126,670 results on '"Robbery"'
Search Results
2. Risk and desistance factors for female acquisitive offending: a systematic review
- Author
-
Ihsan-Ghafoor, Faiza, Worthington, Rachel, and Coughlin, Louise
- Published
- 2024
- Full Text
- View/download PDF
3. Effectiveness of art therapy in reducing post-traumatic stress disorder symptoms and the propensity to quit journalism among journalists covering banditry activities in Nigeria.
- Author
-
Olajide Talabi, Felix, Okunade, Joshua Kayode, Talabi, Joseph Moyinoluwa, Lamidi, Ishola Kamorudeen, Bello, Samson Adedapo, Chinweobo-Onoha, Blessing, and Celestine, Gever Verlumun
- Subjects
ART therapy ,EXPRESSIVE arts therapy ,POST-traumatic stress disorder ,LABOR turnover ,ROBBERY - Abstract
The goal of this study was to examine the efficacy of art therapy in the treatment of Post Traumatic Stress Disorder (PTSD) and the propensity to quit journalism among Nigerian journalists covering banditry attacks. The researchers utilized a quasi-experiment as the design for the study and sampled 327 journalists. The result of the study showed that at baseline, journalists reported high PTSD symptoms and a propensity to quit journalism, but after the intervention, journalists who received the art therapy intervention reported a significant drop in their PTSD symptoms and the propensity to quit the pen profession. This suggests that art therapy is a cost-effective way of treating PTSD among journalists covering dangerous assignments and reducing high labour turnover in the profession. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Shadow of death: the criminal economy of banditry and kidnapping in northwest Nigeria.
- Author
-
Ojewale, Oluwole
- Subjects
LAW enforcement ,ROBBERY ,BORDER security ,SECURITY sector ,SECURITY personnel ,KIDNAPPING - Abstract
This study explores the phenomenon of banditry as a criminal enterprise in Nigeria. By employing qualitative and quantitative data, it provides a historical context for banditry and discusses kidnapping for ransom as its variant. The spatial distribution and patterns of kidnapping incidents are also highlighted. In response to this persistent challenge posed by banditry, the study notes the government and community members have implemented three distinct strategies. They are enhancing security and law enforcement, negotiations, and legislation. The limitations of these responses are also examined. The paper offers guidance on the necessary policy imperatives to effectively combat armed banditry through a multifaceted approach. It emphasizes that addressing the escalating incidents of kidnapping for ransom in the northwest region cannot be addressed independently from the broader need for reform within the security sector of the country. Strengthening border security, preventing the free flow of illicit firearms into the nation, and concerted effort focused on the recruitment, training, and deployment of adequately equipped security personnel to the border areas become pivotal. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. The fate of bones after grave reopening: Bone taphonomy and preservation in Sarmatian sites in Serbia.
- Author
-
Šarkić, Tamara and Djurić, Marija
- Abstract
The skeletal material from Sarmatian cemeteries in the Pannonian Plain (Hungary, Romania, Serbia), dating from the first to the fifth century ce, has exhibited poor preservation. This has been attributed to historical grave robbery, although no analysis of the skeletal remains or taphonomic processes has been conducted. A recent study focused on statistically assessing skeletal preservation and taphonomic examinations of skeletal remains from 152 graves in the Vojvodina territory (Serbia), utilizing interdisciplinary methodologies. The study found that grave reopening in the past contributed to bone fragmentation in two ways: first, by directly damaging and scattering the bones and, second, by leaving the skeletal material exposed to surface and weathering conditions for an extended period. Additionally, the Sarmatian burial practice of placing the dead in solid tree trunk coffins has also resulted in poor skeletal preservation, as indicated by coffin wear modifications on the bones. This research has provided new insights into the various anthropogenic and natural processes that affect skeletal remains from reopened graves, thereby supporting the reconstruction of Sarmatian funerary archeology. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. AnomalyNet: a spatiotemporal motion-aware CNN approach for detecting anomalies in real-world autonomous surveillance.
- Author
-
Mumtaz, Aqib, Sargano, Allah Bux, and Habib, Zulfiqar
- Subjects
- *
DEEP learning , *TRAFFIC accidents , *ROBBERY , *SPEED , *THEFT , *INTRUSION detection systems (Computer security) - Abstract
Anomaly detection has significant importance for the development of autonomous monitoring systems. Real-world anomalous events are complicated due to diverse human behaviors and class variations. Anomalous activities depend upon speed, length of activity, and motion features to comprehend suspicious behaviors. Fast activities are captured quickly within a few video frames, whereas slow actions may take several hundred video frames to define an anomalous action. Furthermore, a video is more than just a stack of frames with spatiotemporal representations. Most of the existing approaches suffer from learning variable speed fast and slow activities simultaneously and primarily focus on learning spatiotemporal features only. Modeling the spatiotemporal and motion relationships between frames together can help understand the actions better. Motion features when combined with spatiotemporal representations perform higher. Our contribution is two-fold in this research work. Firstly, a novel dynamic frame-skipping approach is proposed to duly generate meaningful representations of spatiotemporal frames and optical-flow-based motion representations for variable speed anomalous actions. Secondly, AnomalyNet, as a new end-to-end deep architecture, is designed to simultaneously learn both spatiotemporal and motion features in image sequences. AnomalyNet is evaluated on the challenging real-world anomaly detection datasets. The results confirm that the proposed model has achieved a competitive AUC of 86.1% on the real-world UCF-Crime dataset and has achieved a superior AUC score of 99.87% compared to state-of-the-art methods on challenging ShanghaiTech dataset in the domain of unsupervised, weakly-supervised, and fully-supervised anomaly detection. Furthermore, the model achieved the highest F1 score for both fast and slow variable speed anomalous activities, such as explosions, road accidents, robbery, and stealing for real-world autonomous surveillance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. We don't have government here: banditry and the polycrisis of governance in northwest Nigeria.
- Author
-
Ojewale, Oluwole
- Subjects
- *
SUSTAINABLE communities , *ROBBERY , *SUSTAINABLE urban development , *SECURITY sector , *SOCIAL support - Abstract
This study provides evidence on the evolution and dynamics of banditry and how they are enabled through interlocking factors of governance deficits in northwest Nigeria. It relies on first-hand perspectives gathered covertly and directly from the bandits, defectors, residents, and victims. The paper provides a significant contribution to knowledge by analysing the real and potential impacts of banditry. It links causation to the effects, and shows how the continuous interaction of these factors generates a cycle of polycrisis in northwest Nigeria. The study yields insights for theory and offers direction on the policy imperatives for combatting banditry. The paper concludes that the governance framework to eliminate, neutralise, and disrupt banditry must embrace four strategies − the peacebuilding approach, security sector reform, development, and strategic social support to victims. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Market warfare strategy and rural armed banditry in Zamfara State, Nigeria.
- Author
-
Idris, Aminu, Lenshie, Nsemba Edward, Umaru, Molmela, Onuh, Paul Ani, and Ganiyu, Adamson Duncan
- Subjects
POOR people ,ROBBERY ,MARKETING strategy ,ARMED Forces ,STATE governments - Abstract
As rural armed banditry in Nigeria defies conventional warfare strategies, including militarisation, negotiation, and amnesty, the Zamfara state government in Nigeria introduced a market warfare strategy to contain the spread of rural armed banditry. The markets were shut down across the state, particularly in rural areas, to stop buying and selling all kinds of goods and services to deny armed bandits access to markets where they could sell rustled cows, acquire provisions for their basic needs, and purchase arms and ammunition. The article used the routine activity theory and a qualitative analysis approach to examine the market warfare strategy in Zamfara State. It argues that, the respite provided by the strategy was temporary, as its impact on the poor people has been devastating. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Cross-border migration, banditry and the challenges of development in Nigeria.
- Author
-
Onota, Emmanuella Ozavize, AC-Ogbonna, Chris, and Alfred-Igbokwe, Nesochi
- Subjects
INTERNATIONAL trade ,ROBBERY ,FREE trade ,ECONOMIC indicators ,STRUCTURAL analysis (Engineering) - Abstract
Globalisation has transformed national corporate operations. It allows commercial activity beyond borders, promoting free trade and financial flows. However, concurrently, the influx of cross-border investment has inadvertently facilitated illicit commercial transactions across Nigeria's borders, hence significantly impacting Nigeria's economic performance. This study examined the relationship between cross-border migration and banditry and how they hinder Nigeria's growth. The researchers used textbooks, journal articles, published dissertations, online resources, official statistical documents, international organizations reports, newspapers and periodicals to achieve the objective of the study. The data was analysed using content analysis by extracting relevant information pertaining to the study from the above mentioned secondary sources. This study employed the opportunity structure theory. This theoretical framework states that a group of people, regardless of their amount of discontent or grievances, will not resort to violence unless opportunity structures that enable and inspire violence are present. The study's findings confirm that the permeability of Nigeria's borders has facilitated unrestricted entry for bandits who engage in various forms of violent activities, including cattle rustling, kidnapping and homicides. Information about the victims, the settings, and the nature of the assaults were also submitted as part of the investigation. The majority of businesses in Nigeria's North Eastern region have shut down due to security concerns brought on by armed bandits, according to the study's findings. There has been an increase in youth unemployment and illiteracy, and people's living situations have worsened. The research recommends that Nigeria should invest in human resources to improve security. Security agencies should also receive modern technologies to identify and deter unlawful entry into Nigeria. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. New Fermatean Fuzzy Distance Metric and Its Utilization in the Assessment of Security Crises Using the MCDM Technique.
- Author
-
Ejegwa, Paul Augustine, Anum, Manasseh Terna, Kausar, Nasreen, Nwokoro, Chukwudi Obinna, Aydin, Nezir, and Yu, Hao
- Subjects
- *
TRAVEL warnings , *FUZZY sets , *MULTIPLE criteria decision making , *ROBBERY , *KIDNAPPING - Abstract
The problem of insecurity is a global phenomenon that has several forms like terrorism, banditry, kidnappings, etc. Insecurity has taken hold in the Sub-Saharan Region of West Africa, especially in Nigeria, for over two decades. Nigeria's security crisis is more pronounced in the Northern Region, with a new wave in the North-Central Region of Nigeria. It is herculean to assess insecurity in the North-Central Region of Nigeria because of the region's fuzzy or imprecise nature of insecurity. This constitutes the rationale for deploying the Fermatean fuzzy technique to assess insecurity due to the capacity of the Fermatean fuzzy scheme to handle imprecision. To this end, a new Fermatean fuzzy distance metric is presented to evaluate insecurity in the North-Central Region of Nigeria using a multi-criteria decision-making technique. To express the logic for creating the new Fermatean fuzzy distance metric, some existing Fermatean fuzzy distance metrics are discussed, along with their drawbacks. The mathematical properties of the new technique are discussed, and the new method is applied computationally to assess insecurity in the North-Central Region of Nigeria. The data for the security assessment are collected via Fermatean fuzzy linguistic variables using the opinions of security experts and analyzed using the technique for order of preference by similarity to ideal solution, which is a commonly used multi-criteria decision-making method. Finally, the numerical validity of the new technique is expressed with comparative results, and the finding shows the benefit of the new distance approach over the existing methodologies. The outcome of the work will provide reliable traveling advisories for safe voyages within the region. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Defining Moments
- Subjects
Robbery ,History - Abstract
8 August 1963 THE GREAT TRAIN ROBBERY In the early hours of the morning on 8 August 1963, a Royal Mail train travelling from Glasgow to London was stopped and [...]
- Published
- 2024
12. MONEY BALL.
- Author
-
Laws, Will and Selbe, Nick
- Subjects
- *
HOME runs (Baseball) , *BATTING (Baseball) , *FREE agents (Sports) , *PITCHING (Baseball) , *ROBBERY - Abstract
The article from Sports Illustrated discusses the upcoming MLB free agent market for the 2025 season, highlighting impactful players who could be on the move. Players like Juan Soto, Corbin Burnes, and Blake Snell are expected to command significant contracts based on their performance. The article provides insights into the potential movement of key players and the impact it could have on the upcoming season. [Extracted from the article]
- Published
- 2024
13. I Know That I Know Nothing: The Dunning-Kruger Effect.
- Subjects
DUNNING-Kruger effect ,ROBBERY ,PSYCHOLOGISTS - Abstract
The article focuses on the Dunning-Kruger effect, a psychological phenomenon where individuals with low competence overestimate their abilities, as illustrated by the case of McArthur Wheeler, who believed he could become invisible while committing a robbery. It examines the origins of this effect through experiments by psychologists David Dunning and Justin Kruger, critiques regarding its validity in light of recent research, and the cultural differences in self-assessment of abilities.
- Published
- 2024
14. Enhancing public safety: examining the influence of micro-level physical characteristics in CPTED for evidence-based action.
- Author
-
Wijekoon, K. K. and Warusavitharana, E. J.
- Subjects
- *
CRIME prevention , *COMMUNITY safety , *PUBLIC safety , *ROBBERY , *PROBABILITY theory - Abstract
Crime Prevention Through Environmental Design (CPTED) has long been regarded as a promising approach to enhancing community safety by leveraging the physical environment to deter criminal activity. However, most studies on CPTED largely characterized by theoretical propositions and speculative discussions, lacking empirical evidence to support its effectiveness. This lack of empirical validation has hindered the adoption and implementation of CPTED strategies in practice. Through a quantitative approach, this study facilitates a shift towards evidence-based practice, with a specific focus on micro-level physical characteristics. The derived probability equation demonstrates promising predictive capabilities, suggesting its potential for anticipating robbery occurrences. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Banditry in Global Social History.
- Author
-
Fuoli, Francesca
- Subjects
- *
SOCIAL history , *ROBBERY , *MODERN history , *WORLD history , *NINETEENTH century - Abstract
Eric Hobsbawm argued that banditry was an archaic and pre-political phenomenon that emerged simultaneously and with striking intensity in different regions around the world during the nineteenth and twentieth centuries. While it has often been seen as marginal in global histories, banditry provides an essential gateway to the study of modern history from a global perspective. Drawing on different regional case studies, this article approaches the similarities and connections that ran through different instances of banditry in terms of their inclusion within the global dynamics of imperial expansion, capitalism, and the developing notions of territoriality and sovereignty. It argues that the ubiquitous presence of banditry in this period was propelled by the deep-running changes to local relations of class, economy, and power that resulted from these accelerating global dynamics. Bandits emerged as the expression of rural communities in all their complexity and were able to negotiate their place within the rapidly evolving societies of this period. Far from being victims, bandits were key agents who navigated change, adaptation, and resistance in the modern world. In this sense, banditry was a powerful expression of the different ways in which rural communities interacted, negotiated, and clashed with the global. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Yol Kesiciler ve Kanunsuzlar: Türkiye'de Kırsal ve Siyasi Eşkıyalıkla Mücadele (1923-1938).
- Author
-
TEKİR, Süleyman
- Subjects
ROBBERY ,GANG violence ,CIVIL society ,TAX incidence ,OTTOMAN Empire - Abstract
Copyright of Turcology Research is the property of Ataturk University Coordinatorship of Scientific Journals and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
17. The Development of the Jordanian National Guard in the 1950s.
- Author
-
Bartal, Shaul
- Subjects
ISRAELI war stories ,ROBBERY ,POPULATION ,ASSAULT & battery - Abstract
After the 1948 Arab–Israeli War, Palestinians living in the West Bank began to infiltrate Israel. These infiltrations were characterised by robberies and break-ins, and sometimes the killing of Israelis. Israel responded to these actions with military raids and harm to the civilian population in the villages of Jordan from which these infiltrators set out and crossed the border. As a result, a defensive Jordanian National Guard was developed. Shaul Bartal presents the Jordanian military concept behind the Jordanian National Guard and outlines its military successes in repelling Israeli attacks in the period preceding the 1956 Suez Crisis. ◼ [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Pills, substances and brigandage: Exploring the drug factor in Nigeria's banditry crisis.
- Author
-
Okoli, Al Chukwuma and Aina, Folahanmi
- Subjects
ORGANIZED crime ,DRUGS of abuse ,ROBBERY ,POISONS ,DRUG utilization - Abstract
This paper examines the role of drugs in the prevailing banditry crisis in Nigeria. It does so against the deteriorating trajectory of the banditry crisis in northern Nigeria in which the issue of drugs and substances has been implicated. Existing studies on the subject matter have variously considered the ramifying dimensions of the banditry question, especially its complex nexuses to other organised crimes, such as terrorism, arms trafficking, illicit mining and mercenary militancy. Evidently, the linkage between banditry and illicit drug proliferation and (ab)use has been scarcely explored, hence the need for the present discourse. Using a qualitative method that relies on desk research and key informant interviews, the paper posits that the (ab)use of drugs and toxic substances by bandits has been a critical catalyst for the banditry crisis in Nigeria. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. From cross-border banditry to insurgency in the Lake Chad region: response, collaboration and conflicting interest of Lake Chad region states.
- Author
-
Okolie, Aloysius-Michaels, Mbaegbu, Casmir Chukwuka, Nwoke, Ikemefuna Sunday, and Owonikoko, Saheed Babajide
- Subjects
TERRORIST organizations ,DOCUMENTARY evidence ,REGIONALISM (International organization) ,TASK forces ,ROBBERY - Abstract
The security challenges posed by Boko Haram and its breakaway factions in the riparian states of Lake Chad have attracted plethora of academic inquiries. Comparatively less attention has been paid to the relationship between the national economic interests of the riparian states (Lake Chad oil, fish, etc.) and adopted strategies for dealing with the challenges posed by these terrorist groups. Practically, regional organizations and national governments have evolved different strategies to counter the perennial security threats and hence stabilize the region for intra- and inter-state movements, trades and development with little success. The study argued that historical antecedents among states in the Lake Chad region which appear to institutionalize centrifugal social relations and conflicting economic interests in a security-threatened region that lacked durable security interdependence feed into sustenance of Boko Haram and subsequently undermine counterinsurgency operations. Data collection was based on survey method and complemented by documentary evidence based on secondary sources. The study found out that insurgency will persist unless appropriate security infrastructure is emplaced to promote patterns of amity and economic interdependence that will entrench deeply rooted and durable security architecture in the region. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Police predation and violence in urban Nigeria: The Special Anti-Robbery Squad (SARS).
- Author
-
Ekumaoko, Chijioke Egwu and Ezemenaka, Kingsley Emeka
- Subjects
URBAN violence ,POLICE ,ROBBERY ,CUSTODIAL sentences ,SOCIAL justice - Abstract
Police are omnipresent in Nigerian cities. The existence and actions of the Nigerian Police Force (NPF) in cities such as Lagos, Ibadan, and Abuja are intended like elsewhere in the urban world to deter, reduce, and solve crime. This is true of the Special Anti-Robbery Squad (SARS) of the NPF, created to combat armed robberies, car-snatchings, kidnappings, and cattle rustling. Its methods of seeking greater public security, however, raises questions about the fairness and efficacy of urban policing in Nigeria. Its reported police predation and violence during its stops, searches, detentions, and custody of urban denizens exacerbate socio-spatial injustices in Nigerian cities. We draw on the concept of the right to the city and qualitative data, including key informant interviews with Nigerian police, lawyers, and common city residents, including self-identified victims of SARS brutality, to describe how SARS helps us understand the context and characteristics of urban policing in Nigeria. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Rural Banditry and the Vulnerable: Managing the Internally Displaced Persons' Camps in Benue State, Nigeria.
- Author
-
Peter, Adeniyi Oluwatobi, Rosenje, Musharafa Olapeju, Peju-Rosenje, Temitope O., and Salami, Nofiu Olamikulehin
- Subjects
INTERNALLY displaced persons ,REFUGEE camps ,ROBBERY ,EMERGENCY management - Abstract
Women, children, the aged, and the physically challenged, among others, constitute the vulnerable population in every society but are usually catered for in crisis-ridden situations by the leadership of developed nations, contrary to what obtains in Nigeria, consequent upon rural banditry attacks. This paper investigated how leadership's attitude to banditry attacks on rural communities in Benue State, Nigeria, has rendered the vulnerable miserable with the manner in which the various Internally Displaced Persons' Camps (IDPCs) have been established to give relief to the victims. It adopted a descriptive research method, extracted data using secondary sources of data collection, and used Emergency Management Theory (EMT) to explain the paper. It reveals that before the escalation of rural banditry in Benue State, women, children, and the physically challenged were carrying out their various agricultural practices and other personal businesses without any hindrance. It observed that people appeared to have been merely protected by the efforts of their various family members and their various communities. It argued further that bandits' attacks on these rural communities created an upheaval in the environment, bringing about looting, kidnapping, maiming, and loss of lives and property of serious magnitude. The deadly attacks on these various communities, their desertion, and the displacement of family members led to a humanitarian crisis of multiple dimensions. The need to take care of the vulnerable population by the government led to the setting up of Internally Displaced Persons' Camps (IDPCs). The paper concluded that these IDPCs are poorly managed and characterized by corruption and negligence, among others. It is recommended that security in rural communities be beefed up to forestall further bandits' attacks, while the IDPCs should be properly protected, funded, and better managed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Rajput Vocabulary of Violence.
- Author
-
Turek, Aleksandra
- Subjects
- *
SOCIAL classes , *ROBBERY , *VIOLENCE , *STEREOTYPES , *VOCABULARY - Abstract
The aim of this article is to reflect on certain keywords of the Rajput world shaped by the "predominantly masculine martial culture" (Kasturi 2002: 12). Those keywords are crucial to understanding the phenomenon of violence in the Rajput milieu, violence that is perpetrated irrespective of kshatriyahood and outside the battlefield. Keeping in mind that violence cannot be identified with a particular community, but certain types of aggressive acts can be associated with certain social classes or groups (Kasturi 2002: 20), this article seeks to demonstrate that terms such as vair, bāroṭiyā, dacoity, and bhomiyāvat, reveal the mechanisms of collective violence in the socio-political practice of the Rajputs. This will be useful in understanding the cultural background of specific regional patterns of violent behaviour in contrast to the colonial stereotype of a Rajput as primitive, violent, but brave. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. EDUCATION IN THE LIGHT OF DEUT 6: 8: A PANACEA TO CURBING THE ACTS OF BANDITRY, KIDNAPPING AND TERRORISM IN THE MIDDLE BELT REGION (NORTH CENTRAL) NIGERIA.
- Author
-
Makama, Bulus Audu and Odafe, George
- Subjects
HUMAN beings ,ROBBERY ,CITIZENS ,VIOLENCE ,TERRORISM - Abstract
This study argues that education is a panacea to the recurrent ethno-religious violence and insecurity in the Middle Belt of North central Nigeria perpetrated under the banner of faith and God. The study argues that some of the perpetrators of this viciousness deliberately distort Scriptures to gratify their selfish interests and in the process manipulate unsuspecting believers to assist them in their narcissistic and cruel interests. To change this retrogressive narrative, the article contends that educati on is the answer to preventing the perennial violence in the Middle Belt. This demands educating the citizenry of the Middle Belt to eschew every feature that encourages violence and insecurity. Taking Deut 6:8, the paper presents the procedure to adopt in going about educating the people of the Middle Belt. With a close reading of Deut 6:8, the paper asserts that the educating must be given to all human beings, and in every facet and forum of life. The purpose is to engrain in them the measures and modalities for averting drives that lead to violence and insecurity in the Middle Belt. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Bandidos y revolucionarios. Narrativas de la contrainsurgencia y la insurgencia zapatista en la zona de Tenancingo a inicios de la Revolución Mexicana.
- Author
-
Pérez Ramírez, Tatiana
- Subjects
ROBBERY ,ROBBERS ,REVOLUTIONARIES - Abstract
Copyright of Trashumante. Revista Americana de Historia Social is the property of Universidad de Antioquia and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
25. Las raíces de un cáncer. Historia y memoria de la primera ETA (1959-1973).
- Author
-
Mota Zurdo, David
- Subjects
COLLECTIVE memory ,BOMBINGS ,RADICALISM ,FALSIFICATION ,MEMORY ,ROBBERY - Abstract
Copyright of Pasado y Memoria. Revista de Historia Contemporánea is the property of Pasado y Memoria and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
26. Effects of Climate Change on Women's Security Dynamics in Baragoi, Samburu County, Kenya.
- Author
-
Obuyi, Rehema Zaid
- Subjects
CLIMATE change ,POWER (Social sciences) ,SOFT power (Social sciences) ,HUMAN security ,ROBBERY - Abstract
The paper unearths how climate change influences women's security dynamics in fragile and conflict-affected contexts in Baragoi Samburu County Kenya. It provides an opportunity to rethink security. Security responses must be at par with evolving security underlying forces. One of the precursors is that individuals and groups that were traditionally excluded from combat both as participants and targets such as women and children have now become prime targets. This demands a shift in strategy by not only focusing on traditional threats but also getting more specific linking our approaches to gendered non-traditional security threats. Alternative soft power approaches to addressing insecurity are timely. Framing response to banditry as war creates a narrative with several implications that are suited to extend, stigmatize and prolong the violence. As Baragoi populace, continue to struggle with the adverse impacts of climate shocks, banditry, and hard power securitized interventions. An additional revelation is the interlink between low response that further aggravates women's adaptation to the conflict-climate nexus and fragility. It is agreeable that the climate crisis is a threat to everyone. However, it does not affect everyone to the same extent, and too often magnifies gender inequalities. Gender and identity can either undermine or support security resilience in response to shocks. More broadly, climate "uneven vulnerability" and gender inequality overlap to shape women's adaptation and resilience. There is growing evidence that the adverse effects of climate change increases both "risk" and "severity" of violent conflict on women. However, the impact of climate change has not yet been adequately incorporated into fragility or analysis of women peace security dynamics. In view of the multi-faceted nature of gendered causal factors and rapid evolving trends, timely and fresh perspectives and approaches are required to foster resilience, mitigation and adaptation. In this context, comprehensive gendered early warning and response systems play a substantial role in building absorptive capacity and reducing the impact of hazards. At the same time, timely response on early warning by governments and other authorities can significantly mitigate the effects of disasters and decrease mortality rates. The better we understand what drives the "differentiated outcomes", the better policies and interventions can be tailored to strengthen resilience for all. This calls for new diplomatic shift in security to revolve around conflictclimate risks. Gender Inclusion has to be at the center of prevention efforts. The above discourse serves as a poignant testament to the complex tapestry which serves as setback in knowledge regeneration, policy, practice and to a great extent, the constrictions of "traditional security" vis-a-vis "nontraditional approaches". The study employed a qualitative method of data collection to obtain secondary data. Specifically, this design highlighted the perspectives, history, perceptions, expectations and social construction of the thematic areas. The study, therefore, is one of the ways to intervene on the long protracted conflict which is a congruence of political, social, cultural and security dimensions. The human security approach is intended to present an inclusive, participatory platform, with "equal power dynamics" and "diverse perspectives" to integrate climate risks into security and development plans. The study also provides policy recommendations and some of the best practices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. State v. Reverdes, 295 A.3d 770 (R.I. 2023).
- Author
-
Williams, Lia M.
- Subjects
ROBBERY ,LAW enforcement ,LIQUOR stores ,ARREST ,FELONIES - Published
- 2024
28. State v. Gibson, 291 A.3d 525 (R.I. 2023).
- Author
-
Norman, Katherine
- Subjects
CRIMINAL law ,POLICE patrol ,CRIMINAL procedure ,WARRANTS (Law) ,ROBBERY - Published
- 2024
29. Case updates: Court of Criminal Appeal
- Published
- 2024
30. The grate cheese robbery
- Subjects
Robbery ,Cheese - Abstract
In This Issue The grate cheese robbery Around 950 wheels of cloth-wrapped artisanal cheddar worth more than £300,000 have been stolen from Neal’s Yard Dairy by a fraudster pretending to [...]
- Published
- 2024
31. The 'great cheese robbery' and the rise of food scams
- Subjects
Robbery ,Supermarkets ,News, opinion and commentary - Abstract
A 'great cheese robbery', which saw Cheddar worth hundreds of thousands of pounds stolen from an artisan London cheesemonger, has highlighted how food retailers and restaurants are becoming more vulnerable [...]
- Published
- 2024
32. ITV1 3. MONDAY Main Channels; MONDAY 14 OCTOBER
- Subjects
Robbery ,Company business planning - Abstract
Joan 9.00pm Daylight robbery: Joan (Sophie Turner) keeps a close watch on the day of the heist 4.00pm Tipping Point Ben Shephard hosts the arcade-themed quiz as contestants compete for [...]
- Published
- 2024
33. The Legendary 1877 Train Heist At Big Springs.
- Author
-
JACKSON, RON J. JR.
- Subjects
LAW enforcement ,ROBBERY ,HISTORY of the Americas ,VIGILANTES ,TERRITORIAL expansion of the United States - Abstract
The article focuses on the daring exploits of Millard Fillmore Leech, a shopkeeper who took on the dangerous task of tracking down a gang of outlaws after they committed a significant train robbery in 1877. Topics include the details of the heist involving the theft of 60,000 U.S. dollars in gold, Leech's strategic tracking of the gang, and the eventual identification and pursuit of the robbers by law enforcement.
- Published
- 2024
34. “A Journey to the Other Side of the World”: Ohio State Penitentiary, 1899–1901.
- Author
-
Underhill, Lonnie E.
- Subjects
- *
CRIMINALS , *ROBBERY , *CRIME - Abstract
The article describes how, in the early 1900s, offenders of federal crimes in Indian and Oklahoma Territories were often sent to Ohio State Penitentiary to serve their sentences of twelve months or more. It mentions about Alphonso "Al" Jennings, who was convicted in 1899 for a botched train robbery, and details Jennings' subsequent attempt to flee and his eventual capture.
- Published
- 2022
35. The Train Robber Who Delivered the Mail: Al Jennings, Ohio State Penitentiary.
- Author
-
Underhill, Lonnie E.
- Subjects
- *
CRIMINALS , *ROBBERY , *CRIMINAL sentencing - Abstract
The article discusses the story of Al Jennings, who was sentenced to life in prison in Ohio in 1899 for robbing a train and endangering a postal worker's life. It mentions that prisoner treatment was described as brutal, and convicts followed meticulous schedules designed by the guards to control their behavior.
- Published
- 2022
36. “I Came Here to Die, Not Make a Speech”: Outlaw Cherokee Bill’s Final Words, March 17, 1896.
- Author
-
Underhill, Lonnie E.
- Subjects
- *
OUTLAWS , *CRIME , *CRIMINALS , *ROBBERY - Abstract
The article describes the life of Crawford Goldsby, also known as "Cherokee Bill," a outlaw who committed various crimes throughout Indian Territory, now part of Oklahoma. It mentions that as a teenager, he fell in with a group of violent men and became known for his criminal behavior, and committed various crimes with them, including the robbery of Schufeldt Mercantile.
- Published
- 2022
37. جريمة الاعتداء على سَيَّارَاتِ نَقْلِ الأموال، وأَثَرُهَا فِي ثُبُوتِ الحد أو التعزير.
- Author
-
محمد بن سعد بن عبž
- Subjects
- *
ROBBERY , *TRANSPORT vehicles , *THEFT , *PUNISHMENT , *CRIME - Abstract
This research is about "The crime of assaulting money transport vehicles, and its impact on proving Limitation or discretion", through the descriptive, inductive, analytical, comparative, and deductive research methodology. The topic is considered one of the jurisprudential developments that this study dealt with, and it included two main aspects: First: Establishing the issue of the truth about the registration of money transport vehicles, depending on their circumstances. Second: Listing the forms of the crime of assaulting money transport vehicles and explaining its ruling according to its jurisprudential description in terms of proving the punishment for theft, or the punishment for banditry, or considering the discretionary punishment when the conditions for the obligation to limit theft as theft or banditry are not met. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Banditry, institutional weakness and the Zamfara State amnesty programme.
- Author
-
Adibe, Raymond C., Akpan, Itoro E., Nnamani, Rebecca G., Ezeme, Paulinus, and Nnaegbo, Obiora
- Subjects
- *
NON-state actors (International relations) , *HUMAN security , *PUBLIC institutions , *CONFLICT management , *ROBBERY - Abstract
This article demonstrates how institutional weakness makes amnesty, as a conflict management strategy, ineffective as found in Zamfara State; and how prioritising human security can help combat insecurity. Using Weak Institutions of State as a framework of analysis, the article argued that factors such as loss of territorial control or the sole use of force, crisis of legitimacy, mass poverty, corruption and inability to provide basic services to the citizens as characteristic of states with institutional weakness, create very complex security problems that amnesty is incapable of addressing effectively. Rather than mitigate insecurity, weak institutions in a state further fuel it by creating opportunities for both state and non-state actors to exploit the offer of amnesty for personal enrichment. This article adopted the documentary method of data collection, using deduction and inferences as analytical methods. Based on its findings, the study recommends the need for a more sustainable approach to conflict management that can benefit a larger number of citizens. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Differences Between High and Low Performing Police Agencies in Clearing Robberies, Aggravated Assaults, and Burglaries: Findings From an Eight-Agency Case Study.
- Author
-
Lum, Cynthia, Wellford, Charles, Scott, Thomas, Vovak, Heather, Scherer, Jacqueline A., and Goodier, Michael
- Subjects
- *
BURGLARY , *ROBBERY , *CRIME statistics , *POLICE , *ORGANIZATIONAL structure , *EVIDENCE-based law enforcement - Abstract
This eight-agency case study analyzes the characteristics of four high-and four low-performing police agencies, as measured by their long-term crime clearance rates. High and low performers were identified through a systematic assessment of 30 years of clearance rates of robberies, aggravated assaults, burglaries, and homicides for the largest 100 police departments in the United States. Researchers then conducted in-depth case studies of eight of these agencies—four of the highest and four of the lowest ranking in terms of their investigative practices. Comparisons of high-and low-performing agencies reveal differences in organizational structure; leadership and resources; selection, training, and performance review for investigators; case assignment and investigative processes; and community interactions. These findings provide direct guidance to agencies seeking to strengthen their investigative organization and practices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. SAVAŞÇI KAZAK (KOZAK) TOPLULUĞUNDA SOSYO-KÜLTÜREL KİMLİK VE MÜZİK.
- Author
-
Mirzayev, Samir
- Subjects
- *
NATIONAL character , *OTTOMAN Empire , *BANDURA , *PART songs , *ROBBERY - Abstract
The national identification of the Cossack's is a very interesting historical topic. For many centuries they lived in the south of Ukraine and Russia, and were engaged in robbery. Many runaway slaves, as well as rioters, joined them. Cossack's control system is a military democracy. In all villages ("Stanitsa") there is a commander - Ataman. They call themselves: Orthodox warriors. The villages are uniting in the Army. Army Commander -- "Hetman". In the XVI century, Cossack's formed their own state: "Zaporozhskaya Sech". "Zaporozhskaya Sech" had its own parliament: "Rada". Cossack's had their own schools, had their own church, had hospitals. They even collected taxes. Cossack's fought against the Ottoman Empire. During the USSR, Cossack peopls was under heavy pressure. But now they are reborn again. Cossack's culture is very interesting. They have their own long traditions. But the most interesting thing about them is the music. Cossack choirs are very popular in Eastern Europe. Music often has a military theme. Also popular topics: "Fate", "Wine", "Love", "Horse", "Homeland" and "Nature". Melodies are based on chords: T-S-D-IV. Rhythm - often 2/4 or 4/4. Polyphony is simple. Musical instruments - often an accordion, tambourine, balalaika, bandura (ethnic instruments). The young generation in Russia - idealizes Cossack's. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. 'They Collected Money and Used Hammer to Remove My Front teeth': 'One-Chance' Criminality and Victimisation Experiences in Lagos Transport Corridors.
- Author
-
Tade, Oludayo and Faisol Olaitan, Muhammed
- Subjects
- *
CRIME , *TRANSPORTATION corridors , *PUBLIC transit , *LAW enforcement , *MUNICIPAL services - Abstract
"One-chance" criminality has become public transport threat in Lagos State where passengers are trapped through deceit, robbed, and victimized by individuals or groups pretending to offer public transportation services. Understanding the strategies and victimization experiences may help illuminate this phenomenon toward developing preventive cues and appropriate institutional response. This study, therefore examines "one-chance" strategies and the victimization experiences of passengers in Lagos public transportation corridors. The Routine Activities Theory (RAT) is used to explain the phenomenon using exploratory research design. The snowball technique was used to reach victims of one-chance robbery who responded to in-depth interview guide questions which probed into the strategies, victimization experiences and coping strategies. Findings show that timing, disguise/deception, taking unusual routes, tampering with the vehicle central lock, reworking the seatbelt, and winding up glasses are methods adopted by the one-chance robbery perpetrators to victimize. Physical assaults (beating with all kinds of weapons, sexual assaults, and forced pushing out of the vehicle at top speed which could lead to the victim's disability or death) and loss of valuables (dispossession of jewelleries, monies, and phones). Participants increased vigilance before boarding, hailing a private taxi and instrumentalised religion for protection as coping strategies. The study provokes mapping of "one-chance" hot-spots by law enforcement authorities and routine adjustment for commuters. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Greed Restraint: Ambiguity Aversion, Reference Dependence, and Self-Centeredness as Sources of Self-Regulation in Instrumental Crime.
- Author
-
Jacobs, Bruce A., Cherbonneau, Michael, and Pickett, Justin T.
- Subjects
- *
EGOISM , *AVARICE , *CRIME , *AVERSION , *AMBIGUITY - Abstract
Based on in-depth interviews with 29 active drug robbers (25 male, 4 female) from St. Louis, MO (USA), we explore restraint among people and in circumstances where there should be none. Focusing on greed restraint at the crime's payoff point (i.e., not taking everything one could when rewards are seized), we identify the decision-making constructs and conceptual pathways by which this happens and discuss their implications for improved specification of the relationship between criminal propensity, self-regulation, and risk sensitivity. We contend that self-centeredness is the one dimension of criminal propensity that is sufficiently receptive to risk sensitivity to make self-regulation possible, and that individuals with low trait self-control can show state self-control when ambiguity aversion and reference point expectations align to sate anomic greed. This refinement offers novel pathways for future study of dual-influence models of crime, and suggests that offender decision-making is best conceptualized as a process that unfolds during crimes rather than a discrete event that precedes them. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Horus Behdety, a Royal Wife, and a Royal Daughter from the Private Necropolis of Kom el-Khamaseen (South Saqqara).
- Author
-
González León, Daniel and Cervelló Autuori, Josep
- Abstract
Kom el-Khamaseen is a small necropolis located in South Saqqara, 3 km west of the pyramid of Djedkare-Izezi, dating from the end of the Old Kingdom to the First Intermediate Period. In the past few decades, the site has been the victim of several incidences of looting which have destroyed it to a great extent. Between 2019 and 2022, a team from the Universitat Autònoma de Barcelona carried out rescue excavations there. A great number of limestone blocks and block fragments decorated with inscriptions and reliefs were recovered. In a few cases, this decoration suggests reuse and external provenance. Thus, the two blocks presented here – one with a representation of Horus Behdety and the other with an allusion to a royal daughter – must come from the royal cemeteries of South Saqqara. A discussion of this provenance and of the robbery and reuse of materials during the First Intermediate Period is presented. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Exposure of Pharmacists and Pharmacy Technicians to Violence in Community Pharmacies in Southeast Europe: Frequency and Ethical Considerations.
- Author
-
Popčević, Monika, Javorina, Tanja, Košiček, Miljenko, and Meštrović, Arijana
- Subjects
DRUGSTORES ,VIOLENCE in the community ,PHARMACY technicians ,PHARMACISTS ,VIOLENCE in the workplace ,VIOLENCE prevention ,ANIMAL health technicians - Abstract
Pharmacists and pharmacy technicians working in community pharmacies are exposed to the risk of violence in their workplaces. Studies have shown that workplace violence is affecting their job satisfaction, productivity, and mental health. This study aims to identify the frequency of different types of violence, as well as the common perpetrators that community pharmacy staff in SEE (Southeast Europe) are dealing with. A cross-sectional study was conducted using an online questionnaire created for this purpose. Selected community pharmacies in Croatia, Serbia, Bosnia and Herzegovina, and Montenegro participated in this study. In total, 732 responses were collected from 24 pharmacy chains or independent pharmacies including all community pharmacy staff. More than 80% of pharmacists and pharmacy technicians reported having been exposed to verbal violence at the workplace, while more than 20% of them reported physical and sexual violence in the preceding 12 months. There were no statistically significant differences between pharmacists and pharmacy technicians, gender, age groups, or countries in relation to exposure to physical, verbal, and sexual violence. The most common perpetrators were identified as patients/clients. More than 90% of pharmacy staff reported they did not receive any kind of support from their employer nor any other help after experiencing a robbery. There is a need for a structured approach to addressing violence in pharmacies including organized support for pharmacy staff. Achieving quality patient care, despite dealing with violent individuals or situations daily, is one of the greatest ethical challenges for healthcare providers in community pharmacies to be empowered. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Büyük Kaçgunluk Sonrası Dönemde Şah Sultan Vakıf Arazilerinde Eşkıyalık Olaylarına Bakış.
- Author
-
KOCABAŞ, Bahar and DEMİR, Alparslan
- Subjects
ROBBERY ,OTTOMAN Empire ,SIXTEENTH century ,SOCIAL order ,ROBBERS - Abstract
Copyright of TURKAV Institute of Public Adminsitration Journal of Social Sciences / TÜRKAV Kamu Yönetimi Enstitüsü Sosyal Bilimler Dergisi is the property of TURKAV Institute of Public Adminsitration Journal of Social Sciences and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
46. Learning on the edge: Impacts of banditry on education and strategic options for resilience in northwest Nigeria.
- Author
-
Ojewale, Oluwole
- Subjects
ROBBERY ,FORCED migration ,SEXUALLY transmitted diseases ,SCHOOL facilities ,SCHOOL enrollment - Abstract
The aim of this study is to analyse the dynamics of violence against educational facilities and students in northwest Nigeria, specifically carried out by bandits. By employing qualitative and quantitative research methodologies, a comprehensive understanding of these attacks is sought. The paper notes schools and students are disproportionately targeted by bandits and are becoming vulnerable for various reasons. These include pervasive failure of governance, diminishing presence of the state in maintaining order, general lack of protection by the government, perceived weakness of students to mount resistance, and bandits' propensity for illicit profit through ransom payment by victims. These affect the students in six principal ways: loss of lives, increasing burden of fear, rise in sexually transmitted diseases, decreasing enrolment in school, abandonment of educational facilities and forced displacement. In the milieu of banditry in Nigeria's northwest, it is crucial to adopt the peacebuilding approach and implement security sector reform, safe school initiatives, development, social support and strategic health care delivery to victims in order to successfully eliminate, neutralise, and disrupt (END) attacks by bandits targeting educational facilities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Nigerian state and the management of armed conflicts: rethinking the amnesty approach.
- Author
-
Egonu, Nnamdi, Adibe, Raymond, Nnamani, Rebecca, Nwaogaidu, John, and Oranye, Henry Uchenna
- Subjects
CONFLICT management ,AMNESTY ,MISAPPROPRIATION of funds ,SUBNATIONAL governments ,ROBBERY - Abstract
This paper examined the amnesty approach from a two-dimensional approaches of the central and sub-national governments in the management of structural conflicts in Nigeria. Using the case study approach, the study explains how the actions of individuals (or groups) escalate militancy, insurgency and banditry, as well as undermine the amnesty initiatives of national and subnational bodies in Nigeria. We argued that: administration bordering on crass corruption is the unacknowledged goal of amnesty; the complicity of state actors is the direct consequence of this unacknowledged goal; and there is a clear link between the financial compensation/payment to the bandits/militants and the proliferation of attacks and armed groups. Thus, in the regions we focused on, there was a proliferation of militant, insurgent and bandit attacks as well as fatalities in the post-amnesty period because of the complicit role of political actors in fuelling insecurity to justify continuous financial investment in these initiatives and present more opportunities for further misappropriation of the amnesty funds. This finding questions the appropriateness of multi-layer amnesty programmes as a conflict management strategy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Tit for tat? A study on the relationship between work connectivity behavior after-hours and employees' time banditry behavior.
- Author
-
Jingya Li, Hao Chen, Liang Wang, and Jiaying Bao
- Subjects
JOB performance ,ROBBERY ,PERSONNEL management ,SELF-esteem ,RESOURCE-based theory of the firm ,PSYCHOLOGICAL distress - Abstract
Based on Conservation of Resources Theory, this study tries to reveal the mechanism of action of work connectivity behavior after-hours triggering employees' time banditry behavior. By using Mplus7.4 software the analysis of 429 leader-employee paired data collected in three stages reveals that work connectivity behavior after-hours has a positive effect on work alienation and psychological distress. Work alienation and psychological distress mediates the relationship between work connectivity behavior after-hours and employees' time banditry behavior, respectively. In addition, organization-based selfesteem mitigates the positive effects of work connectivity behavior after-hours on work alienation and psychological distress, which in turn also moderates the indirect effects of work connectivity behavior after-hours on employees' time banditry behavior through work alienation and psychological distress, respectively. This study provides practical guidance for organizations to reduce employee time banditry behavior and human resource management practices in the new technological environment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Research note: Variation of the effect of ambient light level on crime frequency with type of crime and location.
- Author
-
Fotios, S, Robbins, CJ, and Farrall, S
- Subjects
- *
CRIME , *CITIES & towns , *ROBBERY , *HEAT waves (Meteorology) - Abstract
Previous studies have suggested mixed results about the effect of road lighting on crime. One potential explanation is that the effect of lighting, if any, varies with the type of crime. This was tested through analysis of the effect of change in ambient light level on crimes recorded in 11 cities in the USA for the 10-year period 2010–2019. The results suggest that ambient light level had a consistent effect on robbery, with darkness leading to an increase in robbery, but did not suggest a significant effect for other types of crime. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Truth, Theft and Gift: Thoughts on Alētheia.
- Author
-
DESMOND, WILLIAM
- Subjects
THEFT ,ROBBERY ,ROBBERS ,JOURNALISTS ,METAPHOR - Abstract
In discussing truth in Being and Time Heidegger speaks of this as always involving a robbery (ein Raub). This is a revealing word but not noted by commentators. Is it an incidental metaphor not to be taken too seriously? Or does it help us focus on something of the informing orientation to being and truth marking the Heidegger of Being and Time? This reflection offers thoughts on Alētheia in light of the meaning of theft. Significantly, the later Heidegger witnesses an ontological attunement entirely other to that of a robber who steals what is not his own. This attunement is closer to one of being graced or gifted by being rather than stealing secrets from the hiddenness of being. What terms do we need to make sense of theft and gift; how do we turn from, get from, theft to gift? How get from Polemos to Gelassenheit? Does Heidegger leave us in the dark on this great question? [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.