Moisés Naím: Černá kniha globalizace
Review of: Moisés Naím: Černá kniha globalizace. Praha: Vyšehrad, 2008, 303 s., ISBN 978-80-7021-866-2.
More...We kindly inform you that, as long as the subject affiliation of our 300.000+ articles is in progress, you might get unsufficient or no results on your third level or second level search. In this case, please broaden your search criteria.
Review of: Moisés Naím: Černá kniha globalizace. Praha: Vyšehrad, 2008, 303 s., ISBN 978-80-7021-866-2.
More...
The research on collective victimhood has been emphasised in the last few decades, mainly in social psychology, and especially in narrative research, but both theoretical and empirical results are applicable to almost the whole range of social sciences. This paper explores the relationship between securitisation theory and victimisation, primarily from the perspective of the so-called threatened collective identity. In addition to firstly detailing the concept of securitisation and the victimisation approach, it focuses on how the social characteristics of Central and Eastern Europe and within Hungary render society itself both suitable and vulnerable to the securitisation practices of power actors.
More...
As of the onset of 2023, ChatGPT has emerged as the predominant Artificial Intelligence (AI) tool, finding extensive application across various sectors and rapidly becoming an integral part of everyday work and domestic activities. However, the widespread adoption of ChatGPT has been accompanied by instances of misuse, wherein individuals have utilized the tool for unauthorized data access or engaged in activities deemed disruptive or malicious in nature. Consequently, a discernible trend has emerged wherein cyberattacks are increasingly being propelled by the capabilities of AI. This escalation in AI-driven cyber threats is evidenced by the misuse of generative AI tools, which are now being harnessed by attackers for activities such as crafting deceptive phishing emails, deploying malware designed for keystroke monitoring, and developing rudimentary yet effective ransomware code. This shift underscores the growing sophistication of cyber threats facilitated by the misuse of advanced AI technologies, necessitating a comprehensive understanding of the associated risks and the implementation of robust cybersecurity measures to mitigate potential harms.
More...
This article summarizes and organizes recent research findings in information and communication technology security developments integrated with smart grids. A vital component of a smart grid is a smart meter. It is relevant because it can collect, process, and transport customer’s data over the Internet. Whereas developments in smart grid and smart meter technologies have given new productivity gains, they have also presented new security concerns. Security is essential in defending both the smart grid and smart meter from cyber-attack. Guaranteeing safety is one of the most challenging aspects of designing and deploying a smart metering infrastructure. This study presents a thorough investigation of the integrity of smart metering technologies from multiple different viewpoints. It focuses on threats, countermeasures, and estimations. This article makes four contributions: First, all potential vulnerabilities in smart metering components are described and examined. Second, it assesses the impact of attacks that use these weaknesses to boost the performance of each part and the whole smart meter structure. Thirdly, potential countermeasures to defend smart meters are discussed. lastly, it discusses the unresolved issues surrounding smart meter security and future research areas. This evaluation is distinctive due to its exhaustive treatment of security weaknesses and attacks on smart meter components. In conclusion, the future vision is described.
More...
Cyber security has become an important concern for governments, businesses and individuals. This paper aims to provide a comprehensive overview of the current cybersecurity landscape and best practices for addressing the most critical challenges facing organizations and individuals today. The current trends, emerging threats and best solutions will be examined, including incident response planning and secure software development practices.
More...
Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.
More...
The utilization of cloud computing has been growing exponentially, becoming the preferred platform for businesses of all sizes, from start-ups to large corporations. However, this shift towards cloud computing brought about the responsibility to ensure the security of cloud applications and data from malicious attacks. The joint responsibility model of cloud security requires both service providers and businesses to maintain security. Identity and access management are shared responsibility models, requiring protocols and ethical hacking to ensure data protection. Advanced security measures like penetration testing are essential to establish a secure virtual environment. The primary aim of this research paper is to demonstrate how important penetration testing is for an organization even with security features that cloud providers implemented.
More...
Rayuela Project was a Horizon Project 2020 that started on 01 October 2020 and finished on 30 September 2023. The aim of the project was to bring together law enforcement agencies, sociologists, psychologists, anthropologists, legal experts, ethicists and philosophers, computer scientists and engineers, in the common endeavour to develop a better knowledge of the factors affecting the online behaviour of young people and how to keep them safe online.
More...
The Octopus Conference is part of the Octopus Project, funded by voluntary contributions from Canada, Hungary, Iceland, Italy, Japan, Netherlands, the UK and the USA.
More...
Among the most important changes in the criminal legislation made by Law no. 228/2020 for the amendment and completion of some normative acts in the criminal field to transpose some directives of the European Union published on 02.11.2020 in the Official Monitor of Romania are those that provide modification of the institution of confiscation of products, instruments and assets related to the crime, known as extended confiscation. Thus, the unjustified wealth of a person sentenced to a minimum of 4 years in prison can be confiscated, and the prosecutor, if he has suspicions about its illegal nature, will have the obligation to place a protective seizure on it. The changes brought to the criminal legislation had in mind the transposition into the domestic legislation of the provisions of Directive no. 2014/42/EU aimed at freezing and confiscating the instruments and products of crimes committed in the European Union.
More...
Intimate partner violence (IPV) presents a complex challenge for judges, who must weigh victim protection against the gravity of the offense when imposing sanctions. The presented study examines judicial decisions in IPV cases (N = 106), analyzing „the link“ between legal and extralegal factors and sentencing outcomes. The hierarchal logistic regression indicated that perpetrators with prior convictions are significantly more likely to be incarcerated (OR = 6.68), with the presence of additional offenses also heightening this risk (OR = 2.98). Unemployment, an extralegal factor, was strongly linked to harsher sentences. Content analysis of justifications highlighted the 'family cost' argument's frequent use, often sparing presumed breadwinning offenders from prison. While IPV specifics are somewhat factored into decisions, the study highlights a need for enhanced judicial understanding of IPV dynamics for informed punishment decisions.
More...
For almost 15 years, some organizations in Czechia have been working with perpetrators of domestic violence through specialized programs and interventions. Yet, this nascent preventive strategy toward domestic violence remains inadequately supported by the nation´s institutional framework. This context presents a complex array of challenges and opportunities for advancement — the primary focus of this article. Through an expert survey, we present insights from both actors representing organizations endorsing such programs and professionals assisting domestic violence survivors. Complementing the survey, we also derive findings from focus group discussions involving stakeholders active in the execution of procedures aimed at domestic violence perpetrators (police officers, prosecutors, judges, probation officers, misdemeanour department officials, and attorneys, including actors representing the aforementioned organizations from the expert survey). Our research reveals two critical impediments to the broader adoption of PDN programs: a palpable accessibility deficit and an absence of systemic integration.
More...
This essay discusses the role of the non-profit sector in the Czech criminal justice system and the criminological research. It focuses on three events that took place in Prague in October and November 2023, which highlighted the importance of artistic programs, gender-specific needs, and lived experience of imprisonment. The author argues that the non-profit sector can produce valuable knowledge and critique from the perspective of those who are affected by crime and punishment, and that criminologists should collaborate more with this sector in order to improve the criminal policy and regulation. The essay also reflects on the challenges and opportunities of such collaboration, and calls for a more equal partnership between the non-profit sector, the academic sector, and the state institutions.
More...
This article presents a transcript of an interview with Jiří Buriánek, a prominent Czech sociologist and criminologist, who shares his insights on his academic career, his involvement in various research projects, and his views on the development of Czech criminology. The interview covers topics such as the impact of social transformation on crime and public opinion, the study of corruption, cybercrime, youth delinquency, fear of crime, and prison programs. The interview also reflects on the role of the Department of Sociology at the Faculty of Arts, Charles University, in fostering criminological research and education, as well as the collaboration with the Czech Prison Service and other institutions. The interview reveals Buriánek's passion for empirical research, his methodological rigor, and his mentorship of young talents.
More...
This article presents a conversation with Tereza Østbø Kuldová, an anthropologist and criminologist who has conducted research on various topics such as luxury fashion, outlaw motorcycle clubs, and global corporations. The interview covers her personal and academic journey, her methodological approach, and her main findings and insights from her fieldwork in India, Europe, and the US. The article also discusses the challenges and opportunities of doing interdisciplinary and engaged research in the fields of anthropology and criminology, as well as the role of social critique and public communication in the social sciences.
More...
Review of: Buriánek, Jiří, ed. a Podaná, Zuzana, ed. Násilí tváří v tvář: zkoumání kalamitních podob partnerských vztahů. Vydání první. Praha: Univerzita Karlova, nakladatelství Karolinum, 2023. 214 stran. Studie; 146. svazek. ISBN 978-80-246-5260-3.
More...
Here is an abstract of the web page: The web page is a report from a conference on working with perpetrators of domestic violence in the Czech Republic, organized by the Institute of Criminology and Social Prevention. The conference presented the results of a project funded by the Norwegian Funds 2014-2021, which aimed to improve the treatment of perpetrators and the support of victims of domestic and gender-based violence. The report summarizes the main findings and recommendations from the project, as well as the contributions of other experts in the field of domestic violence research and practice. The report highlights the need for early intervention, systematic integration, interdisciplinary cooperation, and education of all actors involved in addressing the problem of domestic violence.
More...
Over the last two decades, combating domestic violence has been one of our country's main goals. Serbia is one of the 12 countries that have ratified the Council of Europe Convention on Prevention and Combating Violence against Women and Domestic Violence (the Istanbul Convention) before its entry into force on August 1, 2014, and as of June 1, 2017 the Law on the Prevention of Domestic Violence (LPDV) has been used in Serbia, which was adopted with the aim of regulating in a general and uniform manner the organization and conduct of state authorities and institutions, thereby enabling the effective prevention of domestic violence and the prompt, timely and effective protection and support for victims of domestic violence. Prescribing emergency measures has radically changed the way the victims of domestic violence are protected. In this paper, we will explore and try to answer several questions: what measures are available to state institutions to prevent violence and protect victims; whether the competent authorities and institutions apply these measures and to what extent; whether it was necessary to introduce urgent measures into our legal system and, finally, whether the activities to combat domestic violence so far produce results, that is, whether this negative social phenomenon is sufficiently suppressed.
More...
Life imprisonment without the right to apply for conditional early release (parole) is not a common institution in many legal systems. The view that social rehabilitation measures carried out during incarceration are devoid of scientific grounds and should be questioned almost immediately induced a discussion on the need to tighten criminal policy. The arguments raised during its course were overly simplistic and widely used in the political debate of the time. There is no doubt that the motivations used to justify the repressive, retaliatory purpose imprisonment as a form of punishment generally gain greater public approval than those underline the fact the primary goal of prison sentences should be to create such conditions of the penalty should be to create conditions enabling the correction of the convict while serving the sentence.
More...
The article presents issues related to disciplinary proceedings against prisoners in the perspective of meta-standards of procedural justice. The reference matrix of the con- ducted analysis was the meta-standards of the rule of law, humanitarianism and fairness of the proceedings. The research was based on the dogmatic method.
More...