|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910464455803321 |
|
|
Autore |
Tibamanya mwene Mushanga |
|
|
Titolo |
Crime and deviance : an introduction to criminology / / Mwene Mushanga |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Nairobi, Kenya : , : LawAfrica, , [2011] |
|
©2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[Revised edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (338 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Criminology |
Punishment |
Crime prevention |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Edition statement from foreword. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and indexes. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title page; Copyright page; Contents; DEDICATION; FOREWORD TO THE REVISED EDITION; PREFACE; CHAPTER I -THE NATURE OF CRIME; CRIMINOLOGY; CRIME; CRIME STATISTICS; CHAPTER II -TYPES OF CRIME; VIOLENT CRIME AGAINST THE PERSON; CRIMES AGAINST PROPERTY; VANDALISM; POLITICAL CRIMES; OCCUPATIONAL CRIMES; PROFESSIONAL CRIME; ORGANISED CRIME; CORPORATE CRIME; CRIME AS A SOCIAL FACT; CHAPTER III -THEORIES OF THE CAUSES OF CRIME; CAUSATIONS; I. THE THEOLOGICAL-BIOLOGICAL THEORIES; (a) Demonology; (b) Original Sin; (c) The Doctrine of the Free Will; (d) Heredity; (e) Mental Disorders and Crime |
(f) Intelligence, Feeblemindedness and Abnormal Behaviour(f) The Freudian Theories of Violence; II SOCIAL-CULTURAL THEORIES; (a) Culture, Conflict and Crime; (b) The Subculture of Violence; (c) Lower Class Culture; d) Anomie and Crime; (e) Poverty and Crime; Theories of the Causes of Crime; Genetic Theory of Crime; CHAPTER IV -CRIMES OF VIOLENCE; ASSAULT AND AGGRAVATED ASSAULT; CRIMINAL HOMICIDE; MOTIVE IN CRIMINAL HOMICIDE; MURDER AND MANSLAUGHTER; INFANTICIDE; MAYHEM AND MUTILATION; SUICIDE AND HOMICIDE FOLLOWED BY SUICIDE; TORTURE; METHODS OF TORTURE |
|
|
|
|
|
|
|
|
|
|
|
CHAPTER V -CRIME AND DEVIANCE RELATING TO SEX ADULTERY; BESTIALITY; BIGAMY; PROSTITUTION; CHARACTERISTICS OF PROSTITUTES; HOMOSEXUALITY; INCEST; PANDERING; RAPE; INDECENT ASSAULT; SWINGING; FORNICATION; DIVORCE; CHAPTER VI -OFFENCES AGAINST PROPERTY; THEFT; CHEATING; ARSON; CORRUPTION; FORGERY; ROBBERY WITH VIOLENCE; SHOPLIFTING; CHAPTER VII -ALCOHOL AND DRUG ADDICTION; FUNCTIONS OF ALCOHOL; EVILS OF ALCOHOL; DRUNKENNESS AND ALCOHOLISM; THE ALCOHOLIC; PREVENTION OF DRUNKENNESS AND ALCOHOLISM; DRUG ADDICTION; CHAPTER VIII -PUNISHMENT OF OFFENDERS; CAPITAL PUNISHMENT; THE CASE FOR DEATH PENALTY |
THE CASE AGAINST THE DEATH PENALTY Arizona; Colorado; Delaware; Iowa; Kansas; Missouri; Oregon; South Dakota; METHODS OF INFLICTING DEATH; ALTERNATIVE TO CAPITAL PUNISHMENT; DECLARATION OF STOCKHOLM AGAINST THE DEATH PENALTY; CORPORAL PUNISHMENT; FINES; IMPRISONMENT; AIMS OF IMPRISONMENT; CURRENT VIEWS OF IMPRISONMENT; PRISON REFORM; ALTERNATIVES TO IMPRISONMENT; CHAPTER IX -PREVENTION OF CRIME |
|
|
|
|
|
|
Sommario/riassunto |
|
The main objective of the first edition was to make available a simplified, readily available introductory reader not only for the students of Criminology, but also for the general reader who may be interested in the problems of crime, crime control and prevention. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910254991203321 |
|
|
Titolo |
Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers / / edited by David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
3-319-41763-0 |
9783319417622 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 recurso en línea (XII, 359 p. 78 ilus.) |
|
|
|
|
|
|
Collana |
|
FIP Advances in Information and Communication Technology, , 1868-4238 ; ; 476 |
IFIP AICT Tutorials ; ; 476 |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer security |
Management information systems |
Computer science |
Computers and civilization |
Seguridad informática |
Systems and Data Security |
Management of Computing and Information Systems |
Computers and Society |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Recurso en línea y en papel |
|
|
|
|
|
|
Nota di contenuto |
|
Modelling the Relationship between Privacy and Security Perceptions and the Acceptance of Surveillance Practices -- The US Privacy Strategy -- Smart Society: Collaboration between Humans and Machines, Promises and Perils -- An Experience with a De-identifying Task to Inform about Privacy Issues -- A4CloudWorkshop: Accountability in the Cloud -- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements -- Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies -- Smart Technologies: Workshop on Challenges and Trends for Privacy in a |
|
|
|
|
|
|
|
|
|
|
|
Hyper-connected World -- Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO/IEC 29100 into the Software Development Process -- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments -- Accountability in the EU Data Protection Reform - Moving from Theory to Practice -- Towards Authenticity and Privacy Preserving Accountable Workflows -- A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains -- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems -- Enhanced Assurance about Cloud Service Provision Promises -- ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance -- Identity Theft through e-Government Services: Government to Pay the Bill? -- "All Your Data Are Belong to Us ". European Perspectives on Privacy Issues in Free Online Machine Translation Services -- Identification of Online Gamblers in the EU: A Two-Edged Sword -- Can Courts Provide Effective Remedies against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom -- Automated Log Audits for Privacy Compliance Validation: A Literature Survey -- Privacy-Preserving Access Control in Publicly Readable Storage Systems -- Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics. |
|
|
|
|
|
|
|
| |