scholarly journals Crime prevention through digitalization

2021 ◽  
Vol 60 (91) ◽  
pp. 227-242
Author(s):  
Darko Dimovski

Common crime prevention measures have not yielded the expected results. It is important to examine the possibilities of using the latest achievements in crime prevention. One of the available options is digitalization. Starting from the definition of digitalization as the use of digital technologies to change the business model and provide new opportunities for generating income and value, the author emphasizes that digitalization can be used as a measure to prevent crime. In this regard, some solutions for preventing crime through digitalization are embodied in the use of digital currencies, digital identities and signatures, smart devices, and mobile applications. The author elaborates on each of these solutions, focusing on specific crime prevention measures and examples from different countries worldwide. It may help crime prevention experts perceive digitalization as a measure for reducing the volume of crime. If the benefits of digitalization are put into good use, we can expect that the volume of property-related crimes, violence-related crimes and traffic delinquency will drop in the forthcoming period. On the other hand, the implementation of these measures may give rise to the commission of Internet-related crimes, thus leading to the increase in computer crime.

Author(s):  
Pablo Nicolás Díaz Bilotto ◽  
Liliana Favre

Software developers face several challenges in deploying mobile applications. One of them is the high cost and technical complexity of targeting development to a wide spectrum of platforms. The chapter proposes to combine techniques based on MDA (Model Driven Architecture) with the HaXe language. The outstanding ideas behind MDA are separating the specification of the system functionality from its implementation on specific platforms, managing the software evolution, increasing the degree of automation of model transformations, and achieving interoperability with multiple platforms. On the other hand, HaXe is a very modern high level programming language that allows us to generate mobile applications that target all major mobile platforms. The main contributions of this chapter are the definition of a HaXe metamodel, the specification of a model-to-model transformation between Java and HaXe and, the definition of an MDA migration process from Java to mobile platforms.


This chapter focuses on the classical or traditional definition of diaspora as it relates to a place of origin and/or an attachment to a homeland (whether real or perceived). The chapter highlights theories of classical diaspora and provides an in-depth analysis into the contemporary Kurdish situation of statelessness and increased claims to land (due to their involvement with the fight against the Islamic State). The chapter also makes brief mention of the other prominent case of contemporary diaspora politics in the Middle East, that of the Palestinians. The chapter explains the struggle of the Kurds to self-determination and to establish an autonomous state, and highlights the adoption and use of digital technologies by diasporic communities, which allows for the facilitation of diasporic communities and networks that transcend traditional borders.


Ethnography ◽  
2021 ◽  
pp. 146613812110160
Author(s):  
Susanne Hofmann

This article scrutinizes the anti-trafficking efforts that the PT Government in Brazil undertook to implement the National Anti-Trafficking Policy in collaboration with different civil society organizations. Focusing on crime prevention measures, the article analyses the perceptions and understandings of trafficking, and the values and norms implicit in those, as well as the relationships developed between pubic officials and members of the civil society in this context. Examining everyday policy work, the article illustrates that policy implementation cannot be considered a mere technical-rational endeavor, in which replaceable officials deliver consistent and replicable outcomes based on unambiguous rules, assigned roles, and specified tasks and procedures. On the one hand, personality, personal motives and interests played a significant role in forging policy implementation focus and approach. On the other hand, the public officials struggled with the activists’ attempts to shift policy concerns and implementation into a direction that diverged from their own politics.


Author(s):  
K. T. Tokuyasu

During the past investigations of immunoferritin localization of intracellular antigens in ultrathin frozen sections, we found that the degree of negative staining required to delineate u1trastructural details was often too dense for the recognition of ferritin particles. The quality of positive staining of ultrathin frozen sections, on the other hand, has generally been far inferior to that attainable in conventional plastic embedded sections, particularly in the definition of membranes. As we discussed before, a main cause of this difficulty seemed to be the vulnerability of frozen sections to the damaging effects of air-water surface tension at the time of drying of the sections.Indeed, we found that the quality of positive staining is greatly improved when positively stained frozen sections are protected against the effects of surface tension by embedding them in thin layers of mechanically stable materials at the time of drying (unpublished).


2014 ◽  
pp. 79-130 ◽  
Author(s):  
Ales Novak

The term ?business model' has recently attracted increased attention in the context of financial reporting and was formally introduced into the IFRS literature when IFRS 9 Financial Instruments was published in November 2009. However, IFRS 9 did not fully define the term ‘business model'. Furthermore, the literature on business models is quite diverse. It has been conducted in largely isolated fashion; therefore, no generally accepted definition of ?business model' has emerged. Therefore, a better understanding of the notion itself should be developed before further investigating its potential role within financial reporting. The aim of this paper is to highlight some of the perceived key themes and to identify other bases for grouping/organizing the literature based on business models. The contributions this paper makes to the literature are twofold: first, it complements previous review papers on business models; second, it contains a clear position on the distinction between the notions of the business model and strategy, which many authors identify as a key element in better explaining and communicating the notion of the business model. In this author's opinion, the term ‘strategy' is a dynamic and forward-looking notion, a sort of directional roadmap for future courses of action, whereas, ‘business model' is a more static notion, reflecting the conceptualisation of the company's underlying core business logic. The conclusion contains the author's thoughts on the role of the business model in financial reporting.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Author(s):  
Ксения Ивановна Голубцова

Статья посвящена рассмотрению проблем профилактики преступлений оперативными подразделениями исправительных учреждений (далее - ИУ). Автор, раскрывая роль оперативных отделов ИУ в общей профилактике правонарушений, указывает на ее двоякость, поскольку, с одной стороны, рассматриваемые подразделения обладают значительным преимуществом перед другими службами учреждения в выявлении негативных факторов (негласный метод получения оперативно значимой информации), с другой стороны - далеко не все условия, которые способствуют совершению преступлений в ИУ, можно устранить оперативным путем. Изучение специальной литературы позволило выявить в деятельности начальников ИУ определенные проблемы, связанные с оценкой состояния оперативной обстановки в ИУ, сложившейся ситуации; с отсутствием прогноза развития криминогенной ситуации в ИУ, а также с профессиональной некомпетентностью руководителей, неумением объективно оценивать результаты деятельности структурных подразделений. Автор особое внимание уделяет анализу статистических данных о совершенных и предотвращенных преступлениях лицами, находящимися в местах лишения свободы. The article is devoted to the consideration of problems of crime prevention by operational units of correctional institutions (hereinafter referred to as IA). The author, revealing the role of the operational departments of the IA in the general prevention of offences, points to its twofold. On the one hand, the units under consideration have significant advantages over other services of the institution in identifying negative factors (these are tacit methods of obtaining promptly meaningful information). On the other hand, not all conditions conducive to the commission of crimes in IA can be eliminated by operational means: For example, shortcomings in the activities of other departments and services (security department, duty shift, etc.). The study of special literature has made it possible to identify problems in the activities of heads of correctional institutions in the sphere of implementation of solutions in case of lack of objective and complete information on the state of the operational situation in IA, the current situation, the results of the activities of structural subdivisions; No forecast of the development of the crime situation in IE; Professional incompetence of managers, inability to objectively assess the results of activities of structural subdivisions. The author pays particular attention to the analysis of statistics on crimes committed and prevented by persons in detention.


Author(s):  
Juan de Lara ◽  
Esther Guerra

AbstractModelling is an essential activity in software engineering. It typically involves two meta-levels: one includes meta-models that describe modelling languages, and the other contains models built by instantiating those meta-models. Multi-level modelling generalizes this approach by allowing models to span an arbitrary number of meta-levels. A scenario that profits from multi-level modelling is the definition of language families that can be specialized (e.g., for different domains) by successive refinements at subsequent meta-levels, hence promoting language reuse. This enables an open set of variability options given by all possible specializations of the language family. However, multi-level modelling lacks the ability to express closed variability regarding the availability of language primitives or the possibility to opt between alternative primitive realizations. This limits the reuse opportunities of a language family. To improve this situation, we propose a novel combination of product lines with multi-level modelling to cover both open and closed variability. Our proposal is backed by a formal theory that guarantees correctness, enables top-down and bottom-up language variability design, and is implemented atop the MetaDepth multi-level modelling tool.


2011 ◽  
Vol 328-330 ◽  
pp. 2400-2404
Author(s):  
Zi Qi Ju

To prevent runway incursions, we should have the corresponding systematic prevent ideas. Based on the definition of runway incursions and classification of relevant criteria, it analyzed the runway incursion system, put forward the closed-loop management ideas to prevent runway incursions, and found the main contradictions of preventing runway incursions using the gray relational analysis. With the example of runway incursion dates of U.S.A, by means of Grey Relational Analysis of different severities and different factors for runway incursions, it have shown that the key factors leading to the class AB and class CD runway incursions are Vehicle/Pedestrian Deviations and Pilot Deviations respectively. Meanwhile, it proposed integrated prevention measures of runway incursions.


Author(s):  
Shrutika Mishra ◽  
A. R. Tripathi

Abstract In today’s world, many digitally enabled start-ups are budding all over the globe because of the fast enhancement in digital technologies. For the establishment of new business, it is necessary to adopt a proper business model which needs to define the way in which the company will provide values and the ways in which the customers can pay for their services. This paper aims to study the various business models being used in today’s marketplace and to provide a better understanding for these business models by having an insight on the attributes.


Sign in / Sign up

Export Citation Format

Share Document