This book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and when is death, affects how we understand the possibility of posthumous harm and redemption. Whilst it is impossible to hurt the dead, it is possible to harm the wishes, beliefs and memories of persons that once lived. In this way, this book highlights the vulnerability of th…
This volume provides a series of illuminating perspectives on the timings of death, through in-depth studies of Shakespearean tragedy, criminal execution, embalming practices, fears of premature burial, rumours of Adolf Hitler’s survival, and the legal concept of brain death. In doing so, it explores a number of questions, including: how do we know if someone is dead or not? What do people ex…
Kompleksnya isu cybersecurity hingga keberagaman multistakeholder yang terlibat dalam cybersecurity memberikan tantangan tersendiri dalam upaya menghadapi cybersecurity. Mulai dari belum adanya definisi yang ajeg, hingga ancaman terkait cybersecurity yang mempengaruhi pembuatan kebijakan, serta upaya yang diambil untuk menghadapi ancaman-ancaman tersebut. Dilengkapi dengan studi kasus, buku ini…
This open access book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research of those who have uncovered various forms of white-collar crime. It argues that the offenders who are convicted represent only ‘the tip of the iceberg’ of a much greater problem: because white-collar crime is forced to compete with other kinds of financial crime l…
This book showcases a multidisciplinary set of work on the impact of regulatory innovation on the scale and nature of tax evasion, tax avoidance, and money laundering. We consider the international tax environment an ecosystem undergoing a period of rapid change as shocks such as the financial crisis, new business forms, scandals and novel regulatory instruments impact upon it. This ecosystem e…
This book examines the survivors of political violence and terrorism, considering both how they have responded and how they have been responded to following critical incidents. As this work demonstrates, survivors of comparatively rare and spectacular violence hold a mirror up to society’s normative assumptions around trauma, recovery and resilience. Drawing on two years of observational fiel…
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging tren…
For nineteenth-century Britons, the rule of law stood at the heart of their constitutional culture, and guaranteed the right not to be imprisoned without trial. At the same time, in an expanding empire, the authorities made frequent resort to detention without trial to remove political leaders who stood in the way of imperial expansion. Such conduct raised difficult questions about Britain's co…
Criminology has until recently neglected the nature and levels of crime outside the urban realm. This is not a surprise as crime tends to concentrate in urban areas and the police directs resources where the problems are. Yet, there are many reasons why scholars, decision-makers and society as a whole should care about crime and safety in rural areas. This book highlights 20 reasons why crime a…
Whether reburied, concealed, stored, abandoned or publicly displayed, human remains raise a vast number of questions regarding social, legal and ethical uses by communities, public institutions and civil society organisations. This book presents a ground-breaking account of the treatment and commemoration of dead bodies resulting from incidents of genocide and mass violence. Through a range of …
This book explores how predictive policing transforms police work. Police departments around the world have started to use data-driven applications to produce crime forecasts and intervene into the future through targeted prevention measures. Based on three years of field research in Germany and Switzerland, this book provides a theoretically sophisticated and empirically detailed account of ho…
Coffeeshops are the most famous example of Dutch tolerance. But in fact, these cannabis distributors are highly regulated. Coffeeshops are permitted to break the law, but not the rules. On the premises, there cannot be minors, hard drugs or more than 500 grams. Nor can a coffeeshop advertise, cause nuisance or sell over five grams to a person in a day. These rules are enforced by surprise polic…
This book is about the ways in which the governance of illicit drug use shapes female users’ lives. It examines how women drug users’ subjectivities, and hence their experiences, are shaped and regulated by drug policies. The construction of female users’ subjectivities in policy discourse and the impact the characteristics ascribed to them has on these women’s experiences are expl…
This open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act – this act was the first attempt to create a legal regulation of cybersecurity and, in addition, has implemented the provisions of the NIS Directive) but may discuss a number of other issues. The book presents internat…
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. This chapter is available open access under a CC BY license. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved sec…
How does terrorism affect our picture of the history of terrorism then, if the victims are moved centre stage? If the focus is put on their suffering? The contributions to this edition of the European History Yearbook will examine such questions in a broad range of historical case studies and methods, including visual history.
How does terrorism affect our picture of the history of terrorism then, if the victims are moved centre stage? If the focus is put on their suffering? The contributions to this edition of the European History Yearbook will examine such questions in a broad range of historical case studies and methods, including visual history.
Crimea merupakan suatu daerah otonom yang mempunyai parlemen sendiri, namun secara fisik dan politik tetap masuk ke dalam wilayah kedaulatan Ukraina. Dalam hal ini, status Crimea masih merupakan bagian dari wilayah kedaulatan Ukraina. Padahal, mayoritas rakyat Crimea lebih memilih untuk bergabung dengan Rusia. Permasalahan timbul ketika terjadi krisis politik internal di Ukraina. Krisis ini dip…
This is the first volume to offer an in-depth look at (lethal) violence in the Balkans. The Balkans Homicide Study analyses 3,000 (attempted) homicide cases from Croatia, Hungary, Kosovo, Macedonia, Romania and Slovenia. Shedding light on a region long neglected in terms of empirical violence research, the study at hand asks: - What types of homicides occur in the Balkans? - Who are the perpe…
The growth and health of our digital economies and societies depend on the core protocols and infrastructure of the Internet. This technical and logical substructure of our digital existence is now in need of protection against unwarranted interference in order to sustain the growth and the integrity of the global Internet. The Internet's key protocols and infrastructure can be considered a glo…
This is the first volume to offer an in-depth look at (lethal) violence in the Balkans. The Balkans Homicide Study analyses 3,000 (attempted) homicide cases from Croatia, Hungary, Kosovo, Macedonia, Romania and Slovenia. Shedding light on a region long neglected in terms of empirical violence research, the study at hand asks: - What types of homicides occur in the Balkans? - Who are the perpe…
The growth and health of our digital economies and societies depend on the core protocols and infrastructure of the Internet. This technical and logical substructure of our digital existence is now in need of protection against unwarranted interference in order to sustain the growth and the integrity of the global Internet. The Internet's key protocols and infrastructure can be considered a glo…