Chapter 11/12 Flashcards
Nuturant Strategies
Nurturant Strategy: a crime prevention strategy that
attempts to forestall development of criminality by
improving early life experiences and channeling child and
adolescent development into desirable directions (p.287)
Concepts of Bunchie
deterrence strategies
Deterrence Strategy: a crime-prevention strategy that
attempts to diminish motivation for crime by increasing the
perceived certainty, severity, or celerity of penalties
(p287).
* New and tougher laws
* Quicker trial-court processing
* Harsher punishments
* Faster imposition of sentences
different nurturant strategies
those that improve early life experiences to forestall the development of strategic styles based on criminality, and those that channel child and adolescent development in an effort to improve the match between individuals and their environment.
What Does CEPTED focus on
A crime-prevention strategy based on the premise that the proper design and effective use of the built environment can lead to a reduction in the incidence and fear of crime.
Define Program Implementation
Program implementation refers to how well a proposed program or intervention is put into practice and is fundamental to establishing the internal, external, construct, and statistical conclusion validity of outcome evaluations.
Define public policy
Government-formulated directives made on behalf of the public good to solve a problem or achieve an end
National prevention crime programs
The Communities at Risk: Security infrastructure program
The Crime Prevention Action Fund
The Northern and Aboriginal Crime Prevention Fund
The Youth Gang Prevention Fund
Who imprisons the most people in the western world
United States
Which Type of crime prevention does Canada use
The National Crime Prevention
Strategy Objectives:
1. Preventing crime among vulnerable groups.
2. Targeting criminogenic risk factors.
3. Focusing on persons most at risk of offending.
4. Supporting evidence-based interventions
5. Working for communities and practitioners
How many stages are need to develop a public policy
Five stages of policy development:
1. Identification of the problem.
2. Agenda setting or prioritization of problems.
3. Policy formation.
4. Program implementation.
5. Program evaluation and reassessment
Social problems perspective
The second perspective of criminology is a more encompassing perspective. It is known as the social problem perspective. This perspective sees crime in the context that it is committed.
Who’s the quickest adapter of biometrics
Banks - and the financial services industry, more broadly - have been one of the quickest adopters of biometrics technology
Viruses
Reign
What is Phishing
An internet-based scam to steal valuable information, such as credit card numbers, social insurance, user IDs, and passwords.
Changing technology relation to crime
Technology and crime have always been closely linked:
however, in the 21st century, there appears to be a widening
gap in the use of technology for crime and its use for
prevention (p.305)
Cybercrime: Any crime that involves a computer as the
object of the crime or as a tool used to commit a material
component of the offence.
* Two broad categories:
– Computers as a Tool of Crime.
– Computers as an Object of Crime.
How many people are trafficked from Canada to the USA every year
between 1,500 and 2,200
Year c11 came about
Bill C-11, is a bill introduced in the 44th Canadian Parliament. It was first introduced on November 3, 2020, by Minister of Canadian Heritage Steven Guilbeault during the second session of the 43rd Canadian Parliament.
New revisions to technology crime
Privacy Act (1985)
Personal Information Protection and Electronics Documents
Act (or PIPEDA) of 2000
Canada’s Cyber Security Strategy:
* Designed to enhance the protection from cyberthreats.
Three pillars:
1. Securing government systems.
2. Partnering to secure vital cybersystems. outside the
federal government.
3. Helping Canadians to be secure online.
Globalization of crime
A process of social homogenization by which the experience of everyday life, marked by the diffusion of commodities and ideas, can foster a standardization of cultural expressions around the world
Software piracy
Software piracy:
* Unauthorized and illegal copying of software programs
Benefits of computer crime
while cybercrime itself is harmful, the response to it has led to some positive outcomes. These include the advancement of cybersecurity technologies, increased public awareness and education about digital safety, growth in the cybersecurity job market, and stronger laws and regulations for digital security.
Biometrics for law enforcement
High-precision biometric devices capture astonishingly detailed fingerprint and palm print images
Largest Group for Human Trafficking
Men aged 18 to 34 accounted for almost two-thirds (64%) of all persons accused of human trafficking. Across adult age groups, the proportion of men accused of human trafficking outnumbered that of women, with about four in five (80%) accused identified as men in each adult age group.Dec 4, 2023
How they identify your thumb swiping
Fingerprint analysis