Results for ' security and crime'

984 found
Order:
  1. (1 other version)Terrorism, Security and Nationality: An Introductory Study in Applied Political Philosophy.Paul Gilbert - 1995 - Routledge.
    _Terrorism, Security and Nationality_ shows how the ideas and techniques of political philosophy can be applied to the practical problems of terrorism, State violence and national identity. In doing so it clarifies a wide range of issues in applied political philosophy including ethics of war; theories of state and nation; the relationship between communities and nationalisms; human rightss and national security. Paul Gilbert identifies conflicting conceptiona of civil strife by different political communities and investigates notions of terrorism both (...)
     
    Export citation  
     
    Bookmark   1 citation  
  2.  13
    Business Entities and the State Who Should Provide Security from Crime?Don E. Scheid - 1997 - Public Affairs Quarterly 11 (2):163-182.
  3.  60
    We have to talk about emotional AI and crime.Lena Podoletz - 2023 - AI and Society 38 (3):1067-1082.
    Emotional AI is an emerging technology used to make probabilistic predictions about the emotional states of people using data sources, such as facial (micro)-movements, body language, vocal tone or the choice of words. The performance of such systems is heavily debated and so are the underlying scientific methods that serve as the basis for many such technologies. In this article I will engage with this new technology, and with the debates and literature that surround it. Working at the intersection of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  49
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the development of an information society, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  45
    Japanese risk society: trying to create complete security and safety using information and communication technology.Kiyoshi Murata & Yohko Orito - 2010 - Acm Sigcas Computers and Society 40 (3):38-49.
    The construction of a secure and safe society using information and communication technology is recognised as an urgent issue in Japan. This recognition is based on public fear about crime related to manufactured risk caused by modernisation or industrial civilisation. This fear has created a social atmosphere that has led to the rapid development and implementation of security systems using ICT, such as security cameras, smart IC cards and mobile phones, to establish security and safety in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  31
    Germany, Israel’s Security, and the Fight Against Anti-Semitism: Shadows from the Past and Current Tensions.Gert Krell - 2024 - Analyse & Kritik 46 (1):141-164.
    The Gaza War is a watershed moment not only in the Middle East. It has also increased political divisions in Germany, where Israel’s security and the fight against anti-Semitism are part of its historical legacy and political and moral identity. Incidents of anti-Semitism have increased dramatically, as have overdrawn accusations of it. An analysis of controversies about the definition of anti-Semitism, about the use of the term apartheid for the situation in the West Bank, of the BDS movement (Boycott, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  37
    U.S. Responses To Japanese Wartime Inhuman Experimentation After World War Ii: National Security and Wartime Exigency.Howard Brody, Sarah E. Leonard, Jing-bao Nie & Paul Weindling - 2014 - Cambridge Quarterly of Healthcare Ethics 23 (2):220-230.
    In 1945–46, representatives of the U.S. government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the United States, influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the United States played an equally key role in concealing information about (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  8.  22
    Fighting Crime Together: The Challenges of Policing and Security Networks.J. Fleming & J. Wood - 2006 - Dialogue: Academy of the Social Sciences in Australia. 25 (2):59-63.
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  13
    Criminologies of the military: militarism, national security and justice.Andrew John Goldsmith & Benjamin Allan Wadham (eds.) - 2018 - Oxford, UK: Bloomsbury Publishing.
    This innovative collection offers one of the first analyses of criminologies of the military from an interdisciplinary perspective. While some criminologists have examined the military in relation to the area of war crimes, this collection considers a range of other important but less explored aspects such as private military actors, insurgents, paramilitary groups and the role of military forces in tackling transnational crime. Drawing upon insights from criminology, this book's editors also consider the ways the military institution harbours criminal (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  52
    Application of IT Examination in Investigation of Crimes on Safety of Electronic Data and Information Systems.Lina Novikoviene & Egle Bileviciute - 2010 - Jurisprudencija: Mokslo darbu žurnalas 119 (1):317-329.
    As an EU state, Lithuania has become an active member of the eEurope 2005 initiative, implementing the goals set forth in the strategic plan for the development of information society in Lithuania. Information technologies introduced into various areas of life open up new, more convenient opportunities to receive services and information. The modernization of state management becomes an integral factor for ensuring continuous social development. The objective of this paper is to study practical aspects of the application of specialized knowledge (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  69
    Hate Crimes and Human Rights Violations.Thomas Brudholm - 2014 - Journal of Applied Philosophy 32 (1):82-97.
    The discourse of hate crime has come to Europe, supported not least by international human rights actors and security and policy organisations. In this article, I argue that there is a need for a philosophical response to challenging claims about the conceptualisation and classification of hate crime. First, according to several scholars, hate crime is extraordinarily difficult to conceptualise and there is a fatigue among practitioners caused by the lack of clarity and consensus in the field. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  31
    Criminogenic Security of Law in the EU and Lithuanian Legislation.Viktoras Justickis & Vidmantas Egidijus Kurapka - 2009 - Jurisprudencija: Mokslo darbu žurnalas 117 (3):217-238.
    The study focuses on the phenomenon of crime-causing (criminogenic) law. It includes a review of related studies on such laws and their criminal side-effects, the change in the legislator’s liability for effects of enacted laws, and the effects of the legislator’s afflatus on the potential criminogenic effects of law. Of special concern are cases where the legislator is aware of the potential criminogenic side-effects of a new law but carelessly neglects them. The study evaluates the tool for detection of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  23
    The Problems of Genocide: Permanent Security and the Language of Transgression.A. Dirk Moses - 2021 - Cambridge University Press.
    "Genocide is a problem: not only the terrible fact of mass death, but also how the relatively new idea and law of genocide organises and distorts our thinking about civilian destruction. Taking the normative perspective of civilian immunity from military attack, this book argues that the implicit hierarchy of international law, atop which sits genocide as the "crime of crimes," blinds us to other types of humanly caused civilian death, like bombing cities, the "collateral damage" of missile and drone (...)
    No categories
  14.  39
    War Crimes and the Asymmetry Myth.C. A. J. Coady - 2021 - Ethics and International Affairs 35 (3):381-394.
    The “asymmetry myth” is that war crimes are committed by one's enemies but never, or hardly ever, by one's own combatants. The myth involves not only a common failure to acknowledge our own actual war crimes but also inadequate reactions when we are forced to recognize them. It contributes to the high likelihood that wars, just or unjust in their causes, will have a high moral cost. This cost, moreover, is a matter needing consideration in the jus ante bellum circumstances (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  51
    Security a la Mexicana: on the particularities of security governance in México’s War on Crime[REVIEW]Keith Guzik - 2013 - Theory and Society 42 (2):161-187.
    Social scientists from different fields have identified security as a future-oriented mode of governance designed to preserve the social order from diverse types of global risk through international cooperation, militarization and privatization of the state security apparatus, surveillance technologies, community policing, and stigmatization of identities and behaviors deemed dangerous. This literature has largely been limited to English-speaking countries in the Global North, however, that are relatively “secure.”. To understand how security operates in a different context, this article (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  22
    Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq.Jawad Kadhim Mezaal, Nabeel Salih Ali, Ahmed Hazim Alhilali & Thamer Alameri - 2022 - Journal of Intelligent Systems 31 (1):726-738.
    Crimes are increasing in our society as a serious worldwide issue. Fast reporting of crimes is a significantly important area in anticrime. This problem is visible in Iraq as people avoid information-sharing due to the lack of trust in the security system despite some contact lines between citizens and police in Iraq. Furthermore, there has been a little empirical study in this field. We proposed a multi-approach for crime reporting and police control to address these issues. First, this (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  1
    Family Security is a Legitimate Purpose to Achieve Human Security Spoken Legal Texts and Witnessing Human Studies- A Legal Scientific Study in the Light of the Purposes of Islamic Law.Abdulmalek Hussein Ali Altaj - forthcoming - Evolutionary Studies in Imaginative Culture:453-469.
    Praise be to Allah and peace and blessings be upon the Messenger of Allah and his family and companions, and after: This research tagged with: "Family security is a legitimate purpose to achieve human security" aims to show the importance of family security, and how the Sharia paid great attention to it, and stressed the need to maintain it in all psychological, health, physical, economic and moral fields as the family is the first basic social unit and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  15
    Gendered Views in a Feminist State: Swedish Opinions on Crime, Terrorism, and National Security.Isabella Nilsen, Eva-Karin Olsson & Charlotte Wagnsson - 2020 - Gender and Society 34 (5):790-817.
    Gender differences have been observed regarding many political and social issues, yet we lack comprehensive evidence on differences in perceptions on a wide range of security issues increasingly important to voters: military threats, criminality, and terrorism. Previous research suggests that when women are highly politically mobilized, as they are in Sweden, gender differences in political opinion are large. On the other hand, Swedish politicians have worked hard to reduce gender stereotypical thinking. This prompts the question: Are there gender differences (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  33
    About Security, Democratic Consolidation and Good Governance. Romania within European Context. Book Review for the volume Despre securitate, consolidare democratica si buna guvernare: Romania in context regional, author Ciprian Iftimoaei, Lumen Media Publishing, Iasi, Romania.George Poede - 2015 - Postmodern Openings 6 (2):121-124.
    More than a decade has passed since the tragic events that took place in America in the dramatic day of September 9th 2001. For the first time since the end of the second World War, the United States were being attacked on their own territory, without prior notice, by a non-state military force which was globally organised, for religious and ideological reasons. The terrorist attacks planned and executed by the terrorist organisation Al-Qaeda on American military and civilian targets have reconfigured (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  31
    Predicting and Preventing Crime: A Crime Prediction Model Using San Francisco Crime Data by Classification Techniques.Muzammil Khan, Azmat Ali & Yasser Alharbi - 2022 - Complexity 2022:1-13.
    The crime is difficult to predict; it is random and possibly can occur anywhere at any time, which is a challenging issue for any society. The study proposes a crime prediction model by analyzing and comparing three known prediction classification algorithms: Naive Bayes, Random Forest, and Gradient Boosting Decision Tree. The model analyzes the top ten crimes to make predictions about different categories, which account for 97% of the incidents. These two significant crime classes, that is, violent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  51
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burns & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  22.  19
    Health and the Governance of Security: A Tale of Two Systems.Sevgi Aral, Scott Burris & Clifford Shearing - 2002 - Journal of Law, Medicine and Ethics 30 (4):632-643.
    The provision of police services and the suppression of crime is one of the first functions of civil government. Article 3 of the Universal Declaration of Human Rights speaks of a right to “security of person.” “The term ‘police’ traditionally connoted social organization, civil authority, or formation of a political community—the control and regulation of affairs affecting the general order and welfare of society,” including the protection of public health. Civil dispute resolution is also an important part of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  23.  13
    Post-Conflict Security, Peace and Development: Perspectives From Africa, Latin America, Europe and New Zealand.Christine Atieno & Colin Robinson (eds.) - 2018 - Springer Verlag.
    This book examines links between post-conflict security, peace and development in Africa, Latin America, Europe and New Zealand. Young peace researchers from the Global South as well as from Italy and New Zealand address in case studies traumas in Northern Uganda, demobilisation and reintegration of ex-combatants in the Ivory Coast, economic and financial management of terrorism in Kenya, organised crime in Brazil, mental health issues in Colombia, macro realism in Europe and global defence reforms within the military apparatus (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  23
    Information systems for national security in Thailand: ethical issues and policy implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
    PurposeThe purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.Design/methodology/approachThe methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community in Thailand. The relevant literature (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  25.  70
    Peaceful Warriors: Private Military Security Companies and the Quest for Stable Societies.Don Mayer - 2009 - Journal of Business Ethics 89 (S4):387 - 401.
    Peace is more likely where there is trade and commerce between nation-states. However, many nations are "failed states" or "failing states," in large part because of civil wars. Yet, "business" may have a role to play here, too; as private military security companies (PMSCs) proliferate, governments and international organizations seem increasingly disposed to contract for their services, in some cases for combat roles as well as non-combat support roles in various conflict zones. This has raised questions about the ethics (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  16
    The Problem of Organized Crime in the South American Tri-Border Area: Paraguay, Brazil and Argentina.Stanisław Kosmynka - 2020 - International Studies. Interdisciplinary Political and Cultural Journal 25 (1):9-28.
    The paper shows mechanisms and manifestations of the challenges for the security in the South American Tri-Border Area. It analyses the background of the activity of chosen organized crime and terrorist groups in this region. The article refers to some social and economic conditions for the spread of violence and illegal business in the area. It is focused on the most important dimensions of these problems and on the strategy implemented by South American governments to fight and prevent (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  46
    Challenges in Implementing the Responsibility to Protect: The Security Council Veto and the Need for a Common Ethical Approach.Brian D. Lepard - 2021 - The Journal of Ethics 25 (2):223-246.
    In 2005 the member states of the United Nations recognized a “responsibility to protect” (“R2P”) victims of mass atrocities such as genocide, war crimes, and crimes against humanity. They acknowledged a special role for the U.N. Security Council in responding to these atrocities, including potentially authorizing military action using its extensive powers under Chapter VII of the U.N. Charter. However, the Council has very rarely been able to agree on appropriate action, and the five permanent Council members (“P5”), most (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  28.  22
    Canadian securities regulation and foreign blocking legislation.Andrew Gray & Graeme Hamilton - 2010 - International Journal of Business Governance and Ethics 5 (1/2):87.
    Knowing who benefits financially from a securities trade is necessary for the detection, prosecution and deterrence of illegal securities trading. Foreign jurisdictions with banking or securities secrecy laws are frequently used as a platform for illegal activity to frustrate law enforcement. This paper considers the extent to which Canadian law gives effect to so-called foreign blocking legislation. We conclude that while Canadian law does not generally give effect to foreign blocking legislation, it imposes only limited requirements on market intermediaries to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  35
    The Welfare State amid Crime: How Victimization and Perceptions of Insecurity Affect Social Policy Preferences in Latin America and the Caribbean.Sandra Ley, Sarah Berens & Melina Altamirano - 2020 - Politics and Society 48 (3):389-422.
    Criminal violence is one of the most pressing problems in Latin America and the Caribbean, with profound political consequences. Its effects on social policy preferences, however, remain largely unexplored. This article argues that to understand such effects it is crucial to analyze victimization experiences and perceptions of insecurity as separate phenomena with distinct attitudinal consequences. Heightened perceptions of insecurity are associated with a reduced demand for public welfare provision, as such perceptions reflect a sense of the state’s failure to provide (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  11
    Unravelling College Students’ Fear of Crime: The Role of Perceived Social Disorder and Physical Disorder on Campus.Marlies Sas, Wim Hardyns, Genserik Reniers & Koen Ponnet - 2022 - British Journal of Educational Studies 70 (1):65-85.
    The current study explores the role of individual and environmental determinants on students’ fear of crime. Based on a large-scale survey among students of a Belgian university (n = 1,463), the relationship between perceived social and physical disorder and the three dimensions of fear of crime (perceived risk of victimization, feelings of anxiety, avoidance behaviour) is examined. Support was found for a relationship between perceived social and physical disorder and perceived risk of victimization. Moreover, a relationship was found (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  19
    The Security Council's Role in Fulfilling the Responsibility to Protect.Jennifer M. Welsh - 2021 - Ethics and International Affairs 35 (2):227-243.
    The principle of the responsibility to protect (RtoP) conceives of a broad set of measures that can be employed in preventing and responding to atrocity crimes. Nevertheless, the UN Security Council remains an important part of the implementation architecture, given what the International Commission on Intervention and State Sovereignty referred to as its authoritative position in international society as the “linchpin of order and stability.” As part of the roundtable “The Responsibility to Protect in a Changing World Order: Twenty (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  25
    National Insecurity Crime.Josh R. Klein - 2015 - Criminal Justice Ethics 34 (1):1-17.
    Terrorism, international gangs, and other frequently mentioned national security threats are actually less dangerous than a new type of state-corporate crime that may be called national insecurity crime. This crime poses not only unprecedented victimization, but a massive ethical problem. Examples in the U.S. include the 1980s Savings and Loan (S&L) scandal, the late-1990s dot-com bubble, the 2003 U.S. invasion of Iraq, and the 2007–09 financial crisis. National insecurity crime threatens national security because of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  34.  21
    Economic crime in the information environment.Vera Evgenievna Shumilina, Tatyana Alexandrovna Scherbakova & Alexandr Yaroslavovich Kochetov - 2021 - Kant 39 (2):121-126.
    The purpose of the study is to reveal the essence of economic security in the Internet environment, to identify and analyze statistical data on this issue. The scientific novelty of the study lies in the fact that for the first time a comparison with foreign practice is made. As a result, some places that require improvement in this area are identified, the essence and understanding of new terms are revealed, and the principle of neural networks is explained. This work (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  34
    Computer crime: Assessing the lawyer's perspective. [REVIEW]Karen A. Forcht, Daphyne Thomas & Karen Wigginton - 1989 - Journal of Business Ethics 8 (4):243 - 251.
    The past decade has seen a rapid development and proliferation of sophisticated computer systems in organizations. Designers, however, have minimized the importance of security control systems, (except for those systems where data security and access control have obviously been of major importance). The result is an increasing recognition that computer systems security is often easily compromised.This research will provide the initial step in assessing ways in which attorneys retained to prosecute computer crimes and computer people who discover (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  36.  29
    Justice Without Retribution? The Case of the System of Communal Security, Justice and Reeducation of Montaña and Costa Chica in Guerrero, Mexico.Alexander Stachurski - 2024 - Diametros 21 (79):24-39.
    This paper discusses a non-state justice system (Sistema Comunitario de Seguridad, Justicia y Reeducación, hereafter: SCSJR) applied by some of the Afromexican and Indigenous communities of the Guerrero state in Mexico as an example of a maximalist restorative justice system. Restorative justice is presented here as an alternative to criminal justice. While it responds to similar moral concerns as retributive justifications do, it offers more adequate mechanisms of dealing with certain crimes and aims to reduce coerciveness of justice when dealing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  39
    Aluta Continua: The Struggle Continues in South Africa - Against Violent Crime.E. Whyte - 2009 - Dialogue: Academy of the Social Sciences in Australia. 7 (1):1-30.
    Concerns for safety and security as South Africa’s hosting of 2010 FIFA World Cup draws nearer highlight the degree to which South Africa’s reputation for a relatively peaceful transition from Apartheid has been replaced by its reputation for violent crime. Its transition, and the peacebuilding efforts that followed it, are not completely unrelated to its current high levels of violent crime. In fact, this article argues that there were a number of issues South Africa’s peacebuilding process failed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  14
    Reforming the Security Council through a Code of Conduct: A Sisyphean Task?Bolarinwa Adediran - 2018 - Ethics and International Affairs 32 (4):463-482.
    The failure of the UN Security Council to adequately and effectively address the Syrian crisis has brought renewed scrutiny to the veto and its capricious use during mass atrocity situations. In response to these concerns, the idea of a code of conduct to regulate the exercise of the veto during humanitarian situations is now being increasingly advanced by several states, including France and the United Kingdom. This paper disputes the utility of such a code and argues that it would (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  32
    The Documentary Method of [Video] Interpretation: A Paradoxical Verdict in a Police-Involved Shooting and Its Consequences for Understanding Crime on Camera.Patrick G. Watson - 2018 - Human Studies 41 (1):121-135.
    On July 27th, 2013, Sammy Yatim was shot and killed by Toronto Police Services’ Constable James Forcillo during a verbal confrontation on a streetcar as Yatim brandished a switchblade knife. Forcillo was charged, initially with second degree murder, and later attempted murder—a decision that confused media commentators as attempted murder is a lesser-and-included offense to second degree murder in Canadian law. In January 2016, Forcillo was found not guilty of second degree murder and guilty of attempted murder. Video evidence, recovered (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  22
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to why (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  17
    How to Deter Financial Misconduct if Crime Pays?Karol Marek Klimczak, Alejo José G. Sison, Maria Prats & Maximilian B. Torres - 2022 - Journal of Business Ethics 179 (1):205-222.
    Financial misconduct has come into the spotlight in recent years, causing market regulators to increase the reach and severity of interventions. We show that at times the economic benefits of illicit financial activity outweigh the costs of litigation. We illustrate our argument with data from the US Securities and Exchanges Commission and a case of investment misconduct. From the neoclassical economic paradigm, which follows utilitarian thinking, it is rational to engage in misconduct. Still, the majority of professionals refrain from misconduct, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  42.  74
    Measuring Unethical Consumer Behavior Across Four Countries.Vince W. Mitchell, George Balabanis, Bodo B. Schlegelmilch & T. Bettina Cornwell - 2009 - Journal of Business Ethics 88 (2):395-412.
    The huge amounts spent on store security and crime prevention worldwide, not only costs international businesses, but also amounts to a hidden tax on those law-binding consumers who bear higher prices. Most previous research has focused on shoplifting and ignored many other ways in which consumers cheat businesses. Using a hybrid of both qualitative research and survey approaches in four countries, an index of 37 activities was developed to examine consumers’ unethical activities across UK, US, France, and Austria. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  43.  55
    Mind the Gap: Lacunae in the International Legal Framework Governing Private Military and Security Companies.Benjamin Perrin - 2012 - Criminal Justice Ethics 31 (3):213-232.
    Abstract This article examines the common claim that there are gaps in international law that undermine accountability of private military and security companies. A multi-actor analysis examines this question in relation to the commission of international crimes, violations of fundamental human rights, and ordinary crimes. Without this critical first step of identifying specific deficiencies in international law, the debate about how to enhance accountability within this sector is likely to be misguided at best.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  53
    The Distinct Character of International Crime: Theorizing the Domain.Kirsten J. Fisher - 2009 - Contemporary Political Theory 8 (1):44-67.
    If contemporary political theory in the area of international justice is to accomplish its aim of clarifying and making coherent the meaning of justice in an international context, the question of the appropriate role and responsibility of international criminal law must be answered. International criminal law must be more than simply domestic laws that are prosecuted at the international level. However, the question of what makes an international crime such that it deserves this special classification and international condemnation has (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  5
    Philosophical Horizons: P4/WC and Anti-Racism in Memphis, TN.Jonathan Wurtz & Kronsted Christian - 2021 - In Stephen Kekoa Miller (ed.), Intentional Disruption: Expanding Access to Philosophy. Wilmington, Delaware: Vernon Press. pp. 91-111.
    Memphis, Tennessee is the Blackest city with a Philosophy for/with Children (P4/WC) program in the United States, making it a unique site of engagement for practitioners. The city faces deeply historically rooted structural problems that continue to manifest themselves, in housing, food security, hate crimes, police brutality, workplace inequality, and segregation; all of which are present in our classrooms where we practice P4C. In this chapter, we illustrate some of the challenges we have faced while practicing P4/WC in Memphis, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  47
    Wrongdoing and the Moral Emotions.Derk Pereboom - 2021 - Oxford: Oxford University Press.
    Wrongdoing and the Moral Emotions provides an account of how we might effectively address wrongdoing given challenges to the legitimacy of anger and retribution that arise from ethical considerations and from concerns about free will. The issue is introduced in Chapter 1. Chapter 2 asks how we might conceive of blame without retribution, and proposes an account of blame as moral protest, whose function is to secure forward-looking goals such as the moral reform of the wrongdoer and reconciliation in relationships. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  47.  17
    On the Undecidability of Legal and Technological Regulation.Peter Kalulé - 2019 - Law and Critique 30 (2):137-158.
    Generally, regulation is thought of as a constant that carries with it both a formative and conservative power, a power that standardises, demarcates and forms an order, through procedures, rules and precedents. It is dominantly thought that the singularity and formalisation of structures like rules is what enables regulation to achieve its aim of identifying, apprehending, sanctioning and forestalling/pre-empting threats and crime or harm. From this point of view, regulation serves to firmly establish fixed and stable categories of what (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49. ''Deterrent Punishment and Respect for Persons''.Zachary Hoskins - 2011 - Ohio State Journal of Criminal Law 8 (2):369-384.
    This article defends deterrence as an aim of punishment. Specifically, I contend that a system of punishment aimed at deterrence (with constraints to prohibit punishing the innocent or excessively punishing the guilty) is consistent with the liberal principle of respect for offenders as autonomous moral persons. I consider three versions of the objection that deterrent punishment fails to respect offenders. The first version, raised by Jeffrie Murphy and others, charges that deterrent punishment uses offenders as mere means to securing the (...)
     
    Export citation  
     
    Bookmark   8 citations  
  50. Travel, Friends, and Killing.Seth Lazar - 2016 - In David Edmonds (ed.), Philosophers Take on the World. Oxford University Press UK. pp. 25-27.
    Military recruitment campaigns emphasize adventure, skills and camaraderie but rarely mention the moral complexities of armed conflict. Enlisting in state armed forces poses the risk of being complicit in unjust wars and associated war crimes. For prospective recruits concerned with morality, the decision is challenging. The probability of wrongdoing alone does not settle the matter; many lawful activities increase risks of future wrongdoing. The permissibility of enlisting depends on weighing expectations of doing good versus wrong. -/- Armed forces provide (...) and humanitarian aid, so members often do much good. To assess individual decisions, consider whether the institution itself is justified. “Minimal justification” means armed forces cause less wrong than having none. “Full justification” means they cause less wrong than feasible alternatives. If justified, the participation needed for functioning should be permitted; volunteers take risks knowingly. -/- If minimally justified, either participation is permitted as above, or impermissible "dirty hands" roles are required, and either conscription distributes burden fairly or volunteers show "moral courage". The real question is institutional justification, not individual permissibility. To argue enlisting is impermissible implies arguing for disbanding the military. -/- If state armed forces are at least minimally justified, enlisting is likely morally permitted or even praiseworthy. Prospective recruits should consider institutional justification and expectations of contributing to good and wrong before deciding the morality of enlisting. For morally conscientious individuals, complex realities of armed conflict pose difficult questions with no easy answers. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 984