1,046 research outputs found
Bite mark analysis in forensic routine case work
The individuality of the human dentition frequently allows the Forensic Odonto-Stomatologist (FOS) to reach a strong opinion of association in cases of identification and bite mark analy-sis. Such analysis can often be useful during the investigation of violent crimes, especially those involving sexual assault. Bites from animals are rarely the object of bite mark analysis. The teeth of animals leave patterned injuries that appear quite different from those created by human teeth. This is especially true with dogs, which are predominant culprits in bites to humans. Dogs bite humans at a rate eight times more frequently than humans bite each other. However, such bites may need to be analyzed in order to distinguish what species of animal may have been the attacker, or exclude one or more animals when there is more than one possible offender. Typical cases of routine bite mark analysis encountered by the FOS are presented. Two cases of dog bites appearing as possible accidents and two human bites report about this spectrum. In another case, a child abuse with several specific bite marks shows the potential to detect the perpetrator. The last case representing a bite mark in a fruit is obtained from criminal routine case work. It is hoped that these cases will demonstrate the significant role the analysis of bite marks might play alongside other criminalistic routines. The FOS is often involved in a late stage of the investigation. This is one reason for the problems associated with the bite mark analysis in the cases presented. Additionally, the quality of the documentation of patterned injuries is often incomplete
Tsunami 2004
The Tsunami after the sea quake in Southeast Asia at the 26th of December 2004 represents one of the largest disasters in the modern World. Approximately 228,000 people from the countries surrounding the Indian Ocean have died. A large number of visitors from different European countries staying for their Christmas holidays in Thailand and Sri Lanka became victims of the natural disaster. The large number of foreign victims in these countries required additional forensic investigations which were organized by internationally working DVI (Disaster Victim Identification) teams. Victim identification was a great challenge due to the environmental conditions rapidly leading to heavily decomposed bodies. Thus the forensic medical investigations were very important to identify the victims. The different steps of forensic medical, odonto-stomatological and molecular genetic investigations beginning at the end of 2004 with the identification of a small number of victims and ending with the closing of the TTVI IMC (Thai Tsunami Victim Identification Information Management Center) in Phuket one year later are described and critically discussed. Up to 31 international DVI Teams worked in the TTVI IMC during 2005
Who knows who we are? Questioning DNA analysis in disaster victim identification
The use of DNA analysis as a mode of identification of disaster victims has become increasingly predominant to other, traditional, methods of identification in recent years. Scientific advances of the technological processes, high-profile use in identification efforts across the globe (such as after 9/11 or in the Asian Tsunami of 2004), and its inclusion in popular media, have led to its popular adoption as one of the primary modes of identification in disaster scenarios, and to the expectation of its use in all cases by the lay public and media. It is increasingly argued to be integral to post-disaster management. However, depending on the circumstances, location, and type of disaster, this technology may not be appropriate, and its use may instead conflict with socio-political and cultural norms and structures of power. Using examples primarily from Cambodia and Iraq this article will explore what these conflicts may be, and in doing so, question the expanding assumption that DNA analysis is a universally appropriate intervention in disaster victim identification. It will argue instead that its use may be a result of a desire for the political and social capital that this highly prestigious technological intervention offers rather than a solely humanitarian intervention on behalf of survivors and the dead
The architecture of a probation office: a reflection of policy and an impact on practice
This article illustrates how the physicality of a probation office can be considered both integral to, and representative of, several important changes in the probation service’s recent history through analysis of research conducted in a probation office. I suggest that the relationship between the ‘protected’ zone of the office and the ‘unprotected’ zone of the waiting area and interview rooms is similar to Goffman’s ‘frontstage’ and ‘backstage’ and expand on his theory of social action by describing how the architecture of probation represents and potentially perpetuates the rise of risk, punishment and managerialism in probation. The article then moves onto the exterior and location of the office to look at how these represent probation’s move away from the communities it serves as well as inadvertently increasing the amount of punishment certain offenders receive. This has significant consequences if the policy of probation moves towards modes of practice which no longer prioritise standardisation and punishment over professional judgment and the importance of the offender-officer relationship and the article concludes by looking to some examples of more inclusive forms of office design and architecture
Net neutrality discourses: comparing advocacy and regulatory arguments in the United States and the United Kingdom
Telecommunications policy issues rarely make news, much less mobilize thousands of people. Yet this has been occurring in the United States around efforts to introduce "Net neutrality" regulation. A similar grassroots mobilization has not developed in the United Kingdom or elsewhere in Europe. We develop a comparative analysis of U.S. and UK Net neutrality debates with an eye toward identifying the arguments for and against regulation, how those arguments differ between the countries, and what the implications of those differences are for the Internet. Drawing on mass media, advocacy, and regulatory discourses, we find that local regulatory precedents as well as cultural factors contribute to both agenda setting and framing of Net neutrality. The differences between national discourses provide a way to understand both the structural differences between regulatory cultures and the substantive differences between policy interpretations, both of which must be reconciled for the Internet to continue to thrive as a global medium
Net neutrality discourses: comparing advocacy and regulatory arguments in the United States and the United Kingdom
Telecommunications policy issues rarely make news, much less mobilize thousands of people. Yet this has been occurring in the United States around efforts to introduce "Net neutrality" regulation. A similar grassroots mobilization has not developed in the United Kingdom or elsewhere in Europe. We develop a comparative analysis of U.S. and UK Net neutrality debates with an eye toward identifying the arguments for and against regulation, how those arguments differ between the countries, and what the implications of those differences are for the Internet. Drawing on mass media, advocacy, and regulatory discourses, we find that local regulatory precedents as well as cultural factors contribute to both agenda setting and framing of Net neutrality. The differences between national discourses provide a way to understand both the structural differences between regulatory cultures and the substantive differences between policy interpretations, both of which must be reconciled for the Internet to continue to thrive as a global medium
Creating the collective: social media, the Occupy Movement and its constitution as a collective actor
This paper examines the process through which Occupy activists came to constitute themselves as a collective actor and the role of social media in this process. The theoretical framework combines Melucci's (1996) theory of collective identity with insights from the field of organizational communication and particularly from the ‘CCO’ strand – short for ‘Communication is Constitutive of Organizing’. This allows us to conceptualize collective identity as an open-ended and dynamic process that is constructed in conversations and codified in texts. Based on interviews with Occupy activists in New York, London and other cities, I then discuss the communication processes through which the movement was drawing the boundaries with its environment, creating codes and foundational documents, as well as speaking in a collective voice. The findings show that social media tended to blur the boundaries between the inside and the outside of the movement in a way that suited its values of inclusiveness and direct participation. Social media users could also follow remotely the meetings of the general assembly where the foundational documents were ratified, but their voices were not included in the process. The presence of the movement on social media also led to conflicts and negotiations around Occupy's collective voice as constructed on these platforms. Thus, viewing the movement as a phenomenon emerging in communication allows us an insight into the efforts of Occupy activists to create a collective that was both inclusive of the 99% and a distinctive actor with its own identity
Probation practice in the information age
This article analyses the implications of the greater use of technology and information
in probation practice. Using data generated via an ethnography of probation, the
article firstly argues that probation in England and Wales now exists in what scholars
would identify as ‘the information age’ (i.e. that computers and other technologies
work to define and create probation practice as we know it). The article goes on to
use actor-network theory to analyse two ‘heterogeneous networks’ to explore the
way in which probation practitioners and the technologies they use interact to create
particular forms of practice. The article argues that unless we understand the technology
that underpins practice we cannot fully understand practice. Finally, the
article considers the implications of this analysis for probation post-Transforming
Rehabilitation (TR)
The potential of a mobile group blog to support cultural learning among overseas students
We explored the use of mobile social software, in the form of a mobile group blog, to assist cultural learning. The potential of using this technology for cultural adaptation among overseas students was examined as those students adapted to the everyday life of studying abroad. Two pilot studies and a successful field study of a mobile group blog as used by UK overseas students are reported. A further study with prospective overseas students witnessing this ‘moblogging’ in China revealed the advantages of communicating through this technology as a form of peer-supported preparation for cultural adaptation. Potential advantages for learning a second language via this system, were highlighted as communication was interweaved with cultural adaptation and exercised in the blog entries. Given mobile internet, the language experience together with cultural observation impressively supported these students' growing confidence with time, space and imagination
- …
