The New Zealand Response to Internet Child Pornography

Author(s):  
David Wilson

New Zealand’s approach to regulating illegal material on the Internet varies from other comparable countries. A single law governs the legal classification of Internet content, commercial films, printed material and a wide variety of other media and covers legal and illegal content. A Crown agency rather than the judiciary determines the legality of material. A specialist, non-police, enforcement agency deals those who possess or distribute illegal material, particularly child pornography. This agency actively seeks out child pornographers and has a high success rate in prosecuting them. This chapter describes the history, development and operation of the New Zealand censorship system, as it applies to Internet content. It is likely to be of interest to policy-makers, law enforcement officers and media regulators in other countries.

Author(s):  
Amin Ibrahim

The sexual exploitation of children remains a very serious problem and is rapidly increasing globally through the use of the Internet. This chapter focuses on the child pornography and IT, and the various methods to combat this problem. The ease of acquiring IT and digital equipments, the global reach of Internet and freely available peer-to-peer services have made child pornography a very complex issue to undertake. The borderless nature of the Internet and the lack of unified criminal code among nations further escalated the complexity of law enforcement against child pornography.


Author(s):  
Maryam Zahabi ◽  
Emily McCollum

Police in-vehicle technologies especially mobile computer terminals (MCTs) are the major cause of motor vehicle crashes for law enforcement officers. Previous studies have found several usability issues with the design of MCT interfaces. The objective of this study was to develop an algorithm for classification of MCT interface usability based on a combination of officer performance, visual attention allocation, and subjective measures. It was found that speed deviation, secondary task completion time, off-road fixation frequency and glance duration are informative features that associate with MCT usability. The developed algorithm has the potential to be used in MCT design and development process to ensure efficient interaction in multi-tasking situations of driving and using the MCT.


2015 ◽  
Vol 44 (1) ◽  
pp. 52 ◽  
Author(s):  
Dwi Haryadi

Bangka Belitung’s tin wealth on the downside has led to rampant illegal mining practices. This research aims to determine the root causes of illegal mining. Data collection was done through literature studies, field observations, participant observation, in-depth interviews and focus group discussions with key informants from miners to policy makers, as well as law enforcement officers. The study finds there are eight criminogenic factors, namely tin disorientation governance, political control of tin, tin abundant, areas prone to smuggling, economic needs of the people and the elite, low awareness of law and and environment, nonoptimal guidance and supervision, and ineffective law enforcement.Kekayaan timah Bangka Belitung pada sisi negatifnya telah menimbulkan maraknya praktik Illegal mining. Tujuan penelitian antaralain untuk mengetahui faktor penyebab terjadinya illegal mining. Pengumpulan data dilakukan melalui studi literatur, pengamatan lapangan, observasi partisipatif, wawancara mendalam dan FGD yang dengan para key informan dari pelaku tambang sampai pengambil kebijakan, serta aparat penegak hukum. Penelitian ini menemukan ada 8 (delapan) faktorkriminogen terjadinya illegal mining timah, yaitu disorientasi tata kelola pertimahan, politik penguasaan timah, timah yang melimpah, daerah rawan penyelundupan, kebutuhan ekonomi rakyat dan elit, rendahnya kesadaran hukum dan lingkungan, pembinaan dan pengawasan belum optimal dan penegakan hukum yang belum efektif.


2020 ◽  
pp. 28-31
Author(s):  
Olga V. Khanineva ◽  

The article describes the main reasons for the increase in the number of registered frauds committed in the Russian Federation over the past 4 years and provides examples of the most common types of fraud committed with the use of information and telecommunication devices. The author analyzes the reasons for committing frauds using communication facilities and information and communication technologies, with the focus on their types, ways of commission, categories of citizens most susceptible to these crimes. The author lists the most common types of fraud and their nature and proposes improvements for further activities of law enforcement officers to promote cooperation with other organizations involved in transferring and storing funds of citizens (banks) and providing communication services via the Internet (providers, companies of cellular operators) with the aim to curb the growth of crimes and achieve the highquality prevention and protection of information about citizens and their funds.


Author(s):  
Dmitriy Sochivko ◽  
Tat'yana Simakova

The article is devoted to the study of the individual legal awareness as profoundly subjective personal substructure, falling within the scope intrapsychic as well as interpsychic relations of human «I». Competency-based approach of modern system of higher professional departmental education considers individual legal awareness as a special socio-psychological category of subjects of educational space. Research interest in this phenomenon justified by the fact that future professional activities of employees of law enforcement officers are associated with high stressogenicity with interaction with the criminal strata of the population, with the ability to assess the legitimacy of events of an extreme nature. Substantive side of educational activity is revealed not only (and not so much) in determining requirements for personality of the graduate in the context of law knowledge but also in the formation of the subjective position of the legal cultural bearer, which is esseenticilly a synthesis of personality reflection of the student’s personality in the need, value and regulatory spheres. The article analyzes the relevance of the issue of individual legal consciousness in the psychological aspect – its embeddedness in the intrapsychic structure of the personality. The analysis allows us to carry out a psychological measurement using the original author’s technique «Individual Legal Awareness Structure» and the subsequent correction of this phenomenon. Based on the results of an empirical study, the authors constructed a psychodynamic intrapsychic classification of individual legal consciousness, which includes two types – feminine and masculine. The conclusion is made about the psychological significance of the intrapsychic and psychodynamic connection of legal awareness and self-relationship in a single personality substructure.


Author(s):  
Yuriy Kramarenko

The article focuses on the professional requirements for persons who carry out law enforcement activities. The questions of higher education in the specialty «law enforcement activities» are considered. The functional responsibilities and personal qualities of investigators of pre-trial investigation bodies and employees of operational units are analyzed. Generalizations are made regarding the working conditions of law enforcement officers. Conclusions are drawn regarding the lack of significant differences in the training of investigators and operational unit employees. The need for a mutual understanding of the essence of the work of the investigator and the operative officer is expressed. The problematic issues are identified that relate to the uncertainty of employment of graduates of the specialty «law enforcement activities», the experience of the position of an investigator to legal professions, as well as the lack of using the calculation of the norms of time spent for investigators of pre-trial investigation bodies and employees of operational units. The article suggests two ways out of the uncertain state of graduates of the specialty «law en-forcement activities»: 1) the classification of the specialty «law enforcement activities» as a legal education; 2) amending the legislation regarding the requirements of higher education for investigators of pre-trial investigation bodies - to provide for the possibility of having a higher education in the specialty «law» and «law enforcement activities». Work experience as an investigator should be counted as work experience in the field of law, regardless of the specialty received.


Author(s):  
Fransiska Novita Eleanora

Rampant and rampant crime against children on social media, resulting in increasingly restless and worried every parent, especially trafficking child prostitution, and carried out using the internet media. This online prostitution also spreads the contents of child pornography, whether done by the perpetrators themselves, a group of people or even corporations. The aim is to find out how to deal with civil society in dealing with child crimes through online prostitution, the ways that civil society do in eradicating crimes or criminal acts that occur in the environment or civil society life so that they are always vigilant, cautious and not easily trapped in criminal acts or crimes that occur in social medial that is by using social media namely through the internet, or facebook, instagram and so forth. While the research method used is normative research that is by examining and processing theories or in existing concepts and regulations and even legislation that is considered relevant and related to this research, in this case cannot be separated by using books or literature which exists. The results of this finding are various mitigation efforts that can be carried out by civil society in responding to criminal acts related to online prostitution of children, namely by carrying out various measures which are also called preventive, repressive, persuasive, curative and rehabilitation, considered to be able to reduce prostitution crime. existing children on social media, accompanied by a mindset which is advanced modern and supervision from the community and law enforcement which exist.


2021 ◽  
Vol 16 (12) ◽  
pp. 167-176
Author(s):  
L. V. Glazkova

To successfully counter extremist and terrorist crime in the virtual space, it is important to implement measures for improving legislation (clarification of extremism features, the introduction of a list of extremist crimes into the law, etc.), as well as measures to improve the training of law enforcement officials, wider involvement of specialists and experts in the investigation of cases, establishing cooperation with providers in order to timely identify extremist and terrorist crimes, a deeper study of the personality of criminals who specialize in committing extremist crimes using the field of telecommunications and computer information. The use of telecommunications and computer information in the commission of extremist crimes indicates a high intellectual level of the criminal, which helps him not only to commit high-tech crimes, but also to hinder the investigation of his actions using the same knowledge and experience. In this regard, the social danger of both the criminal and the offence committed by him increases, which should be taken into account when solving and investigating crimes. In addition, the professionalism of criminals makes increased demands on law enforcement officers investigating crimes of this type, which means that it is necessary to constantly improve their training in the field of computer information and telecommunication technologies. The paper discusses some issues of classification of extremism using computer and telecommunication networks, gives a definition of extremism, and suggests ways to solve problems in the qualification and organization of the investigation of the crimes in question.


Author(s):  
Sachil Kumar ◽  
Geetika Saxena

Online child pornography is a ubiquitous predicament over the internet, and its pessimistic effects and steady growth are significant in today's society. Online CSAM trading has recently gained much attention as well as “moral outrage” for national and international governments and law officials due to the ease of availability and sustained connectivity. The chapter is structured to highlight a deeper understanding of the term “CSAM” that is more diverse than the stigmatized expression of word child pornography and addresses the dark internet modalities frequently used by pedophiles to attract innocent victims. The authors also explored numerous innovative digital technologies and methods used by law enforcement officers around the world, together with corporate and non-governmental organizations to combat this unseen enemy.


Sign in / Sign up

Export Citation Format

Share Document