Pub Date : 2014-11-10DOI: 10.1080/09627251.2014.984545
Rebecca Daddow
We all know that justice is not a product that can be unilaterally dispensed by law enforcement or the Judiciary. It is simply not within the power of the Police, Judiciary, the Prison Service, Probation or any other professional to rehabilitate people and produce more just societies, when this is fundamentally about tackling issues of poverty and health inequality.Nurture Development believe these are issues of social justice, more so than criminal justice, and their complexity requires a community response that is radically different to the status quo.
{"title":"Nurture Development, ABCD and criminal justice","authors":"Rebecca Daddow","doi":"10.1080/09627251.2014.984545","DOIUrl":"https://doi.org/10.1080/09627251.2014.984545","url":null,"abstract":"We all know that justice is not a product that can be unilaterally dispensed by law enforcement or the Judiciary. It is simply not within the power of the Police, Judiciary, the Prison Service, Probation or any other professional to rehabilitate people and produce more just societies, when this is fundamentally about tackling issues of poverty and health inequality.Nurture Development believe these are issues of social justice, more so than criminal justice, and their complexity requires a community response that is radically different to the status quo.","PeriodicalId":432339,"journal":{"name":"Criminal Justice Matters","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-10DOI: 10.1080/09627251.2014.984538
D. Stuckler, Sarah Steele
{"title":"Migrants, the National Health Service, and the threat of exclusion: David Stuckler and Sarah Steele point out that dog-whistle immigration politics are incompatible with the founding principles of the NHS","authors":"D. Stuckler, Sarah Steele","doi":"10.1080/09627251.2014.984538","DOIUrl":"https://doi.org/10.1080/09627251.2014.984538","url":null,"abstract":"","PeriodicalId":432339,"journal":{"name":"Criminal Justice Matters","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133159809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-10DOI: 10.1080/09627251.2014.984535
V. Canning
{"title":"Women, asylum and the harms of detention","authors":"V. Canning","doi":"10.1080/09627251.2014.984535","DOIUrl":"https://doi.org/10.1080/09627251.2014.984535","url":null,"abstract":"","PeriodicalId":432339,"journal":{"name":"Criminal Justice Matters","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-10DOI: 10.1080/09627251.2014.984541
Marie-Helen Maras
The anonymity afforded by the Internet provides perpetrators with an environment within which they can operate with a low risk of detection. Nowhere is this more pronounced than in Darknet, which is considered the ‘underworld’ of cyberspace. Darknet consists of a collection of non-indexed domains; accordingly, these sites cannot be found using search engines like Google or Bing. To enter Darknet, Tor (the Onion Router), a privacy-enhancing application originally created by the USA Naval Research Laboratory, is used. Tor is ‘an anonymous Internet communication system that provides individuals (and organisations) with the ability to share information and communicate over public networks without compromising their privacy’ (Maras, 2014). When Tor is used, the ‘user's Internet traffic is routed through a worldwide network of volunteer computers to conceal the user's location and Internet usage’ (United States v Ross William Ulbricht, Superseding Indictment, 2013, 1).
互联网提供的匿名性为犯罪者提供了一个低风险的活动环境。这一点在被视为网络空间 "黑社会 "的暗网中最为明显。暗网由一系列无索引的域名组成,因此无法通过谷歌或必应等搜索引擎找到这些网站。要进入暗网,需要使用 Tor(洋葱路由器),这是一种最初由美国海军研究实验室创建的隐私增强应用程序。Tor是 "一种匿名互联网通信系统,为个人(和组织)提供在公共网络上共享信息和通信的能力,同时又不泄露个人隐私"(Maras,2014)。使用Tor时,"用户的互联网流量会通过一个由志愿者计算机组成的全球网络来隐藏用户的位置和互联网使用情况"(United States v Ross William Ulbricht, Superseding Indictment, 2013, 1)。
{"title":"Inside Darknet: the takedown of Silk Road","authors":"Marie-Helen Maras","doi":"10.1080/09627251.2014.984541","DOIUrl":"https://doi.org/10.1080/09627251.2014.984541","url":null,"abstract":"The anonymity afforded by the Internet provides perpetrators with an environment within which they can operate with a low risk of detection. Nowhere is this more pronounced than in Darknet, which is considered the ‘underworld’ of cyberspace. Darknet consists of a collection of non-indexed domains; accordingly, these sites cannot be found using search engines like Google or Bing. To enter Darknet, Tor (the Onion Router), a privacy-enhancing application originally created by the USA Naval Research Laboratory, is used. Tor is ‘an anonymous Internet communication system that provides individuals (and organisations) with the ability to share information and communicate over public networks without compromising their privacy’ (Maras, 2014). When Tor is used, the ‘user's Internet traffic is routed through a worldwide network of volunteer computers to conceal the user's location and Internet usage’ (United States v Ross William Ulbricht, Superseding Indictment, 2013, 1).","PeriodicalId":432339,"journal":{"name":"Criminal Justice Matters","volume":"473 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126493785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-10DOI: 10.1080/09627251.2014.984530
Ciarán MacAirt
{"title":"Corporate memory and the McGurk's Bar Massacre","authors":"Ciarán MacAirt","doi":"10.1080/09627251.2014.984530","DOIUrl":"https://doi.org/10.1080/09627251.2014.984530","url":null,"abstract":"","PeriodicalId":432339,"journal":{"name":"Criminal Justice Matters","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122122493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-10DOI: 10.1080/09627251.2014.984543
Kevin Walby, Randy K. Lippert
Corporate security is a practice and a concept that may not be familiar to criminal justice scholars and policymakers. Yet, it points to a form of regulation taking place in organisations all around the globe. Sometimes corporate security is referred to as in-house or industrial security. While corporate security might still conjure up the image of an ex-police officer hired to watch over employees and visitors from a dingy backroom, twenty-first century corporate security is increasingly central to organisations - high-tech, and professionalised. And its effects are farther reaching.
{"title":"Why criminal justice scholars should study twenty-first century corporate security","authors":"Kevin Walby, Randy K. Lippert","doi":"10.1080/09627251.2014.984543","DOIUrl":"https://doi.org/10.1080/09627251.2014.984543","url":null,"abstract":"Corporate security is a practice and a concept that may not be familiar to criminal justice scholars and policymakers. Yet, it points to a form of regulation taking place in organisations all around the globe. Sometimes corporate security is referred to as in-house or industrial security. While corporate security might still conjure up the image of an ex-police officer hired to watch over employees and visitors from a dingy backroom, twenty-first century corporate security is increasingly central to organisations - high-tech, and professionalised. And its effects are farther reaching.","PeriodicalId":432339,"journal":{"name":"Criminal Justice Matters","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129576212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-10DOI: 10.1080/09627251.2014.984546
D. Faulkner
Servant of the Crown tells the story of criminal justice and public service reform as I saw it during my time as a Home Office civil servant, with later reflections based on my work as a Senior Research Associate at the University of Oxford Centre for Criminology and with various voluntary organisations. It concludes with some suggestions relating to issues which government and the criminal justice services have to face today, and those are the basis of this article.
《王冠的仆人》讲述了我在担任内政部公务员期间所看到的刑事司法和公共服务改革的故事,后来的反思是基于我在牛津大学犯罪学中心(University of Oxford Centre for Criminology)担任高级研究助理以及在各种志愿组织的工作。最后,对当前政府和刑事司法部门面临的问题提出了一些建议,这些建议是本文的基础。
{"title":"Advice for an incoming government","authors":"D. Faulkner","doi":"10.1080/09627251.2014.984546","DOIUrl":"https://doi.org/10.1080/09627251.2014.984546","url":null,"abstract":"Servant of the Crown tells the story of criminal justice and public service reform as I saw it during my time as a Home Office civil servant, with later reflections based on my work as a Senior Research Associate at the University of Oxford Centre for Criminology and with various voluntary organisations. It concludes with some suggestions relating to issues which government and the criminal justice services have to face today, and those are the basis of this article.","PeriodicalId":432339,"journal":{"name":"Criminal Justice Matters","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133003415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-10DOI: 10.1080/09627251.2014.984533
V. Cooper
{"title":"Bricks and mortality: the violence of coalition housing policy","authors":"V. Cooper","doi":"10.1080/09627251.2014.984533","DOIUrl":"https://doi.org/10.1080/09627251.2014.984533","url":null,"abstract":"","PeriodicalId":432339,"journal":{"name":"Criminal Justice Matters","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}