Results 21 to 30 of about 461,154 (292)

Crime Prevention through Environmental Design [PDF]

open access: yes, 2016
This chapter is concerned with the extent to which the individual design features of the built environment (such as a house, school, shopping mall or hospital), as well as the natural environment surrounding those buildings, impact upon crime risk ...
Armitage, Rachel
core   +1 more source

The Principle of Minimum Sentence of Imprisonment (A Comparative Reflection on Islamic Jurisprudence and French Law) [PDF]

open access: yesپژوهش تطبیقی حقوق اسلام و غرب, 2019
The approach based on the constitutionalization of criminal institutions is one of the most effective strategies for organizing the discourses aimed at safeguarding fundamental rights and freedoms of citizens against the state power.
farid mohseni, reza rahimian
doaj   +1 more source

Exploring the Mutual Influence Relationships of International Airport Resilience Factors from the Perspective of Aviation Safety: Using Fermatean Fuzzy DEMATEL Approach

open access: yesAxioms, 2023
International airports are responding to the threat of climate change and various man-made hazards by proposing impact protection measures. Airport managers and risk controllers should develop a comprehensive risk assessment model to measure the mutual ...
Hsiu-Chen Huang   +3 more
doaj   +1 more source

Principles of Penitentiary Crime Prevention: Conditioning Factors, Sources and Their Classification [PDF]

open access: yesПенитенциарная наука, 2023
Introduction: the article shows a special place of penitentiary crime in criminological research and law enforcement and substantiates the importance of understanding methodological foundations of its prevention.
PAVEL V. TEPLYASHIN
doaj   +1 more source

Beyond Manipulation: Administrative Sorting in Regression Discontinuity Designs

open access: yesJournal of Causal Inference, 2020
This paper elaborates on administrative sorting, a threat to internal validity that has been overlooked in the regression discontinuity (RD) literature.
Crespo Cristian
doaj   +1 more source

Support for Radical Left Ideologies Among Youth in Switzerland

open access: yesSwiss Journal of Sociology, 2021
This article aims to better understand the determinants which support the ideologies of the Radical Left among young people in Switzerland. The analyses presented in the article are based on a survey on the theme of political radicalism which has been ...
Jacot Cédric   +5 more
doaj   +1 more source

A Web Model of Domestic Violence and Abuse in Muslim Communities—A Multi Perspective IPA Approach

open access: yesSocial Sciences, 2022
This paper brings together two qualitative studies exploring how domestic violence and abuse (DVA) manifests within UK Muslim communities. Study one was conducted with UK-based Muslim female survivors of DVA (n = 10).
Rahmanara Chowdhury, Belinda Winder
doaj   +1 more source

Overcoming the insider: reducing employee crime through Situational Crime Prevention [PDF]

open access: yes, 2009
Information security has become increasingly important for organizations, given their dependence on ICT. Not surprisingly, therefore, the external threats posed by hackers and viruses have received extensive coverage in the mass media.
Cornish D.   +4 more
core   +1 more source

Identity Diffusion and Extremist Attitudes in Adolescence

open access: yesFrontiers in Psychology, 2021
Various theoretical approaches assume that identity diffusion is an influencing factor of extremism. However, there are hardly any empirical tests on this relationship. Based on a nationwide survey of 8,317 young people in Switzerland, the study analyses
Anna Isenhardt   +6 more
doaj   +1 more source

Do sports stadiums generate crime on days without matches? A natural experiment on the delayed exploitation of criminal opportunities [PDF]

open access: yes, 2018
Crime pattern theory claims that busy places generate crime through immediate and delayed exploitation. In delayed exploitation, offenders notice criminal opportunities during opening hours but return to exploit them later.
Bernasco, Wim   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy