903 research outputs found

    Bite mark analysis in forensic routine case work

    Get PDF
    The individuality of the human dentition frequently allows the Forensic Odonto-Stomatologist (FOS) to reach a strong opinion of association in cases of identification and bite mark analy-sis. Such analysis can often be useful during the investigation of violent crimes, especially those involving sexual assault. Bites from animals are rarely the object of bite mark analysis. The teeth of animals leave patterned injuries that appear quite different from those created by human teeth. This is especially true with dogs, which are predominant culprits in bites to humans. Dogs bite humans at a rate eight times more frequently than humans bite each other. However, such bites may need to be analyzed in order to distinguish what species of animal may have been the attacker, or exclude one or more animals when there is more than one possible offender. Typical cases of routine bite mark analysis encountered by the FOS are presented. Two cases of dog bites appearing as possible accidents and two human bites report about this spectrum. In another case, a child abuse with several specific bite marks shows the potential to detect the perpetrator. The last case representing a bite mark in a fruit is obtained from criminal routine case work. It is hoped that these cases will demonstrate the significant role the analysis of bite marks might play alongside other criminalistic routines. The FOS is often involved in a late stage of the investigation. This is one reason for the problems associated with the bite mark analysis in the cases presented. Additionally, the quality of the documentation of patterned injuries is often incomplete

    The President and the Administration

    Full text link

    Who knows who we are? Questioning DNA analysis in disaster victim identification

    Get PDF
    The use of DNA analysis as a mode of identification of disaster victims has become increasingly predominant to other, traditional, methods of identification in recent years. Scientific advances of the technological processes, high-profile use in identification efforts across the globe (such as after 9/11 or in the Asian Tsunami of 2004), and its inclusion in popular media, have led to its popular adoption as one of the primary modes of identification in disaster scenarios, and to the expectation of its use in all cases by the lay public and media. It is increasingly argued to be integral to post-disaster management. However, depending on the circumstances, location, and type of disaster, this technology may not be appropriate, and its use may instead conflict with socio-political and cultural norms and structures of power. Using examples primarily from Cambodia and Iraq this article will explore what these conflicts may be, and in doing so, question the expanding assumption that DNA analysis is a universally appropriate intervention in disaster victim identification. It will argue instead that its use may be a result of a desire for the political and social capital that this highly prestigious technological intervention offers rather than a solely humanitarian intervention on behalf of survivors and the dead

    Tsunami 2004

    Get PDF
    The Tsunami after the sea quake in Southeast Asia at the 26th of December 2004 represents one of the largest disasters in the modern World. Approximately 228,000 people from the countries surrounding the Indian Ocean have died. A large number of visitors from different European countries staying for their Christmas holidays in Thailand and Sri Lanka became victims of the natural disaster. The large number of foreign victims in these countries required additional forensic investigations which were organized by internationally working DVI (Disaster Victim Identification) teams. Victim identification was a great challenge due to the environmental conditions rapidly leading to heavily decomposed bodies. Thus the forensic medical investigations were very important to identify the victims. The different steps of forensic medical, odonto-stomatological and molecular genetic investigations beginning at the end of 2004 with the identification of a small number of victims and ending with the closing of the TTVI IMC (Thai Tsunami Victim Identification Information Management Center) in Phuket one year later are described and critically discussed. Up to 31 international DVI Teams worked in the TTVI IMC during 2005

    Architectures of control in consumer product design

    Get PDF
    Copyright @ 2005 Social Services Research GroupThe idea of architectures of control is introduced through examples ranging from urban planning to digital rights management, and the intentions behind their use in consumer products are examined, with reference to case studies of printer cartridges and proposed 'optimum lifetime products.' The reactions of the technical community and consumers themselves are also explored, along with some wider implications for society

    The architecture of a probation office: a reflection of policy and an impact on practice

    Get PDF
    This article illustrates how the physicality of a probation office can be considered both integral to, and representative of, several important changes in the probation service’s recent history through analysis of research conducted in a probation office. I suggest that the relationship between the ‘protected’ zone of the office and the ‘unprotected’ zone of the waiting area and interview rooms is similar to Goffman’s ‘frontstage’ and ‘backstage’ and expand on his theory of social action by describing how the architecture of probation represents and potentially perpetuates the rise of risk, punishment and managerialism in probation. The article then moves onto the exterior and location of the office to look at how these represent probation’s move away from the communities it serves as well as inadvertently increasing the amount of punishment certain offenders receive. This has significant consequences if the policy of probation moves towards modes of practice which no longer prioritise standardisation and punishment over professional judgment and the importance of the offender-officer relationship and the article concludes by looking to some examples of more inclusive forms of office design and architecture

    Net neutrality discourses: comparing advocacy and regulatory arguments in the United States and the United Kingdom

    Get PDF
    Telecommunications policy issues rarely make news, much less mobilize thousands of people. Yet this has been occurring in the United States around efforts to introduce "Net neutrality" regulation. A similar grassroots mobilization has not developed in the United Kingdom or elsewhere in Europe. We develop a comparative analysis of U.S. and UK Net neutrality debates with an eye toward identifying the arguments for and against regulation, how those arguments differ between the countries, and what the implications of those differences are for the Internet. Drawing on mass media, advocacy, and regulatory discourses, we find that local regulatory precedents as well as cultural factors contribute to both agenda setting and framing of Net neutrality. The differences between national discourses provide a way to understand both the structural differences between regulatory cultures and the substantive differences between policy interpretations, both of which must be reconciled for the Internet to continue to thrive as a global medium

    Net neutrality discourses: comparing advocacy and regulatory arguments in the United States and the United Kingdom

    Get PDF
    Telecommunications policy issues rarely make news, much less mobilize thousands of people. Yet this has been occurring in the United States around efforts to introduce "Net neutrality" regulation. A similar grassroots mobilization has not developed in the United Kingdom or elsewhere in Europe. We develop a comparative analysis of U.S. and UK Net neutrality debates with an eye toward identifying the arguments for and against regulation, how those arguments differ between the countries, and what the implications of those differences are for the Internet. Drawing on mass media, advocacy, and regulatory discourses, we find that local regulatory precedents as well as cultural factors contribute to both agenda setting and framing of Net neutrality. The differences between national discourses provide a way to understand both the structural differences between regulatory cultures and the substantive differences between policy interpretations, both of which must be reconciled for the Internet to continue to thrive as a global medium

    Creating the collective: social media, the Occupy Movement and its constitution as a collective actor

    Get PDF
    This paper examines the process through which Occupy activists came to constitute themselves as a collective actor and the role of social media in this process. The theoretical framework combines Melucci's (1996) theory of collective identity with insights from the field of organizational communication and particularly from the ‘CCO’ strand – short for ‘Communication is Constitutive of Organizing’. This allows us to conceptualize collective identity as an open-ended and dynamic process that is constructed in conversations and codified in texts. Based on interviews with Occupy activists in New York, London and other cities, I then discuss the communication processes through which the movement was drawing the boundaries with its environment, creating codes and foundational documents, as well as speaking in a collective voice. The findings show that social media tended to blur the boundaries between the inside and the outside of the movement in a way that suited its values of inclusiveness and direct participation. Social media users could also follow remotely the meetings of the general assembly where the foundational documents were ratified, but their voices were not included in the process. The presence of the movement on social media also led to conflicts and negotiations around Occupy's collective voice as constructed on these platforms. Thus, viewing the movement as a phenomenon emerging in communication allows us an insight into the efforts of Occupy activists to create a collective that was both inclusive of the 99% and a distinctive actor with its own identity

    Distilling Privacy Requirements for Mobile Applications

    Get PDF
    As mobile computing applications have become commonplace, it is increasingly important for them to address end-users’ privacy requirements. Privacy requirements depend on a number of contextual socio-cultural factors to which mobility adds another level of contextual variation. However, traditional requirements elicitation methods do not sufficiently account for contextual factors and therefore cannot be used effectively to represent and analyse the privacy requirements of mobile end users. On the other hand, methods that do investigate contextual factors tend to produce data that does not lend itself to the process of requirements extraction. To address this problem we have developed a Privacy Requirements Distillation approach that employs a problem analysis framework to extract and refine privacy requirements for mobile applications from raw data gathered through empirical studies involving end users. Our approach introduces privacy facets that capture patterns of privacy concerns which are matched against the raw data. We demonstrate and evaluate our approach using qualitative data from an empirical study of a mobile social networking application
    • …
    corecore