Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Sociology, social studies > Crime & criminology > General
This book explores victims' views of plea negotiations and the level of input that they desire. It draws on the empirical findings of the first in-depth study of victims and plea negotiations conducted in Australia. Over the last 50 years, the criminal justice system has seen major changes in both the role that victims play in the justice process and in how the vast majority of criminal cases are finalised. Guilty pleas have become the norm, and many of these result from negotiations between the prosecutor and the defence. The extent to which the victim is one of the participating parties in plea negotiations however, is a question of law and of practice. Drawing from focus groups and surveys with victims of crime, Victims and Plea Negotiations seeks to privilege victims' voices and lived experiences of plea negotiations, to present their perspectives on five options for enhanced participation in this legal process. This book appeals to academics and students in the areas of law, criminology, sociology, victimology and legal studies, those who practice in the criminal justice system generally, those who work with victims, and policy makers.
This open access book explores how biometric data is increasingly flowing across borders in order to limit, control and contain the mobility of selected people, namely criminalized populations. It introduces the concept of bio-bordering, using it to capture reverse patterns of bordering and ordering practices linked to transnational biometric data exchange regimes. The concept is useful to reconstruct how the territorial foundations of national state autonomy are partially reclaimed and, at the same time, partially purposefully suspended. The book focuses on the Prum system, which facilitates the mandatory exchange of forensic DNA data amongst EU Member States. The Prum system is an underexplored phenomenon, representing diverse instances of bio-bordering and providing a complex picture of the hidden (dis)integration of Europe. Particular legal, scientific, technical and political dimensions related to the governance and uses of biometric technologies in Germany, the Netherlands, Poland, Portugal and the United Kingdom are specifically explored to demonstrate both similar and distinct patterns.
WINNER OF THE SUNDAY TIMES ALAN PATON AWARD In the spring of 1999, in the beautiful and seemingly tranquil hills of the KwaZulu-Natal midlands, a young white farmer is shot dead on the dirt road running from his father's farmhouse to his irrigation fields. The murder is the work of assassins rather than robbers. Journalist Jonny Steinberg travels to the midlands to investigate. It is clear that the young white man is not the only one who will die and that the story of his and other deaths will illuminate a great deal about the early days of post-apartheid South Africa. Midlands is a triumph of literary investigative journalism.
This book examines how alcohol intoxication impacts upon the memory of rape victims and provides recommendations for how best to investigate and prosecute such rape complaints. An estimated 75% of victims are under the influence of alcohol during a sexual assault and yet there is surprisingly little guidance on conducting interviews with complainants who were alcohol-intoxicated during the attack. This book will provide a distinctive, rigorous and important contribution to knowledge by reviewing the evidence base on the effects of alcohol on memory performance. The book brings together a range of academics from various disciplines, including psychology, law and criminology, and it discusses the implications for practice based on consultation with various criminal justice practitioners, including police officers, barristers who defend and prosecute rape cases and policy makers.
Flexon presents an interdisciplinary perspective to the problem of racial disparities in capital case outcomes. In doing so, research from social and cognitive psychology concerning stereotypes and attitude influence were bridged with other empirical findings concerning racial disparities in capital sentencing. Specifically, the psychology of stereotypes and attitudes are used to help explain how racial discrimination can operate undetected among death qualified jurors while producing sentencing discrepancies. The introduction of a potential source of bias information concerning criminal justice and race also is offered. Results indicate that prejudicial ideas are likely operating to influence capital sentencing decisions.
This book assesses potential developments of terrorism and ways to prevent it-the growing threats as new technologies become available - and how the same new technologies may help trap those with potential mal-intent. The drumbeat of terror resonates from everywhere; how can we stop it? What are the tripping points along the road and how can we avoid them? Increasingly more people have access to increasingly more information and increasingly more destructive technologies. In the meantime, increasingly advanced technologies help us create an increasingly safer and more harmonious world. Advantages and disadvantages are accelerating each other. While hybrid threats are intensifying, so are the opportunities to address them. But what are the compromises and how can we mitigate them? This book also looks at the unexpected and often random success and failure of policies to counter the evolving terror threat. The various aspects of the terrorism phenomena are presented in a unique way using scenario vignettes, which give the reader a realistic perception of the threat. The combination of positive and negative implications of emerging technologies is describing what might well be one of the most important dimensions of our common future.
This unique volume explores the relationship between music and crime in its various forms and expressions, bringing together two areas rarely discussed in the same contexts and combining them through the tools offered by cultural criminology. Contributors discuss a range of topics, from how songs and artists draw on criminality as inspiration to how musical expression fulfills unexpected functions such as building deviant subcultures, encouraging social movements, or carrying messages of protest. Comprised of contributions from an international cohort of scholars, the book is categorized into five parts: The Criminalization of Music; Music and Violence; Organised Crime and Music; Music, Genocide, and Crimes Against Humanity and Music as Resistance. Spanning a range of cultures and time periods, Crime and Music will be of interest to researchers in critical and cultural criminology, the history of music, anthropology, ethnology, and sociology.
This book offers unparalleled insight into the ways in which hate crime affects individuals and communities across the world. Drawing from the testimonies of more than 2,000 victims of hate crime, the book identifies the physical, emotional and community-level harms associated with hate crimes and key implications for justice in the context of punitive, restorative, rehabilitative and educative interventions. Hate crime constitutes one of the biggest global challenges of our time and blights the lives of millions of people across the world. Within this context the book generates important new knowledge on victims' experiences and expectations, and uses its compelling evidence-base to identify fresh ways of understanding, researching and responding to hate crime. It also documents the sensitivities associated with undertaking complex fieldwork of this nature, and in doing so offers an authentic account of the very necessary - and sometimes unconventional - steps which are fundamental to the process of engaging with 'hard-to-reach' communities.
Northern Ireland presents a fundamental challenge for the sociology of religion - how do religious beliefs, attitudes and identities relate to practices, violence and conflict? In other words, what does religion do? These interrogations are at the core of this book. It is the first critical and comprehensive review of the ways in which the social sciences have interpreted religion's significance in Northern Ireland. In particular, it examines the shortcomings of existing interpretations and, in turn, suggests alternative lines of thinking for more robust and compelling analyses of the role(s) religion might play in Northern Irish culture and politics. Through, and beyond, the case of Northern Ireland, the second objective of this book is to outline a critical agenda for the social study of religion, which has theoretical and methodological underpinnings. Finally, this work engages with epistemological issues which never have been addressed as such in the Northern Irish context: how do conflict settings affect the research undertaken on religion, when religion is an object of political and violent contentions? By analysing the scope for objective and critical thinking in such research context, this critical essay intends to contribute to a sociology of the sociology of religion.
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.
This the first book to focus specifically on serial killers motivated by monetary gain. Serial Killing for Profit: Multiple Murder for Money addresses a gap in the existing literature by documenting one dozen of the most notorious perpetrators of commercial serial murder-murderers who kill to secure inheritances and pensions, to sell possessions or even the body itself, or as murderers-for-hire. In these pages, readers will encounter some of the nation's most infamous and disturbing criminals, including "America's first serial killer," Herman Mudgett; Raymond Fernandez and Martha Beck, the "Honeymoon Killers;" Los Angeles's "Night Stalker," Richard Ramirez; the "black widow" Blanche Taylor Moore; and Dana Sue Gray, who killed three women for shopping money. Author Dirk Gibson gets to the twisted heart of each case, meticulously detailing the crimes, the victims, the hunt for the killers, the distinctive variations on the motive of "killing for money," and the lessons learned by investigators in each instance. Everyone from professional investigators to true crime aficionados will be riveted by these stunning accounts. Profiles 12 cases of serial murder motivated by profit Provides ten tables of data that collectively describe salient dimensions of the sample of murderers examined in the book, and quantify their commercial motivation Includes a selective bibliography of the resources used by the author to write the book Offers a comprehensive index covering all aspects of the murderers, their crimes, and the profit motive behind them
This book provides a comprehensive introduction to the problem of Internet child pornography that spotlights the connection between technology and behavior, presenting practical suggestions for reducing this pervasive problem. The role of the Internet in fueling the problem of child pornography is enormous. Prior to the Internet, child pornography was typically locally produced, of poor quality, expensive, and difficult to obtain. United States' law enforcement officials were able to boast in the late 1970s that the traffic in child pornography had virtually been eliminated. The advent of the Internet in the 1980s made vast quantities of child pornography instantly available in the privacy of the viewer's home. Today, child pornography largely exists because of the opportunities provided by the Internet. Internet Child Pornography provides a comprehensive overview of the issue by describing the problem of child pornography, examining the impact of the Internet, and presenting a profile of users. With this foundation in place, the authors then address responses to child pornography and shed light on the complexities of dealing with criminal activities that are perpetrated largely online-for example, the fact that people behave differently in online environments than they do in other areas of their lives. The book examines prevention efforts designed to reduce access to child pornography, law enforcement responses designed to catch known offenders, and treatment responses designed to reduce reoffending. Easily understood charts and tables that translate the evidence for a broad audience Technical aspects of the Internet and Internet offending described in simple language
The first full-scale historical account of the rise and growth of the jury system in England. The American edition adds a number of notes, as well as making several corrections to American references.
The book first explores the cybersecurity's landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law.
This book examines South Africa's post-apartheid culture through the lens of affect theory in order to argue that the socio-political project of the "new" South Africa, best exemplified in their Truth and Reconciliation Commission Hearings, was fundamentally an affective, emotional project. Through the TRC hearings, which publicly broadcast the testimonies of both victims and perpetrators of gross human rights violations, the African National Congress government of South Africa, represented by Nelson Mandela and Archbishop Desmond Tutu, endeavoured to generate powerful emotions of contrition and sympathy in order to build an empathetic bond between white and black citizens, a bond referred to frequently by Tutu in terms of the African philosophy of interconnection: ubuntu. This book explores the representations of affect, and the challenges of generating ubuntu, through close readings of a variety of cultural products: novels, poetry, memoir, drama, documentary film and audio anthology.
This book outlines the theory of convenience for white-collar crime to explain what motivates and enables offenders, providing a unique focus on white-collar crime in the business context. The theory of convenience suggests that the extent to which elite members commit and conceal economic crime is dependent on their extent of orientation towards convenience in problematic and attractive situations. Chapters are organized along the main theoretical dimensions of economical motive, organizational opportunity, and personal willingness. In addition, this book: Addresses a business audience by focusing on themes familiar to corporations Documents attitudes towards white-collar crime among business students and future business leaders Analyzes how convenience orientation varies among individuals Analyzes autobiographies of convicted white-collar offenders Demonstrates the various ways in which white-collar crime occurs The Convenience of White-Collar Crime in Business contributes to an increased understanding of white-collar crime, offering valuable insight in business education that supplements the traditional roles of topics like auditing and compliance in education and practice. It is a useful resource for researchers and law enforcement, and those involved in the detection, prosecution, and conviction of white-collar offenders.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
This multidisciplinary book introduces readers to original perspectives on crimmigration that foster holistic, contextual, and critical appreciation of the concept in Australia and its individual consequences and broader effects. This collection draws together contributions from nationally and internationally respected legal scholars and social scientists united by common and overlapping interests, who identify, critique, and reimagine crimmigration law and practice in Australia, and thereby advance understanding of this important field of inquiry. Specifically, crimmigration is addressed and analysed from a variety of standpoints, including: criminal law/justice; administrative law/justice; immigration law; international law; sociology of law; legal history feminist theory, settler colonialism, and political sociology. The book aims to: explore the historical antecedents of contemporary crimmigration and continuities with the past in Australia reveal the forces driving crimmigration and explain its relationship to border securitisation in Australia identify and examine the different facets of crimmigration, comprising: the substantive overlaps between criminal and immigration law; crimmigration processes; investigative techniques, surveillance strategies, and law enforcement agents, institutions and practices uncover the impacts of crimmigration law and practice upon the human rights and interests of non-citizens and their families. analyse crimmigration from assorted critical standpoints; including settler colonialism, race and feminist perspectives By focusing upon these issues, the book provides an interconnected collection of chapters with a cohesive narrative, notwithstanding that contributors approach the themes and specific issues from different theoretical and critical standpoints, and employ a range of research methods. |
You may like...
The Republic Of Gupta - A Story Of State…
Pieter-Louis Myburgh
Paperback
(15)
Can We Be Safe? - The Future Of Policing…
Ziyanda Stuurman
Paperback
(1)
Snyman's Criminal Law
Kallie Snyman, Shannon Vaughn Hoctor
Paperback
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, …
Paperback
(1)
|