SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "hsv:(SAMHÄLLSVETENSKAP) hsv:(Juridik) ;spr:eng;lar1:(bth)"

Search: hsv:(SAMHÄLLSVETENSKAP) hsv:(Juridik) > English > Blekinge Institute of Technology

  • Result 1-10 of 10
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Enander, Viveka, et al. (author)
  • The killing and thereafter : intimate partner homicides in a process perspective, part II
  • 2022
  • In: Journal of Gender-Based Violence. - : Bristol University Press. - 2398-6808 .- 2398-6816. ; 6:3, s. 501-517
  • Journal article (peer-reviewed)abstract
    • This article puts intimate partner homicide (IPH) into a process perspective, and describes the latter two stages of the IPH process, that is, ‘changing the project’ and ‘the aftermath’. The focus of analysis is on the moment when the perpetrator chooses to kill the victim, and what s/he does and says in the wake of the killing. Fifty court files, from cases involving 40 male and 10 female perpetrators, underwent thematic analysis. Regarding the final trigger pertaining to changing the project, some situational factors that trigger male-perpetrated IPH seem to differ from the corresponding factors in female-perpetrated IPH. Feelings of rejection and jealousy seemed to be more common as triggers to kill for men than for women, while some cases of female-perpetrated IPH were linked to self-defence in response to IPV. Moreover, as noted previously, no female perpetrators displayed possessiveness. Regarding the aftermath, after the homicide the perpetrators generally contacted someone and admitted to having killed their partners. Only a few perpetrators denied culpability and even fewer, mainly male, perpetrators concealed their crimes and denied knowledge of them. However, even in cases where the perpetrator admitted to having killed their victims, their courtroom narratives were apparently constructed to minimise resposibility. © Centre for Gender and Violence Research.
  •  
2.
  • Borg, Anton, et al. (author)
  • All Burglaries Are Not the Same : Predicting Near-Repeat Burglaries in Cities Using Modus Operandi
  • 2022
  • In: ISPRS International Journal of Geo-Information. - : MDPI. - 2220-9964. ; 11:3
  • Journal article (peer-reviewed)abstract
    • The evidence that burglaries cluster spatio-temporally is strong. However, research is unclear on whether clustered burglaries (repeats/near-repeats) should be treated as qualitatively different crimes compared to spatio-temporally unrelated burglaries (non-repeats). This study, therefore, investigated if there were differences in modus operandi-signatures (MOs, the habits and methods employed by criminals) between near-repeat and non-repeat burglaries across 10 Swedish cities, as well as whether MO-signatures can aid in predicting if a burglary is classified as a nearrepeat or a non-repeat crime. Data consisted of 5744 residential burglaries, with 137 MO features characterizing each case. Descriptive data of repeats/non-repeats is provided together with Wilcoxon tests of MO-differences between crime pairs, while logistic regressions were used to train models to predict if a crime scene was classified as a near-repeat or a non-repeat crime. Near-repeat crimes were rather stylized, showing heterogeneity in MOs across cities, but showing homogeneity within cities at the same time, as there were significant differences between near-repeat and non-repeat burglaries, including subgroups of features, such as differences in mode of entering, target selection, types of goods stolen, as well the traces that were left at the crime scene. Furthermore, using logistic regression models, it was possible to predict near-repeat and non-repeat crimes with a mean F1-score of 0.8155 (0.0866) based on the MO. Potential policy implications are discussed in terms of how data-driven procedures can facilitate analysis of spatio-temporal phenomena based on the MO-signatures of offenders, as well as how law enforcement agencies can provide differentiated advice and response when there is suspicion that a crime is part of a series as opposed to an isolated event. © 2022 by the authors. Licensee MDPI, Basel, Switzerland.
  •  
3.
  •  
4.
  • Carlsson, Linnea, et al. (author)
  • Socio-demographic and psychosocial characteristics of male and female perpetrators in intimate partner homicide : A case-control study from Region Västra Götaland, Sweden
  • 2021
  • In: PLOS ONE. - : Public Library of Science. - 1932-6203. ; 16:8
  • Journal article (peer-reviewed)abstract
    • Risk factor studies on male-perpetrated intimate partner homicide (IPH) are often compared with studies on intimate partner violence (IPV) or non-partner homicide perpetrators. This not only excludes female perpetrators, but also fails to take socio-demographic and psychosocial differences between perpetrators and the general population into consideration. The aim of this study was to examine male- and female-perpetrated IPH cases, and to compare socio-demographic factors in IPH perpetrators and in matched controls from the general population. Data were retrieved from preliminary inquiries, court records and national registers for 48 men and 10 women, who were perpetrators of IPH committed in 2000–2016 and residing in Region Västra Götaland, Sweden. The control group consisted of 480 men and 100 women matched for age, sex and residence parish. Logistic regression, yielding odds ratios (OR) with 95% confidence intervals (CI), was performed for male perpetrators and male controls to investigate associations for selected socio-demographic and psychosocial characteristics. This was not performed for females due to the small sample size. Female perpetrators were convicted of murder to a lesser extent than male perpetrators. No woman was sentenced to life imprisonment while five men were. Jealousy and separation were the most common motivational factors for male perpetration while the predominant factor for female perpetrators was subjection to IPV. Statistically significant differences were found between male perpetrators and male controls in unemployment rate (n = 47.9%/20.6%; OR 4.4; 95% CI 2.2–8.6), receiving benefits (n = 20.8%/4.8%; OR 5.2; 95% CI 2.3–11.7) and annual disposable income (n = 43.8%/23.3% low income; OR 5.2; 95% CI 1.9–14.2) one year prior to the crime. Female IPH perpetrators were less educated than female controls (≤ 9-year education 30%/12%) and were more often unemployed (70%/23%) one year before the crime. Male and female IPH perpetrators were socio-economically disadvantaged, compared with controls from the general population.
  •  
5.
  • Kosenkov, Oleksandr, et al. (author)
  • On Developing an Artifact-Based Approach to Regulatory Requirements Engineering
  • 2024
  • In: Proceedings - 32nd IEEE International Requirements Engineering Conference Workshops, REW 2024. - : Institute of Electrical and Electronics Engineers (IEEE). - 9798350395518 ; , s. 262-271
  • Conference paper (peer-reviewed)abstract
    • Context: Regulatory acts are a challenging source when eliciting, interpreting, and analyzing requirements. Requirements engineers often need to involve legal experts who, however, may often not be available. This raises the need for approaches to regulatory Requirements Engineering (RE) covering and integrating both legal and engineering perspectives. Problem: Regulatory RE approaches need to capture and reflect both the elementary concepts and relationships from a legal perspective and their seamless transition to concepts used to specify software requirements. No existing approach considers explicating and managing legal domain knowledge and engineering-legal coordination. Method: We conducted focus group sessions with legal researchers to identify the core challenges to establishing a regulatory RE approach. Based on our findings, we developed a candidate solution and conducted a first conceptual validation to assess its feasibility. Results: We introduce the first version of our Artifact Model for Regulatory Requirements Engineering (AM4RRE) and its conceptual foundation. It provides a blueprint for applying legal (modelling) concepts and well-established RE concepts. Our initial results suggest that artifact-centric RE can be applied to managing legal domain knowledge and engineering-legal coordination. Conclusions: The focus groups that served as a basis for building our model and the results from the expert validation both strengthen our confidence that we already provide a valuable basis for systematically integrating legal concepts into RE. This overcomes contemporary challenges to regulatory RE and serves as a basis for exposure to critical discussions in the community before continuing with the development of tool-supported extensions and large-scale empirical evaluations in practice. © 2024 IEEE.
  •  
6.
  • Larsson, Stefan (author)
  • Between Daring and Deliberating : 3G as a Sustainability Issue in Swedish Spatial Planning
  • 2008
  • Licentiate thesis (other academic/artistic)abstract
    • The thesis shows how different aspects of sustainable development have been handled or not handled in the third generation infrastructure development in Sweden. The difference between the design of the 3G development – emphazising competition, growth and regional access, based on a strong technological optimism - and the implementation, as the roll out struck the landscape, including the non-handled radiation issue and the legal changes in order to facilitate the roll out, is discussed and analyzed. The roll out formally started in late 2000 as the licence allocation process, the so called beauty contest, was finished. Four operators were to build partly competing systems within three years, each covering 8 860 000 persons, more than 99,98 percent of the populated areas. The Post and Telecommunications Agency can sanction operators not fulfilling licence conditions by a considerable fine. The coverage by the end of the period was between 66 and 74 percent of the promised 8 860 000, with only three remaining operators still participating. Not until 1 December 2006 did the first operator report the required coverage, followed by the two remaining operators by 1 June 2007. The municipal permit handling was blamed for the delay, a reason that “could not have been foreseen”, which helped the operators avoid sanctions from the PTA. The thesis shows that a slow municipal permit process can not explain the lack of coverage in some areas of Sweden. Environmental aspects were not handled at national level but assessed locally in the building permit handling, as well as the regional 12:6 consultations at the County Administrations. This is why the municipal permit process holds many of the keys regarding environmental management and planning. Therefore the permit processes regarding 3G masts has been charted as they developed in time and screened for main issues and conflicts. Public participation can be found in the local context tied to the legal concept of being a concerned party in the permit process, or the 12:6 consultation. In spite of this, the much debated radiation issue is lifted from the participative aspects and legally defined as not relevant. The theoretical basis of the analysis combines spatial planning and sociology of law, applying the sociological concept of norms as entities controlling action on the discussion of two different paradigms of governance derived from planning theory. The thesis project has been a part of a study within the MiSt programme, an interdisciplinary research programme on tools for environmental assessment in strategic decision making funded by the Swedish Environmental Protection Agency. Supervisors: professor Lars Emmelin, School of Planning, Blekinge Institute of Technology Karsten Åström, professor in sociology of law, Lund University
  •  
7.
  • Larsson, Stefan, et al. (author)
  • Law, Norms, Piracy and Online Anonymity – Practices of de-identification in the global file sharing community
  • 2012
  • In: Journal of Research in Interactive Marketing: Special Issue on Digital Piracy. - : Emerald. - 2040-7130. ; 6:4, s. 260-280
  • Journal article (peer-reviewed)abstract
    • Purpose The purpose of this study is to better understand online anonymity in the global file-sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of Virtual Private Networks (VPNs) or similar services with respect to age, gender, geographical location, as well as analysing the correlation with file-sharing frequencies. Design/methodology/approach This study, to a large extent, collected descriptive data through a web-based survey. This was carried out in collaboration with the BitTorrent tracker The Pirate Bay (TPB), which allowed us to link the survey from the main logo of their site. In 72 hours, we received over 75,000 responses, providing the opportunity to compare use of anonymity services with factors of age, geographical region, file-sharing frequency, etc. Findings Overall, 17.8 per cent of the respondents used a VPN or similar service (free or paid). A core of high-frequency uploaders is more inclined to use VPNs or similar services than the average file sharer. Online anonymity practices in the file-sharing community depend on how legal and social norms correlate (more enforcement means more anonymity). Research limitations/implications The web-based survey was in English and mainly attracted visitors on The Pirate Bay’s web site. This means that it is likely that those who do not have the language skills necessary were excluded from the survey. Practical implications This study adds to the knowledge of online anonymity practices in terms of traceability and identification, and therefore describes some of the conditions for legal enforcement in a digital environment. Social implications This study adds to the knowledge of how the Internet is changing in terms of a polarization between stronger means of legally enforced identification and a growing awareness of how to be more untraceable. Originality/value The scale of the survey, with over 75,000 respondents from most parts of the world, has likely not been seen before on this topic. The descriptive study of anonymity practices in the global file-sharing community is therefore likely unique.
  •  
8.
  • Larsson, Stefan, et al. (author)
  • Objectively best or most acceptable? Expert and lay knowledge in Swedish wind power permit processes
  • 2016
  • In: Journal of Environmental Planning and Management. - : Informa UK Limited. - 1360-0559 .- 0964-0568. ; 59:8, s. 1360-1376
  • Journal article (peer-reviewed)abstract
    • This article analyses legal aspects of the Swedish wind power development, theoretically based on how different types of knowledge are represented in legal contexts, mainly in the courts. A sample of appealed wind power permits is analysed, a handful of relevant informants are interviewed – including two judges in the Land and Environment Court and the appeal court – and the legal setting is analysed. Of key interest here is the interplay between expert and lay statements in the court cases, which here is related to the concepts of calculating and communicative rationalities that are developed in the planning literature. The results indicate that the juridification – which takes place as a permit issue is appealed in the judiciary system – supports the calculating rationality more than the communicative, and that the plaintiffs often attempt to adapt in how they shape their argumentation.
  •  
9.
  • Larsson, Stefan, et al. (author)
  • On Legal Complexity: Between Law in Books and Planning in Practice
  • 2013
  • In: Social and Legal Norms: towards a socio-legal understanding of normativity. - Farnham, England : Ashgate Publishing. - 9781409453437 ; , s. 285-307
  • Book chapter (peer-reviewed)abstract
    • This chapter addresses the difference between the intentions of the law and its application by using mobile telephony infrastructure development in Sweden as a case. Three possible pitfalls for policy management in general are concluded and analyzed. The first pitfall deals with legal complexity, which may be a result of piecemeal changes to the governing legal bodies over a longer time and is here argued to be of relevance for issues of public participation and access to justice. Another problematic pitfall concerns when law is internally contradictory without any clear hierarchy, which is exemplified below. The third possible pitfall, which often is a point of focus in sociology of law, concerns when extra-legal factors interfere in the legal decision-making without this being pronounced or acknowledged. This means that economy and politics can affect the application of law to the extent that legal security and predictability is jeopardized. These three possible pitfalls in policy represent issues of general character in the legal government of land use and spatial planning, and are here analysed from a socio-legal perspective.
  •  
10.
  • Privacy and Identity Management : Data for Better Living: AI and Privacy
  • 2019
  • Editorial collection (peer-reviewed)abstract
    • This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019.The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 10

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view