首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 15 毫秒
1.
The focus of this paper is on the social and economic aspects of corruption in Nigeria. Given the increasingly borderless nature of corruption and economic crime, this paper argues that a successful control campaign requires a coordinated response that will fuse domestic and international strategies. While the paper is wholly committed to the strategy of depriving criminals of their ill-gotten wealth, it acknowledges that the success that law enforcement agencies have had around the world in ‘taking the profit out of crime’ has been hitherto unimpressive. Drawing on the United Nations Convention against Corruption (UNCAC), particularly Article 20, the paper argues that governments in developing economies should adopt the radical strategy of taxing unaccountable wealth and criminalising illicit enrichment.  相似文献   

2.
3.
4.
Notwithstanding the embrace of modern institutions of social control, traditional social control mechanisms still enjoy patronage in Nigeria. This paper examines the traditional structures of social control in Iraye-Oke, Lagos. In-depth interviews, key informant interviews and case studies were used to obtain data from participants. Findings established the functionality of traditional structures in checking crime and its preference over the use of modern social control structures. Traditional structures used include: traditional spiritualists who provide measures to reduce victimisation; the family courts where adjudication takes place involving elders and family chiefs; and the apex traditional court, presided over by the king, where cases like murder, land disputes, adultery and fornication are decided. Traditional extrajudicial measures involve the invocation of ancestral spirits at shrines.  相似文献   

5.
Since 2004, the Indian government has described the country's Maoist insurgency as a grave threat to domestic security. A study of the sustaining dynamics behind Maoist violence suggests that the rebels are growing operationally stronger due to profits derived from organized crime. Having built up a parasitic economy that operates within the boundaries of nominal state control, they are proceeding to undermine that same control. In effect, the Maoists have assumed characteristics of a Mafia group. With India's economic growth having surged in recent years, their ability to finance aggressive operations and consolidate their subversive infrastructure has increased correspondingly.  相似文献   

6.
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses.  相似文献   

7.
8.
Within a panel VAR framework and utilizing generalized impulse response and forecast error variance decomposition analysis, we explore the dynamic effects of terrorism and crime on public order and safety spending across European countries during the period 1994–2006. Our findings show that a ‘shock’ in terrorism and/or in crime, significantly increases the subsequent trajectory of public order and safety spending. As a by-product, we find that public spending is ineffective in reducing observed crime or terrorism.  相似文献   

9.
我国民营经济的发展,引起了党和政府的高度重视,党和国家领导人到民营企业参观、视察、调研活动日益增多.研究警卫对象视察民营企业的警卫工作,确保警卫对象视察、调研的安全,是警卫部门的一个新课题.  相似文献   

10.
根据<刑法>有关组织他人偷越国(边)境等相关犯罪的规定,针对司法实践中出现的问题和分歧,就组织他人偷越国(边)境罪,为组织他人偷越国(边)境骗取出境证件罪,提供伪造、变造出入境证件罪以及出售出入境证件罪等相关犯罪的司法认定及适用进行了分析探讨.  相似文献   

11.
The four military interventions into the conflict in Sierra Leone between 1995 and 2000 met with varying degrees of success. One of the more effective ones was launched by a private military company (PMC) early in the conflict. In the following paper a comparison is made between different aspects of the PMC intervention and the interventions by national military and by multilateral forces from regional and international organisations. The findings are that the interventions of the PMC and national forces were more successful due to their clear peace-enforcing mandate, unitary structure, elite counterinsurgency training, intelligence-gathering capabilities, relationship with the public, incentive to win as efficiently as possible and role as a force multiplier for local forces. The failure of multilateral peacekeeping forces in peace-enforcing roles suggests that small contingents of elite special forces, whether donated unilaterally by governments or hired in a competitive PMC market, are not only likely to be more effective in bringing violent conflict to a halt, but could at the same time be helpful in building the capacity, loyalty and professionalism of local militaries.  相似文献   

12.
并行应用程序中绝大部分的访存是对私有数据的访问,在cache一致性协议上不会产生冲突。传统一致性协议没有根据程序私有数据的访问模式进行针对性设计,存在着很大的优化空间。针对以上的问题,提出了一种支持私有状态的cache一致性协议PMESI,通过动态关闭和激活内存空间的cache一致性目录,优化私有内存空间的访问延迟和功耗。通过时钟精确模拟器的测试,PMESI协议优化了程序中54%的访存,并行程序的执行时间平均缩短了9%。  相似文献   

13.
This article addresses the concept of quality risk in outsourcing. Recent trends in outsourcing extend a contract manufacturer's (CM's) responsibility to several functional areas, such as research and development and design in addition to manufacturing. This trend enables an original equipment manufacturer (OEM) to focus on sales and pricing of its product. However, increasing CM responsibilities also suggest that the OEM's product quality is mainly determined by its CM. We identify two factors that cause quality risk in this outsourcing relationship. First, the CM and the OEM may not be able to contract on quality; second, the OEM may not know the cost of quality to the CM. We characterize the effects of these two quality risk factors on the firms' profits and on the resulting product quality. We determine how the OEM's pricing strategy affects quality risk. We show, for example, that the effect of noncontractible quality is higher than the effect of private quality cost information when the OEM sets the sales price after observing the product's quality. We also show that committing to a sales price mitigates the adverse effect of quality risk. To obtain these results, we develop and analyze a three‐stage decision model. This model is also used to understand the impact of recent information technologies on profits and product quality. For example, we provide a decision tree that an OEM can use in deciding whether to invest in an enterprise‐wide quality management system that enables accounting of quality‐related activities across the supply chain. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   

14.
消防责任事故罪包括客体、客观要件、主体、主观要件等若干构成要件,其客体为“国家的消防监督制度”,其客观要件是“经消防监督机构通知采取改正措施而拒绝执行”,其主体为特殊主体“直接责任人员”,其主观要件应限于过于轻信的过失。  相似文献   

15.
就新兴私人旅馆在安全疏散、消防给水等方面的设计和执行规范中遇到的一些问题进行初步探讨,希望能引起有关部门的注意和重视.  相似文献   

16.
"坦白从宽,抗拒从严"是我们党和国家一贯的刑事政策,是我国刑事司法活动的重要指导原则.但是这一政策在目前的司法实践中并未得到很好的贯彻,有人甚至对其持否定态度.从哲学的角度,用联系的观点、重点论的方法分析阐述该项政策的科学性,提出完善、执行该项政策的有效途径.  相似文献   

17.
随着军民融合的深度发展,越来越多的民营企业进入军品科研生产领域承制军品,成为国防科技工业建设的新生力量,承制军品民营企业所拥有的科技资源也就成为国防工业科技资源的重要补充。研究承制军品民营企业的科技资源配置情况,关注其配置规模、配置结构、配置效率等问题,实现承制军品民营企业科技资源配置的优化和效率的提升,不仅能够提升民营企业自身竞争力和参与军品生产的能力,更有利于提高国防工业科技资源使用效率,增强国防科技创新能力和武器装备生产能力。本文利用DEA模型测算了87家承制军品民营企业的Malmquist指数及其分解情况,并与传统军工企业和传统民营企业进行对比分析,对承制军品民营企业科技资源的配置效率进行了评价,并根据效率评价结果提出优化建议。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号