prevention theory
Recently Published Documents


TOTAL DOCUMENTS

55
(FIVE YEARS 0)

H-INDEX

9
(FIVE YEARS 0)



2020 ◽  
Vol 13 (1) ◽  
pp. 28-55
Author(s):  
Shaka Yesufu

The Southern African Development Community (SADC) is an organisation that aims to facilitate cooperation between the governments of its Member States through a set of goals. SADC uses protocols as an instrument of coordination of its Member States on Transport, Communications and Meteorology endeavours to harmonise various aspects of traffic and transportation in the region. The researcher relies on carrying out an extensive literature review, consulting secondary data, official government publications and review of case studies. This article is informed by both the routine activity theory and situational crime prevention theory. It was found that the SADC regional body still has several barriers to overcome before a successful harmonisation stage to prevent crime will be achieved by Member States. Regional cooperation is needed amongst Member States to prevent organised borderless crime like human trafficking, drugs trafficking, fraud and money laundering, car-hijacking and terrorism.



2020 ◽  
Vol 3 (2) ◽  
pp. 267
Author(s):  
Riyanto Riyanto ◽  
Umar Ma'ruf ◽  
Sri Kusriyah Kusriyah

This study aims to determine the implementation of the role of the police in traffic criminal acts of traffic violations in an effort to build the image of the police as a community protector and inhibiting factors and solutions. The method used is sociological juridical, descriptive analytical research specifications. The data used are primary data and secondary data. Data collection methods are field studies and library studies. The data analysis method uses qualitative analysis. As a knife of analysis, crime prevention theory and law enforcement theory are used. The results showed that the implementation of the role of the police in tackling traffic violations in an effort to build the image of the police as a community protector was carried out through preemptive, preventive and repressive efforts. Pre-emptive efforts are carried out through socialization activities whose main purpose is to instill moral values in society to obey the law. Preventive efforts are carried out through operations or patrols to prevent traffic violations. While repressive efforts carried out through actions in the form of reprimands or tickets to violators. Inhibiting factors in implementing the role of the police in tackling traffic violations in an effort to build an image as a community protector are the lack of professionalism of the traffic police, the legal awareness of the community is still low, and there is a culture of lawlessness from the community.Keywords: The Role Of The Police; Criminal Acts; Traffic Violations.



2020 ◽  
Vol 53 (2) ◽  
pp. 174-193 ◽  
Author(s):  
Charlotte Hunn ◽  
Caroline Spiranovic ◽  
Jeremy Prichard ◽  
Karen Gelb

There are claims that the societal appetite for ‘child exploitation material’ is increasing. Yet, Australia’s policy response does not include initiatives to dissuade potential offenders from deliberately viewing child exploitation material for the first time (onset). To critically examine this issue, this paper draws on Situational Crime Prevention theory. It argues that (a) many first-time child exploitation material viewers fit the Situational Crime Prevention construct of the Opportunistic Offender and (b) suggests that current policy overlooks the kinds of non-instrumental factors that increase the risk of onset for this group, including doubts about the criminality and harmfulness of viewing child exploitation material. The paper then empirically examines social attitudes to child exploitation material viewing by presenting the findings of a survey of 504 Australian internet users. Results indicate that a sizeable minority of the participants were: unaware that it is a crime to view certain types of child exploitation material in Australia; and held doubts about the harmfulness of viewing child exploitation material. These findings are used to reflect on how the presence of these non-instrumental factors among ordinary internet users may affect the offending readiness of the Opportunistic Offender. Policy implications are then briefly discussed.



Author(s):  
Nicholas J. Blasco ◽  
Nicholas A. Fett

The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack the sidechain while mainchain assets can be withdrawn, along with the disconnect between the integrity of the sidechain and the value of the stolen assets are among the top disadvantages. The current study used a vulnerability analysis and theoretical mathematics based on situational crime prevention theory to highlight the attack vectors and prevention methods for these systems. Much of the analysis can be applied to any distributed system (e.g. blockchain network), particularly any supposedly trustless off-chain component. The equations developed in the current study will hold for any two chains that are bridged and pass value back and forth and provides evidence to suggest a public sidechain is likely not a viable option for scalability due to security concerns. Criminal strategies on blockchain networks in the digital realm are similar to criminal strategies in the physical realm; therefore, the application of criminology can lead to more efficient development and ultimately more effective security protocols.



2019 ◽  
Vol 10 (2) ◽  
pp. 199-226
Author(s):  
Suh-Hyun Moon ◽  
Cheol-Jae Yoon


Sign in / Sign up

Export Citation Format

Share Document