and non-criminal subjects was investigated. The subjects in the study consisted of fifty male individuals between the ages of 18 and 55, half of which had been convicted of one crime and half of which had no history of criminal activity. The tests administered consisted of the Psychopathic Deviation Scale from the Minnesota Multiphasic Personality Inventory (MMPI), the Psychopathic Deviation Scale of the Clinical Analysis Questionnaire, and two tests designed by the author. The author's tests consisted of the Test of Criminal Cognitions which evaluated antisocial thought patterns and cognitive flexibility, and the Social Semantics Test which assessed individual role definitions. The Test of Criminal Cognitions was administered as a part of a structured interview, and all other scales were administered in a paper and pencil format. The results indicated that the Psychopathic Deviation Scale of the MMPI, and a portion of both the Test of Criminal Cognitions and the Social Semantics Scales differentiated between the groups at the .05 level or better. These findings indicated that criminals tend to be significantly less flexible in their thought and tend to view others in a much more narcissistic manner than non-criminals. The results also indicated that these tests can be utilized to discriminate between criminals and non-criminals. It was additionally noted that the Psychopathic Deviation Scale of the Clinical Analysis Questionnaire did not consistently differentiate between the groups and should not be considered a valid instrument for discriminating between these groups.
APA, Harvard, Vancouver, ISO, and other styles
2

Obinna, Denise N. "American Deportation and the `Non-Criminal’ Criminals." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1437579909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barksby, Kelly. "Constructing criminals : the creation of identity within criminal mafias." Thesis, Keele University, 2013. http://eprints.keele.ac.uk/3806/.

Full text
Abstract:
Constructing criminals: the creation of identity within criminal mafias This thesis seeks to demonstrate that there has been a change in the social and cultural aspects of established organised criminal sub-cultures by observing the changes that have taken place in how identity is constructed. The literature is comparatively lacking in emphasis when compared to information about specific criminal activities and the threat of the organisations. This study finds that the social and cultural dimensions of established organised criminal sub-cultures can be equally important and indicative of changes in those organisations. This thesis analyses the change in how established organised criminal sub-cultures, or mafias, have perceived and used identity over the last twenty years and asks whether this can be indicative of a change in the social and cultural model of these organisations. The study is comparative and will focus on how identity in four distinct mafias from across the world - the Russian mafiya, Sicilian mafia, the Japanese yakuza and the Chinese triads - is constructed and how this has changed. The Russian mafiya was the first of the established organised criminal sub-cultures to demonstrate this change whereby identity was used in a different way from its criminal underworld roots. The study also analyses the literature available from gang studies to ask whether the recognised focus upon identity can be interpreted with reference to the established organised criminal sub-cultures. This thesis considers that a criminal identity is constructed through a variety of customs and behaviours including mythology and legend, language and oral traditions and the visual image that a group portrays. A contextual approach is proposed, whereby organisations create and negotiate criminal identities at different scales, by which a street level identity might be more distinctive.
APA, Harvard, Vancouver, ISO, and other styles
4

Palumbo, Laurie C. "Dreamboats and criminals." The Ohio State University, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=osu1329235952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Van, Nevel Jolene M. "From Combat Veterans to Criminals: Posttraumatic Stress Disorder and Criminal Justice Involvement." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4183.

Full text
Abstract:
Posttraumatic stress disorder (PTSD) is currently known as the silent killer among combat veterans who have served in Operation Iraqi Freedom, Operation Enduring Freedom, and Operation New Dawn. Many combat veterans do not know or understand that they may be suffering from mental illness/disorders such as PTSD and turn to maladaptive behavior, resulting in criminal justice involvement (CJI). The goal of this study was to assess a relationship between PTSD and CJI among combat veterans. This study used cognitive behavior theory to understand the relationship between PTSD, CJI, and combat. This study used a predictive correlational design and statistical analysis of retrospective archival data (N=146) provided by the Department of Veteran Affairs to find the correlation between PTSD, CJI, and combat. The 5 research questions were: Does PTSD positively predict CJI in combat veterans? Does criminal history pre combat positively predict CJI in combat veterans who have PTSD? Does combat trauma experience positively predict CJI in combat veterans with PTSD? Does deployment length positively predict PTSD in combat veterans? And do multiple deployments positively predict PTSD in combat veterans? This study determined that PTSD did not significantly predict CJI and that criminal history did not predict PTSD. However, this study did predict that multiple deployments and length of deployment does predict PTSD in combat veterans. This study provides a way to bring change to how veterans are treated in the criminal justice system. This is important for many reasons, such as the positive social change it will have on the veteran community through providing insight on the changes that need to be made in PTSD awareness education and possible change in assessment and treatment of PTSD.
APA, Harvard, Vancouver, ISO, and other styles
6

Schuhmacher, Jacques. "The war criminals investigate." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:0573af80-6407-4bf4-9ba4-6529cc9ae584.

Full text
Abstract:
This thesis uses the war crimes investigations carried out by the Wehrmacht between 1939-1945 to explore the creation and development of the narrative which the Nazi regime constructed to justify its war of aggression, conquest, and extermination. This source has been sorely underused and provides deep insight into the regime's official narrative - a narrative which seems fundamentally at odds with its true aims and its murderous actions. It claimed that the Reich was waging a war in self-defence and for humanitarian reasons. These justifications were designed to convince both the German population and international audiences. The regime did not simply lie, however, but gathered empirical evidence which it then used selectively to legitimise the war. By reconstructing this process, the thesis aims to understand the degree to which the regime was able to make its arguments convincing. This allows us to better understand how it was possible to mobilise so many ordinary Germans to support and fight the war and, indeed, to perpetrate horrendous crimes. In particular, this thesis seeks to explore the tension between the official narrative and the Reich's own crimes, arguing that these two were not diametrically opposed, but that there was a direct justificatory link between them. Crucial in this context was the degree to which the regime could portray its criminal actions as a response to those of the enemy. In doing so, this thesis develops on a historiography which has acknowledged the importance of the regime's justificatory framework, but which has yet to study the foundations on which this was based and how it developed over the course of the war. In short, this is a study of the German narrative of victimhood which underpinned the brutal war of extermination.
APA, Harvard, Vancouver, ISO, and other styles
7

Glazebrook, S. G. M. "Justice in transition : Crime, criminals and criminal justice in Revolutionary Rouen, 1790-1800." Thesis, University of Oxford, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.384068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kelty, Sally Fiona. ""You have to hit some people, it's all they understand!" : are violent sentiments more criminogenic than attributing hostile intent in the escalation of grievances? /." Access via Murdoch University Digital Theses Project, 2006. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20061019.152626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harpur, Timothy John. "Visual attention in psychopathic criminals." Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/31019.

Full text
Abstract:
This study was designed to examine the hypothesis that criminal psychopaths differ from criminal nonpsychopaths in their ability to over-focus attention on certain kinds of stimuli. For the purposes of this study, the concept of over-focussing was operationalized to mean the ability to process stimuli more quickly or efficiently by making use of one or more attentional mechanisms for selecting among locations or stimuli. A second aim of the study was to identify the component processes contributing to this more efficient selection. Five experiments were run to assess several different components of attention contributing to selection of stimuli in a variety of paradigms. Experiments 1 and 2 assessed covert orienting of attention across the visual field using both peripherally presented physical cues and centrally presented symbolic cues to prime locations in visual space. Three dissociable components of attention were assessed in this paradigm. Experiments 3-5 were designed to assess the efficiency of processing a target item in the presence of a distractor item. Four additional dissociable components of selective attention were measured in these three studies. The results supported the hypothesis that psychopaths can over-focus attention, but the groups were differentiated by only one of the component processes measured. In Experiments 1 and 2 endogenous orienting of attention was greater for psychopaths than for nonpsychopaths. In these paradigms endogenous facilitation controlled the allocation of attention to cued locations, and the subsequent speeding of reaction time to targets presented at those locations, when the cue was symbolic or predictive, but not when it involved a physical change of energy at the cued location. This strategic allocation of attention probably resulted from the predictive validity (approximately 68% valid) of the cue in relation to the target. Other component processes failed to differentiate the groups. These included measures of exogenous orienting and inhibition of return in experiments 1 and 2, and measures of interference due to a distracting stimulus, habituation of interference, attenuation of interference due to spatial displacement of the distractor, and negative priming in experiments 3-5. The difference in covert orienting was replicated in experiments 1 and 2 in two groups of criminals who also failed to demonstrate any abnormalities in a variety of other processes involved in attention. It was concluded that psychopaths differ from nonpsychopaths specifically in their strategic allocation of attention in situations of moderate uncertainty, but show no other abnormalities in the component processes that control attention.
Arts, Faculty of
Psychology, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
10

Leontiadis, Nektarios. "Structuring Disincentives for Online Criminals." Thesis, Carnegie Mellon University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3691274.

Full text
Abstract:

This thesis considers the structural characteristics of online criminal networks from a technical and an economic perspective. Through large-scale measurements, we empirically describe some salient elements of the online criminal infrastructures, and we derive economic models characterizing the associated monetization paths enabling criminal profitability. This analysis reveals the existence of structural choke points: components of online criminal operations being limited in number, and critical for the operations’ profitability. Consequently, interventions targeting such components can reduce the opportunities and incentives to engage in online crime through an increase in criminal operational costs, and in the risk of apprehension.

We define a methodology describing the process of distilling the knowledge gained from the empirical measurements on the criminal infrastructures towards identifying and evaluating appropriate countermeasures. We argue that countermeasures, as defined in the context of situational crime prevention, can be effective for a long-term reduction in the occurrence of online crime.

APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Criminals"

1

Alfred, Blumstein, and National Research Council (U.S.). Panel on Research on Criminal Careers., eds. Criminal careers and "career criminals". Washington, D.C: National Academy Press, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Service, Teesside Probation. Crime, criminals, & the criminal justice system: Facts & figures. 3rd ed. Middlesbrough: Teesside Probation Service, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1951-, Hobbs Dick, ed. Professional criminals. Aldershot [England]: Dartmouth, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ikin, Reg. Criminals lib. Liverpool: Liverpool Libraries & Arts, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kerrigan, Gene. Little criminals. New York: Europa Editions, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mocan, H. Naci. Ugly criminals. Bonn, Germany: IZA, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Namale, Ambayisi. Honourable criminals. Nairobi: East African Educational Publishers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mocan, H. Naci. Ugly criminals. Cambridge, Mass: National Bureau of Economic Research, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

David, Powell, ed. Pitiful Criminals. New York: Counterpoint, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Art, O'Connor. Criminals: Inside the minds of criminals and victims. Dublin: Marino, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Criminals"

1

Duggan, James M., and James J. F. Forest. "Criminals." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_261-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gregoriou, Christiana. "Criminals." In The Routledge Companion to Crime Fiction, 168–76. Abingdon, Oxon; New York, NY: Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429453342-21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ainsworth, Peter B., and Ken Pease. "Criminals." In Police Work, 128–42. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003376330-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bencivenga, Jennifer. "Criminals: Motives." In Encyclopedia of Security and Emergency Management, 1–4. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_115-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bencivenga, Jennifer. "Criminals: Motives." In Encyclopedia of Security and Emergency Management, 1–4. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_115-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Duggan, James M., and James J. F. Forest. "Criminals: Terrorist." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_261-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Duggan, James M., and James J. F. Forest. "Criminals: Terrorist." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_261-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grispos, George. "Criminals: Cybercriminals." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_80-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cushing, Nancy. "Innocent Criminals." In A History of Crime in Australia, 203–19. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003273561-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Petti, Gabriella. "Enemies-criminals." In Conflict, Security and the Reshaping of Society, 138–50. London: Routledge, 2010. http://dx.doi.org/10.4324/9780203846315-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Criminals"

1

Dewi, Dian, and Zudan Fakrulloh. "The Effectiveness of Criminal Sanctions Against the Narcotics Criminals." In Proceedings of the 1st International Conference on Law, Social Science, Economics, and Education, ICLSSEE 2021, March 6th 2021, Jakarta, Indonesia. EAI, 2021. http://dx.doi.org/10.4108/eai.6-3-2021.2306878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Akimzhanov, Talgat Kurmanovich. "Criminal Law as the Most Effective Tool for Influencing Crime and Criminals." In VII INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE “CRIMINAL LAW AND OPERATIVE SEARCH ACTIVITIES: PROBLEMS OF LEGISLATION, SCIENCE AND PRACTICE”. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010635200003152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tan, Fang, Weiwei Liu, and Xin Zhao. "The Ethical Problems of Criminals." In 2020 International Conference on Public Health and Data Science (ICPHDS). IEEE, 2020. http://dx.doi.org/10.1109/icphds51617.2020.00021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Enache, M., and T. S. Letia. "Trap application for cyber criminals." In 2012 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2012). IEEE, 2012. http://dx.doi.org/10.1109/aqtr.2012.6237786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Haofeng. "Technical education and reshaping criminals." In Proceedings of the 2019 4th International Conference on Modern Management, Education Technology and Social Science (MMETSS 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/mmetss-19.2019.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yimyam, Worawut, Thidarat Pinthong, Narumol Chumuang, and Mahasak Ketcham. "Face Detection Criminals through CCTV Cameras." In 2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS). IEEE, 2018. http://dx.doi.org/10.1109/sitis.2018.00061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rybalchenko, Ludmila. "Protection of the citizens’ rights in terms of informatization issues in the conditions of digital transformations." In The 8th International Conference "Management Strategies and Policies in the Contemporary Economy". Academy of Economic Studies of Moldova, 2023. http://dx.doi.org/10.53486/icspm2023.53.

Full text
Abstract:
Digital space is an integral part of the state and society. This indicates the necessity of its guaranteed protection. Significant increase of the dependence of the country from the information technologies and willingness of the competitors and criminals to use t he global network as the place to create various threats in the economic, political, military and social spheres should be counteract and created strategic measures for strengthen and protection of the network from the intervention of criminals. The biggest threat is the internal criminals, who enjoy confidence in the organizations where they work, and have access to the vital systems and data. Criminals, by providing their activity, such as theft of the secret data or intellectual property, can cause financial losses or damage to the reputation of the organization. They also can cause threat to destructive cyber activity if they will use a special knowledge or access to conduct the attack or facilitate it in order to disable, degrade or destroy the critical services of the organizational network.
APA, Harvard, Vancouver, ISO, and other styles
8

Kwan, Leonard, Pradeep Ray, and Greg Stephens. "Towards a Methodology for Profiling Cyber Criminals." In 2008 41st Annual Hawaii International Conference on System Sciences. IEEE, 2008. http://dx.doi.org/10.1109/hicss.2008.460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arrais de Freitas, Nicksson Ckayo, Ticiana L. Coelho da Silva, Jose Antonio Fernandes de Macedo, Luis Cesar M. de Vasconcelos, and Francisco C. F. Nunes Junior. "Crime Monitor: Monitoring Criminals from Trajectory Data." In 2021 22nd IEEE International Conference on Mobile Data Management (MDM). IEEE, 2021. http://dx.doi.org/10.1109/mdm52706.2021.00043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Životić, Ilija, and Ivan Pekić. "THE RELATIONSHIP BETWEEN CRIMINAL GROUPS AND PUBLIC FUNCTIONS." In SECURITY HORIZONS. Faculty of Security- Skopje, 2021. http://dx.doi.org/10.20544/icp.2.4.21.p15.

Full text
Abstract:
Some criminal groups take every opportunity to infiltrate legitimate businesses; other criminal groups aim to make profits through politics and close contact with senior officials leading governments, by tracking money through campaigning for elections at both the local and state level, then through misuse of state resources, by creating a criminal organization which does not stop from anything and anyone. In this scientific work we will discuss briefly on the case of the former and sole president of the State Union of Serbia and Montenegro until its dissemination in 2006, Svetozar Marovic. Marovic, even after admitting being the head of an organized crime group, and for this being sentenced to three years and ten months in prison, is still not serving his sentence today. The aim of the research in this work is to prove the hypothesis that criminal groups succeed in corrupting high holders of public office, making them criminals. The data collection and research technique will be to analyze the content of texts of legal and political documents, as well as available literature in this field, relevant internet sources and journals. Key words: Criminal groups, corruption, politics, criminal law, state power
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Criminals"

1

Mocan, Naci, and Erdal Tekin. Ugly Criminals. Cambridge, MA: National Bureau of Economic Research, February 2006. http://dx.doi.org/10.3386/w12019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Medina-Durango, Carlos Alberto, Jorge Andrés Tamayo-Castaño, and Christian Manuel Posso-Suárez. The effect of adult criminals' spillovers on the likelihood of youths becoming criminals. Bogotá, Colombia: Banco de la República, February 2013. http://dx.doi.org/10.32468/be.755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Spencer, David. Colombia's Paramilitaries: Criminals or Political Force? Fort Belvoir, VA: Defense Technical Information Center, December 2001. http://dx.doi.org/10.21236/ada398077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

O'Leary, Denis F. Approaching Career Criminals With An Intelligence Cycle. Fort Belvoir, VA: Defense Technical Information Center, December 2015. http://dx.doi.org/10.21236/ad1009185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McCarthy, Sean M. Colombia's FARC: More Than Just Opportunistic Criminals. Fort Belvoir, VA: Defense Technical Information Center, February 2013. http://dx.doi.org/10.21236/ad1018816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bibler, Andrew, Stephen Billings, and Stephen Ross. Does School Choice Leave Behind Future Criminals? Cambridge, MA: National Bureau of Economic Research, February 2023. http://dx.doi.org/10.3386/w30936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gray, Howard L. Gangs and Transnational Criminals Threaten Central American Stability. Fort Belvoir, VA: Defense Technical Information Center, March 2009. http://dx.doi.org/10.21236/ada498136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Williams, Phil. Criminals, Militias, and Insurgents: Organized Crime in Iraq. Fort Belvoir, VA: Defense Technical Information Center, June 2009. http://dx.doi.org/10.21236/ada504847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bodenhorn, Howard, Carolyn Moehling, and Gregory Price. Short Criminals: Stature and Crime in Early America. Cambridge, MA: National Bureau of Economic Research, April 2010. http://dx.doi.org/10.3386/w15945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tella, Rafael Di, and Juan Dubra. Free to Punish? The American Dream and the Harsh Treatment of Criminals. Cambridge, MA: National Bureau of Economic Research, August 2011. http://dx.doi.org/10.3386/w17309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography