Science topics: LawPenal LawCriminals
Science topic

Criminals - Science topic

Persons who have committed a crime or have been convicted of a crime.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Criminals (10,000)
Sorted by most recent
Preprint
Full-text available
The release and widespread use of large language models (LLMs), such as ChatGPT, have generated significant attention owing to their ability to provide quick and versatile responses across various contexts. This article critically examines the outcomes of 2023 expert workshops organised by the Europol Innovation Lab to explore the potential misuse...
Chapter
Full-text available
The effectiveness of the reporting system is a topic of hot debate. It’s unclear how many criminal investigations SARs generate. Some researchers also worry that reporting entities are unnecessarily burdened. Reporting entities themselves sometimes also wonder what it is all for. They complain that follow-up feedback is often lacking. Meanwhile the...
Chapter
Full-text available
Autism Spectrum Disorder (ASD) is a spectrum of neurodevelopmental disorders marked by impairments in social interactions, communication, hypersensitivity, and systematic patterns of behavior. Although the large majority of individuals with ASD are law-abiding, many individuals with ASD continue to become involved in the criminal-legal system as de...
Book
Full-text available
In Nigeria, armed banditry has emerged as a contemporary threat to national security. Commentators and scholars have repeatedly pointed to overlapping foci such as herders-farmers' conflicts, warlordism, ungoverned spaces, transnational criminal networks, and the proliferation of Small Arms and Light Weapons (SALW) from Libya as dynamics influencin...
Article
Full-text available
Recognition systems have received a lot of attention because of their various uses in people's daily lives, for example in robotic intelligence, smart cameras, security surveillance or even criminal identification. Determining the similarity of faces by different face variations is based on robust algorithms. The validation of our experiment is don...
Presentation
Full-text available
The explosive abundant of women harassment and unsafety in our daily life forced us to develop an application called “JAGRUTHI” for the safety of women in our society. Jagruthi is a women harassment prevention application (“JAGRUTHI" is a word from the Sanskrit language which means "awareness" or "consciousness". It is often used in the context of...
Article
Full-text available
In this discussion, I engage the politics of intention to explore how structural racism structures the production of meaning and the practice of reason. Building on María Lugones's analysis of intention formation as a form of practical reasoning, I explore the reasoning at work during the 2011 Stand Your Ground (SYG) hearing of black survivor of do...
Article
Full-text available
Nowadays, enormous amounts of data are produced every second. These data also contain private information from sources including media platforms, the banking sector, finance, healthcare, and criminal histories. Data mining is a method for looking through and analyzing massive volumes of data to find usable information. Preserving personal data duri...
Article
Full-text available
Criminal investigations are complex in nature and hence an investigator must be of the sound psychological mind. The purpose of this study is to investigate the perceptions of the police officers towards psychological assessments especially in criminal investigations. The study used a case study of Kabalagala Police Station hence the study area was...
Article
Full-text available
Când ura este transformată în armă împotriva unei națiuni, nu se oprește niciodată acolo. În fiecare deceniu, Rusia începe un nou război. Părți din Moldova şi Georgia rămân ocupate. Rusia a transformat Siria în ruine" (V. Zelenski). Au trecut 580! de zile de război, un război criminal, dus de dementul Putin împotriva Ucrainei, în mare parte împotri...
Article
Full-text available
The internet is a sophisticated tool for exchanging information, various fields from law to medical sciences (medicine) have also used the internet on a large scale. The use of wireless fidelity is also quite attractive for those who need free internet access. But it is undeniable that in addition to some people hoping to use the free internet,...
Article
Full-text available
Nigeria today more than ever is replete with high profile cases of criminalities. These include but are not limited to:
Research
Full-text available
Terrorism, a formidable global challenge, remains an enigma that threatens peace and stability. In this concise qualitative analysis, the writer embarks on an illuminating journey into the intricate minds of terrorists. By exploring the untapped potential of criminal profiling techniques, the writer exposes the hidden facets of their motivations, b...
Article
Full-text available
The rise of online transactions has led to a corresponding increase in online criminal activities. Account takeover attacks, in particular, are challenging to detect, and novel approaches utilize machine learning to identify compromised accounts. This paper aims to conduct a literature review on account takeover detection and user behavior analysis...
Article
Full-text available
Background Understanding the health conditions of those under carceral control is often made difficult due to lack of access to data. Yet, as has been made clear during the COVID-19 pandemic, is that data is essential to understand the scope of disease and how best to allocate resources. To better understand the needs of criminal legal oriented res...
Poster
Full-text available
When it comes to minor attracted persons (MAPs), the common reaction is usually very negative. In addition to viewing these individuals as potential sex offenders, it is not uncommon to find a sense of contempt on the part of both professionals and the general population that goes as far as to encourage the implementation of coercive measures (e.g....
Article
Full-text available
Trata de trabalho escravo contemporâneo e motivações para sua manutenção após anos de proibição. Por meio de levantamento bibliográfico e análise judicial, conceitua os institutos relacionados e elenca as motivações tanto para a proibição da prática quanto para sua ocorrência. Demonstra que há relação direta entre os momentos de crise econômica ou...
Article
Full-text available
The prison environment is indeed a dynamic and complex social environment where various factors and interactions shape the experiences and behaviors of the prisoners along with the staff. The present cross-sectional correlation study highlighted the impact of strain experienced by juvenile offenders during imprisonment on institutional misconduct a...
Article
Full-text available
Introduction: Mega sporting events, such as the Olympic Games, provide niche sports with unique opportunities to attract public attention. However, scandals during these events can pose serious threats to these sports. In particular, if a sport scandal enables hostile stakeholders to achieve a scale shift, it becomes almost impossible for a niche s...
Article
Full-text available
A small but growing number of studies have explored the impact of ‘border justice’ on federal sentencing. Despite their contributions, these works are limited by the practice of broadly aggregating data from the four southern border states of Arizona, New Mexico, Texas, and California—potentially obscuring within-state variation. To address this co...
Article
Full-text available
Com enfoque no posicionamento do Superior Tribunal de Justiça, o presente artigo tem por objetivo investigar como os Tribunais Superiores tratam a relativização do estupro de vulnerável contra menores de 14 anos. Notadamente, a presunção de vulnerabilidade da vítima, que hodiernamente é entendida como absoluta, já aflorou muitos debates na doutrina...
Article
Full-text available
There is growing interest in the use of neurointerventions to reduce the risk that criminal offenders will reoffend. Commentators have raised several ethical concerns regarding this practice. One prominent concern is that, when imposed without the offender’s valid consent, neurointerventions might infringe offenders’ right to bodily integrity. Whil...
Article
Full-text available
The study investigated the influence of family environment and peer pressure on criminal tendencies among Undergraduate Students of Federal University of Lafia, Nasarawa State. Three hundred and nine-one participants with ages ranging from 17-28 years (Mean= 18.69; SD=9.52) were selected from different departments of the institution using simpl...
Article
Full-text available
Background and Objectives: This study aimed to examine the function of various inflammation parameters and their interactions in the pathology of Bipolar disorder (BD) and to assess whether they could be biomarkers in the relationship between criminal behavior and BD. Materials and Methods: Overall, 1029 participants, including 343 patients with BD...
Article
Full-text available
The practice of crime risk mapping, enabled by the utilization of geospatial big data such as street view images, has received significant research attention. However, in situations where available data is scarce, mapping models may suffer from underfitting and generate inaccurate spatial pattern estimations of crime risk. The covert nature of pick...
Article
Full-text available
Investigating lone actor terrorism presents many challenges, not only in the discourse surrounding the appropriate terminology to use when discussing the phenomenon, but also within counter terrorism investigations and identifying perpetrators. With identifying lone actor terrorists online seen as a needle in a haystack, research needs to identify...
Article
Full-text available
Introduction The Violent Extremism Risk Assessment - Version 2 Revised (VERA-2R) is an evidence-based structured professional judgement (SPJ) tool for ideologically motivated violence. Use of the tool can help professionals in risk assessment and risk management of suspected and convicted terrorists and violent extremists at different stages within...
Article
Full-text available
Drawing on Brown and Fraser’s (in: Giles, Scherer (eds) Social markers in speech, Cambridge University Press, Cambridge, pp 33–62, 1979) framework for the analysis of communicative situations and Fuentes Rodríguez’s (Lingüística pragmática y Análisis del discurso, Arco Libros, Madrid, 2000; in Estudios de Lingüística: Investigaciones lingüísticas e...
Article
Full-text available
The safety of tourists is of great importance in tourism-oriented countries such as Croatia, and the most serious threat to tourists is homicide. This paper examines the factors that have led to the homicides of foreign tourists in Croatia. For this analysis, the routine activity theory approach and its three key elements are used: a motivated offe...
Article
Full-text available
Violent crime such as robbery, assault, murder, sexual and domestic violence, undermine the economic and social rights of the people and distorts society’s attempts to achieve a decent and dignified life for all. To reverse the situation, in Ghana, the police have been charged with the primary responsibility of maintaining domestic security. The em...
Article
Full-text available
Zusammenfassung Hintergrund In Deutschland liegt die Identifizierung unbekannter Toter in der Zuständigkeit der Polizei. Gemäß INTERPOL-Standards werden primäre (DNA, Fingerabdrücke, Zähne) und sekundäre Merkmale (z. B. Tätowierungen) untersucht. Die forensische Zahnmedizin wird als effiziente Methode bereits international eingesetzt. In dieser St...
Article
Full-text available
Pipeline infrastructures are the most used means of transporting oil and gas from extraction point to production and sales point. These pipelines are exposed to various attacks either by natural occurrences, indiscriminate human activities around pipelines or direct criminal sabotage, and therefore require constant monitoring. The use of low-cost w...
Technical Report
Full-text available
This report provides the characteristics of individuals convicted of escape, then chronologically examines their criminal histories before the instant offense through their criminal behavior while on escape status. It also examines their alleged criminal behavior after being released into the community.
Article
Full-text available
Crime includes all kinds of harmful acts that violate the laws in force in Indonesia as well as social and religious norms. The crime total is the number of incidents reported to the police, obtained from public reports and events where the perpetrators were caught red-handed by the police. We can use the Poisson model to analyze the data, but the...
Article
Full-text available
The article examines the historical experience of using evidence collection methods in wartime, which demonstrates the risks of unstable boundaries between what is permitted and what is prohibited. Compliance with the standards of the Geneva Conventions and their protocols is an absolute rule, but tactical methods of obtaining evidence developed fo...
Article
Full-text available
Individuals who live with mental illness are encumbered by related risk factors that increase the probability of legal involvement. The goal was to determine how homelessness and substance use disorder are intervening factors in the relationship between symptoms of serious mental illness (SMI) and criminal offending. A sample of 210 chronically hom...
Article
Full-text available
Philanthropy is essential to public goods such as education and research, arts and culture, and the provision of services to those in need. Providers of public goods commonly struggle with the dilemma of whether to accept donations from morally tainted donors. Ethicists also disagree on how to manage tainted donations. Forgoing such donations reduc...
Article
Full-text available
There are several well-established theories of criminal punishment and of its justification. The quarantine model (advocated by Pereboom and Caruso) has recently emerged as one of the most prominent theories in the field, by denying the very idea of criminal justice. This theory claims that no one ought to be criminally punished because fundamental...
Article
Full-text available
In this article we take two forensic technologies used to generate facial renditions of suspects, forensic DNA phenotyping (FDP) and facial composite drawing, to think through innovation in policing. Comparing more mundane, taken-for-granted approaches of facial composite drawing with 'high-tech' facial renditions generated using DNA traces, we com...
Article
Full-text available
Defendants’ and victims’ characteristic has always been an important part of forensic rhetoric in a jury trial. This research featured speeches by such famous Russian lawyers and prosecutors of the XIX century as F. N. Plevako, N. V. Muravyov, P. A. Aleksandrov, and A. F. Koni, who described the criminal and the victim in their speeches to offer th...
Technical Report
Full-text available
New UNODC report on trafficking in persons for forced criminality (online scams and fraud) in Southeast Asia
Preprint
Full-text available
Machine Learning techniques can be used to identify whether deficits in cognitive functions contribute to antisocial and aggressive behavior. This paper initially presents the results of tests conducted on delinquent and non-delinquent youths to assess their cognitive functions. The dataset extracted from these assessments, consisting of 37 predict...
Article
Full-text available
Background Obstetric-Gynecological Nursing is articulated as one of the specialities with the greatest responsibility in the field of health care, due to the involvement of being in care not only for the life of the pregnant woman, but also for the future neonate. Settling down as a profession with a high number of legal claims, there are not many...
Article
Full-text available
Metaverse technology in the criminal justice system: “Reality and Hope” The Metaverse technology raises several possibilities and presents a variety of modern criminal cases that need to be addressed. There are also concerns about the role of Metaverse in the restoration and decline of human relations, with the possibility of society bearing new b...
Article
Full-text available
Combatting transnational economic crime, including bribery and money laundering, is a concern of the international community. Today, although a number of international treaties address the issue, enforcement of the laws against corruption still builds on individual states with national criminal laws, procedures, prosecutors and courts. Internationa...
Article
Full-text available
In the light of deconstruction theory, the current study examines Ahmed Saadawi's Frankenstein in Baghdad (2013) in relation to Mary Shelley's Frankenstein. It shows the binary oppositions in the novel such as good and evil, justice and revenge, peace and destruction, life and death, order and disorder, innocence and criminality, and truth and lies...
Article
Full-text available
Woman genital slicing additionally referred to as woman genital mutilation or circumcision, is a deeply rooted cultural exercise that entails the partial or overall elimination of outside lady genitalia for non-scientific reasons. Despite being extensively criticized for its bodily and psychological fitness dangers, as well as its violation of huma...
Article
Full-text available
Ukrainian law enforcement agencies are working in cooperation with the International Criminal Court - ICC and countries that jointly support the ICC to collect evidence of Russia’s atrocity crimes in order to hold the alleged perpetrators accountable. The collection of evidence in the situation of Ukraine ever turned into an unprecedented investiga...
Article
Full-text available
Murders are one of the most important causes of mortality in Russia, and most aggressors suffer from mental disorders. The purpose of the research is to study the structure of mental disorders of murderers and its features in Chuvashia in 2011–2020. Materials and methods. The forensic psychiatric examination examined 507 murderers (409 men and 98 w...
Book
Full-text available
Sebastià Juan Arbó (1902-1984) fou una figura clau en la literatura catalana i espanyola del segle XX; l’exponent més gran fins ara de les lletres a les seves Terres de l’Ebre de naixença, que immortalitzà en tot un seguit de novel·les que posen l’accent en el conflicte existencial que assola l’individu. Les tasques de recuperació del llegat de l’a...
Article
Full-text available
This study sought to examine neuropsychological functioning in men with pedophilic disorder (PD), in order to assess whether findings from prior neuropsychological studies are replicated in a diverse sample including men with non-contact sexual offenses. It was hypothesized that when non-contact offenders are included in the study, a slowed process...
Article
Full-text available
This article examines Australia’s obligation to investigate war crimes in the context of its obligations under the Rome Statute of the International Criminal Court (ICC). This obligation is contrasted with Australia’s investigation of war crimes to date, with a particular focus on the current investigations into alleged war crimes by Australian Def...
Article
Full-text available
The reviewer recommends the book as very readable but having a serious flaw in its historial argument.
Article
Full-text available
Writing in 2022, Mark Wolf, Richard Goldstone, and Robert Rotberg detail a proposal for the establishment of an International Anti-Corruption Court (IACC), a plan that has received some diplomatic support from Canada, Ecuador, and the Netherlands. The focus of this article rests on asset recovery in the context of the proposal. Among the questions...
Article
Full-text available
Children are the nation's greatest human resource, and their well-being—health, education, safety, happiness, and access to opportunities—is a barometer of the socioeconomic progress of the nation. The article begins by outlining the POCSO Act and its goals, which was introduced in 2012 in response to an increase in crimes against children. Followi...
Article
Full-text available
The widespread of virtual criminal activities has cause changes and brought about a need for new investigative skills, laws and enforcement procedures to attack these obstacles. In view of the fact that virtual technological crimes committed through the information superhighway or the internet is evolving very rapidly, efficacious enforcement of vi...
Article
Full-text available
Purpose: In this research, normatively and practically, insults and defamation tested the standard limits of freedom of speech as a form of freedom of expression. Theoretical framework: Each individual has an obligation to exercise their human rights and to recognize and protect the human rights of others. No entity, whether it be the government, g...
Article
Full-text available
The anti-corruption package presented by the European Commission last May reaffirms the high political priority of combating corruption offences in the European Union. Concerning the proposal for a new EU directive on this matter, the existing significant disharmony and fragmentation of national legal systems calls for greater alignment at the Euro...
Article
Full-text available
In 2014, US federal judge Mark Wolf proposed the establishment of an International Anti-Corruption Court (IACC) to redress the impunity enjoyed by corrupt officials in some countries. An essential aspect of the IACC’s functioning, should the proposal ever take off, would concern the substantive law that it applies. Since no international court or t...
Article
Full-text available
Purpose Intimate partner abuse and violence has a high incidence rate in the United States. However, it remains underreported to formal agencies, including the police. With a focus on women who had contacted the police at least once, this study explored the complexity of intimate partner abuse and violence experienced between women who contacted th...
Article
Full-text available
We consider a parabolic-parabolic chemotaxis system with singular chemotactic sensitivity and source functions, which is originally introduced by Short et al to model the spatio-temporal behaviour of urban criminal activities with the particular value of the chemotactic sensitivity parameter $\chi =2$ . The available analytical findings for this ur...
Article
Full-text available
Advancements in technology have improved human well-being but also enabled new avenues for criminal activities, including digital exploits like deep fakes, online fraud, and cyberbullying. Detecting and preventing such activities, especially for law enforcement agencies needing photo profiles for covert operations, is imperative. Yet, conventional...
Article
Full-text available
The Current Decentralized Accountability question, in my view, entails a consideration of the following important principles and issues: positive complementarity, complementarity, universal jurisdiction, and the role of regional and international organization in international criminal justice as partners with the International Criminal Court (ICC)....
Article
Full-text available
El artículo aborda la responsabilidad médica penal por omisión en situaciones de emergencia de salud, debido a las dudas que aún existen sobre el accionar médico en estas circunstancias y las posibles consecuencias jurídicas por negligencia, impericia e imprudencia. La responsabilidad médica incluye la obligación moral de responder de los propios a...
Article
Full-text available
Wireless sensors networks (WSNs) play an important role in life. With the development of 5G, its security issues have also raised concerns. Therefore, it is an important topic to study the offense and defense confrontation in WSNs. A complete information static game model is established to analyze the offense and defense confrontation problem of WS...
Article
Full-text available
Despite the criminalisation of kidnapping in Nigeria by the Nigerian criminal codes and an Anti-Kidnapping Act, Ekiti State continues to experience kidnapping schemes for ransom that have raised concerns among its residents. Using the routine activity theory, purposive sampling method, and qualitative findings, this study found that kidnappers in E...
Article
Full-text available
The network defamation crime presents a serious legal quandary in the digital age. This paper delves into the identification, supervision, criminal applications, and countermeasures of the network defamation crime. First, we clarify the constitutive requirements of the crime and propose a meticulous standard to balance freedom of speech with safegu...
Article
Full-text available
In recent years, the rise of big data has revolutionized many domains, including policing. Research is lacking, however, on the various ways in which the police use big data applications. This study provides new insights into the ways the Netherlands Police currently use big data and algorithmic applications. Based on a novel data source—job vacanc...
Article
Full-text available
In this paper, the author compares the novel Confessions of a Thug (1839), written by a colonial official named Philip Meadows Taylor, with Newgate novels in general and the novel Jack Sheppard (1839) by William Harrison Ainsworth in particular. During the first half of the nineteenth century, two English colonial administrators named Philip Meadow...
Chapter
Full-text available
The rapid expansion of information and communication technology has shaped a continually growing digital landscape, wherein the internet and digital networks play a central role. However, this technological ubiquity has brought forth challenges, such as sophisticated and ever-evolving cybercrimes. This article addresses the complexity and diversity...
Article
Full-text available
In general, the State has taken responsibility to protect the person and property of every individual. If any person commits any offence, it is not considered only against the respective victim rather against the State also. In such scenario, the State and its machineries, particularly the Executive and the Judiciary, are under legal obligations to...
Preprint
Full-text available
A partir da etnografia de um processo judicial e do Tribunal do Júri, pretende-se discutir os limites e tensões do “feminicídio” como categoria política e jurídica explicativa do assassinato por razões de gênero para a compreensão dos assassinatos praticados contra as mulheres trans, resultado parcial da pesquisa de mestrado desenvolvida para o Pro...
Article
Full-text available
The Internet of Things brings many benefits to our society, but its advantages come with a price, namely with a huge opportunity for those who want to commit cybercrime. To fight against this kind of criminality, investigators must use appropriate methods. The Forensics of the Internet of Things (IoT) has evolved from “traditional” Digital Forensic...
Article
Full-text available
Author summary • Human immunodeficiency virus (HIV) drug resistance has implications for antiretroviral treatment strategies and for containing the HIV pandemic because the development of HIV drug resistance leads to the requirement for antiretroviral drugs that may be less effective, less well-tolerated, and more expensive than those used in first...
Preprint
Full-text available
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who exploit ChatGPT to launch cyberattacks. This paper examines the tactics that adversaries use to...
Article
Full-text available
Introduction: The realization of Parliament's desire to support asset seizure efforts, currently there is a discourse to regulate the seizure of assets resulting from criminal offenses in a separate law. The proposal to form a law on the expropriation of assets resulting from criminal acts is seen in the agreement to include a draft law on the expr...
Article
Full-text available
With advancing technology, complex decision-making in warfare, including targeting, is increasingly assisted by machines. Although involving humans in decision-making is often seen as a safeguard against machine errors, it does not always prevent them. Machines can make incorrect determinations or delay them when time is critical. In these cases, h...
Article
Full-text available
Introduction Criminals’ propensity to precautionary mask their tracks such as disposing of an item of evidence in an aquatic environment (including freshwater and seawater) warrants the ongoing quest for advanced reagents and techniques that are tailored to the substrate characteristics on which the print will be developed. Aim The study aimed to...
Article
Full-text available
A pesquisa tem por objetivo verificar se o emprego de Sistemas de Inteligência Artificial poderia abrandar a altíssima carga de seletividade do Controle Penal, notadamente aquelas fundadas no racismo e na discriminação. Para tanto, num primeiro momento, o texto trata da seletividade do poder punitivo como característica estrutural. Na sequência, da...
Article
Full-text available
Introduction: One of the legal goods provided by a notary is a cover note, which is a statement in the management of a deed or a notarial document stating that the deed is in progress and can be finished within the time set by the cover note.Purposes of the Research: A notary certificate is referred to as a cover note, as a substitute for the proce...
Article
Full-text available
The study looked at the information needs of Nigerian youths living in Zamfara State towards contributing to national development. This became necessary given the high rate of youth unemployment and consequent criminality in the country and the state. Descriptive survey was used by the study and data was collected using structured questionnaire. Th...
Article
Full-text available
Criminal trials of anti-war activists in Ireland.
Article
Full-text available
In adopting the Malabo Protocol and creating the African Court of Justice and Human Rights, the African Union has established the first ever regional court with international criminal jurisdiction. This milestone signals once again, the role of African institutions in creating and developing norms in international politics. Yet, both International...
Presentation
Full-text available
Social media has become a new public space that allows users to express opinions, criticisms, and suggestions freely. This article captures the resistance of the content creator, Bima Yudho Saputro, a student from Lampung studying in Australia, in criticizing the damage to roads in Lampung Province, Indonesia, for decades. This study uses ethnograp...
Article
Full-text available
Corporate crime is often misrepresented in crime media as individual wrongdoing with minor consequences. Despite considerable research on corporate crime in news, there has been no examination of quality media sources, upon which this paper focuses. This paper presents an exploratory study of the first week of framing corporate crime in UK-based on...
Conference Paper
Full-text available
Children and young people voraciously consume technology and social media, expanding social connections and relationships far beyond previous generations. With such advances, it has been argued, young people are at greater risk of exposure to unwanted sexual material and advances via these media (Andrie, et al., 2021; Lebedíková et al.; Madigan, et...
Article
Full-text available
While the situation of crime victims is analyzed by law enforcement officers, victims of human rights violations deserve special attention due to the very fact that these violations were ‘performed’ by the state, through its official employee or a person who acts in the capacity of an official. This fact does not in any way change the right of the...
Article
Full-text available
Restorative justice practices are used to resolve criminal cases with minor or minor losses that do not have to be resolved through court but can be resolved at the Police and Prosecutor's Office stages. The resolution of the case can be carried out in a fair and balanced manner for the victim and the perpetrator, which is achieved through restorat...
Article
Full-text available
The objective is to understand the relations between diff erent Brazilian governments and indigenous peoples in the last 20 years, with an emphasis on the Bolsonaro administration and during the Covid-19 pandemic. In this sense, it is asked: in what way have indigenous people and the Amazon Forest been aff ected by the Bolsonaro government’s handli...
Article
Full-text available
Sexual violence against children can have complex impacts, including physical and non-physical loss and suffering. Children who experience sexual violence need to be protected and recovered psychologically and socially. A form of legal protection for children as victims can be in the form of restitution charged to the perpetrator to fulfill the rig...
Article
Full-text available
Background Having a reliable and feasible method to estimate whether an individual has reached 16 years of age would greatly benefit forensic analysis. The study of age using dental information has matured recently. In addition, machine learning (ML) is gradually being applied for dental age estimation. Aim The purpose of this study was to evaluat...
Article
Full-text available
Perceptions of the trustworthiness of faces predict important social outcomes, including economic exchange and criminal sentencing decisions. However, the specific facial characteristics that drive trustworthiness perceptions remain poorly understood. Here we investigated this issue by exploring possible relationships between ratings of the trustwo...
Article
Full-text available
Background: Artificial intelligence (AI) has many applications in various aspects of our daily life, including health, criminal, education, civil, business, and liability law. One aspect of AI that has gained significant attention is natural language processing (NLP), which refers to the ability of computers to understand and generate human languag...
Article
Full-text available
Mass murders are understudied in the Russian Federation (RF), while there is a tendency for them to increase in our country. Materials and Methods. 303 murders (with three victims or more) committed by 303 murderers (men – 295, women – 8) aged 15 to 71 years (mean age – 33.6±11.0 years) in 85 regions of the Russian Federation in 2002-2021 were anal...
Article
Full-text available
The informal sector has been a fundamental component of urban economies worldwide since ancient times. The informal sector, which employs a significant portion of the population, is essential for the urban financial development of countries including India. The majority of country dwellers now have the option to make their living working in various...
Article
Full-text available
The Dayak Suruk tribe in the Customary Law Community environment in Nanga Tubuk Village, Kapuas Hulu Regency currently still exists, carrying out their ancestral civilization from generation to generation, as the resolution of cases or problems that occur in indigenous communities can be resolved through two possibilities. First, customary law sett...