170 research outputs found

    The United Nations Minimum Rules for the Treatment of Offenders: An Overview With Specific Reference to the Situation in Developing Countries

    Get PDF
    A version of the paper by Sam S. Souryal presented at The Academy of Criminal Justice Sciences in Boston, MA March 7-9, 1995.Anyone who reads the newspapers or watches the miracle of CNN on television cannot escape noting the atrocities committed against prisoners in so many parts of the world. Just recently, atrocities have been reported by the Serbs against Muslim prisoners in Bosnia-Herzogovina. by the Whites against black prisoners in South Africa, by fascist regimes against political prisoners in Latin America, and by the Israeli authorities against Arab prisoners. The world also recalls with horror the atrocities committed by the Iraqis against Kuwaiti prisoners whose sole crime was attempting to liberate their homeland during the Iraqi occupation of 1990-1991. The mistreatment of prisoners is neither new to the history of man. nor is it limited to developing countries. It is the egotistical constitution of man which favors conquest over tolerance, power over reason, and humiliation over kindness. The mistreatment of prisoners has existed in just about every country, in one form or another, at one time or another in its development. Socrates, Jesus. Maciavelli. Thomas More. Galileo. Ghandi, Martin Luther King Jr., and Nelson Mandela, to mention just a few, are "living proof of such acts of inmate oppression. Apostle Paul, perhaps because of his personal prison experience, wrote in the message to the Hebrews: "Remember those in prison as though you are imprisoned with them" (Hebrews 13: 3)

    Demythelogizing Personal Loyalty to Superiors

    Get PDF
    Authors draft of an article later published in Critical Criminology Volume 19 Issue 2.This article examines the practice of personal loyalty to superiors, in general, and in criminal justice agencies, in particular. While practitioners are taught that their primarily loyalty is to the United States Constitution, State laws, departmental rules and regulations, they are organizationally taught that personal loyalty to superiors is paramount if they wanted their career to continue and prosper. As a result many practitioners are rightfully confused (even exhibiting paranoia) over who or what to be primarily loyal to, and at what price or risk. This unwarranted fear has been behind numerous acts of malfeasance and misfeasance; it can lower the workers’ morale, confuses the practitioners, and destabilizes the agency’s equilibrium. This article examines three types of workplace loyalties, and suggests, as an attempt toward reform, the use of a more sensible duty-based paradigm. Such a paradigm can be based on four practical propositions: (1) seriously examining why personal loyalty to superiors is deemed essential, if at all, especially since it is never mentioned in the agency’s rules and regulations; (2) taking the fear out of the language of “loyalty-disloyalty” by perhaps replacing the term with more benign and rather measurable terms such as “performance and collaboration;” (3) strengthening dutiful supervision; and (4) maximizing professional accountability

    Stopped for a Traffic Ticket: A Getaway Scale Index

    Get PDF
    An early draft of an article by Sam S. Souryal published my Sentry in fall 1979.Have you ever wondered why you wind up each year with more traffic tickets than your friends whom you consider worse drivers than you are? The chances are they talk their way out of them, at least some. They know how to cultivate the officers tactfully, how to sell them a good story, and how to secure their collaboration. These are obviously delicate tasks which involve considerable risks. In order to be able to handle these tasks successfully you must have a talent for game planning and strategy. More importantly, before you attempt to play the game of evading traffic tickets you must be better informed about your chances. It is, therefore, important and necessary that you familiarize yourself with the Getaway Scale Index (GSI). I

    A White Paper on Teaching Excellence in Criminal Justice

    Get PDF
    A professional white paper of teaching Criminal Justice that is believed to not be published. Written around 2008 or later.This paper reiterates two classic academic propositions: First, intellect without a disciplined mind is worthless and a disciplined mind without intellect is dangerous. This proposition suggests that regardless of faculty efforts, students will not receive quality learning unless they fully understand the theory of "what is being taught, where did it come from, and what is it good for, " and Second, teaching that does not produce quality learning is futile since it can only reinforce ignorance. Therefore, to achieve teaching excellence, it is imperative to consider these two propositions and to rethink the profession of teaching in a new and judicious manner r~cognizing that it is not what the instructors say in the classroom that fosters quality learning, but rather what the students hear and interpret that can make the difference between mediocrity and excellence (Luntz, 2007, xiii)

    The Challenges of White Collar Crimes and Computer Crimes and The Imperative of Training the Police in Forensic Accountancy

    Get PDF
    Paper Presented at Sharjah Conference on Economic Crime on January 21-22, 2002.White Collar crime is a dangerous problem that becomes even more dangerous when aligned with computer crime. These two types of crime feed on each other and present a global challenge to society and the police. The combination of these two types of crime can severely undermine the economy especially in developing countries. It is imperative, therefore, that the police be better trained in the sciences of forensic accountancy. This paper presents definitions, classifications and profiles of how white collar crime and computer crime can be intertwined, who are involved, and the loopholes that allow financial assets to be moved undetected across the globe. The paper examines computer crimes as they practically progress at different stages. This examination addresses criminal techniques such as “trojan horses." “viruses." “salami," “logical bombs." and explain the risks that face society, in general, and public and private institutions, in particular, as a result of these criminal activities. This paper also addresses the relationships between cyber crime, money laundering, and explains the practice of commingling licit and illicit assets. It makes a strong case for training the police in forensic accountancy, an emerging discipline by which police experts can collect direct evidence as well as circumstantial evidence and apply such scientific concepts as “sampling." “forecasting." “ratio analysis." and "flow charts." This paper concludes by proposing an advanced protocol for police training. That protocol focuses on three distinct activities: (1) detection, (2) investigation, and “prevention.” It also introduces the reader to available facilities and programs where the police can be trained to combat economic crimes

    An Exposition of Police Badge Policy: Ten Reasons in Support of a Single-badge

    Get PDF
    An early version of an article published in Texas Police Journal in December of 1997Modern police departments allow for a variety of police badges, i.e., one for patrol officers, one for supervisors, one for detectives, etc. While the rationale behind this policy may have been embedded in tradition, its continuance may speak unfavorably to the department's managerial sophistication. In multiple-badge departments, badges vary from a basic stainless steel version which is small, crude, and of limited appeal, to a golden version which is larger and has ornaments attached to it. The reasoning behind this is certainly one that is motivated by a desire to signify rank or function, to stimulate motivation within the force, to make a better impression on the public, or a combination of all of these. Yet, despite the elegance of this reasoning, the policy may have a counter-effect on the overall performance of the department, and, if so, should be rethought

    Assessment of correlation between knee notch width index and the three-dimensional notch volume

    Get PDF
    This study was done to determine whether there is a correlation between the notch volume and the notch width index (NWI) as measured on the three most frequently used radiographic views: the Holmblad 45°, Holmblad 70°, and Rosenberg view. The notch volume of 20 cadaveric knees was measured using Computed Tomography (CT). The Holmblad 45°, Holmblad 70°, and Rosenberg notch view radiographs were digitally re-created from the CT scans for each specimen, and the NWI was measured by two observers. The Pearson correlation coefficient between the NWI and notch volume was calculated, as well as between the three views. An independent t test was performed to determine the difference in NWI and notch volume between male and female specimens. The reliability for each view was also determined. There was no correlation between the NWI as measured on the Holmblad 45°, Holmblad 70°, or Rosenberg view and the notch volume. All three radiographic views proved reliable, but showed only a moderate correlation with each other. Men had larger notch volumes than women, but there was no difference in NWI. A knee with a small intercondylar notch is often considered an increased risk for ACL rupture. The NWI is a frequently used two-dimensional method to determine notch size. However, in the present study, this index was not positively correlated with the overall volume of the notch. Based on the results of the current study, the authors would advice to use caution when using notch view radiographs in a clinical setting to predict risk of ACL rupture

    Building a Private LoRaWAN Platform

    Get PDF
    LoRaWAN technology has been here for several years as one of LPWAN technologies. It consists of various components such as end nodes, a gateway, a network server, and an application server at the minimum. The servers have been exclusive products of commercial companies, and not many experimental or academic ones are available. Recently one such software has been developed. However, few fully functional academic ones have been reported. In this study, we implement a fully functional private independent LoRaWAN platform for the academic research of LPWAN Internet of Things (IoT) and demonstrate that our platform can support not only end-to-end LoRaWAN communication but also graphical user interface on an embedded and limited computing power system
    corecore