Search Results

1 - 10 of 11 items :

  • "technology" x
  • Criminal Law x
Clear All
The Need for Diversification of Forensic Tactical Rules Applicable to Crime Scene Investigation

Abstract

The unprecedented development of cybernetics was concretized by the emergence of computer technology in ways difficult to predict. In this context, the international underworld and organized crime have expanded the area of criminal acts, but equally there were new investigation possibilities for the police and judicial authorities, limiting the role of intuition and flair, of human spontaneity, the center of gravity falling on their ability to use new technology intelligence they have at their disposal.

Open access
Differences in the Quality of the Photoplethysmograph Signal in Subjects with and without Nail Polish

References [1] Varlamov V.A., Varlamov G.V. (2005), Counteraction to Polygraph and Ways of Their Neutralization , Per SE Press, 192. [2] Medvedev A.Y., Polygraph – Nostalgia for “Analog” Quality , http://daily.sec.ru/2011/07/07/Poligraf---nostalgiya-po-analogovomu-kachestvu.html . [3] Pavlov S.V. (2007), Photoplethmusmic Technologies for Controlling the Cardiovascular System , [in:] S.V. Pavlov, V.P. Kozhemyako, V.G. Petruk and others, Universum, Vinnytsya, 254.

Open access
Preparation to Experimental Testing of the Potential from Using Facial Temperature Changes Registered with an Infrared Camera in Lie Detection

Facial Thermal Imaging, Li Creative Technologies, Florham Park, NJ, USA. Kołecki H. (1979), Kryminalistyczne zastosowania termografii, Warszawa 1979. Polakowski H., Kastek M., Pilski J. (2011), Analysis of Facial Skin Temperature Changes in Acquaintance Comparison Question Test, European Polygraph 2011, 5, 3–4, 107–121. Pollina D.A., Ryan A.H. (2004), The Relationship between Facial Skin Surface Temperature Reactivity and Traditional Polygraph Measures used in Psychophysiological Detection of Deception: A Preliminary Investigation, Polygraph, 2004, 33

Open access
Child Pornography and Child Abuse in Cyberspace

References 1. Robert Moore, Cybercrime. Investigating high-technology computer crime, second edition, Anderson Publishing, Oxford, 2011 2. Grainne Kirwan, Andrew Power, Cybercrime. The Psychology of online offenders, Cambridge University Press, 2013 3. Sergiu Brînză, Vitalie Stati, Tratat de drept penal. Partea specială (Criminal Law Treatise. The Special Part), Vol. I, Tipografia Centrală (Central Printing House), Chișinău (Kishinev), 2015 4. George Antoniu, Tudorel Toader et al., Explicațiile

Open access
Laboratory and Field Research on the Ocular-motor Deception Test

, Department of Educational Psychology. Office of Technology Assessment (1983). Scientific validity of polygraph testing: A research review and evaluation . OTA-TM-H-15. Washington, DC: US Government Printing Office. Osher, D. (2005). Multimethod assessment of deception: Oculomotor movement, pupil size, and response time measures. Unpublished dissertation, University of Utah, Department of Educational Psychology. Patnaik, P. (2013). Ocular-motor methods for detecting deception: Direct versus indirect interrogation. Unpublished master’s thesis

Open access
Criminal Responsibility for Concealing Truth in Finance

, Mehdi (2003), Subversion of Goods, First Edition, Razavi University of Science and Technology, Mashhad, Iran. 20. Amid, Hasan, (1360), Farsi Farsi Amid, Third Edition, Amir Kabir Publishing. 21. Ghanavati, Jalil; Javar, Hossein (2006) “Comparative study of prosecuted maladjustment in British and Iranian law and Imamie jurisprudence”, Volume 10, Issue 3, 160-180 22. Katouzian, Naser (1395), General Terms of Contract, Liquidation of Contract, Tenth Edition, Public Joint Stock Company, Tehran. 23. Kashani, Alaeddin Abu Bakan Massoud, (1438), Al

Open access
Thermal Vision as a Method of Detection of Deception: A Review of experiences**

References Bauer J., Dereń E. (2014), Standaryzacja badań termograficznych w medycynie i fizykoterapii, Acta Bio-Optica et Informatica Medica Inżynieria Biomedyczna, Vol. 20, No. 1, p. 12. Eysenck H.J. (1971), Sens i nonsens w psychologii, Warszawa, pp. 87-88. Hilgard E.R. (1972), Wprowadzenie do psychologii, Warszawa, pp. 243-245. Jain U., Tan B., Li Q. (2012), Concealed Knowledge Identification using facial thermal imaging, Li Creative Technologies, Florham Park, NJ, USA. Kim K

Open access
fMRI as a Method of Detection of Deception: A Review of Experiences

). A cognitive neurobiological account of deception; Evidence from function neuroimaging. Philosophical Transaction of the Royal Society B: Biological Sciences, 359, 1755-1752. Spence, S. A., Farrow, T. F., Herford, A. E., Wilkinson, I. D., Zheng, Y., & Woodruff , P. W. (2001). Behavioural and functional anatomical correlates of deception in humans. Neuroreport, 12, 2849-2853. Vendemia, J. M., Schillaci, M. J., Buzan, R. F., Green, E. P., & Meek, S. W. (2009). Alternate technologies for the Detection of Deception. In D. Wilcox (Ed.), Th e Use of the Polygraph in

Open access
Cross-National Comparative Study on Legal Education and Admission to Practice Between China, India and Pakistan

. 13. Flood, J. (2011). Legal education in the global context: challenges from globalization, technology and changes in government regulation. 14. Gao, J. (2010). Comparison between Chinese and American Lawyers: Educated and Admitted to Practice Differently in Difference Legal System. Penn St. Int'l L. Rev., 29, 129. 15. Godwin, A., & Wu, R. W.-s. (2016). Legal Education, Practice Skills, and Pathways to Admission: A Comparative Analysis of Singapore, Hong Kong, and Australia. J. Legal Educ., 66, 212. 16. He, W. (2005

Open access