Search results
1 – 10 of 31Tinna Dögg Sigurdardóttir, Adrian West and Gisli Hannes Gudjonsson
This study aims to examine the scope and contribution of Forensic Clinical Psychology (FCP) advice from the National Crime Agency (NCA) to criminal investigations in the UK to…
Abstract
Purpose
This study aims to examine the scope and contribution of Forensic Clinical Psychology (FCP) advice from the National Crime Agency (NCA) to criminal investigations in the UK to address the gap in current knowledge and research.
Design/methodology/approach
The 36 FCP reports reviewed were written between 2017 and 2021. They were analysed using Toulmin’s (1958) application of pertinent arguments to the evaluation process. The potential utility of the reports was analysed in terms of the advice provided.
Findings
Most of the reports involved murder and equivocal death. The reports focused primarily on understanding the offender’s psychopathology, actions, motivation and risk to self and others using a practitioner model of case study methodology. Out of the 539 claims, grounds were provided for 99% of the claims, 91% had designated modality, 62% of the claims were potentially verifiable and 57% of the claims were supported by a warrant and/or backing. Most of the reports provided either moderate or high insight into the offence/offender (92%) and potential for new leads (64%).
Practical implications
The advice provided relied heavily on extensive forensic clinical and investigative experience of offenders, guided by theory and research and was often performed under considerable time pressure. Flexibility, impartiality, rigour and resilience are essential prerequisites for this type of work.
Originality/value
To the best of the authors’ knowledge, this study is the first to systematically evaluate forensic clinical psychology reports from the NCA. It shows the pragmatic, dynamic and varied nature of FCP contributions to investigations and its potential utility.
Details
Keywords
Anne Leena Marika Kauppi, Tuija Vanamo, Kari Karkola and Juhani Merikanto
A parent who continuously physically abuses her/his child doesn't aim to kill the child but commits an accidental filicide in a more violent outburst of anger. Fatal abuse deaths…
Abstract
A parent who continuously physically abuses her/his child doesn't aim to kill the child but commits an accidental filicide in a more violent outburst of anger. Fatal abuse deaths are prevented by recognition of signs of battering in time. Out of 200 examined intra-familial filicides, 23 (12%) were caused by child battering and 13 (7%) by continuous battering. The medical and court records of the victim and the perpetrator were examined. The perpetrator was the biological mother and the victim was male in 69 per cent of the cases. The abused children were either younger than one year or from two-and-a-half to four years old. Risk factors of the victim (being unwanted, premature birth, separation from the parent caused by hospitalization or custodial care, being ill and crying a lot) and the perpetrator (personality disorder, low socioeconomic status, chaotic family conditions, domestic violence, isolation, alcohol abuse) were common. The injuries caused by previous battering were mostly soft tissue injuries in head and limbs and head traumas and the battering lasted for days or even an year. The final assault was more violent and occurred when the parent was more anxious, frustrated or left alone with the child. The perpetrating parent was diagnosed as having a personality disorder (borderline, narcissistic or dependent) and often substance dependence (31%). None of them were psychotic. Authorities and community members should pay attention to the change in child's behavior and inexplicable injuries or absence from daycare. Furthermore if the parent is immature, alcohol dependent, have a personality disorder and is unable to cope with the demands the small child entails in the parent's life, the child may be in danger.
Details
Keywords
Tinna Dögg Sigurdardóttir, Lee Rainbow, Adam Gregory, Pippa Gregory and Gisli Hannes Gudjonsson
The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).
Abstract
Purpose
The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).
Design/methodology/approach
The 77 BIA reports reviewed were written between 2016 and 2021. They were evaluated using Toulmin’s (1958) strategy for structuring pertinent arguments, current compliance with professional standards, the grounds and backing provided for the claims made and the potential utility of the recommendations provided.
Findings
Consistent with previous research, most of the reports involved murder and sexual offences. The BIA reports met professional standards with extremely high frequency. The 77 reports contained a total of 1,308 claims of which 99% were based on stated grounds. A warrant and/or backing was provided for 73% of the claims. Most of the claims in the BIA reports involved a behavioural evaluation of the crime scene and offender characteristics. The potential utility of the reports was judged to be 95% for informative behavioural crime scene analysis and 40% for potential new lines of enquiry.
Practical implications
The reports should serve as a model for the work of behavioural investigative advisers internationally.
Originality/value
To the best of the authors’ knowledge, this is the first study to systematically evaluate BIA reports commissioned by the NCA; it adds to previous similar studies by evaluating the largest number of BIA reports ever reviewed, and uniquely provides judgement of overall utility.
Details
Keywords
This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which…
Abstract
This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which have been identified as root causes of the missing and murdered Indigenous women crisis in Canada. The authors consider how technology can facilitate multiple forms of violence against women including stalking and intimate partner violence, human trafficking, pornography and child abuse images, and online hate and harassment and note instances where Indigenous women and girls may be particularly vulnerable. The authors also explore some of the complexities related to police use of technology for investigatory purposes, touching on police use of social media and DNA technology. Without simplistically blaming technology, the authors argue that technology interacts with multiple factors in the complex historical, socio-cultural environment that incubates the national crisis of missing and murdered Indigenous women and girls. The article concludes with related questions that may be considered at the impending national inquiry.
Details
Keywords
The purpose of this paper is to critically analyse the extent of protection available for whistleblowers in South African criminal cases.
Abstract
Purpose
The purpose of this paper is to critically analyse the extent of protection available for whistleblowers in South African criminal cases.
Design/methodology/approach
This paper first provides a brief background of crime in South Africa and argues that the concept of the whistleblower is just a buss word or collective noun. The methodology of this paper consists of a literature review of whistleblowers and relevant laws that can be used to protect whistleblowers in South African criminal cases.
Findings
This paper concludes that the existing law as primarily contained in the Criminal Procedure Act 51 of 1977 provides appropriate protection for whistleblowers in South African criminal cases.
Research limitations/implications
Whistleblowers provide information on criminal, civil and disciplinary wrongdoings. This study focuses on the protection of whistleblowers pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977.
Originality/value
The originality of this paper lies in the approach to the handling of whistleblowers in South African criminal cases. This is the first research done with the emphasis on the use of mainly the provisions of the Criminal Procedure Act 51 of 1977 to protect whistleblowers in South African criminal cases. The contribution of the study is that, by using this approach, it can provide protection and save lives, and it may enhance the willingness of whistleblowers to blow the whistle, which will be beneficial to the community of South Africa as a whole.
Details
Keywords
Bridget Harris and Delanie Woodlock
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…
Abstract
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.
Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.
Details
Keywords
Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…
Abstract
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.
Details
Keywords
Muhammad Ali Jinnah Ahmad and Burhanuddin Lukman
This paper aims to examine the implications of compensation on late payment of takāful benefit imposed in the Islamic Financial Services Act 2013 on the takāful industry in…
Abstract
Purpose
This paper aims to examine the implications of compensation on late payment of takāful benefit imposed in the Islamic Financial Services Act 2013 on the takāful industry in Malaysia. It also aims to identify the issues and challenges faced by takāful operators in the implementation of the compensation and propose solutions for the benefits of the takāful industry.
Design/methodology/approach
This research uses the qualitative approach to understand the practices of claims in takāful and to analyze the implication of compensation on late payment of takāful benefit to the takāful industry in Malaysia. Data are collected through survey and interview with various takāful stakeholders.
Findings
Some of the key findings in this research are that the compensation of late payment of takāful benefit has a positive impact to the takāful industry. The research also found some Sharīʿah operational issues in terms of its implementation among takāful operators.
Research limitations/implications
The research focuses on compensation on late payment of takāful benefit claim in death and personal accident only.
Practical implications
The research offers certainty to the takāful industry and an explanation to academic and legal fraternities on the implementation of compensation on late payment of takāful benefit according to Islamic Financial Services Act (IFSA) 2013.
Originality/value
The research provides a valuable contribution to the current practices of takāful operators, identifies some issues and challenges of its implementation and proposes the solution.
Details