Filters








64 Hits in 11.9 sec

Legal aspects of open source intelligence – Results of the VIRTUOSO project

Colette Cuijpers
2013 Computer Law and Security Review  
I want to thank Gé raud Canet for leading the VIRTU-OSO project, and Gabriela Bodea for doing a wonderful job in leading the legal and ethical work package within the VIR-TUOSO project.  ...  Acknowledgements The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007(FP7/ -2013 under grant agreement n FP7-SEC-GA-2009-242352.  ...  Introduction 1 Open-source intelligence involves the collection, analysis, and use of data from open sources for intelligence purposes. Using open sources for intelligence is not a new phenomenon.  ... 
doi:10.1016/j.clsr.2013.09.002 fatcat:podbr4hm7bhxfkmhqbwkutp3iy

Semantic Web Regulatory Models: Why Ethics Matter

Pompeu Casanovas
2014 Philosophy & Technology  
This article outlines one of such multilayered governance models, designed for the CAPER platform, and offers a definition of Semantic Web Regulatory Models (SWRM).  ...  Conceptual models for complex regulatory systems shape the characteristic features of rules, norms and principles in different ways.  ...  crime through the sharing, exploitation and analysis of open information sources. 24 Its architecture is shown in Fig.2 . 25 The main targets are: (i) information acquisition, processing, exploitation  ... 
doi:10.1007/s13347-014-0170-y fatcat:yx4mr4kx2fejjewzlmk5eq6m2u

Big Data and Predictive Reasonable Suspicion

Andrew Guthrie Ferguson
2014 Social Science Research Network  
Field Office, FBI) ("Since September 11, 2001, the FBI has shifted from a traditional crime-fighting agency into an intelligence-led, threat-driven organization, guided by clear operational strategies.  ...  Bennett Capers, Crime, Surveillance, and Communities, 40 FORDHAM URB.  ... 
doi:10.2139/ssrn.2394683 fatcat:qkbfdteohjhltdv5zwuyznmryq

Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace

Erik Gartzke, Jon R. Lindsay
2015 Security Studies  
strategies of the past again appear inadequate.  ...  This argument mistakes the ease of deception on the Internet for a categorical ease of attack. As intelligence agencies have long known, deception is a double-edged sword.  ...  Students of cyber strategy would do well to bear in mind that the Line X caper teaches lessons about both supply-chain insecurity and the disruptive potential of counterintelligence.  ... 
doi:10.1080/09636412.2015.1038188 fatcat:lssjlnctpvatlgsajmo2m3rrbi

Criminal Affirmance: Going Beyond the Deterrence Paradigm to Examine the Social Meaning of Declining Prosecution of Elite Crime

Mary Kreiner Ramirez
2012 Social Science Research Network  
Affirmance is far more costly and dangerous with respect to the crimes of powerful elites that control large organizations than can be accounted for under traditional notions of deterrence.  ...  Further, this undermines the legitimacy of the rule of law and encourages even more lawlessness among the entire population, as the declination of prosecution advertises the profitability of crime.  ...  to government resources to fight corporate crime).  ... 
doi:10.2139/ssrn.2039785 fatcat:fvkoutwkurcw5c3glgds7mm4va

When Stop and Frisk Comes Home: Policing Public and Patrolled Housing

Alexis Karteron
2019 Social Science Research Network  
An often-heralded example of smart policing is hot spots policing, which involves directing police attention to locations where crime and disorder fester.  ...  Instead, the Fourth Amendment fuels the use of law enforcement as a tool of social control in public and patrolled housing.  ...  Criminal law became the primary source of police legitimacy, and reformers posited crime control and apprehension of criminals as the core police function."). 15.  ... 
doi:10.2139/ssrn.3417793 fatcat:ehy4qjpb5ne4fmxr22pwkmzonu

Regulating Mass Surveillance as Privacy Pollution: Learning from Environmental Impact Statements

A. Michael Froomkin
2014 Social Science Research Network  
projects.  ...  a domesticated form of regulation with the potential to ignite a regulatory dynamic by collecting information about the privacy costs of previously unregulated activities that should, in the end, lead  ...  ., Bennett Capers, Crime, Surveillance, and Communities, 40 FORDHAM URB.  ... 
doi:10.2139/ssrn.2400736 fatcat:5hpcg2ush5a45emfwkgtodnini

Mr Tati's Holiday and João's Safari - Seeing the World through Transplant Tourism

Nancy Scheper-Hughes
2011 Body & Society  
This article examines the logics and practices through which kidney buyers and kidney sellers, organs brokers, surgeons and their accessories convince themselves that they are engaged in an illegal but  ...  João Cavalcanti was among the first of 38 residents of the slums of Recife recruited by retired military Captain Ivan da Silva and his sidekick Captain Gadddy Tauber (of Israel) to travel to Durban, South  ...  Acknowledgements This article is drawn from sections of two chapters of A World Cut in Two: the Global Traffic in Organs (forthcoming, University of California Press).  ... 
doi:10.1177/1357034x11402858 fatcat:uj47t5cyhndlbkgj2l25jm3pfe

Perceptions of Fairness and Justice: The Shared Aims & Occasional Conflicts of Legitimacy and Moral Credibility

Josh Bowers, Paul H. Robinson
2011 Social Science Research Network  
-the goals of doing justice and fighting crime inevitably conflict.  ...  of regulatory crime, while moral credibility is more important to the enforcement of conventional crime.  ...  WAKE FOREST PERCEPTIONS OF FAIRNESS AND JUSTICE: THE SHARED AIMS AND OCCASIONAL CONFLICTS OF LEGITIMACY AND MORAL CREDIBILITY Josh Bowers and Paul H. Robinson LAW REVIEW  ... 
doi:10.2139/ssrn.1814006 fatcat:uoglysoyyjhthaudpc6zjuuwn4

Envisioning socialism: television and the Cold War in the German Democratic Republic

2014 ChoiceReviews  
The preponderance of available sources on the DFF date from the period after 1965, which is reflected in the publications of the project. 55 .  ...  The border was presented as a major source of crime, which most often originated in the Federal Republic and was "exported" to the GDR.  ...  , 191n56 Revolt of the Conscience (Gewissen in Aufruhr), 124, 135, 137, 140, 153, 154, 156 ; critical reception of, 135-36 RIAS.  ... 
doi:10.5860/choice.52-0100 fatcat:75jawi2wrfcjdabzwfc6gp46jq

The Failure of Democratic Nation Building [chapter]

2019 The Statesman's Yearbook Companion  
book Under the Shadow of Defeat is the first wide-ranging analysis of how memories of the Franco-Prussian War shaped French political culture and identities.  ...  Examining war remembrance as an emerging mass phenomenon in Europe, it sheds new light on the relationship between memories and the emergence of new concepts of the nation.  ...  This type of soft power projection through public diplomacy has not as yet been embraced by most countries in North Africa and the Middle East.  ... 
doi:10.1057/978-1-349-95839-9_1533 fatcat:napgfmamaverfbdzt63lqualba

The Popular Image of North Africa and the Middle East [chapter]

2019 The Statesman's Yearbook Companion  
book Under the Shadow of Defeat is the first wide-ranging analysis of how memories of the Franco-Prussian War shaped French political culture and identities.  ...  Examining war remembrance as an emerging mass phenomenon in Europe, it sheds new light on the relationship between memories and the emergence of new concepts of the nation.  ...  This type of soft power projection through public diplomacy has not as yet been embraced by most countries in North Africa and the Middle East.  ... 
doi:10.1057/978-1-349-95839-9_1537 fatcat:kgyfv2dzynhbdb5ctmnefez7ya

Freedom to Hack

Ido Kilovaty
2017 Social Science Research Network  
This Article argues that law and policy have a central role to play in making this digital ecosystem more securenot only through direct regulation of this industry, but primarily through allowing individual  ...  This Article rejects this outdated approach in the wake of ubiquitous cyber-attacks, imperfect software, and the emerging Internet of Things ecosystem.  ...  that allowed the organization of this botnet.  ... 
doi:10.2139/ssrn.3035518 fatcat:ehta5rnuzfdl5o376vt6y2gb6a

Cast Out: Vagrancy and Homelessness in Global and Historical Perspective

C. Dionne
2011 Enterprise & Society  
The editor seeks manuscripts of quality on any subject and can usually make a decision regarding publication within three months of receipt of the original work.  ...  Production methods generally permit a work to appear within one year of acceptance. The editor works closely with authors to produce a high-quality book.  ...  Another of Mayhew's stated objectives played to the fear of organized crime that seemed to be growing in the early s, for he promised to determine whether England was experiencing a crime wave, writing  ... 
doi:10.1093/es/khr047 fatcat:c73r7p3kc5h2ta53r2mvzjop7m

Enhancing International Law Enforcement Co-operation, including Extradition Measures. Proceedings of the workshop held at the Eleventh United Nations Congress on Crime Prevention and Criminal Justice. Bangkok, Thailand, 18-25 April 2005

(:Unkn) Unknown, Universitätsbibliothek Tübingen, Universitätsbibliothek Tübingen, Kauko Aromaa, Terhi Viljanen
2018
Lehmus of the Finnish Ministry of the Interior for his assistance in the preparations of the workshop and finally to Ms Aili Pääkkönen and Mr Sami Nevala of their efforts related to the finalization of  ...  We wish to express our special appreciation to the overall moderator of the workshop, Mr Klas Bergenstrand of Sweden and to the Chairman of Committee I, Dr Matti Joutsen of Finland for their eloquent guidance  ...  Projects and programmes are also carried out to fight organized crime and corruption (Sydrug -Marco -Nomak -Umbrella, etc.).  ... 
doi:10.15496/publikation-24093 fatcat:cmpbjsy43rbbvjwwbnik5xwsz4
« Previous Showing results 1 — 15 out of 64 results