نتایج جستجو برای: investigations law enforcement
تعداد نتایج: 287840 فیلتر نتایج به سال:
The public does not want all laws enforced. In the closed society of law enforcement institutions, police discretion, the conspiracy of silence, the lack of an administration with integrity, and susceptible law enforcement officers contribute to the development of corruption from occupational deviance. Corruption in law enforcement agencies may have similar roots in business, law, medicine, and...
On October 31, 2001, in New York City, a 61-year-old female hospital employee who had acquired inhalational anthrax died after a 6-day illness. To determine sources of exposure and identify additional persons at risk, the New York City Department of Health, Centers for Disease Control and Prevention, and law enforcement authorities conducted an extensive investigation, which included interviewi...
The investigation surrounding the Boston Marathon bombings was a missed opportunity for automated facial recognition to assist law enforcement in identifying suspects. We simulate the identification scenario presented by the investigation using two state-of-the-art commercial face recognition systems, and gauge the maturity of face recognition technology in matching low quality face images of u...
Criminals often falsify their identities intentionally in order to deter police investigations. In this paper we focus on uncovering patterns of criminal identity deception observed through a case study performed at a local law enforcement agency. We define criminal identity deception based on an understanding of the various theories of deception. We interview a police detective expert and disc...
In this paper, we report our work on developing and evaluating a prototype system aimed at addressing the information monitoring and sharing challenges in the law enforcement domain. Our system, called COPLINK Agent, is designed to provide automatic information filtering and monitoring functionalities. This system also supports knowledge sharing by proactively identifying officers who are worki...
Cloud computing is a relatively new concept that offers the potential to deliver scalable elastic services to many. The notion of pay-per use is attractive and in the current global recession hit economy it offers an economic solution to an organizations’ IT needs. Computer forensics is a relatively new discipline born out of the increasing use of computing and digital storage devices in crimin...
Child Advocacy Centers (CACs) were developed to improve on child abuse investigative services provided by child protective service (CPS) agencies. However, until very recently, there has been little research comparing CAC-based procedures and outcomes to those in CPS investigations not based in CACs. The current study tracked 76 child abuse cases that were reported to authorities and investigat...
The physical work capacity, body composition, and physiological characteristics of 12 law enforcement officers (9 males, 3 females) were measured. Subjects included a representative sample from the occupational categories of detective, staff, investigative and patrol officer. Mean maximal oxygen uptake of the men was 42.1 +/- 8.9 ml.kg-1min-1 with mean values of 41.5 +/- 8.7 ml.kg-1min-1 for th...
There are still a number of individuals and government bodies in Indonesia that have the capacity to abuse power they possess. In entities, it is possible for KPK investigators their positions power. Since make direct contact with crime or suspect, will accept bribes gifts. This study aims investigate types crimes may be committed by when handling corruption cases, criminal liability law enforc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید