scholarly journals Technical and Forensic Support for the Prevention of Penitentiary Crimes

Author(s):  
Andrey Nuzhdin

Crimes committed by convicts serving criminal punishments present an urgent social problem. Although inmates are isolated and under constant control, the number of penitentiary crimes is growing. The identification of the whole complex of circumstances contributing to penitentiary crimes and their elimination are a guarantee of successful work on preventing crimes of this type. The potential of modern achievements in science and technology should be actively used in preventive work. Many legal scholars stress that the possibilities of using technical means, techniques and methods in the process of preventing crime (including penitentiary crime) are undervalued. Employees of preliminary investigation bodies and penitentiary institutions, in their turn, do not give value to the technical-forensic support (and sometime do not simply understand its possibilities) of preventing penitentiary crime. At the same time, their high priority and value in the organization of preventive work is beyond doubt. The article describes the theoretical basis of using technical-forensic means, offers their classification, shows key spheres of their use. The author stresses the preventive potential of special equipment available in each correctional institution (technical means of security and supervision). The article presents and offers a detailed classification of technical-forensic means, techniques and methods of preventing penitentiary crimes.

Author(s):  
Skakov А. B. ◽  

The article formulates the author`s definition of the progressive system: “The progressive system is a complex intersectoral institution of criminal and criminal and executive law, including several independent institutions, in the process of applying which the legal status of the convict changes depending on the degree of its correction in the direction of either expansion or restriction of the volume of his rights”. It is noted that in the current legislation, with the establishment of a general rule on various conditions for serving a sentence within one correctional institution, the progressive system has acquired a completely finished form and can be considered the basis of all punitive and educational impact on convicts. The need for a more detailed classification of positively characterized convicts has been also actualized. In this case, each positive degree of behavior of convicts must correspond to certain conditions of detention and institutions of the progressive system, namely: upon reaching the 1st positive degree, the convict is kept in the usual conditions of a correctional institution (the institution of changing conditions of detention within one correctional institution); at the 2nd positive degree – transferred to lighter conditions of detention; at the 3rd positive degree – transferred to preferential conditions of detention; upon reaching the 4th positive degree – transferred to an institution of another type; at the 5th positive degree – the institution of replacement of punishment is applied; at the 6th positive degree – parole of the convicted person is possible. A proposal regarding the release of the court from the function of changing the process of executing the sentence has been formulated, in order to entrust it to the supervisory commissions created at the correctional institution. The court will only appoint the type of punishment, and the execution of the court`s decision should be entrusted to the Committee of the Penitentiary System and the Supervisory Commission. In this case, the commission collectively decides on the application of all the institutions of the progressive system, up to the institution of parole. The necessity of further improvement of legal regulation of the process of execution of punishments, alternative to imprisonment, according to the progressive system is substantiated. Key words: criminal policy, humanization, deprivation of liberty, punishments alternative to imprisonment, progressive system of execution of imprisonment, conditions of detention, behavior of convicts.


Author(s):  
Nadya Fisunenko ◽  
Dmitro Dyachenko

The article is devoted to the study of problems in the field of economic security of the enterprise. The essences of the concepts «danger» and «threat» are analyzed, their main properties are determined. The main types of danger are identified, according to the magnitude of the possible consequences. The main types of hazards include «warning», which has the following characteristics. They are: set of circumstances that have developed in the enterprise, to which it is necessary to react. The peculiarities of the evolution of threats have been studied. The actuall scheme of evolution of threats has been built, considering the concepts of «risk», «danger» and «threat». The classification of economic threats and risks according to the main features (by area of distribution and objects of influence) as components of economic security of the enterprise are formed. The main causes of economic threats have been identified. They are: insufficient adaptation of individual business entities to dynamic and constantly changing market conditions; general insolvency of business entities; growing crime; low level of labor discipline and responsibility of employees of enterprises, insufficient legal regulation of some activities; as well as low professional level of a significant part of the management and employees of the enterprise. It is determined that the causes of physical threats are: inefficient personnel policy of business entities, low professional training, insufficient level of security of enterprises, banks, low control over the work process of employees. The causes of intellectual threats are studied. They are first of all inefficient personnel policy of the enterprise, secondly, violation of non-disclosure agreements and the principle of publicity of results, then, intensification of competition in the markets along with low level of information security or its absence. It is proposed that in order to effectively ensure the economic security of the enterprise, first of all, it is necessary to focus on the presence of various threats, risks and dangers and try to minimize their impact in time.


2021 ◽  
Vol 2021 ◽  
pp. 1-21
Author(s):  
George Iakovakis ◽  
Constantinos-Giovanni Xarhoulacos ◽  
Konstantinos Giovas ◽  
Dimitris Gritzalis

The COVID-19 outbreak has forced businesses to shift to an unprecedented “work from home” company environment. While this provides advantages for employees and businesses, it also leads to a multitude of shortcomings, most prevalent of which is the emergence of additional security risks. Previous to the outbreak, company computer networks were mainly confined within its facilities. The pandemic has now caused this network to “spread thin,” as the majority of employees work remotely. This has opened up a variety of new vulnerabilities, as workers’ cyber protection is not the same at home as it is in office. Although the effects of the virus are now subsiding, working remotely has embedded itself as the new normal. Thus, it is imperative for company management to take the necessary steps to ensure business continuity and be prepared to deal with an increased number of cyber threats. In our research, we provide a detailed classification for a group of tools which will facilitate risk mitigation and prevention. We also provide a selection of automated tools such as vulnerability scanners, monitoring and logging tools, and antivirus software. We outline each tool using tables, to show useful information such as advantages, disadvantages, scalability, cost, and other characteristics. Additionally, we implement decision trees for each category of tools, in an attempt to assist in navigating the large amount of information presented in this paper. Our objective is to provide a multifaceted taxonomy and analysis of mitigation tools, which will support companies in their endeavor to protect their computer networks. Our contribution can also help companies to have some type of cyber threat intelligence so as to put themselves one step ahead of cyber criminals.


Author(s):  
I.O. Mikulionok

The basic data on the volume of production of pneumatic tires in the world and in Ukraine are presented. The need to improve the ways of handling pneumatic tires that have lost their con-sumer properties (worn out tires as a result of their intended use and tires rejected as a result of passing quality control during their manufacture) is shown as one of the most dangerous for the environment and promising in terms of using their properties. A detailed classification of methods for handling worn out and defective tires is proposed and a critical analysis of each of them is given. Particular attention is paid to the methods of utilization of tires, in particular, recycling, which makes it possible to efficiently use the secondary raw materials obtained from tires directly for their intended purpose. The features of physical, physicochemical and chemical processing methods, in particular combustion, gasification, pyrolysis of tires and their frag-ments, as well as the prospects for their decomposition under the influence of environmental factors, in particular microorganisms, are also considered. The main ways of solving the prob-lem of tires that have lost their consumer properties in Ukraine are proposed. Bibl. 88, Fig. 2.


2021 ◽  
Author(s):  
Ming Xie ◽  
Yunpeng Jia ◽  
Ying Li ◽  
Xiaohua Cai ◽  
Kai Cao

Abstract Laser-induced fluorescence (LIF) is an effective, all-weather oil spill identification method that has been widely applied for oil spill monitoring. However, the distinguishability on oil types is seldom considered while selecting excitation wavelength. This study is intended to find the optimal excitation wavelength for fine-grained classification of refined oil pollutants using LIF by comparing the distinguishability of fluorometric spectra under various excitation wavelengths on some typical types of refined-oil samples. The results show that the fluorometric spectra of oil samples significantly vary under different excitation wavelengths, and the four types of oil applied in this study are most likely to be distinguished under the excitation wavelengths of 395 nm and 420 nm. This study is expected to improve the ability of oil types identification using LIF method without increasing time or other cost, and also provides theoretical basis for the development of portable LIF devices for oil spill identification.


2003 ◽  
Vol 15 (3) ◽  
pp. 278-285
Author(s):  
Daigo Misaki ◽  
◽  
Shigeru Aomura ◽  
Noriyuki Aoyama

We discuss effective pattern recognition for contour images by hierarchical feature extraction. When pattern recognition is done for an unlimited object, it is effective to see the object in a perspective manner at the beginning and next to see in detail. General features are used for rough classification and local features are used for a more detailed classification. D-P matching is applied for classification of a typical contour image of individual class, which contains selected points called ""landmark""s, and rough classification is done. Features between these landmarks are analyzed and used as input data of neural networks for more detailed classification. We apply this to an illustrated referenced book of insects in which much information is classified hierarchically to verify the proposed method. By introducing landmarks, a neural network can be used effectively for pattern recognition of contour images.


PEDIATRICS ◽  
1971 ◽  
Vol 47 (6) ◽  
pp. 1103-1104
Author(s):  
David S. Walton

The authors begin their presentation–in this, the first textbook I know of devoted entirely to pediatric glaucomas–with a detailed classification of glaucomas in childhood. This is followed by a discussion of diagnostic techniques and the important clinical signs encountered in the pediatric glaucomas. A description of the conditions assoiated with childhood glaucomas follows, including a concise review of their distinguishing ocular features, with additional comments on treatment. The final section deals with methods of treatment; appropriate emphasis is given to the operative techniques used in performing a goniotomy.


1981 ◽  
Vol 33 (5) ◽  
pp. 1097-1110 ◽  
Author(s):  
A. T. Huckleberry ◽  
E. L. Livorni

Throughout this paper a surface is a 2-dimensional (not necessarily compact) complex manifold. A surface X is homogeneous if a complex Lie group G of holomorphic transformations acts holomorphically and transitively on it. Concisely, X is homogeneous if it can be identified with the left coset space G/H, where if is a closed complex Lie subgroup of G. We emphasize that the assumption that G is a complex Lie group is an essential part of the definition. For example, the 2-dimensional ball B2 is certainly “homogeneous” in the sense that its automorphism group acts transitively. But it is impossible to realize B2 as a homogeneous space in the above sense. The purpose of this paper is to give a detailed classification of the homogeneous surfaces. We give explicit descriptions of all possibilities.


Author(s):  
Nils Braakmann ◽  
Joachim Wagner

SummaryWe use unique rich data for German manufacturing enterprises to investigate the product diversification - firm performance relationship.We find that an increase in the degree of product diversification has a negative impact on profitability when observed and unobserved firm characteristics are controlled for. The effects are statistically significant and large from an economic point of view. This helps to understand the fact that nearly 40 percent of all enterprises with at least 20 employees are single-product firms according to a detailed classification of products, and that multi-product enterprises with a large number of goods are a rare species.


Sign in / Sign up

Export Citation Format

Share Document