SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(SAMHÄLLSVETENSKAP) hsv:(Juridik) hsv:(Juridik och samhälle) ;lar1:(bth)"

Sökning: hsv:(SAMHÄLLSVETENSKAP) hsv:(Juridik) hsv:(Juridik och samhälle) > Blekinge Tekniska Högskola

  • Resultat 1-10 av 14
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Börrefors, Johanna, 1973- (författare)
  • Digitala spörsmål
  • 2018
  • Ingår i: Festskrift till Håkan Hydén. - Lund : Juristförlaget, Lund. - 9789154405756 ; , s. 97-106
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
2.
  • Enander, Viveka, et al. (författare)
  • The killing and thereafter : intimate partner homicides in a process perspective, part II
  • 2022
  • Ingår i: Journal of Gender-Based Violence. - : Bristol University Press. - 2398-6808 .- 2398-6816. ; 6:3, s. 501-517
  • Tidskriftsartikel (refereegranskat)abstract
    • This article puts intimate partner homicide (IPH) into a process perspective, and describes the latter two stages of the IPH process, that is, ‘changing the project’ and ‘the aftermath’. The focus of analysis is on the moment when the perpetrator chooses to kill the victim, and what s/he does and says in the wake of the killing. Fifty court files, from cases involving 40 male and 10 female perpetrators, underwent thematic analysis. Regarding the final trigger pertaining to changing the project, some situational factors that trigger male-perpetrated IPH seem to differ from the corresponding factors in female-perpetrated IPH. Feelings of rejection and jealousy seemed to be more common as triggers to kill for men than for women, while some cases of female-perpetrated IPH were linked to self-defence in response to IPV. Moreover, as noted previously, no female perpetrators displayed possessiveness. Regarding the aftermath, after the homicide the perpetrators generally contacted someone and admitted to having killed their partners. Only a few perpetrators denied culpability and even fewer, mainly male, perpetrators concealed their crimes and denied knowledge of them. However, even in cases where the perpetrator admitted to having killed their victims, their courtroom narratives were apparently constructed to minimise resposibility. © Centre for Gender and Violence Research.
  •  
3.
  • Borg, Anton, et al. (författare)
  • All Burglaries Are Not the Same : Predicting Near-Repeat Burglaries in Cities Using Modus Operandi
  • 2022
  • Ingår i: ISPRS International Journal of Geo-Information. - : MDPI. - 2220-9964. ; 11:3
  • Tidskriftsartikel (refereegranskat)abstract
    • The evidence that burglaries cluster spatio-temporally is strong. However, research is unclear on whether clustered burglaries (repeats/near-repeats) should be treated as qualitatively different crimes compared to spatio-temporally unrelated burglaries (non-repeats). This study, therefore, investigated if there were differences in modus operandi-signatures (MOs, the habits and methods employed by criminals) between near-repeat and non-repeat burglaries across 10 Swedish cities, as well as whether MO-signatures can aid in predicting if a burglary is classified as a nearrepeat or a non-repeat crime. Data consisted of 5744 residential burglaries, with 137 MO features characterizing each case. Descriptive data of repeats/non-repeats is provided together with Wilcoxon tests of MO-differences between crime pairs, while logistic regressions were used to train models to predict if a crime scene was classified as a near-repeat or a non-repeat crime. Near-repeat crimes were rather stylized, showing heterogeneity in MOs across cities, but showing homogeneity within cities at the same time, as there were significant differences between near-repeat and non-repeat burglaries, including subgroups of features, such as differences in mode of entering, target selection, types of goods stolen, as well the traces that were left at the crime scene. Furthermore, using logistic regression models, it was possible to predict near-repeat and non-repeat crimes with a mean F1-score of 0.8155 (0.0866) based on the MO. Potential policy implications are discussed in terms of how data-driven procedures can facilitate analysis of spatio-temporal phenomena based on the MO-signatures of offenders, as well as how law enforcement agencies can provide differentiated advice and response when there is suspicion that a crime is part of a series as opposed to an isolated event. © 2022 by the authors. Licensee MDPI, Basel, Switzerland.
  •  
4.
  • Börrefors, Johanna (författare)
  • En essä om estetisk efterrättelse
  • 2007
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • This thesis is about aesthetic observance. By these terms I intend to give an account of a social phenomenon considered an angle of approach on the understanding of norms. I narrow down the problems with the perspective from social psychology. The central claim by George Herbert Mead was that mind arises from human interaction. The individual subject by this means appears as an effect. I whish to emphasize the fact that the ?Me? (in my terminology, not Mead's ? the ?Me? as well as the ?I? being aspects of the Self) ? the agent not the subject ? precedes as well as is an integral part of the social interaction. With this the ?Me? precedes the distinction between subject and object which, in turn, become relevant only when the interaction already is a fact. The biological organism ? the body (in interaction) thus precedes mind. The ?Me? as body and organism is emphasized in the dissertation to elucidate the difference between the ?Me? and the ?I?. The ?I? as representation and reflection is something quite different from the executed actions. The distinction made by Sören Kierkegaard between passion (the genuine devotion) and reflection (calculated and intentional) ? where passion required the deepest sympathy and r eflection required distance ? functions as a parallel. The ?I? is the unyielding crusader truthful to aesthetic observance, the absolute antithesis of the fervent sympathy, in some sense empty. This need for identifying oneself as something can be seen as a way to ? with the form as a point of departure ? reach out for community; but also as a way to keep life ? the content ? at a distance. While the aesthetician being blind for metaphors, he doesn?t recognize or acknowledge the representation as representation; that the ?I? is the represented Self and not the Self. Aesthetic observance starts from the gap ? between the ?I? and the ?Me? ? in the sense that the difference between the object and the representation of it (the desirable) is ignored. To justify a certain formation of a fact is thus not equivalent to verify an actual fact. Jean-Paul Sartre is mentioned as an example. As a child he seems to completely have equated himself with the generalized other. Sartre was exclu sively his ?I?, the mirror representation of the others? opinion of him. Whether it was the social surrounds, situations or things that demanded aesthetic observance from him remains unclear ? clear seems on the other hand the fact that it was hard for him not to oblige as his own worth was subordinate. The case of the operating system GNU/Linux is used as an analogy to this: the operating system GNU/Linux versus the sign GNU/Linux. The symbol milieu ? with it's language game and acting ? functions as a point of intersection between individual and society, this ever-changing ?focus? with the individual counterpart in the relation between the ?I? ? like a generalized other ? and the ?Me? ? the existing character. A symbol milieu consists of common denominators wherein the same social reality prevails. Subjective opinions appear objective. To acquire or assimilate a symbol milieu ? an attitude ? is about the same thing as navigating by aid of an external ?compass?. The external compass tells us how we should be and behave, what we should look for and how we ought to judge what we see. Even the structural norm system gets its meaning by these means. Either others are in accordance, through things and gestures, with one's own symbol milieu or they are not. Man actually could be said to depend on the associations she gives rise to in the recipient.
  •  
5.
  • Börrefors, Johanna, 1973- (författare)
  • Vaddå informationssamhälle?
  • 2004
  • Ingår i: Om begrepp och förståelse. - Lund : Department of Sociology, Lund University. - 9172671718
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • I följande framställning görs en reflektion kring begreppet informationssamhälle och dess användning. Detta kommer att betraktas i parallellitet med de pretentioner som används i kategoriseringen av det västerländska samhället där människan, företaget och samhället uppmanas att anpassa sig inför framtiden, i detta fall det nya informationssamhället. En begreppsbestämning som avser att kategorisera ett samhälle och dess utveckling gör således anspråk på framtiden och resulterar i tolkningsföreträden över vad som kommer att bli viktigt, uppgifter som i sin tur tycks styra allt fler av samhällets likvida medel. Det är därför av yttersta vikt, speciellt i vetenskapliga sammanhang, att fundera kring de begrepp som frekvent gynnas. Genom att betrakta samhället som ett informationssamhälle skapas exempelvis krav på och därmed också behov av satsningar på informationsteknologi, säkerhet, datasystem, tekniker och matchande utbildning.
  •  
6.
  • Börrefors, Johanna, 1973- (författare)
  • Varför använder Jeppe Linux?
  • 2004. - 1
  • Ingår i: Normvetenskapliga reflektioner. - Lund : Sociology of Law, Lund University. - 9172671858 ; , s. 105-112
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Var tid har sin gällande norm. En anpassning till en sådan norm måste te sig som ett fritt val. Vissa ordningar måste därför fungera som grundval för individualitet. Vår tids norm tycks jämförbar med "fri vilja" och uttrycks på många olika sätt. Operativsystemet GNU/Linux är ett exempel och torde därför inte, av dess användare, upplevas som ett system arv rätta sig efter utan som ett alternativ till just detta.
  •  
7.
  • Carlsson, Linnea, et al. (författare)
  • Socio-demographic and psychosocial characteristics of male and female perpetrators in intimate partner homicide : A case-control study from Region Västra Götaland, Sweden
  • 2021
  • Ingår i: PLOS ONE. - : Public Library of Science. - 1932-6203. ; 16:8
  • Tidskriftsartikel (refereegranskat)abstract
    • Risk factor studies on male-perpetrated intimate partner homicide (IPH) are often compared with studies on intimate partner violence (IPV) or non-partner homicide perpetrators. This not only excludes female perpetrators, but also fails to take socio-demographic and psychosocial differences between perpetrators and the general population into consideration. The aim of this study was to examine male- and female-perpetrated IPH cases, and to compare socio-demographic factors in IPH perpetrators and in matched controls from the general population. Data were retrieved from preliminary inquiries, court records and national registers for 48 men and 10 women, who were perpetrators of IPH committed in 2000–2016 and residing in Region Västra Götaland, Sweden. The control group consisted of 480 men and 100 women matched for age, sex and residence parish. Logistic regression, yielding odds ratios (OR) with 95% confidence intervals (CI), was performed for male perpetrators and male controls to investigate associations for selected socio-demographic and psychosocial characteristics. This was not performed for females due to the small sample size. Female perpetrators were convicted of murder to a lesser extent than male perpetrators. No woman was sentenced to life imprisonment while five men were. Jealousy and separation were the most common motivational factors for male perpetration while the predominant factor for female perpetrators was subjection to IPV. Statistically significant differences were found between male perpetrators and male controls in unemployment rate (n = 47.9%/20.6%; OR 4.4; 95% CI 2.2–8.6), receiving benefits (n = 20.8%/4.8%; OR 5.2; 95% CI 2.3–11.7) and annual disposable income (n = 43.8%/23.3% low income; OR 5.2; 95% CI 1.9–14.2) one year prior to the crime. Female IPH perpetrators were less educated than female controls (≤ 9-year education 30%/12%) and were more often unemployed (70%/23%) one year before the crime. Male and female IPH perpetrators were socio-economically disadvantaged, compared with controls from the general population.
  •  
8.
  • Kosenkov, Oleksandr, et al. (författare)
  • On Developing an Artifact-Based Approach to Regulatory Requirements Engineering
  • 2024
  • Ingår i: Proceedings - 32nd IEEE International Requirements Engineering Conference Workshops, REW 2024. - : Institute of Electrical and Electronics Engineers (IEEE). - 9798350395518 ; , s. 262-271
  • Konferensbidrag (refereegranskat)abstract
    • Context: Regulatory acts are a challenging source when eliciting, interpreting, and analyzing requirements. Requirements engineers often need to involve legal experts who, however, may often not be available. This raises the need for approaches to regulatory Requirements Engineering (RE) covering and integrating both legal and engineering perspectives. Problem: Regulatory RE approaches need to capture and reflect both the elementary concepts and relationships from a legal perspective and their seamless transition to concepts used to specify software requirements. No existing approach considers explicating and managing legal domain knowledge and engineering-legal coordination. Method: We conducted focus group sessions with legal researchers to identify the core challenges to establishing a regulatory RE approach. Based on our findings, we developed a candidate solution and conducted a first conceptual validation to assess its feasibility. Results: We introduce the first version of our Artifact Model for Regulatory Requirements Engineering (AM4RRE) and its conceptual foundation. It provides a blueprint for applying legal (modelling) concepts and well-established RE concepts. Our initial results suggest that artifact-centric RE can be applied to managing legal domain knowledge and engineering-legal coordination. Conclusions: The focus groups that served as a basis for building our model and the results from the expert validation both strengthen our confidence that we already provide a valuable basis for systematically integrating legal concepts into RE. This overcomes contemporary challenges to regulatory RE and serves as a basis for exposure to critical discussions in the community before continuing with the development of tool-supported extensions and large-scale empirical evaluations in practice. © 2024 IEEE.
  •  
9.
  • Larsson, Stefan (författare)
  • Between Daring and Deliberating : 3G as a Sustainability Issue in Swedish Spatial Planning
  • 2008
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The thesis shows how different aspects of sustainable development have been handled or not handled in the third generation infrastructure development in Sweden. The difference between the design of the 3G development – emphazising competition, growth and regional access, based on a strong technological optimism - and the implementation, as the roll out struck the landscape, including the non-handled radiation issue and the legal changes in order to facilitate the roll out, is discussed and analyzed. The roll out formally started in late 2000 as the licence allocation process, the so called beauty contest, was finished. Four operators were to build partly competing systems within three years, each covering 8 860 000 persons, more than 99,98 percent of the populated areas. The Post and Telecommunications Agency can sanction operators not fulfilling licence conditions by a considerable fine. The coverage by the end of the period was between 66 and 74 percent of the promised 8 860 000, with only three remaining operators still participating. Not until 1 December 2006 did the first operator report the required coverage, followed by the two remaining operators by 1 June 2007. The municipal permit handling was blamed for the delay, a reason that “could not have been foreseen”, which helped the operators avoid sanctions from the PTA. The thesis shows that a slow municipal permit process can not explain the lack of coverage in some areas of Sweden. Environmental aspects were not handled at national level but assessed locally in the building permit handling, as well as the regional 12:6 consultations at the County Administrations. This is why the municipal permit process holds many of the keys regarding environmental management and planning. Therefore the permit processes regarding 3G masts has been charted as they developed in time and screened for main issues and conflicts. Public participation can be found in the local context tied to the legal concept of being a concerned party in the permit process, or the 12:6 consultation. In spite of this, the much debated radiation issue is lifted from the participative aspects and legally defined as not relevant. The theoretical basis of the analysis combines spatial planning and sociology of law, applying the sociological concept of norms as entities controlling action on the discussion of two different paradigms of governance derived from planning theory. The thesis project has been a part of a study within the MiSt programme, an interdisciplinary research programme on tools for environmental assessment in strategic decision making funded by the Swedish Environmental Protection Agency. Supervisors: professor Lars Emmelin, School of Planning, Blekinge Institute of Technology Karsten Åström, professor in sociology of law, Lund University
  •  
10.
  • Larsson, Stefan, et al. (författare)
  • Law, Norms, Piracy and Online Anonymity – Practices of de-identification in the global file sharing community
  • 2012
  • Ingår i: Journal of Research in Interactive Marketing: Special Issue on Digital Piracy. - : Emerald. - 2040-7130. ; 6:4, s. 260-280
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose The purpose of this study is to better understand online anonymity in the global file-sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of Virtual Private Networks (VPNs) or similar services with respect to age, gender, geographical location, as well as analysing the correlation with file-sharing frequencies. Design/methodology/approach This study, to a large extent, collected descriptive data through a web-based survey. This was carried out in collaboration with the BitTorrent tracker The Pirate Bay (TPB), which allowed us to link the survey from the main logo of their site. In 72 hours, we received over 75,000 responses, providing the opportunity to compare use of anonymity services with factors of age, geographical region, file-sharing frequency, etc. Findings Overall, 17.8 per cent of the respondents used a VPN or similar service (free or paid). A core of high-frequency uploaders is more inclined to use VPNs or similar services than the average file sharer. Online anonymity practices in the file-sharing community depend on how legal and social norms correlate (more enforcement means more anonymity). Research limitations/implications The web-based survey was in English and mainly attracted visitors on The Pirate Bay’s web site. This means that it is likely that those who do not have the language skills necessary were excluded from the survey. Practical implications This study adds to the knowledge of online anonymity practices in terms of traceability and identification, and therefore describes some of the conditions for legal enforcement in a digital environment. Social implications This study adds to the knowledge of how the Internet is changing in terms of a polarization between stronger means of legally enforced identification and a growing awareness of how to be more untraceable. Originality/value The scale of the survey, with over 75,000 respondents from most parts of the world, has likely not been seen before on this topic. The descriptive study of anonymity practices in the global file-sharing community is therefore likely unique.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 14

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy