Crime Reporting: Profiling and Neighbourhood Observation

Author(s):  
Siddhartha Bandyopadhyay ◽  
Kalyan Chatterjee

We consider the effect of giving incentives to ordinary citizens to report potential criminal activity. Additionally we look at the effect of 'profiling' and biased reporting. If police single out or profile a group for more investigation, then crime in the profiled group decreases. If a certain group is reported on more frequently through biased reporting by citizens, crime in the group reported on actually increases. In the second model, we consider a neighbourhood structure where individuals get information on possible criminal activity by neighbours on one side and decide whether to report or not based on the signal. When costs of reporting are low relative to the cost of being investigated, the costs of investigation increase in the number of reports and there is at least one biased individual. We show there is a "contagion equilibrium" where everyone reports his or her neighbour.

2020 ◽  
Vol 37 (4) ◽  
pp. 26-41
Author(s):  
Jelena Matijašević ◽  
Sara Zarubica

The modern society is facing an increasingly dangerous and serious manifestation of criminal activity, that utilizes the most modern technical achievements, especially in the field of communications. That is why the modern states resort to employing new procedural forms of gathering evidence at the cost of a certain infringement on the right to privacy and other human rights. The Criminal Procedure Code establishes six special evidentiary procedures. The most complex issue in special evidentiary procedures is the question of when their usage is justified, in other words, the type of criminal activity to which they can be applied, and the conditions under which they can be used. In addition to the special evidentiary actions established in the Criminal Procedure Code, the security agencies are, within their competences, authorized to secretly collect data by applying preventive and security measures provided by special laws (lex specialis). Having that in mind, this paper will deal with the questions concerning the types and conditions of the usage of special evidentiary procedures, as well as the types and conditions of the application of preventive and security measures in Republic of Serbia.


Author(s):  
Hossein Kermani ◽  
Niloofar Hooman

Having reduced the cost of political activism, social media has provided room for ordinary citizens to engage in politics, build networks, spread information, and resist oppressive regulation (Howard & Hussain, 2013; Margetts et al., 2016). The ideas of connective action (Bennett & Segerberg, 2012) and hashtag activism (Jackson et al., 2020) are recent endeavors to theorize such transitions. However, the existing literature has overemphasized the positive side of social media platforms, in particular Twitter, in challenging inequalities, as well as in giving voice to marginalized groups (Lindgren, 2019; Wonneberger et al., 2020). While scholars, to a lesser extent, investigated how social media are used to suppress online protest from a normative and more general standpoint (Gunitsky, 2015), the ways that a connective action could be disrupted, e.g., by state actors has not received much scholarly attention yet. This has become particularly important in recent years, as several governments across the globe have adopted new tactics to dismantle connective actions, such as the coordinated dissemination of fake news. This study sheds light on such disruptive processes by investigating how a connective action in the Iranian Twittersphere (revolving around #rape , i.e., Iranian #MeToo) was derailed.


1977 ◽  
Vol 23 (3) ◽  
pp. 260-271 ◽  
Author(s):  
John E. Monzingo

Economic analysis of problems of the criminal justice system following the model developed by Gary Becker is based on assumptions about what motivates criminal activity. According to this model, criminals are motivated by the expected net gain from the use of available resources in criminal activity compared with the expected net gain from the use of the same resources in legitimate activity. When the expected gain from crime is higher than the gain from legitimate activity, individuals can be expected to engage in criminal activity. Based on this assumption, policies may be adopted which increase the cost of crime to those who engage in it, reducing the expected net gain and therefore the amount of crime engaged in. Because increasing the cost of criminal activity to criminals may be very costly, the total loss to a community from crime will have to include not only the direct costs of crime but the indirect costs associated with the suppression of crime. It is assumed that policy will be designed to minimize the total loss from crime. Two possible standards are proposed, "efficiency" and a Pareto test. While most of those who adopt this model concentrate on the deterrent effect of pu nish ment, raising the cost of engaging in crime, other less punitive policies for increasing legitimate opportunities and equalizing the distribution of wealth are equally consistent with the assumptions of this model.


Author(s):  
James F. Mancuso

IBM PC compatible computers are widely used in microscopy for applications ranging from control to image acquisition and analysis. The choice of IBM-PC based systems over competing computer platforms can be based on technical merit alone or on a number of factors relating to economics, availability of peripherals, management dictum, or simple personal preference.IBM-PC got a strong “head start” by first dominating clerical, document processing and financial applications. The use of these computers spilled into the laboratory where the DOS based IBM-PC replaced mini-computers. Compared to minicomputer, the PC provided a more for cost-effective platform for applications in numerical analysis, engineering and design, instrument control, image acquisition and image processing. In addition, the sitewide use of a common PC platform could reduce the cost of training and support services relative to cases where many different computer platforms were used. This could be especially true for the microscopists who must use computers in both the laboratory and the office.


Author(s):  
H. Rose

The imaging performance of the light optical lens systems has reached such a degree of perfection that nowadays numerical apertures of about 1 can be utilized. Compared to this state of development the objective lenses of electron microscopes are rather poor allowing at most usable apertures somewhat smaller than 10-2 . This severe shortcoming is due to the unavoidable axial chromatic and spherical aberration of rotationally symmetric electron lenses employed so far in all electron microscopes.The resolution of such electron microscopes can only be improved by increasing the accelerating voltage which shortens the electron wave length. Unfortunately, this procedure is rather ineffective because the achievable gain in resolution is only proportional to λ1/4 for a fixed magnetic field strength determined by the magnetic saturation of the pole pieces. Moreover, increasing the acceleration voltage results in deleterious knock-on processes and in extreme difficulties to stabilize the high voltage. Last not least the cost increase exponentially with voltage.


1994 ◽  
Vol 58 (11) ◽  
pp. 832-835 ◽  
Author(s):  
ES Solomon ◽  
TK Hasegawa ◽  
JD Shulman ◽  
PO Walker
Keyword(s):  

1998 ◽  
Vol 138 (2) ◽  
pp. 205-205
Author(s):  
Snellman ◽  
Maljanen ◽  
Aromaa ◽  
Reunanen ◽  
Jyrkinen‐Pakkasvirta ◽  
...  
Keyword(s):  

2004 ◽  
Vol 171 (4S) ◽  
pp. 40-40
Author(s):  
Leslee L. Subak ◽  
Stephen K. Van Den Eeden ◽  
Jeanette S. Brown ◽  
Arona I. Ragins ◽  
Eric Vittinghoff ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document