Results for 'Cyber Crime'

471 found
Order:
  1. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  4. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  80
    The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  9. An Evidence-driven Research to the Transgressions of Geneva Conventions by the Communist Party of China Led Autocratic Regime.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (10):249-266.
    The "second-generation indigenization" hypothesis of Huntington's phenomenological observations on totalitarianism in Cold War regime collapse subtly portrayed the realpolitik interest groups' political influences with autocracy disbandment processes. The research puts democratization as the premise and globalization as purpose for the analysis, with the cultural anthropological psychopathology & criminological elements of genocide and crime against humanity explained, underlying some of the Communist Party of China (CPC)’s organizational behaviors. With the regionalism purposes & approaches to multilateralism by People's Republic of China (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  11. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Measuring trends in online hate speech victimisation and exposure, and attitudes in New Zealand.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    Government agencies in New Zealand are not required to systematically collect data on online hate speech, thus, there is a lack of longitudinal evidence regarding this phenomenon. This report presents trends in personal experiences of and exposure to online hate speech among adult New Zealanders based on nationally representative data. The findings from this study are also compared with results from a similar research study conducted in 2018. In addition, this report explores people’s perceptions about other issues related to hate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. War crimes in Ukraine: is Putin responsible?Vittorio Bufacchi - 2022 - Journal of Political Power 16 (2022).
    War crimes are being committed in Ukraine today, but who should be held responsible? By looking at the literature on responsibility and violence by Philippa Foot and John Harris, this article argues that there are grounds for holding Vladimir Putin responsible for war crimes in Ukraine, even if he did not give the command for these crimes and other atrocities to be carried out.
    Download  
     
    Export citation  
     
    Bookmark  
  14. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Is Crime Caused by Illness, Immorality, or Injustice? Theories of Punishment in the Twentieth and Early Twenty-First Centuries.Amelia M. Wirts - 2022 - In Matthew C. Altman (ed.), The Palgrave Handbook on the Philosophy of Punishment. Palgrave-Macmillan. pp. 75-97.
    Since 1900, debates about the justification of punishment have also been debates about the cause of crime. In the early twentieth century, the rehabilitative ideal of punishment viewed mental illness and dysfunction in individuals as the cause of crime. Starting in the 1970s, retributivism identified the immorality of human agents as the source of crime, which dovetailed well with the “tough-on-crime” political milieu of the 1980s and 1990s that produced mass incarceration. After surveying these historical trends, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Crime & Punishment: A Rethink.Ognjen Arandjelović - 2023 - Philosophies 8 (3):47.
    Incarceration remains the foremost form of sentence for serious crimes in Western democracies. At the same time, the management of prisons and of the prison population has become a major real-world challenge, with growing concerns about overcrowding, the offenders’ well-being, and the failure of achieving the distal desideratum of reduced criminality, all of which have a moral dimension. In no small part motivated by these practical problems, the focus of the present article is on the ethical framework that we use (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Biological Interventions for Crime Prevention.Christopher Chew, Thomas Douglas & Nadira Faber - forthcoming - In David Birks & Thomas Douglas (eds.), Treatment for Crime: Philosophical Essays on Neurointerventions in Criminal Justice. Oxford: Oxford University Press.
    This chapter sets the scene for the subsequent philosophical discussions by surveying a number of biological interventions that have been used, or might in the future be used, for the purposes of crime prevention. These interventions are pharmaceutical interventions intended to suppress libido, treat substance abuse or attention deficit-hyperactivity disorder (ADHD), or modulate serotonin activity; nutritional interventions; and electrical and magnetic brain stimulation. Where applicable, we briefly comment on the historical use of these interventions, and in each case we (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  19. Implemented Crime Prevention Strategies of PNP in Salug Valley, Zamboanga Del Sur, Philippines.Mark Patalinghug - 2017 - Asia Pacific Journal of Multidisciplinary Research (August 2017):143-150.
    Abstract – This study aimed primarily to determine the effectiveness of crime prevention strategies implemented by the Salug Valley Philippine National Police (PNP) in terms of Police Integrated Patrol System, Barangay Peacekeeping Operation, Anti-Criminality Operation, Integrated Area Community Public Safety services, Bantay Turista and School Safety Project as evaluated by 120 inhabitants and 138 PNP officers from four Municipalities of Salug Valley Zamboanga del Sur. Stratified random sampling was utilized in determining the respondents. Index crime rate were correlated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Inchoate Crime, Accessories, and Constructive Malice in Libertarian Law.Ben O'Neill & Walter Block - 2013 - Libertarian Papers 5:241-271.
    Inchoate crime consists of acts that are regarded as crimes despite the fact that they are only partial or incomplete in some respect. This includes acts that do not succeed in physically harming the victim or are only indirectly related to such a result. Examples include attempts (as in attempted murder that does not eventuate in the killing of anyone), conspiracy (in which case the crime has only been planned, not yet acted out) and incitement (where the inciter (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  91
    Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  23. MORAL CRIME.Sally Ramage - forthcoming - Criminal Law News (87):2-25.
    Crime is a prohibited act from which results in more evil than good’ is how Jeremy Bentham described crime. ‘Crime is a serious anti-social action to which the State reacts consciously by inflicting pain’, is how W.A.Bonger describes crime. Morality and its lack thereof are related to crime. Morality is so closely interwoven with social conduct and immorality interwoven with criminal conduct that it is desirable to investigate this matter further and so this shorter version (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Crime as social excess: Reconstructing Gabriel Tarde’s criminal sociology.Sergio Tonkonoff - 2014 - History of the Human Sciences 27 (2):60-74.
    Gabriel Tarde, along with Durkheim and others, set the foundations for what is today a common-sense statement in social science: crime is a social phenomenon. However, the questions about what social is and what kind of social phenomenon crime is remain alive. Tarde’s writings have answers for both of these capital and interdependent problems and serve to renew our view of them. The aim of this article is to reconstruct Tarde’s definition of crime in terms of genus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The crime-preventive impact of penal sanctions.Anthony Bottoms & Andrew von Hirsch - 2010 - In Peter Cane & Herbert M. Kritzer (eds.), The Oxford Handbook of Empirical Legal Research. Oxford University Press.
    This article opens with the consequentialist–deontologist debate, with the former concerned about the relevance of punitive measures against their crime reducing potentials, while the latter highlights punishment as censure of wrongful acts and the proportion of the punishment to the degree of crime. The article briefly discusses the empirical research on the impact of penal sanctions and focuses on three main kinds of empirical research into possible general deterrent effects—namely, association studies, quasi-experimental studies, and contextual and perceptual studies. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Crime as the Limit of Culture.Sergio Tonkonoff - 2014 - Human Studies 37 (4):529-544.
    In this article culture is understood as the ensemble of systems of classification, assessment, and interaction that establishes a basic community of values in a given social field. We will argue that this is made possible through the institution of fundamental prohibitions understood as mythical points of closure that set the last frontiers of that community by designating what crime is. Exploring these theses, we will see that criminal transgression may be thought of as the actualization of a rigorous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Genetics crime and justice, Edward elgar 2015.Sally Ramage - 2016 - Current Criminal Law 9 (3):2-29.
    The UK government decided to introduce Income Tax in 1799. Later, tax avoidance schemes involved creation of Deeds of Convenant. It is a fact that crime is increasing but the number of people committing crime is not increasing because many crimes are repeated crimes committed by persons with habitual criminal behaviour, ie hard-core criminals. -/- For more than half a century now, there has been scientific evidence that genetics plays a key role in the origins of criminal behaviour. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. Crimes Against Minds: On Mental Manipulations, Harms and a Human Right to Mental Self-Determination. [REVIEW]Jan Christoph Bublitz & Reinhard Merkel - 2014 - Criminal Law and Philosophy 8 (1):51-77.
    The neurosciences not only challenge assumptions about the mind’s place in the natural world but also urge us to reconsider its role in the normative world. Based on mind-brain dualism, the law affords only one-sided protection: it systematically protects bodies and brains, but only fragmentarily minds and mental states. The fundamental question, in what ways people may legitimately change mental states of others, is largely unexplored in legal thinking. With novel technologies to both intervene into minds and detect mental activity, (...)
    Download  
     
    Export citation  
     
    Bookmark   68 citations  
  32. The Crime/Tort Distinction: Legal Doctrine and Normative Perspectives.Kenneth Simons - 2008 - Widener Law Journal 17:719-732.
    This essay provides an overview of the crime/tort distinction. It first investigates some of the fundamental differences between criminal law and tort law in doctrine and legal structure. It then explores some important similarities and differences in normative perspectives between the two doctrinal fields. This typology should prove analytically useful for examining some of the specific issues at the borderline of crime and torts—such as the proper scope of punitive damage liability and the question whether criminal law as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Crime against Dalits and Indigenous Peoples as an International Human Rights Issue.Desh Raj Sirswal - 2015 - In Manoj Kumar (ed.), Proceedings of National Seminar on Human Rights of Marginalised Groups: Understanding and Rethinking Strategies. pp. 214-225.
    In India, Dalits faced a centuries-old caste-based discrimination and nowadays indigenous people too are getting a threat from so called developed society. We can define these crimes with the term ‘atrocity’ means an extremely wicked or cruel act, typically one involving physical violence or injury. Caste-related violence has occurred and occurs in India in various forms. Though the Constitution of India has laid down certain safeguards to ensure welfare, protection and development, there is gross violation of their rights such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Crimes and punishments.Giuliano Torrengo & Achille C. Varzi - 2006 - Philosophia 34 (4):395-404.
    Every criminal act ought to be matched by a corresponding punishment, or so we may suppose, and every punishment ought to reflect a criminal act. We know how to count punishments. But how do we count crimes? In particular, how does our notion of a criminal action depend on whether the prohibited action is an activity, an accomplishment, an achievement, or a state?
    Download  
     
    Export citation  
     
    Bookmark  
  35. Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions.Thomas C. King, Nikita Aggarwal, Mariarosaria Taddeo & Luciano Floridi - 2020 - Science and Engineering Ethics 26 (1):89-120.
    Artificial intelligence research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this article AI-Crime. AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  36. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  37. Crime as Limit of Culture.Sergio Tonkonoff - 2014 - Human Studies A Journal for Philosophy and the Social 2014 (37): 529–544.
    In this article culture is understood as the ensemble of systems of classification, assessment, and interaction that establishes a basic community of values in a given social field. We will argue that this is made possible through the institution of fundamental prohibitions understood as mythical points of closure that set the last frontiers of that community by designating what crime is. Exploring these theses, we will see that criminal transgression may be thought of as the actualization of a rigorous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. On Wrongs and Crimes : Does Consent Require Only an Attempt to Communicate?Tom Dougherty - 2019 - Criminal Law and Philosophy 13 (3):409-423.
    In Wrongs and Crimes, Victor Tadros clarifies the debate about whether consent needs to be communicated by separating the question of whether consent requires expressive behaviour from the question of whether it requires “uptake” in the form of comprehension by the consent-receiver. Once this distinction is drawn, Tadros argues both that consent does not require uptake and that consent does not require expressive behaviour that provides evidence to the consent-receiver. As a result, Tadros takes the view that consent requires an (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  40. Crime Control in Traditional African Societies: A Review of Crime Control in Nigeria.Onwe Friday & Eze Ogbonnia Eze - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (4):20-29.
    Abstract: This review dealt with the traditional methods most African countries utilize in dealing with issues of crimes considered to be very serious, which seriously affect the traditional societies in those African countries. Although there has been modern introductions, but these methods are still being practiced and very effective in most of the rural areas.
    Download  
     
    Export citation  
     
    Bookmark  
  41. The freedom of crime: property, theft, and recognition in Hegel’s System of Ethical Life.Jacob Blumenfeld - 2022 - British Journal for the History of Philosophy 31 (1):103-126.
    Volume 31, Issue 1, January 2023, Page 103-126.
    Download  
     
    Export citation  
     
    Bookmark  
  42. Embarking on a Crime.Sarah Paul - 2014 - In Enrique Villanueva V. (ed.), Law and the Philosophy of Action. Rodopi. pp. 101-24.
    When we define something as a crime, we generally thereby criminalize the attempt to commit that crime. However, it is a vexing puzzle to specify what must be the case in order for a criminal attempt to have occurred, given that the results element of the crime fails to come about. I argue that the philosophy of action can assist the criminal law in clarifying what kinds of events are properly categorized as criminal attempts. A natural thought (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  43. Causes of Crime.Andrzej Klimczuk - 2015 - In The Sage Encyclopedia of Economics and Society. Sage Publications. pp. 308--311.
    Causes of crime are the subject of the etiology of criminal behavior, which is characterized by an interdisciplinary approach. There are many theories attempting to explain the determin ants of criminal behavior, a set of acts recognized by the criminal law, which emphasize different aspects of this phenomenon.
    Download  
     
    Export citation  
     
    Bookmark  
  44. Crime, Culpability and Moral Luck. [REVIEW]Alec Walen - 2010 - Law and Philosophy 29 (4):373-384.
    Crime and Culpability, by Larry Alexander, Kimberly Kessler Ferzan (with Stephen Morse) is a visionary work of moral and legal philosophy. Nonetheless, it is fundamentally morally misguided. In seeking to free criminal law from what the authors take to be the distorting influence of outcome luck, they arrive at a position that is overly exculpatory. It fails to hold actors liable for the harms they cause when they have taken less care they should. -/- I argue, first, that the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Genetics Crime and Justice. [REVIEW]Sally Ramage - 2015 - CCL 9 (3):2-31.
    This review is unashamedly from the perspective of English law because busy United Kingdom criminal law solicitors and barristers mostly wish to know what the law states, which case is a precedent case and whether the author has provided up-to-date legal information. This is because legal practitioners deal with real and urgent cases. The English Income Tax Act gained Royal Assent in 1799 the first government attempt to stop early tax avoidance. Later, tax avoidance schemes (which in English Law were (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Less Blame, Less Crime? The Practical Implications of Moral Responsibility Skepticism.Neil Levy - 2015 - Journal of Practical Ethics 3 (2):1-17.
    Most philosophers believe that wrongdoers sometimes deserve to be punished by long prison sentences. They also believe that such punishments are justified by their consequences: they deter crime and incapacitate potential offenders. In this article, I argue that both these claims are false. No one deserves to be punished, I argue, because our actions are shot through with direct or indirect luck. I also argue that there are good reasons to think that punishing fewer people and much less harshly (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. Charity, Childcare, and Crime: From Objectivist Ethics to the Austrian School.Kathleen Touchstone - 2016 - Libertarian Papers 8:23-57.
    : The purpose of this paper is to address from a normative perspective issues raised by John Mueller in Redeeming Economics: Rediscovering the Missing Element. Mueller criticizes economists, including Austrians, for failing to properly address unilateral transfers—in particular, charity, childcare, and crime—in economic thought. Mueller challenges economist Gary Becker’s position that giving increases the […] The post “Charity, Childcare, and Crime: From Objectivist Ethics to the Austrian School” appeared first on Libertarian Papers.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Time and Crime: Which Cold-Case Investigations Should Be Reheated.Jonathan A. Hughes & Monique Jonas - 2015 - Criminal Justice Ethics 34 (1):18-41.
    Advances in forensic techniques have expanded the temporal horizon of criminal investigations, facilitating investigation of historic crimes that would previously have been considered unsolvable. Public enthusiasm for pursuing historic crimes is exemplified by recent high-profile trials of celebrities accused of historic sexual offences. These circumstances give new urgency to the question of how we should decide which historic offences to investigate. A satisfactory answer must take into account the ways in which the passage of time can erode the benefits of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Crime e fruição: o egoísmo de Max Stirner como discurso de resistência contra a dominação?Beatriz de Almeida Rodrigues - 2018 - Dissertation, Nova University Lisbon
    This dissertation critically examines the writings of Max Stirner, especially his masterpiece The Ego and Its Own, as a discourse of resistance against modern forms of domination and, in particular, against the modern political State. I begin by examining Stirner's inversion of the Hegelian concept of the State, from the “actualization of freedom”to an instance of domination. The State appears, to Stirner as to Hegel, as the guardian of order and cohesion in modern societies. While both recognize the genesis of (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 471