Organised Behaviour and Organised Identity

نویسنده

  • Vincenzo Ruggiero
چکیده

There is growing body of literature which offers reviews of the concepts of organised crime and political violence, while documenting the official efforts to address such concepts jointly and treat them as a single issue. It would be intriguing to investigate how members of organised criminal groups and violent political groups respectively react to such official efforts. In my own memory, when the ‘mafiosi’ happened to share a prison institution with members of the Red Brigades, they would steer away from those idealist Communists who got nothing out of killing. The former, when overcoming the disgust they felt in the presence of those who in their eyes adopted an incomprehensible political stance, and perhaps even a despicable sexual lifestyle, would simply suggest: “don’t make revolution, make money, you cretin!”. The latter, in their turn, would deal with the former as one deals with yet a different version of the economic and political power against which they fought. Echoes of this are found in an example coming from Greece itself, where the Courts have attempted to term ‘common’ rather than ‘political’ the offences attributed to the Revolutionary Organisation November 17. The fact that organised crime is guided by material motivations and terrorism by political ones may be seen as irrelevant by official agencies pursuing the objective of degrading the ‘enemy’ whoever that might be. Therefore, the ceremonies of degradation, including the choice of an ad hoc vocabulary, may well serve the task, as the mad, the drug user and the terrorist constitute an undistinguishable mob in the face of which quibbling differences may just obstruct the criminal justice process. The purpose of this paper is to try and clarify a number of issues that we encounter when dealing with organised crime and political violence respectively.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

Robustness of Self-Organised Systems to Changes in Behaviour: An Example from Real and Simulated Self-Organised Snail Aggregations

Group or population level self-organised systems comprise many individuals displaying group-level emergent properties. Current theory indicates that individual-level behaviours have an effect on the final group-level behaviour; that is, self-organised systems are sensitive to small changes in individual behaviour. Here we examine a self-organised behaviour in relation to environmentally-driven ...

متن کامل

Adolescent male hazardous drinking and participation in organised activities: involvement in team sports is associated with less hazardous drinking in young offenders.

BACKGROUND There is a lack of research investigating organised activity participation and associated alcohol use in vulnerable groups. AIMS The purpose of this research was to test and compare associations between participation in organised activities and indicators of hazardous drinking between young offenders and young non-offenders. METHODS Two groups of 13-18 year-old males were recruit...

متن کامل

Trust among Cybercriminals? Carding Forums, Uncertainty and Implications for Policing

At the beginning of the 21 st Century, before the power of online social networking became apparent, several studies speculated about the likely structure of organised cybercrime (Mann and Sutton 1998; Brenner 2002). In the light of new data on cybercriminal organisations, this paper sets out to revisit their claims. In collaboration with the Serious Organised Crime Agency (SOCA), this paper ex...

متن کامل

Introducing Personal Operating Spaces for Ubiquitous Computing Environments

Pervasive computing environments will combine everyday physical spaces with network aware devices and services; hence providing computing behaviour that is much more entwined with the environments we inhabit. Within such environments, a nomadic user will own and make use of many services attached to, and organised around, physical space. This study introduces the concept of a personal operating...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010