SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(SAMHÄLLSVETENSKAP) hsv:(Juridik) ;lar1:(bth);conttype:(refereed)"

Sökning: hsv:(SAMHÄLLSVETENSKAP) hsv:(Juridik) > Blekinge Tekniska Högskola > Refereegranskat

  • Resultat 1-5 av 5
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Borg, Anton, et al. (författare)
  • All Burglaries Are Not the Same : Predicting Near-Repeat Burglaries in Cities Using Modus Operandi
  • 2022
  • Ingår i: ISPRS International Journal of Geo-Information. - : MDPI. - 2220-9964. ; 11:3
  • Tidskriftsartikel (refereegranskat)abstract
    • The evidence that burglaries cluster spatio-temporally is strong. However, research is unclear on whether clustered burglaries (repeats/near-repeats) should be treated as qualitatively different crimes compared to spatio-temporally unrelated burglaries (non-repeats). This study, therefore, investigated if there were differences in modus operandi-signatures (MOs, the habits and methods employed by criminals) between near-repeat and non-repeat burglaries across 10 Swedish cities, as well as whether MO-signatures can aid in predicting if a burglary is classified as a nearrepeat or a non-repeat crime. Data consisted of 5744 residential burglaries, with 137 MO features characterizing each case. Descriptive data of repeats/non-repeats is provided together with Wilcoxon tests of MO-differences between crime pairs, while logistic regressions were used to train models to predict if a crime scene was classified as a near-repeat or a non-repeat crime. Near-repeat crimes were rather stylized, showing heterogeneity in MOs across cities, but showing homogeneity within cities at the same time, as there were significant differences between near-repeat and non-repeat burglaries, including subgroups of features, such as differences in mode of entering, target selection, types of goods stolen, as well the traces that were left at the crime scene. Furthermore, using logistic regression models, it was possible to predict near-repeat and non-repeat crimes with a mean F1-score of 0.8155 (0.0866) based on the MO. Potential policy implications are discussed in terms of how data-driven procedures can facilitate analysis of spatio-temporal phenomena based on the MO-signatures of offenders, as well as how law enforcement agencies can provide differentiated advice and response when there is suspicion that a crime is part of a series as opposed to an isolated event. © 2022 by the authors. Licensee MDPI, Basel, Switzerland.
  •  
2.
  • Larsson, Stefan, et al. (författare)
  • Law, Norms, Piracy and Online Anonymity – Practices of de-identification in the global file sharing community
  • 2012
  • Ingår i: Journal of Research in Interactive Marketing: Special Issue on Digital Piracy. - : Emerald. - 2040-7130. ; 6:4, s. 260-280
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose The purpose of this study is to better understand online anonymity in the global file-sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of Virtual Private Networks (VPNs) or similar services with respect to age, gender, geographical location, as well as analysing the correlation with file-sharing frequencies. Design/methodology/approach This study, to a large extent, collected descriptive data through a web-based survey. This was carried out in collaboration with the BitTorrent tracker The Pirate Bay (TPB), which allowed us to link the survey from the main logo of their site. In 72 hours, we received over 75,000 responses, providing the opportunity to compare use of anonymity services with factors of age, geographical region, file-sharing frequency, etc. Findings Overall, 17.8 per cent of the respondents used a VPN or similar service (free or paid). A core of high-frequency uploaders is more inclined to use VPNs or similar services than the average file sharer. Online anonymity practices in the file-sharing community depend on how legal and social norms correlate (more enforcement means more anonymity). Research limitations/implications The web-based survey was in English and mainly attracted visitors on The Pirate Bay’s web site. This means that it is likely that those who do not have the language skills necessary were excluded from the survey. Practical implications This study adds to the knowledge of online anonymity practices in terms of traceability and identification, and therefore describes some of the conditions for legal enforcement in a digital environment. Social implications This study adds to the knowledge of how the Internet is changing in terms of a polarization between stronger means of legally enforced identification and a growing awareness of how to be more untraceable. Originality/value The scale of the survey, with over 75,000 respondents from most parts of the world, has likely not been seen before on this topic. The descriptive study of anonymity practices in the global file-sharing community is therefore likely unique.
  •  
3.
  • Larsson, Stefan, et al. (författare)
  • Objectively best or most acceptable? Expert and lay knowledge in Swedish wind power permit processes
  • 2016
  • Ingår i: Journal of Environmental Planning and Management. - : Informa UK Limited. - 1360-0559 .- 0964-0568. ; 59:8, s. 1360-1376
  • Tidskriftsartikel (refereegranskat)abstract
    • This article analyses legal aspects of the Swedish wind power development, theoretically based on how different types of knowledge are represented in legal contexts, mainly in the courts. A sample of appealed wind power permits is analysed, a handful of relevant informants are interviewed – including two judges in the Land and Environment Court and the appeal court – and the legal setting is analysed. Of key interest here is the interplay between expert and lay statements in the court cases, which here is related to the concepts of calculating and communicative rationalities that are developed in the planning literature. The results indicate that the juridification – which takes place as a permit issue is appealed in the judiciary system – supports the calculating rationality more than the communicative, and that the plaintiffs often attempt to adapt in how they shape their argumentation.
  •  
4.
  • Larsson, Stefan, et al. (författare)
  • On Legal Complexity: Between Law in Books and Planning in Practice
  • 2013
  • Ingår i: Social and Legal Norms: towards a socio-legal understanding of normativity. - Farnham, England : Ashgate Publishing. - 9781409453437 ; , s. 285-307
  • Bokkapitel (refereegranskat)abstract
    • This chapter addresses the difference between the intentions of the law and its application by using mobile telephony infrastructure development in Sweden as a case. Three possible pitfalls for policy management in general are concluded and analyzed. The first pitfall deals with legal complexity, which may be a result of piecemeal changes to the governing legal bodies over a longer time and is here argued to be of relevance for issues of public participation and access to justice. Another problematic pitfall concerns when law is internally contradictory without any clear hierarchy, which is exemplified below. The third possible pitfall, which often is a point of focus in sociology of law, concerns when extra-legal factors interfere in the legal decision-making without this being pronounced or acknowledged. This means that economy and politics can affect the application of law to the extent that legal security and predictability is jeopardized. These three possible pitfalls in policy represent issues of general character in the legal government of land use and spatial planning, and are here analysed from a socio-legal perspective.
  •  
5.
  • Privacy and Identity Management : Data for Better Living: AI and Privacy
  • 2019
  • Samlingsverk (redaktörskap) (refereegranskat)abstract
    • This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019.The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-5 av 5

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy