Results 21 to 30 of about 1,107,800 (358)

Web Application based Image Geolocation Analysis to Detect Human Trafficking

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Migrant smuggling is a dangerous phenomenon threatening international peace and security. This global concern for many countries is mainly due to the high use of multimedia devices and social media.
Ibrahim Adam   +4 more
doaj   +1 more source

Just and sustainable? : examining the rhetoric and potential realities of UK food security [PDF]

open access: yes, 2011
The dominant discourse in 20th century UK food and agricultural policies of a liberal, free trade agenda was modified at the turn of the 21st to embrace ecological sustainability and "food security." The latter term has a long international history; the ...
Dowler, Elizabeth, MacMillan, Tom
core   +1 more source

Configuring Security and Justice

open access: yesSSRN Electronic Journal, 2005
Surveys of public opinion conducted at different times in Canada and in the UK show that many more respondents believe in the criminal courts than in the police for controlling crime. The implications of this perceived gap in the crime control efficiency of punishing and of policing are examined through an analysis of the notions of penal justice and ...
Shearing, Clifford, Brodeur, Jean-Paul
openaire   +1 more source

Population genetic data for 12 X-STR loci in the Central Saudi region using investigator Argus X-12 amplification kit

open access: yesAnnals of Human Biology, 2021
Background X-chromosome short tandem repeat (X-STR) markers are important in forensic identity investigations and kinship analysis. Subject and methods In the current study, the distribution of 12 X-STR loci located in four linkage groups was evaluated ...
Safia A. Messaoudi   +7 more
doaj   +1 more source

Identifying Key Activities, Artifacts and Roles in Agile Engineering of Secure Software with Hierarchical Clustering

open access: yesApplied Sciences, 2023
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ...
Anže Mihelič   +2 more
doaj   +1 more source

Factors contributing to women being used as drug mules: A phenomenological study of female offenders incarcerated at the Johannesburg and Kgoši Mampuru II Correctional Centres in South Africa

open access: yesCogent Social Sciences, 2022
Women and gender minorities are disadvantaged by systemic inequalities relating to the lack of access to finances/income, resources to land as well as social and educational resources. This article provides a nuanced understanding of factors contributing
Nokonwaba Z. Mnguni   +1 more
doaj   +1 more source

Brazil’s Experience with Recognition and Enforcement of Family Agreements in International Child Disputes

open access: yesLaws, 2023
Recently, there has been a greater focus on promoting amicable solutions in cross-border family disputes. Alternative dispute resolution methods such as mediation and conciliation have been used in Brazil to avoid lengthy legal proceedings and to resolve
Lalisa Froeder Dittrich
doaj   +1 more source

Security and Justice Overview

open access: yes, 2010
The central theme of the 2011 World Development Report (WDR) is that violent conflict remains a constant threat to human rights, peace and sustainable development. While the nature of violent conflict maybe changing1 its negative impact on poor people in terms of rights violations, public ...
Sage, Caroline, Harborne, Bernard
openaire   +2 more sources

The face recall and face recognition: Description accuracy does not indicate eyewitness identification accuracy [PDF]

open access: yesNBP: Nauka, bezbednost, policija
Eyewitness testimonies are frequently considered crucial in criminal investigations. The impact of the initial description provided by an eyewitness on subsequent identification accuracy remains an understudied area.
Fazlić Adnan, Deljkić Irma
doaj   +1 more source

Pakistan in 2009: Tackling the Taliban? [PDF]

open access: yes, 2010
Party-based political competition played an important part in shaping key events in Pakistan in 2009. This article examines the impact of party-based competition on the much-delayed restoration of Supreme Court Chief Justice Mohammad Iftikhar Chaudhry ...
Nelson, Matthew J.
core   +1 more source

Home - About - Disclaimer - Privacy