Journal articles on the topic 'Trials (Theft)'

To see the other types of publications on this topic, follow the link: Trials (Theft).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Trials (Theft).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Piper, Alana, and Lisa Durnian. "Theft on trial: Prosecution, conviction and sentencing patterns in colonial Victoria and Western Australia." Australian & New Zealand Journal of Criminology 50, no. 1 (July 27, 2016): 5–22. http://dx.doi.org/10.1177/0004865815620684.

Full text
Abstract:
From Ned Kelly to Waltzing Matilda, tales of thievery dominate Australia's colonial history. Yet while theft represents one of the most pervasive forms of criminal activity, it remains an under-researched area in Australian historical scholarship. This article draws on detailed inter-jurisdictional research from Victoria and Western Australia to elaborate trends in the prosecution, conviction and sentencing of theft in colonial Australia. In particular, we use these patterns to explore courtroom attitudes towards different forms of theft by situating such statistics within the context of contemporary commentaries. We examine the way responses to theft and the protection of property were affected by colonial conditions, and consider the influence of a variety of factors on the outcomes of theft trials.
APA, Harvard, Vancouver, ISO, and other styles
2

Jia, Jianfei. "Horse Theft, Law, and Punishment in Xinjiang during the Qianlong Reign." Ming Qing Yanjiu 20, no. 1 (March 1, 2016): 135–64. http://dx.doi.org/10.1163/24684791-12340007.

Full text
Abstract:
There are a large number of criminal cases in the Manchu archives, which occurred in Mongolia and Xinjiang and were reported to the Qing emperors. These criminal cases can be roughly divided into two groups: homicide cases and horse theft cases. Based on the records of the Manchu archives, this paper will focus upon horse theft cases in Xinjiang during the Qianlong reign. Xinjiang was a place populated by many ethnic groups under the Qing rule. In the Qing records, we found that almost all of the ethnic groups were involved in horse theft cases. The questions at issue are: why did such horse theft cases matter in the Qing dynasty, especially to the extent they even had to be reported to the central government and the Qing emperors? Based on what law were the criminals of different peoples punished in the judicial trials?My arguments are as follows: based on the Qing records, one can learn that the legislation in Xinjiang had been less mature than that in China proper, and there had not been specific regulations or laws on criminal cases including horse theft being enacted by the Qing court in Xinjiang; the law was subject to variation based on the emperors’ own will, which largely reflects the limitations and challenges that the Manchu rulers were facing during their reign in such a newly-conquered multi-cultural territory. What is certain is: first, in general, the ethnicities of horse theft criminals and owners of the stolen horses were considered by the Qing magistrates, and the criminals were punished on the basis of their and the owners’ ethnicities, thus, a diversified statutory base appeared to be applied in these trials. Second, the punishment for criminals in horse theft in Xinjiang at the time was more severe than that in other parts of the Qing Empire, and the penalties were generally borrowed from that inDaqing lüli, which, to some extent, could reflect the strong influences of Chinese and Manchu legislation.
APA, Harvard, Vancouver, ISO, and other styles
3

Fins, Joseph J., Amanda R. Merner, Megan S. Wright, and Gabriel Lázaro‐Muñoz. "Identity Theft, Deep Brain Stimulation, and the Primacy of Post‐trial Obligations." Hastings Center Report 54, no. 1 (January 2024): 34–41. http://dx.doi.org/10.1002/hast.1567.

Full text
Abstract:
AbstractPatient narratives from two investigational deep brain stimulation trials for traumatic brain injury and obsessive‐compulsive disorder reveal that injury and illness rob individuals of personal identity and that neuromodulation can restore it. The early success of these interventions makes a compelling case for continued post‐trial access to these technologies. Given the centrality of personal identity to respect for persons, a failure to provide continued access can be understood to represent a metaphorical identity theft. Such a loss recapitulates the pain of an individual's initial injury or illness and becomes especially tragic because it could be prevented by robust policy. A failure to fulfill this normative obligation constitutes a breach of disability law, which would view post‐trial access as a means to achieve social reintegration through this neurotechnological accommodation.
APA, Harvard, Vancouver, ISO, and other styles
4

HOWARD, SHARON. "Investigating responses to theft in early modern Wales: communities, thieves and the courts." Continuity and Change 19, no. 3 (December 2004): 409–30. http://dx.doi.org/10.1017/s0268416004005211.

Full text
Abstract:
This article makes use of the rich deposits of pre-trial documents in the court archives of early modern Wales, focusing on the county of Denbighshire, to investigate attitudes and responses to theft. Qualitative research on this subject tends to emphasize or privilege actively law-enforcing behaviour that led to trials; while that is the inevitable emphasis of court records, I argue that we need to examine witness testimonies more closely in order to understand responses that did not match up to the ideals of vigilance and communal responsibility. Drawing on modern criminological research, I explore ‘suspicion’ and the decision-making processes leading to various outcomes: non-action; investigation and prosecution; alternative resolutions that bypassed the courts. Finally, I explore the everyday ‘world of stolen goods’ and its social and economic rewards in local networks of reciprocal favours, gifts and alliances.
APA, Harvard, Vancouver, ISO, and other styles
5

Yuniati, Trihastuti, and Iqsyahiro Kresna A. "Secure Electronic Payment Methods for Online Shopping Based on Visual Cryptography." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 2 (April 20, 2020): 319–28. http://dx.doi.org/10.29207/resti.v4i2.1732.

Full text
Abstract:
Phishing and identity theft are common threats of online shopping. Phishing is an attempt to steal personal data from legitimate user. In this paper we propose a secure e-payment method using a credit card based on visual cryptography. This method adopts the existing 3D-Secure technology. Visual cryptography is applied in: user-merchant authentication, user-card provider authentication, user-card issuer authorization. It is applied to captcha image generated by merchant during registration using (2, 2) scheme with 2-subpixel expansion, to a text file containing credit card information sent by merchant to the card provider using (2, 2) scheme with pixel replacement, and to quick response code containing one-time-password that is used to authorize the payment transaction using (2, 2) scheme with 4-subpixel expansion. The test results show that out of 100 trials, all of them give 100% true positive. This indicates that the method is able to prevent phishing and identity theft, in sense of authentication, authorization, confidentiality, and integrity are gained. Phishing can be prevented because only legitimate participant who has an image share. Identity theft can be prevented because credit card details are not stored in the merchant’s database. Authorization is more guaranteed because only authenticated user can authorize the payments.
APA, Harvard, Vancouver, ISO, and other styles
6

Paula, João J. S., Regina M. B. Bispo, Andreia H. Leite, Pedro G. S. Pereira, Hugo M. R. G. Costa, Carlos M. M. S. Fonseca, Miguel R. T. Mascarenhas, and Joana L. V. Bernardino. "Camera-trapping as a methodology to assess the persistence of wildlife carcasses resulting from collisions with human-made structures." Wildlife Research 41, no. 8 (2014): 717. http://dx.doi.org/10.1071/wr14063.

Full text
Abstract:
Context To assess the real impact of human-made structures on bird and bat communities, a significant number of carcass-removal trials has been performed worldwide in recent decades. Recently, researchers have started to use camera traps to record carcasses exact removal time and better understand the factors that influence this event. Aims In our study, we endeavoured to identify the factors that significantly affect carcass-persistence time, such as (1) season, (2) scavenger guild, (3) type of carcass, (4) habitat and (5) weather conditions. Additionally, we aimed to assess the performance of camera-trapping technology in comparison to the conventional method typically used in carcass-removal trials. Methods We conducted two trials in two wind farms during early spring and during summer season. In each trial, we used 30 bird carcasses and 30 mice carcasses as surrogates for bats. Digital infrared camera traps were used to monitor each carcass. Chi-squared test was used to investigate differences between wind farms regarding the scavenger guild. A log-rank test was used to compare carcass-persistence times for both wind farms. Carcass-persistence times were analysed using both non-parametric and parametric survival models. Finally, we evaluated the percentage of carcasses removed during the day time and night time. Key results In our study area, carcass-persistence times were influenced by the scavenger guild present and by the exposure to rain. Camera traps allowed to record the exact removal time for the majority of the carcasses, reducing the number of visits to the study site about five times. However, there were also cases wherein loss of data occurred as a result of equipment flaws or camera theft. Conclusions Results demonstrated the importance of undertaking site-specific carcass-removal trials. Use of camera-trap methodology is a valid option, reducing displacement costs. Costs related to equipment purchase and the risk of camera theft should be taken into consideration. Implications When choosing camera-trapping, the main aspect to evaluate is the balance between the investment in equipment purchase and the cost savings through reduced displacement costs. Further studies are required concerning the real effects of the data collected on the accuracy of carcass-removal correction factor obtained.
APA, Harvard, Vancouver, ISO, and other styles
7

Fullitan, Ric Vincent T., Jason F. Mamac, Joshua T. Palma, Jestone C. Labastida, Michael P. Garay, and Maria Danesa S. Rabia. "Automatic Street Lighting Controller with Anti-Theft Alarm." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 5 (January 30, 2022): 87–91. http://dx.doi.org/10.35940/ijrte.d6613.0110522.

Full text
Abstract:
In times when security is the topmost priority of every community, the provision of adequate and functional streetlights is deemed necessary as one of the measures to protect life and property. In this study, the researchers designed and constructed a prototype device Automatic Streetlight Controller with anti-theft alarm using a Light-dependent resistor (LDR) and Photodiode – Infrared LED tandem. This study was conducted to assess the qualitative description, functionality, and level of acceptability regarding the constructed Automatic Streetlight Controller with Anti-theft device in terms of its performance as to device and simulator/trainer, the convenience of use, safety, assembly of parts, and cost. A mixed research design was used that includes both qualitative and quantitative research design. The qualitative description of the device was presented in narrative form and assessed using a focused-group discussion. Quantitative research design is done using quasi-experimental in testing the functionality, trials were made to assess its functionality and descriptive survey method was used to assess the level of acceptability. Probability sampling was also used thru the lottery method to get the two (2) selected groups of respondents: the 3rd year BSIT- Electricity block B students and community barangay officials of Calunasan, Calape, Bohol. T-test was used to test its significance using the 0.05α. Results have shown that on testing the device has 100% good performance and is rated as it functions well. The acceptability level was rated “very high” which means highly acceptable by both respondents. Therefore, the device can be used if implanted in existing street lights or newly built ones to improve the condition of our street lights to properly illuminate the streets for an improved security system.
APA, Harvard, Vancouver, ISO, and other styles
8

Darke, Andrew C., and John H. Stewart. "Efficacy and Abuse Potential of Opioid Analgesics and the Treatment of Chronic Noncancer Pain." Pain Research and Management 4, no. 2 (1999): 104–9. http://dx.doi.org/10.1155/1999/352469.

Full text
Abstract:
While the role of opioid analgesics has been established in the treatment of cancer pain, reservations persist about appropriate use in patients with chronic noncancer pain. Recent evidence from controlled clinical trials supports the effectiveness of opioids for treating noncancer pain of varying etiologies. The safety of opioids in noncancer patients has been an area of controversy because of confusion between physical dependence, which develops in all patients receiving opioids chronically, and addiction, which is a behavioural diagnosis that is rarely made in patients appropriately treated with opioids for pain. Abuse by secondary recipients of opioids is well documented and arises as a result of diversion by primary recipients, double-doctoring, forgery and theft. The frequency of forgery and theft of different opioids appears to be largely related to the corresponding number of legitimate prescriptions. While it is legitimate medical practice to prescribe opioid analgesics to patients with chronic noncancer pain, there is clear evidence that prescribing is affected by concerns of regulatory sanctions. Recent guidelines, including most recently comprehensive guidelines issued by the Canadian Pain Society, should help to reduce inappropriate undertreatment because of such concerns.
APA, Harvard, Vancouver, ISO, and other styles
9

Kazdin, Alan E. "Developing Treatments for Antisocial Behavior Among Children: Controlled Trials and Uncontrolled Tribulations." Perspectives on Psychological Science 13, no. 5 (June 29, 2018): 634–50. http://dx.doi.org/10.1177/1745691618767880.

Full text
Abstract:
The article describes my research on the development and evaluation of psychosocial treatments for children who engage in extremes of antisocial behavior (e.g., aggression, property destruction, theft). I begin with my “story” of how the focus on interventions started as I worked in various settings (rehabilitation facilities, schools, hospitals, and outpatient clinical services) and with children, adolescents, and adults. The main stream of treatment research and findings with antisocial child behavior is highlighted along with tributaries that led naturally from the outcome research. Our trials are complemented by tribulations that apply to evidence-based psychosocial interventions more broadly. Most individuals in need of psychological services in the United States and worldwide receive no treatment. Much can be done right now with novel models of treatment delivery that draw on multiple disciplines (e.g., public health, business, entertainment, economics, robotics and artificial intelligence, and law and social policy). More research on interventions that do not or cannot reach most people in need is quite limited in value to me. Finally (and belatedly) my attention has turned to ways of exerting impact, and for that, evidence-based interventions are necessary but hardly sufficient.
APA, Harvard, Vancouver, ISO, and other styles
10

Fahrurrozi, Muh, and Lalu Puji Indra Kharisma. "Home Security And Access System Prototype Using Fingerprint." IJISTECH (International Journal of Information System and Technology) 5, no. 4 (December 30, 2021): 498. http://dx.doi.org/10.30645/ijistech.v5i4.169.

Full text
Abstract:
A sense of security and easy access in managing the house is a must that every home must-have. With advances in technology, it makes it easy for us to manage and maintain the security of our homes, one of which is by utilizing an embedded system in home management using fingerprints. Fingerprints are used as the main key to access the house to provide a sense of security, convenience in managing the house, and minimizing cases of theft that occur in houses that still use conventional keys. based on trials carried out the use of fingerprints is easier to use than using an ordinary key with a success rate in the test, namely 100% in a clean and not wet state, 40% in wet fingerprints, and 0% in dirty fingerprints or dusty.
APA, Harvard, Vancouver, ISO, and other styles
11

Beattie, J. M. "Scales of Justice: Defense Counsel and the English Criminal Trial in the Eighteenth and Nineteenth Centuries." Law and History Review 9, no. 2 (1991): 221–67. http://dx.doi.org/10.2307/743649.

Full text
Abstract:
My subject is the story of the entry of lawyers into the English criminal courts and their impact on trial procedure. Until the eighteenth century lawyers played little part in the trial of felonies in England—in the trial, that is, of those accused of the most serious offenses, including murder, rape, arson, robbery, and virtually all forms of theft. Indeed, the defendants in such cases were prohibited at common law from engaging lawyers to act for them in court. In the case of less-serious crimes—misdemeanors—defendants were allowed counsel; and those accused of high treason, the most serious offense of all, were granted the right to make their defense by counsel in 1696. But not in felony. Accused felons might seek a lawyer's advice on points of law, but if they wanted to question the prosecution evidence or to put forward a defense, they had to do that on their own behalf. The victim of a felony (who most often acted as the prosecutor in a system that depended fundamentally on private prosecution) was free to hire a lawyer to manage the presentation of his or her case. But in fact few did so. The judges were generally the only participants in felony trials with professional training. They dominated the courtroom and orchestrated the brief confrontation between the victim and the accused that was at the heart of the trial.
APA, Harvard, Vancouver, ISO, and other styles
12

Hakim, Oktafian Sultan, Muhammad Agus Zainuddin, Sritrusta Sukaridhoto, and Agus Prayudi. "Digital Twin and Blockchain Extension in Smart Buildings Platform as Cyber-Physical Systems." JUITA : Jurnal Informatika 11, no. 2 (November 17, 2023): 175. http://dx.doi.org/10.30595/juita.v11i2.18704.

Full text
Abstract:
Cyber-physical systems is integrated computation with the physical world. CPS increasing in a wide range of applications, from smart homes to smart buildings. Digital twins are promising way to solve challenges with combination of CPS, 3D technology, and IoT. The system provides users with immersive interfaces to control and interact with devices within the smart building environment. Blockchain was chosen to secure user data using cryptographic algorithms and ensure data protection against manipulation, spying, and theft. Average load testing data for digital twin platform implemented in smart buildings range from 1 to 11 floors. The results reveal a gradual increase in average test times as the buildings' size and complexity grow, with the following values: 5.663s for 1 floor until 11 floors 7.294s. The data obtained from of the blockchain test using Hyperledger Besu provide essential insights into the system's performance with several bandwidth that used in the system. Average time for each test trial ranged from 1.066 seconds to 2.006 seconds, showing slight variations based on the bandwidth used. However, transactions per second (TPS) values were relatively fast, ranging from 1.066 tps to 0.499 tps with positive aspect of the retention rate for all trials was 100% success.
APA, Harvard, Vancouver, ISO, and other styles
13

ZHUNUSSOV, Yeldos. "Criminal and Legal Characteristics of Theft and Fraud as Basic Personal Crimes Related to the Theft of Another Property." Journal of Advanced Research in Law and Economics 9, no. 7 (November 24, 2019): 2496. http://dx.doi.org/10.14505//jarle.v9.7(37).38.

Full text
Abstract:
The article is devoted to the consideration of the criminal law characteristics of certain mercenary crimes related to the theft of another’s property, namely thefts and frauds. The relevance of the chosen subject is because theft and fraud are the most common types of theft of another's property. Thus, according to the analysis of legal statistics data, in Kazakhstan frauds take the second place among all types of crimes against property and are second only to thefts. At the same time, it was established that the types of acts prohibited by criminal law constitute more than half of the total number of pre-trial investigations. The author substantiates the position that the result of committing thefts and fraud should be causing damage directly to the owner or property owner, and not to someone else, therefore, when committing credit fraud, legal entities - banks should be recognized as the injured party. The article considers the points of view of researchers of criminal law, on the basis of which their own conclusions are formed, in particular, on determining the definition of ‘theft’, determining the age of criminal responsibility for committing qualified types of fraud, as well as on the need to introduce a qualified theft composition - committing theft from banking accounts, as well as in relation to electronic cash. Also reviewed recent changes in the legislation of Kazakhstan, which directly affected the criminal law, providing for liability for theft and fraud.
APA, Harvard, Vancouver, ISO, and other styles
14

Fehér, Andrea. "WOMEN, CRIME AND THE SECULAR COURT IN EIGHTEENTH CENTURY CLUJ." Journal of Education Culture and Society 6, no. 2 (January 1, 2020): 33–42. http://dx.doi.org/10.15503/jecs20152.33.42.

Full text
Abstract:
The purpose of this presentation is to address the issue of female criminality in early modern Cluj, and to analyze women’s position before the law. Our investigation is based on the records of the secular Court from the town Cluj, where we have identified more than 250 cases of women accused of fornication, adultery, witchcraft, infanticide, theft and drunkenness, poisoning, swearing and slander. There were a significant number of female convictions during the century, from which most ended with light sentences, such as banishment, corporal punishments, stigmatizations with hot iron, mutilations and only occasionally death. We would like to analyze in detail the types of crime and their punishments presenting the legal background, the jurisdiction and the habitual practices of the Court. We would also like to underline the importance of the narrative strategies used in these inquisitorial trials, since our documents reveal female criminality from a male perspective, as in these times men ran the legal system, consequently the Court records, in our reading contain moral, legal and sexual elements of a male discourse on female crime.
APA, Harvard, Vancouver, ISO, and other styles
15

Krisbiantoro, Dwi, Sofyan Fathur Rohim, and Irfan Santiko. "Perbandingan Algoritma N-gram dan Algoritma Knuth Morris Pratt untuk Mengukur Tingkat Akurasi Plagiarisme pada Dokumen Abstrak Skripsi Berbasis Website." JITU : Journal Informatic Technology And Communication 5, no. 1 (July 29, 2021): 30–39. http://dx.doi.org/10.36596/jitu.v5i1.390.

Full text
Abstract:
Plagiarism is a crime that often occurs in the academic world, plagiarism occurs because of theft of other people's work that is illegally recognized as if the work is his own. N-gram is an algorithm by cutting as many characters as N-characters in a sentence or word. While the Knuth Morris Pratt (KMP) algorithm is a string search algorithm, this algorithm is used to maintain information that is used to carry out the number of shifts whenever there is no matched patency in the text. The purpose of this study is to create a system to measure the comparison of the accuracy of the N-gram algorithm with a website-based KMP on a thesis abstract document. This research uses the waterfall system development method which has stages, namely analysis, design, coding, and testing. The KMP test results are better than N-gram where kmp has an average percentage of 3.8% while the N-gram 3.5% results are obtained from an average of 10 trials and 5 documents tested.
APA, Harvard, Vancouver, ISO, and other styles
16

Kinsella, John. "Hotel Impossible." CounterText 6, no. 2 (August 2020): 239–381. http://dx.doi.org/10.3366/count.2020.0196.

Full text
Abstract:
Hotel Impossible is the puzzle-world of global capital Pilgrim enters looking for comfort, discovering instead various trials and tribulations on his way through an unresolvable Hell of Whiteworld. As it spreads and occupies the planet, a super-charged colonialism of the now, there's a paddock in the Western Australian Wheatbelt where Sister is waiting, keeping life going as they knew it, but it was always a different kind of life, out of keeping with the conservative rural community around it, a community with its corruptions and invasiveness. Discovering purpose in resisting corruption, Pilgrim decodes his way through the hotel via CERN and Lake Geneva, arriving back ‘home’ to confront the offices of colonial mining corruption. Bunyan's The Pilgrim's Progress is a de-map in a world of constant remapping and overlays, and Escher and Penrose are clues to possible solutions, but in the end only the land itself and truths outside colonialism can offer any way through without ongoing acts of appropriation, cultural-theft, and the deceptions of ‘fictionalising’ reality.
APA, Harvard, Vancouver, ISO, and other styles
17

Ren, Yong, Jinfeng Han, Yingcheng Lin, Xiujiu Mei, and Ling Zhang. "An Ontology-Based and Deep Learning-Driven Method for Extracting Legal Facts from Chinese Legal Texts." Electronics 11, no. 12 (June 8, 2022): 1821. http://dx.doi.org/10.3390/electronics11121821.

Full text
Abstract:
The construction of smart courts promotes the in-deep integration of internet, big data, cloud computing and artificial intelligence with judicial trial work, which can both improve trials and ensure judicial justice with more efficiency. High-quality structured legal facts, obtained by extracting information from unstructured legal texts, are the foundation for the construction of smart courts. Based on the strong normative characteristics of Chinese legal text content and structure composition and the strong text feature learning ability of deep learning, this paper proposes an ontology-based and deep learning-driven method for extracting legal facts from Chinese legal texts. The proposed method utilizes rules and patterns generated in the process of knowledge modeling to extract simple entities, and then extracts complex entities hidden in legal text details with deep learning methods. Finally, the extracted entities are mapped into structured legal facts with clear logical relationships by the Chinese Legal Text Ontology. In the information extraction test of judicial datasets composed of Chinese legal texts on theft, the proposed method effectively extracts up to 38 categories of legal facts from legal texts and the number of categories extracted increases significantly. Among them, the rule-based extractor obtains an F1-score of 99.70%, and the deep learning-driven extractor obtains an F1-score of 91.43%. Compared with existing methods, the proposed method has great advantages in extracting the completeness and accuracy of legal facts.
APA, Harvard, Vancouver, ISO, and other styles
18

Haidar, O. V. "Current Situation of Illegal Usage of Special Expertise while Investigating Thefts." Bulletin of Kharkiv National University of Internal Affairs 94, no. 3 (September 29, 2021): 224–33. http://dx.doi.org/10.32631/v.2021.3.20.

Full text
Abstract:
The author of the article has studied regulatory legal acts of Ukraine that regulate the usage of special expertise while investigating secret theft of another’s property. The concepts of “an expert”, “a specialist”, “a forensic inspector” have been revealed. The role of a specialist and an expert during the pre-trial investigation has been reflected. The author has analyzed the necessity of involving persons with special expertise during the conduction of the crime scene search in criminal proceedings on the fact of thefts. The functions of the forensic inspector while conducting the crime scene search have been considered. The author has revealed the essence of expert research conducted during the the crime scene search to investigate the secret theft of another’s property. Besides, the author has distinguished specific features of conducting the expert study of individual objects of the material situation at the crime scene and the expert study of the crime scene in the whole. The relevance of trasological research during the investigation of thefts on railway transport has been highlighted. Specific features of fingerprinting of victims during the investigation of thefts of personal property on railway transport have been provided. A number of examinations have been identified that can improve the investigation of thefts from vehicle. The author has analyzed the importance of interaction between the investigator and persons with special expertise during the investigation of thefts committed on the territory of horticultural associations and country house cooperatives. The need to conduct the crime scene search after the report of pickpocketing or attempted pickpocket has been revealed. The relevance of using special expertise while investigating pickpocketing has been highlighted. The research on the involvement of specialists while conducting examinations, searches in criminal proceedings on the fact of burglaries has been analyzed. The emphasis has been placed on the objects that should be initially examined during the investigation of the secret theft of someone else’s property, combined with the penetration into the premises. The importance of involving experts and specialists while preparing and conducting an investigative experiment has been studied. The necessity of appointing a commodity examination during the pre-trial investigation by the fact of the secret theft of someone else’s property has been revealed. The author has highlighted the role of a psychologist, teacher, physician as persons with special expertise.
APA, Harvard, Vancouver, ISO, and other styles
19

Mikhaelis, Dmitrii. "Economic Crimes in the Irkutsk Province in the Second Half of the 19th — Early 20th Centuries." Journal of Economic History and History of Economics 23, no. 1 (March 18, 2022): 152–66. http://dx.doi.org/10.17150/2308-2488.2022.23(1).152-166.

Full text
Abstract:
The article is dedicated to the criminal legislation regulating the protection of property in the Russian Empire during the implementation of the judicial reform of 1864, case study of the Irkutsk Province. The author examines the law enforcement practice of that time using the specific articles of criminal legislation applied then to fight economic crimes: theft and damage to property, fraud, abuse of official position. The author indicates that certain articles of criminal legislation, due to local specifics, have not been applied in the practice of magistrate and general courts in Siberia. Quantitative characteristics of economic crimes give the overall picture of economic crimes both on the scale of the Russian Empire and in its regions. The study of the specifics of economic crimes in the Irkutsk province and their consideration in the general and magistrate courts allows the author to conclude that they were associated not only with the peculiarities of judicial reform in Siberia, but also with its socio-economic development. The study of archival data relating to various trials revealed procedural errors due to the excessive workload of judges, as well as the insufficient level of their professional training.
APA, Harvard, Vancouver, ISO, and other styles
20

Parth, Chauhan, Jaitly Tamanna, and Agrawal Animesh Kumar. "Comparative analysis of mobile forensic proprietary tools: an application in forensic investigation." Journal of Forensic Science and Research 6, no. 1 (November 22, 2022): 077–82. http://dx.doi.org/10.29328/journal.jfsr.1001039.

Full text
Abstract:
The utilization of the Internet and wireless communication reaches its pinnacle from one side of the planet to the other. Marking the rise of criminal activity in recent years sees enormous growth in security breaches and data theft-related cases in mobile phones. To mitigate them, the implementation of security patches, safety fixes, and updates in mobile devices is of high priority for the organization. The need to foster techniques and procedures in the field to be able to extract and precisely dissect digital crime cases, providing valuable tactical data about the investigation. Mobile forensics is a developing branch assisting the investigator in criminal trials and investigations. Acquisition, Collection, and Analysis of mobile phones settle the purpose of recovering cumulative and corroborative evidence. Upgradation and innovation of mobile devices with time imposed a challenge to mobile forensic technology to extract information from such devices. The study aims at extracting comparative and statistical approaches in the analysis of Physical data acquisition utilizing significant versatile mobile criminological proprietary tools. The proposed study also introduces newly developed utility tools along with their characteristic features which help in successful data extraction from mobile devices.
APA, Harvard, Vancouver, ISO, and other styles
21

Hartini, Pri, Ibrahim Ibrahim, Reni Rahmadewi, and Tiara Nurhuda. "Motorcycle Tracking System Using Telegram Integrated Quectel L80 GPS." Sainteks: Jurnal Sains dan Teknik 5, no. 1 (March 26, 2023): 36–46. http://dx.doi.org/10.37577/sainteks.v5i1.456.

Full text
Abstract:
Motorcycles are two-wheeled vehicles that are very common and widely used in Indonesia. At the same time, the criminal rate of motorcycle thieving also has the possibility to increase. The standard security system that motorcycles have is still ineffective. One solution to secure motorcycle from theft is adding a security system. The security system used in this research is a tracking system using a Quectel L80-R GPS connected to an ESP8266 NodeMCU which then installed on a motorcycle. The GPS then integrates with the Telegram application. Users can request the location of the motorcycle by pressing the button on the Chatbot that was previously created. Then the GPS will send a link containing the coordinates of the motorcycle location which can be opened via Google Maps. In this research, the location obtained from the GPS response is quite accurate with an average error distance of 3,06 meters in outdoor tests and 3,51 meters in indoor tests with each 30 trials in 3 different places. Thus, the tracking system using Quectel L80-R GPS can be used properly as a motorcycle security system and has been integrated with the Telegram application.
APA, Harvard, Vancouver, ISO, and other styles
22

Junaidi, Muksan SAN. "SISTEM KEAMANAN PELACAKAN KENDARAAN BERMOTOR MENGGUNAKAN RASPBERRY PI 3 DENGAN MODULE GPS SECARA REALTIME BERBASIS WEB." SIMETRIS 14, no. 2 (December 30, 2020): 33–38. http://dx.doi.org/10.51901/simetris.v14i2.133.

Full text
Abstract:
Motor vehicle theft is a criminal problem that very often occurs in the community. Along with the development of technology and the level of demand for motor vehicle safety in the community that begins to increase. One of the devices that has been developed is Internet of Things (IoT) technology which is able to connect and facilitate the communication process between machines, devices and humans via the internet network. The purpose of this research is to develop a monitoring application that utilizes IoT technology as a medium for tracking the location of motorized vehicles. This research consists of 3 main system components, including the End Device System found on the Raspberry Pi device, Web Service (Back-End System) as a service for data transfer, and Front-End System user interface in the form of a website application. This system has several main features, including realtime tracking and is equipped with an activity log which can be used to determine the identity of the vehicle user. Users can access these features through the application from the website. Based on the trials conducted, this system works well on motorized vehicles, however, this system has more dependence on the internet network available in each region.
APA, Harvard, Vancouver, ISO, and other styles
23

Frick, David. "The Witches of Wilno: Constant Litigation and Conflict Resolution." Slavic Review 73, no. 4 (2014): 881–902. http://dx.doi.org/10.5612/slavicreview.73.4.881.

Full text
Abstract:
Seventeenth-century Wilno, capital of the Grand Duchy of Lithuania and thus the second capital of the Polish-Lithuanian Commonwealth, was home to five Christian confessions (Roman Catholic, Lutheran, Calvinist, Greek Orthodox, and Uniate) and three religions (Christians, Jews, and Muslims [Tatars]). Against the general question of how they “made it work” arises the issue of witchcraft practice in local perceptions and in prosecution in the courts. Witchcraft trials are treated here as an integral part of “constant litigation“ and the “use of justice” in restoring communal peace. My conclusions and propositions include the following: that religion and confession played no role in witchcraft litigation; that although there is no doubt that beliefs in the existence of witchcraft persisted, there was nothing like a “witchcraft scare,“ and allegations of sorcery were treated on a level with that of petty theft and general misbehavior between neighbors; and that the goal of recourse to the courts was here, and in other types of cases, the restoration of a status quo ante. My final proposition, which invites testing, is that the Grand Duchy of Lithuania represented in this question, as well as perhaps in others, a transitional zone between the European west and east.
APA, Harvard, Vancouver, ISO, and other styles
24

K., Dr Umadevi, Gunasekaran I, D. Jaya Surya, and Boopathi P. "An Integrated Smart Metering System Using LORA Technology." International Journal of Innovative Research in Advanced Engineering 11, no. 04 (April 5, 2024): 381–85. http://dx.doi.org/10.26562/ijirae.2024.v1104.34.

Full text
Abstract:
Precise meter readings are essential for effectively regulating residential energy systems in India's smart city context. However, due to the high number of users and the absence of daily consumption monitoring, standard meter reading methods are expensive and time-consuming, which causes consumer unhappiness. The suggested approach to address this issue is to put in place an integrated wireless smart energy system that makes use of smart metering technologies. The way utilities manage energy could be completely changed by this method. The integrated system is intended to take the place of the traditional digital energy meters, which are primarily used to record meter readings properly for payment purposes. This allows for automatic meter readings without the need for frequent travels to the location where the meters are located. Low Power Wide Area Networks (LPWAN) technology, which is renowned for its low power consumption, cost-effectiveness, long-range coverage, and efficient penetration, are used in this technology to enable the transfer of accurate and secure data on energy usage in real-time. The experiments that resulted from the trials allowed the energy to successfully communicate and documented reliable readings. By providing users with real-time usage data and guarding against overloaded scenarios, the system also benefits consumers. Additionally, the device reports electricity theft to the utility company. The shortcomings of the conventional systems and design difficulties are addressed by the suggested system.
APA, Harvard, Vancouver, ISO, and other styles
25

Sutanto, Hermawan, and Syahrul Borman. "EFFORTS MADE BY POLRI AS LAW ENFORCEMENT OFFICIALS IN COMMITTING CRIME WITH VIOLENCE (BEGAL)." POLICY, LAW, NOTARY AND REGULATORY ISSUES (POLRI) 2, no. 4 (August 19, 2023): 318–26. http://dx.doi.org/10.55047/polri.v2i4.773.

Full text
Abstract:
The crime of robbery involves theft that can lead to the loss of a person's life. To address this issue, the police are empowered with authority and responsibilities outlined in Article 13 of Law Number 2 of 2002. These responsibilities include maintaining security and public order, upholding the law, and providing protection, services, and assistance to the community. This research aims to (1) understand the role of the National Police in combating criminal acts involving violence (such as "begal"), and (2) explore efforts to uphold the rule of law when addressing such criminal acts. This study adopts a normative legal research approach, incorporating statutory, case-based, and conceptual legal analyses. Legal materials are examined through interpretation and relevant legal theories, leading to deductive conclusions. The findings of this study reveal that (1) Robbery is classified as a criminal act punishable under Criminal Code Articles 365 and 368. The National Police employs preventive measures by advising the public to exercise caution in areas susceptible to robberies. Additionally, repressive legal actions are taken through investigations and trials to administer punishments. (2) If certain conditions for accountability are met, an individual displaying deviant behavior may commit specific criminal acts. Therefore, a perpetrator utilizing a planned approach to commit robbery, accompanied by the required evidence, could be sentenced to up to 12 years of imprisonment.
APA, Harvard, Vancouver, ISO, and other styles
26

Haidar, O. V. "Forms of special knowledge used during the investigation of secret theft of someone else's property." Law and Safety 85, no. 2 (June 30, 2022): 30–39. http://dx.doi.org/10.32631/pb.2022.2.03.

Full text
Abstract:
The concept of special knowledge forms used during pre-trial investigation is considered. The views of scientists regarding the classification of special knowledge forms used during the investigation of criminal proceedings are analyzed. The opinion of the majority of scientists regarding the division of forms of special knowledge into procedural and non-procedural ones is highlighted. In addition, besides procedural and non-procedural forms of special knowledge, the statement on the selection of such a form as mixed, which combines the features of the two forms indicated above, is considered. Another division of special knowledge by forms is also analyzed. Each form of special knowledge is explored in more detail. Statistical studies of scientists regarding the use of forms of special knowledge in practical activities are presented. Scientific views on conducting forensic examinations in criminal proceedings are analyzed. Peculiarities of appointment of examinations are considered. Aspects of the expediency of using advisory and reference information during the investigation of criminal offenses, in particular theft, are highlighted. The positive consequences of the involvement of specialists in conducting investigative (research) actions as a form of special knowledge are clarified. The main goals of special knowledge used during the investigation of secret theft of someone else's property are determined. Forms of special knowledge, which are used during the inspection of the scene at the beginning of the pre-trial investigation, are revealed. Judicial practice in criminal cases based on the fact of theft regarding the use of forms of special knowledge during pre-trial investigation is selectively considered. The forms of special knowledge used during the investigation of the secret theft of someone else’s property are analyzed. The need to involve specialists in inspecting the scene during the investigation of thefts is revealed. It is emphasized that it is mandatory to appoint a commodity expert when investigating the secret theft of someone else’s property. The expediency of involving experts and specialists in the investigative (search) actions carried out during the investigation of the above offenses is analyzed. Attention is paid to consultations and references that can carry important information and influence the receipt of substantive evidence.
APA, Harvard, Vancouver, ISO, and other styles
27

Putra, I. Made Dharma, I. Nyoman Putu Budiartha, and A. Sagung Laksmi Dewi. "Perlindungan Hukum Anak Nakal dalam Penjatuhan Sanksi Pidana." Jurnal Preferensi Hukum 1, no. 2 (September 15, 2020): 83–87. http://dx.doi.org/10.22225/jph.1.2.2380.83-87.

Full text
Abstract:
Children are an inseparable part of human survival and the survival of the nation and state. Today delinquency and crimes committed by children continues to increase, such as narcotics abuse, robbery, theft and rape, destruction of property and so on. When delinquency committed by children even leads to criminal acts, of course this is very disturbing for the community. The existence of legal protection for naughty children in criminal sanctions is of course very desirable for the best interests of children who are in conflict with the law. The method used in this research is normative legal research or what is also called the term library research by examining document studies using secondary data, namely laws, legal theory, expert opinion and so on. The result of this research is that the process of examining criminal cases against delinquents and starting investigations, arrests, detention, prosecution, trials and placement at the correctional center must pay attention to children's rights, as well as legal protection of delinquents in imposing criminal sanctions where child protection aims to provide guarantees for children in conflict with the law. In this case, special investigators for children, investigations with a family atmosphere, investigators do not use service attributes, duties to carry out diversity, child secrecy and arrest must of course put Restorative Justice, and the fall of criminal sanctions against children must be based on truth, justice and child welfare. So that Law Enforcement Apparatus both the Police as Investigators, Public Prosecutors, and Child Judges with the enactment of Law Number 11 of 2012 concerning the Juvenile Justice System.
APA, Harvard, Vancouver, ISO, and other styles
28

Darriba, H. Becerra. "Combined use of clozapine and cariprazine in treatment-resistant schizophrenia, is it a good choice?" European Psychiatry 64, S1 (April 2021): S798—S799. http://dx.doi.org/10.1192/j.eurpsy.2021.2111.

Full text
Abstract:
IntroductionTreatment-resistant schizophrenia (TRS) affects 30% of people with a diagnosis of schizophrenia, and is defined as nonresponse to at least two trials of antipsychotic medication of adequate dose and duration. Clozapine is the only evidence-based treatment for TRS. Cariprazine may be considered significantly more efficacious than risperidone in improving negative symptoms of schizophrenia.ObjectivesTo describe the experience of using cariprazine in combination with clozapine in patients with refractory schizophrenia and negative symptoms.MethodsQualitative design. We present a case report study of a 47-year-old male with a diagnosis of TRS, treated in our outpatient mental health clinic for twenty years. The patient experiences crystallized delusional ideas of harm, self-referential, paranoid and mystical-messianic content, phenomena of theft and thought reading, egodistonic auditory hallucinations. No substance use disorder was observed. He made several suicide attempts in the context of intense suffering and psychotic anguish. Clozapine 400mg/day was instituted after no response to treatment with amisulpride, paliperidone, olanzapine or aripiprazole. The intensity of positive symptoms was reduced (experiences of damage, commenting and insulting auditory hallucinations, self-referentiality), as well as the emotional and behavioral repercussions. Persistent negative symptoms appeared such as apathy, abulia, clinophilia, anergy, social isolation, affective flattening, impairing his functionality.ResultsNeuroimaging and periodic blood tests results were normal. Oral cariprazine was added in ascending doses up to 4.5mg with good tolerance. The patient showed remission of apathy, enhancement of behavioral activation, socialization and motivation to perform occupational activities.ConclusionsCombinations of clozapine with partial agonists may improve the quality of life in refractory schizophrenia.DisclosureNo significant relationships.
APA, Harvard, Vancouver, ISO, and other styles
29

Підпалий, В. В. "WAYS OF THEFT IN THE CONDITIONS OF A BIG CITY." Juridical science, no. 1(103) (February 19, 2020): 322–29. http://dx.doi.org/10.32844/2222-5374-2020-103-1.39.

Full text
Abstract:
The relevance of the article is that the method of committing a criminal offense is one of the central elements of the forensic characterization of criminal offenses, which provides the largest amount of forensic information, which allows the investigator to navigate the crime and determine the best methods of investigation. The article substantiates that the method of committing theft in a large city depends on objective factors (situation, time, place of commission; object of encroachment, its qualitative and quantitative features; the presence of tools or access to them; the commission of preparatory actions; the presence of accomplices and their qualifications) and subjective (availability of «professional knowledge», physical condition and psychological characteristics of the offender) nature. It was found that the preparation for committing theft in a large city involved the choice of the subject of criminal encroachment; preliminary reconnaissance of the place; development of a plan of criminal actions; observation of the place where the property is stored, or of the property itself; distribution of roles for theft; selection and preparation of the place of storage of stolen property; selection of technical means for penetration into the premises where the property is stored; search for technical means for transportation of stolen property. It is determined that the establishment of a method of committing theft in a large city is the basis for the promotion of operational and investigative and investigative versions and the development of certain tactics. This allows to concentrate the necessary forces and means in the places of probable theft, to provide effective operational maintenance of the most criminogenic objects. In addition, knowledge of the methods of committing thefts in a large city allows the investigator (coroner) to methodically correctly determine the directions of pre-trial investigation of criminal proceedings. It should be added that offenders, in turn, seek to use methods that would significantly complicate the investigation or make it impossible. For this purpose, new ways of committing a criminal offense and its concealment are being sought and modified.
APA, Harvard, Vancouver, ISO, and other styles
30

Cicourel, Aaron V. "John Rawls on Two Concepts of Rules." Journal of Classical Sociology 9, no. 4 (November 2009): 371–87. http://dx.doi.org/10.1177/1468795x09344448.

Full text
Abstract:
Over fifty years have passed since the publication of John Rawls’ paper ‘Two Concepts of Rules’ (1955). The paper remains a unique work. Rawls’ seminal ‘distinction between justifying a practice and justifying a particular action falling under it’ (1955: 3) provides us with a powerful analytic proposition that can have extensive theoretical and empirical consequences for the social sciences, as I seek to demonstrate below. In footnote 1 on page 3, Rawls states that ‘practice’ is a technical term that refers to ‘any form of activity specified by a system of rules which defines offices, roles, moves, penalties, defenses, and so on, and which gives the activity its structure. As examples one may think of games and rituals, trials and parliaments.’ Rawls’ philosophical objective was to defend utilitarianism vis-à-vis ‘punishment and the obligations to keep promises.’ The general idea was to provide a clearer understanding of a rule regardless of whether or not it is defensible. The notion of two conceptions of rules is central to his discussion. I ask: can Rawls’ unique analytical notion of two concepts of rules be clarified by empirical research in the social sciences? I present some recent data from a criminal justice case to illustrate the notion’s potential and limitations. The empirical circumstances are somewhat dramatic. The case involved an allegation of inter-racial sexual molestation and two counts of Grand Theft. The sexual molestation allegation is a theme at the heart of deep-seated cultural tensions between Caucasians and African Americans that can be traced back to initial importation of slaves from Africa. The inter-racial sexual molestation allegation was documented in detail by two law-enforcement agencies but was never pursued. Once major consequence of this decision was to render empirically problematic the issue of when a case is said to fall under a rule of law.
APA, Harvard, Vancouver, ISO, and other styles
31

Taltsev, Alexander N. "Features of the System of Supply and Distribution of Food During the Great Patriotic War (Based on the Materials of Stavropol)." Vestnik of North Ossetian State University, no. 3 (September 25, 2023): 81–87. http://dx.doi.org/10.29025/1994-7720-2023-3-81-87.

Full text
Abstract:
The article analyzes the features of the food supply and distribution system as an essential element of the daily life of the population of Stavropol during the Great Patriotic War. The relevance of the study is due to the need to preserve the memory of the participants in the war and the inhabitants of the home front, to study from other methodological positions the features of survival and existence in the years of the most difficult trials of the middle of the 20th century. The practical significance of the study is expressed in the possibility of using its results in the reconstruction of the regional history of everyday life during the Great Patriotic War. The methodological potential of the study is revealed in the possibility of using its material at the level of a higher educational institution, when conducting classes in the history of Russia. The scientific novelty lies in the study, based on archival materials, sources of personal origin, of the features of catering, behavior patterns, domestic and labor daily practices of Soviet society during the Great Patriotic War, taking into account the specifics of the Stavropol region. The results of the study indicate that the food supply, organized in the form of a rationing system during the war, provided only the nutritional needs of only a small part of the population of Stavropol. The majority, the inhabitants of the village, were self-sufficient and survived thanks to their personal plots of land. In the daily existence of residents, especially young people, a constant “sign” of the war years was malnutrition, eating various surrogates, hunger, massive in some areas of the region, led to all sorts of deviations, often - theft, severely punished by the state law enforcement machine.
APA, Harvard, Vancouver, ISO, and other styles
32

TOMAŃSKA, ANNA, MACIEJ JANECZEK, and WOJCIECH BORAWSKI. "Poaching and illegal trade in rhino horn - a significant problem for an endangered species." Medycyna Weterynaryjna 79, no. 5 (2023): 216–22. http://dx.doi.org/10.21521/mw.6759.

Full text
Abstract:
The international problem of poaching and illegal trade in rhino horn has led to the formulation of standards defining human duties towards the natural environment and animals, especially the endangered species. The smuggling of animals and animal products, as well as historical, artistic or archaeological exhibits, required legislators to come up with more stringent and faster penal measures against crime, which also involved the introduction of uniform methods of identification and marking. The movement of personal goods, as well goods exchanged between scientific units has been subjected to stricter control, in which scientific knowledge and consulting bodies play a more important role. This had a definite positive effect on nature conservation in general. In the case of rhinoceroses, however, protection and attempts to restore them to the environment have encountered significant difficulties, which posed both technical and ethical dilemmas for these activities. Other unintended consequences included increased demand for rhino horn, proliferation of criminal groups specialized in the theft and smuggling of horns, as well as political conflicts. The desire to acquire horns has a cultural background in many countries. For example, the use of rhino horn, although its efficacy has not been proven by clinical trials, is well-established in traditional Chinese medicine. Modern identification methods, from macroscopic and microscopic evaluation to advanced molecular methods with analysis based on genetic profiling, make it possible to identify even the smallest amount of substances derived from rhino horn (e.g. in a powdered form). Scanning microscopy, fluorescence techniques, roentgenography and computed tomography are used. Thermogravimetric analysis, protein profiling, evaluation of inductively compressed plasma are also useful for this purpose. Such identification methods can determine a wide range of parameters, including the phylogenetic and geographical origin, sex, age, and condition of the animal, as well as the horn growth rate or climatic changes.
APA, Harvard, Vancouver, ISO, and other styles
33

Haykal, Muhammad, Taufik Siregar, and Rizkan Zulyadi. "The Role of the Prosecutor at the Aceh Tamiang District Prosecutor's Office in Prosecuting Cases of Theft Crimes (Decision Study No. 44/Pid.B/2020/Pn. Ksp)." Cognizance Journal of Multidisciplinary Studies 3, no. 8 (August 30, 2023): 660–73. http://dx.doi.org/10.47760/cognizance.2023.v03i08.016.

Full text
Abstract:
The purpose of this study was to analyze the roles and prosecution procedures carried out by the Aceh Tamiang District Attorney in prosecuting cases of theft (Decision Study No. 44/Pid-B/2020/PN.Ksp). The research method used is normative juridical research. The results of the study show that the role played by the Aceh Tamiang District Prosecutor's Office in prosecuting the crime of theft (Decision Study No. 44/Pid.B/2022/PN. Ksp) is as follows: The Attorney General's Office acts as a prosecutor in cases of theft crime; The Attorney General's Office has a role in carrying out the investigative process related to the crime of theft based on Indonesian law; The Attorney General's Office of Aceh Tamiang has the role of transferring cases to court and carrying out prosecutions at trial; The Aceh Tamiang District Prosecutor's Office plays a role in assisting judges in giving criminal decisions decided by judges handling cases of theft. The prosecution procedure carried out by the Prosecutor is to make legal efforts in accordance with the criminal procedure law. This writing concludes that the Aceh Tamiang District Prosecutor's Office should provide legal counseling or socialization to the community in order to minimize the number of criminal acts of theft in the province of Aceh.
APA, Harvard, Vancouver, ISO, and other styles
34

Stachelska, Aleksandra. "The Crime of Identity Theft as an Aftermath of the Development of Modern Technologies – Legal and Criminological Aspects of the Phenomenon in Poland." International Annals of Criminology 57, no. 1-2 (May 2019): 138–71. http://dx.doi.org/10.1017/cri.2020.9.

Full text
Abstract:
AbstractThe problem of identity theft is current all over the world. Nowadays we can even observe a tendency for an increasing occurrence of this kind of behaviour. The rapid development of new communication tools and the Internet has made it easier to commit a crime of identity theft than ever before. Despite this seemingly obvious trend in the world, in Poland since 2011, when this phenomenon was criminalized, convictions for identity theft are still one of the rarest situations. Identity theft as a proportion of general identified offences in 2017, according to Police statistics, was only .30%. The paper will present selected legal aspects of identity theft from the Polish Criminal Code, as well as criminological analysis of the phenomenon in Poland. The results of research on identity theft conducted in the District Court in Białystok on court files that ended in a final court judgment covering the years 2011–2016 will also be presented. In the course of the research process, seven cases were found and examined. The analysis was enabled by using a questionnaire, which included forty-nine questions grouped into categories, i.e. characteristics of the perpetrator of the crime, characteristics of the victim, description of the committed act, as well as the course of the pre-trial and judicial proceedings. In the paper, an attempt will be made to find an answer to the question of why the dark number of identity theft crimes in Poland is still great, and this will help characterize identity theft in the area of Białystok.
APA, Harvard, Vancouver, ISO, and other styles
35

Nalayini, C. M., K. Vishnupriya, and D. Sruthinila. "Clinical Trial Management System using Blockchain for Secure and Efficient Record Keeping." June 2024 6, no. 2 (June 2024): 135–49. http://dx.doi.org/10.36548/jucct.2024.2.005.

Full text
Abstract:
In today’s developing environment, there is always a need for upgradation to easier lifestyle among people. Technology has improved in almost all areas of concern to facilitate people’s work. But even today, there is no efficient tool for managing Clinical Trial records. Clinical Trial records management is considered to be an important job when it comes to discovery of new medicines into the market. It is important to monitor the behaviour medicines for different group of people, at different locations, different age groups and gender. Only when the medicine’s behaviour is known, it can be administered to patients of several concerns. There are various EHMS used in hospitals to manage their data. But it should also be noted that, it is important to secure the data from theft or modification. Using Blockchain technology is one of the best ways to secure data from theft or modification. Clinical Trial Management system using Blockchain can be an efficient way to store trial reports safe.
APA, Harvard, Vancouver, ISO, and other styles
36

Smith, A. T. H. "THEFT OR SHARP PRACTICE: WHO CARES NOW?" Cambridge Law Journal 60, no. 1 (March 2001): 1–58. http://dx.doi.org/10.1017/s0008197301660616.

Full text
Abstract:
THE House of Lords has upheld, by a majority, the decision of the Court of Appeal in Hinks [2000] 3 W.L.R. 1590 (noted (1999) 58 C.L.J. 10), giving a positive answer to the certified question: “Whether the acquisition of an indefeasible title to property is capable of amounting to an appropriation of property belonging to another for the purposes of section 1(1) of the Theft Act 1968”. The appellant had persuaded a somewhat simple-minded man to make her the “gift” of a quite considerable sum of money. No deception was alleged to have been employed, and so far as the civil law was concerned, the “gift” might well have been a perfectly valid transaction; the question was never determined by the jury, because it was deemed to be irrelevant by the trial judge. But the decision of the House of Lords is to the effect that she was properly convicted of theft however that question might have been answered. So, it would seem, a person may become the indefeasible owner of property and nevertheless be accounted a thief of that very same property, and by the very act of acquiring the ownership of it.
APA, Harvard, Vancouver, ISO, and other styles
37

Montaño, Diana J. "Ladrones de Luz: Policing Electricity in Mexico City, 1901–1918." Hispanic American Historical Review 101, no. 1 (February 1, 2021): 35–72. http://dx.doi.org/10.1215/00182168-8796462.

Full text
Abstract:
AbstractThis essay explores Mexico City's electrification in the early twentieth century through the lens of power theft. The arrest and resulting trial of dozens of capitalinos (Mexico City residents) suspected of power theft allow us to document the nuances of policing and prosecuting a modern crime and thus to explore how notions of policing, private property, space, honor, and even decency influenced how people secured and used electricity. Using 63 cases tried before the Tribunal Superior de Justicia del Distrito Federal (Federal District Higher Court) and newspaper and legal debate on power theft, this article examines how capitalinos could flip seamlessly between the elitist, scripted, proper use of electricity and the ad-libbed, improper use that fit their needs in specific circumstances. By grounding electrification in everyday life, this article argues that capitalinos emerge as agents of technological change, people who understood the importance of electricity to transform their lives and spaces.
APA, Harvard, Vancouver, ISO, and other styles
38

Rohalin, Serhii. "Criminal Characteristics of Criminal Offenses Related to Electricity Theft." Krakowskie Studia Małopolskie 40, no. 4 (2023): 188–210. http://dx.doi.org/10.15804/ksm20230413.

Full text
Abstract:
This article purpose is to review development state of the issue of forensic characterization of criminal offenses, build the general structure of forensic characteristic of electrical energy theft, determine its main constituent elements, divide them into groups, and develop a detailed forensic characteristic of electric energy theft. Validity of the obtained results and conclusions that were based on the analysis of the latest scientific research on issues of violation of regulatory requirements regarding the accounting of electric energy and unaccounted consumption of electric energy, on the results obtained during performance of forensic examinations at the National Scientific Center »Hon. Prof. M.S. Bokarius Forensic Science Institute« of the Ministry of the Interior of Ukraine, and also ensured the use of a complex of general scientific and special methods, in particular formal and logical, generalization, comparison. Scientific novelty. In the context of forensic expert provision of evidentiary base in criminal act qualification: electric energy theft, provided for in Article 1881 of the Criminal Code of Ukraine, for development of new and supplementing existing methodological recommendations for investigation by employees of pre-trial investigation bodies of criminal offenses; this article elaborates and systematizes data on performing forensic examinations and a detailed forensic description of electric energy theft was compiled that will become the basis for the construction of investigative versions and will contribute to the effective conduct of investigative (search) actions and other investigative measures, as well as quickly. Conclusions. 1. Development state of issue of forensic characteristics of criminal offenses is considered. 2. General structure of forensic characteristics of electric energy theft is built. 3. The main constituent elements of forensic characteristics of electric energy theft are determined. It is proposed to divide constituent elements into groups according to a defining sign; the most significant and auxiliary signs. 4. On the basis of generalizations of data based on the results of forensic examinations and theoretical processing of research results into the issues of unaccounted electric energy consumption, detailed forensic description of electric energy theft has been developed.
APA, Harvard, Vancouver, ISO, and other styles
39

Manuaba, Ida Bagus Agung Pariama, I. Nyoman Sujana, and Ni Made Sukaryati Karma. "Pertimbangan Hakim dalam Menjatuhkan Pidana terhadap Tindak Pidana Pencurian dengan Pemberatan yang Dilakukan oleh Anak." Jurnal Preferensi Hukum 1, no. 1 (July 27, 2020): 207–13. http://dx.doi.org/10.22225/jph.1.1.2009.207-213.

Full text
Abstract:
Judge's considerations are matters which are the basis or are considered by the judge in deciding a crime case. Crime Theft is an act that is classified as a general crime in which a crime against the property of another person. Theft with weighting is a criminal act of theft which in its implementation is accompanied by certain elements so that it is more severe and threatened with higher penalties. Child is a person who is not yet eighteen (18) years old, including those who are still in the womb. In settling a child case, the judge must consider the report in the trial regarding the child concerned. This study aims to determine the criminal considerations and sanctions imposed by the judge on criminal theft with weighting carried out by children. This study uses a normative legal research method with a statutory approach, conceptual approach and case approach. The legal materials studied are primary legal materials, secondary legal materials and tertiary legal materials. The results of this study indicate the judge's judgment in imposing a crime against a child who commits a crime of theft by weighting it based on the elements of the crime committed as well as things that alleviate and incriminate the crime against the child. Criminal sanctions imposed by a judge against a child who commits an act of theft by weighting based on the Court's Decision and the provisions of Article 363 paragraph (1) of the 4th KtoP Jungto Article 65 paragraph (1) of the Criminal Code and other laws relating to the case state that the child is proven legally and convincingly guilty as well as convicting a child of seven months in prison.
APA, Harvard, Vancouver, ISO, and other styles
40

Galang Yudha Murih Raharja and Padjar Setyobudi. "RANCANG BANGUN SISTEM KEAMANAN SEPEDA MOTOR MENGGUNAKAN RFID DAN PERSONAL IDENTIFICATION NUMBER (PIN) BERBASIS MIKROKONTROLER ATMEGA16." Elkom : Jurnal Elektronika dan Komputer 12, no. 1 (July 16, 2019): 6–12. http://dx.doi.org/10.51903/elkom.v12i1.104.

Full text
Abstract:
The increase in motorized vehicles in urban areas is followed by an increase in cases of motorcycle theft due to the lack of public awareness about the motorcycle security system. The intensity of motorcycle theft with its disclosure is still far in comparison. Crime will also increase, such as cases of theft of motor vehicles, especially motorbikes. Cases of motorcycle theft still often occur, this happens because there is still a lack of security systems contained in motorized vehicles that only use ignition. the existence of an alternative safety system is needed because the average key of a conventional motorcycle is easily penetrated by thieves. A double motorcycle safety device (Doble Smart Lock) composed of an RFID and Personal Identification Number (PIN) and an ATMega microcontroller. This system serves to provide two-stage security. The first stage is a microcontroller in the form of a PIN and the second stage is an RFID system. If the first stage breaks then it will enter the second stage, namely the RFID system The results in the form of a main tool for motorcycle management consists of: Power supply, RFID Card, RFID Reader, Personal Identification Number (PIN), IC / Microcontroller ATMega and already running. The system testing process shows the number 3 in the expert validation test and the number 3 in the expert validation trial. Based on the above calculation, it can be concluded that the validation results from the expert show that the value of 3 is between 2 - 3, which is classified in the valid category. The system process shows the number 3 in the expert validation and the number 2.9 in the validation trial of the user. Based on the above calculation, it can be concluded that the validation results from the user point to a value of 2.9 between 2 - 3 which is classified in the valid category.
APA, Harvard, Vancouver, ISO, and other styles
41

Saputra, Ardiansyah Rolindo. "PENGGUNAAN CCTV (CLOSED CIRCUIT TELEVISION) SEBAGAI ALAT BUKTI PETUNJUK DALAM MENGUNGKAP TINDAK PIDANA PENCURIAN KENDARAAN BERMOTOR (Studi Pada Satreskrim Polres Sawahlunto)." UNES Law Review 2, no. 3 (July 1, 2020): 321–30. http://dx.doi.org/10.31933/unesrev.v2i3.125.

Full text
Abstract:
The position of CCTV according to the ITE and RKUHAP Laws is a legitimate evidence, whereas according to the Criminal Procedure Code the position of CCTV is evidence but there is an expansion in the ITE Law article 5 paragraph (2) which states that electronic information or electronic documents or printouts are extensions of evidence which is valid in accordance with the applicable Procedural Law in Indonesia and the position of CCTV in proving a common crime in the trial is evidence, because the KUHAP does not regulate the position of CCTV as evidence. One of the facilities for using CCTV is the disclosure of criminal acts of motor vehicle theft which are very prevalent in the jurisdiction of the Sawahlunto Regional Police Station. This research is a descriptive analytical study. Adapaun the results of research into motor vehicle theft at the Sawahlunto police Satreskrim, there were 264 cases of theft of motorized vehicles that were revealed and recorded through CCTV from 509 criminal acts of motor vehicle theft that were reported at the Satal Police Headquarters in Sawalunto. The use of CCTV helps investigators to uncover who is the perpetrator of the crime of motor vehicle theft with the help of IT experts who understand CCTV. The elements that meet CCTV as evidence are Article 184 paragraph 1 of the Criminal Procedure Code, CCTV footage can be used as evidence of expansion (which is also strengthened by the Constitutional Court Decision No. 20 / PUU-XIV / 2016 dated September 7, 2016 and Article 5 of the Law ITE) so that CCTV footage can be used as a panel of judges as a guide to ensure the existence of a criminal act. Second, the constraints faced by Sawahlunto District Police Satreskrim investigators in using CCTV as evidence to reveal the crime of motor vehicle theft are maintaining CCTV in the original state, because after data from CCTV was taken, the video was not clearly visible when playing and brought CCTV experts nor can it be fast.
APA, Harvard, Vancouver, ISO, and other styles
42

Abdillah, Dwi Badru, and Rusdiyanto Rusdiyanto. "Pencurian dengan Pemberatan yang Dilakukan Anak Belum Dewasa: Studi Kasus Putusan No. 41/Pid.Sus-Anak/2020/PN.Plg." As-Syar'i: Jurnal Bimbingan & Konseling Keluarga 3, no. 2 (September 15, 2021): 337–51. http://dx.doi.org/10.47467/as.v3i2.1581.

Full text
Abstract:
One of the crimes that has been formulated in the Criminal Code or a crime called "Theft with Aggravation" is regulated in Article 363 paragraph (1) 5th of the Criminal Code in conjunction with Article 25 in conjunction with Article 26 paragraph (1) of Law Number 3 of 1997 concerning Juvenile Justice , Aggravated theft committed by a child is a criminal offense. The specificity of this type of criminal act lies in the perpetrator/subject of the crime, namely children who are classified as minors who still have a long future as the nation's next generation. The aim of the criminal justice process is not punishment, but improving the condition, maintenance and protection of children as well as preventing and overcoming their actions through constructive court action. As related to the case of aggravated theft committed by a minor in case Number: 41/Pid.Sus-Anak/2020/PN.Plg. The method in this research is a normative juridical method or library research, namely research by analyzing applicable legal norms, both in the form of laws and court decisions. Research data was obtained from library materials and legal documentation in the form of primary, secondary and tertiary law. Then the data is collected by investing in statutory regulations, books and literature related to the research material. Finally, the existing data is then analyzed qualitatively, namely carrying out analysis without using numbers or formulas. The results of the research show that firstly, in the process of resolving criminal acts committed by immature children, in the examination process both at the investigation level and in the trial process, the children have been accompanied by community counselors (BISPA), parents, and Advocates/Legal Advisors. Second, the punishment of children who committed the crime of theft with aggravation in Case No. 41/Pid.Sus-Anak/2020/PN. Plg, it is regulated in Article 363 paragraph (1) 4th of the Criminal Code. This is based on legal facts that have been revealed in the trial, both from the testimony of the victim and witnesses as well as from the defendant's confession.
APA, Harvard, Vancouver, ISO, and other styles
43

Lokanan, Mark Eshwar. "A fraud investigation plan for a false accounting and theft case." Journal of Financial Crime 26, no. 4 (October 7, 2019): 1216–28. http://dx.doi.org/10.1108/jfc-09-2017-0086.

Full text
Abstract:
Purpose The purpose of this paper is to formulate and propose a fraud investigation plan that forensic accountants can use to investigate financial frauds. In particular, the paper sets out the structure and rationale of the fraud investigation plan that both forensic accountants and fraud examiners can use in their investigation of false accounting and theft charges. Design/methodology/approach The paper uses the material facts from the Polly Peck International fraud as a prototype case upon which to build an investigation plan and detail potential areas of investigation to establish evidence for a criminal trial. Findings The findings revealed that the case can be used to provide insights on evidence gathering techniques and test particular models of fraud detection. The concealment and conversion evidence gathering techniques provide fodder on how to gather and triangulate both direct and circumstantial evidence that can be used to avoid mistrials in courts. Practical implications The case is of interest to practitioners and forensic and fraud examination students who would like to build on their existing knowledge and obtain insights into the steps to follow to conduct an investigation and gather evidence to build a case. The paper makes specific recommendations to enhance the effectiveness and efficiency of investigations. Originality/value The paper is among one of the few to propose a fraud investigation plan designed to investigate cases involving false accounting and theft charges. More importantly, the paper uses a real case to illustrate how to examine documentation/data and how such documentation will be analysed in a trial.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Shan, Yuanzuo Li, Jing Liu, Meiyu Zhao, Yueyi Han, Yong Ding, Peng Song, and Fengcai Ma. "Theoretical Evidence for the Distance-Dependent Photoinduced Electron Transfer of Porphyrin-Oligothiophene-Fullerene Triads." International Journal of Photoenergy 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/314896.

Full text
Abstract:
The ground and excited state properties ofnT-C60 dyads and Por-nT-C60 triads (n=4, 8, and 12) have been theoretically investigated by using the time-dependent density functional theory together with a set of extensive multidimensional visualization techniques. The results reveal that the length of thenT moiety strongly influences the charge transfer characters of these systems. The charge transfer ability is largely strengthened by introducing the porphyrin group and decreases with the length of thenT moiety. Also the adjustment of the electron transport mode of Por-nT-C60 triads by the length of thenT moiety was visualized. It is found that Por*-4T-C60 shows predominantly the energy transfer process generating Por-4T-1C60* but the charge transfer becomes predominant for other triads, such as the direct formation ofPor∙+-12T-C60∙−via Por*-12T-C60. Furthermore, the process ofPor∙−-8T∙+-C60→Por-8T∙+-C60∙−via Por*-8T-C60 has been proved to be possible. Finally, the energetically most stable final charge transfer excited state is confirmed to be Por-nT∙+-C60∙−.
APA, Harvard, Vancouver, ISO, and other styles
45

Манжос, І. О. "The planning of pre-trial investigation of theft committed by groups of juveniles." Theory and practice of jurisprudence 2, no. 8 (March 17, 2015): 23. http://dx.doi.org/10.21564/2225-6555.2015.2.63874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Gallupe, Owen, Patrick Lalonde, Holly Nguyen, and Jennifer Schulenberg. "A randomized trial testing deviant modeling, peer gender, and theft: replication and extension." Journal of Experimental Criminology 15, no. 3 (August 9, 2019): 421–39. http://dx.doi.org/10.1007/s11292-019-09374-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Senko, Anastasiya. ". Essence of forensic description of citizens’ luggage thefts committed at the airport." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 1, no. 1 (March 30, 2020): 293–300. http://dx.doi.org/10.31733/2078-3566-2020-1-293-300.

Full text
Abstract:
. The article deals with some aspects of investigating theft of citizens' luggage at the airport. The features of forensic characteristics for faster investigation of the investigated category of criminal offenses are considered. The author emphasizes that the creation of a stable system is a prerequisite for the effectiveness of any activity. The process of pre-trial investigation of criminal offenses is not an exception. An important element of the methodology of investigation of a particular criminal offense is its forensic characteristics. This element allows law enforcement officials to build versions and determine the direction of criminal proceedings at its initial stage. At the same time, when investigating theft of citizens' luggage at the airport, the initial stage is in many cases crucial. It provides an opportunity to gather sufficient evidence that will be lost over time without being able to recover it. Therefore, the issue of research and development of the cur-rent forensic characteristics of the offense is important for the investigation as a whole. It is also noted that the forensic characteristics of the citizens' luggage theft committed at the airport is a system of generalized evidence of the studied materials of the forensic practice, which reflect the connection and correlation of individual forensically significant elements that can be used in the pre-trial investigation of a specific criminal offense. The system of the designated category consists of the following elements: method of preparation, commission and concealment of a criminal offense; the subject of the assault; the situation of committing a criminal offense; a trace picture; the person of the offender; the identity of the victim.
APA, Harvard, Vancouver, ISO, and other styles
48

Summerson, Henry. "Hanging Matters: Petty Theft, Sentence of Death, and a Lost Statute of Edward I." Law and History Review 40, no. 1 (January 10, 2022): 149–64. http://dx.doi.org/10.1017/s0738248021000572.

Full text
Abstract:
This article discusses an important aspect of the law relating to theft in thirteenth-century England, and one of the ways in which that law developed. Central to it is the argument that the treatise The Mirror of Justices and references in court records and reports show that a short statute enacted early in the reign of Edward I, probably in 1278, categorically defined 12d. as the amount, whether in goods or money, at which larceny became a capital felony, incurring judgment of death. As well as setting out the evidence for this hitherto overlooked ordinance, the article also argues that the statute can be associated with some significant developments in the way petty theft was treated subsequently. In particular it had the effect of promoting the development of penal imprisonment, while since the task of valuation was given to trial juries, it further enhanced the leading role of the latter in determining the fates of the men and women whose lives depended on their verdicts.
APA, Harvard, Vancouver, ISO, and other styles
49

Shigenobu, Kazue, Manabu Ikeda, Ryuji Fukuhara, Kenjiro Komori, and Hirotaka Tanabe. "A Structured, Open Trial of Risperidone Therapy for Delusions of Theft in Alzheimer Disease." American Journal of Geriatric Psychiatry 11, no. 2 (March 2003): 256–57. http://dx.doi.org/10.1097/00019442-200303000-00018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ouyang, Long, Ruizhang Huang, Yanping Chen, and Yongbin Qin. "A Sentence Prediction Approach Incorporating Trial Logic Based on Abductive Learning." Applied Sciences 12, no. 16 (August 9, 2022): 7982. http://dx.doi.org/10.3390/app12167982.

Full text
Abstract:
Sentencing prediction is an important direction of artificial intelligence applied to the judicial field. The purpose is to predict the trial sentence for the case based on the description of the case in the adjudication documents. Traditional methods mainly use neural networks exclusively, which are trained on a large amount of data to encode textual information and then directly regress or classify out the sentence. This shows that machine learning methods are effective, but are extremely dependent on the amount of data. We found that there is still external knowledge such as laws and regulations that are not used. Moreover, the prediction of sentences in these methods does not fit well with the trial process. Thus, we propose a sentence prediction method that incorporates trial logic based on abductive learning, called SPITL. The logic of the trial is reflected in two aspects: one is that the process of sentence prediction is more in line with the logic of the trial, and the other is that external knowledge, such as legal texts, is utilized in the process of sentence prediction. Specifically, we establish a legal knowledge base for the characteristics of theft cases, translating relevant laws and legal interpretations into first-order logic. At the same time, we designed the process of sentence prediction according to the trial process by dividing it into key circumstance element identification and sentence calculation. We fused the legal knowledge base as weakly supervised information into a neural network through the combination of logical inference and machine learning. Furthermore, a sentencing calculation method that is more consistent with the sentencing rules is proposed with reference to the Sentencing Guidelines. Under the condition of the same training data, the effect of this model in the experiment of responding to the legal documents of theft cases was improved compared with state-of-the-art models without domain knowledge. The results are not only more accurate as a sentencing aid in the judicial trial process, but also more explanatory.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography