نتایج جستجو برای: keywords victim
تعداد نتایج: 1984901 فیلتر نتایج به سال:
abstract the problems caused by the traditional system of criminal justice (which are based on remuneration and rehabilitation) such as, lack of attention to victim’s rights and position and society, underlie the emergence of restorative justice which had the victim-centered perspective, with respect to the role of the offender and participation of civil society. meanwhile, criminal mediation ...
one of the most important necessities that victimology requires at least within criminal sciences is to create a general theory describing and explaining all concepts, theories and hypotheses which may be used in this scientific sphere. the present article seeks to introduce such a theory, using key terminologies formed the literature and content of victimology from beginning of its emergence s...
This study examined whether participants’ attributions of blame and responsibility toward a victim of domestic violence were influenced by whether or not the victim left her abuser. It also looked at whether or not educational information regarding the difficulties of leaving a violent partner would affect these attributions. Participants, all adults from the United States, either read a vignet...
a r t i c l e i n f o Keywords: Restorative justice Victim offender mediation Apology Juvenile offender Victim-sensitive communication This qualitative study examined the multiple perspectives of participants' experiences of a Victim Offender Mediation (VOM) program operating in a Midwestern city. Thirty-four face-to-face interviews were conducted with 37 participants, including juvenile offend...
This paper proposes a study of distributed denial-of service attacks and a study of the defense mechanism that strive to counter these attacks. The attack illustrate do using both known and potential attack mechanisms along with this classification we discuss important feature .So each attack category that in turn define the challenge involved in combating these threats. Distributed Denial of S...
The number of malware variants is growing tremendously and the study of malware attacks on the Internet is still a demanding research domain. In this research, various logs from different OSI layer are explore to identify the traces leave on the attacker and victim logs, and the attack worm trace pattern are establish in order to reveal true attacker or victim. For the purpose of this paper, it...
Free AccessImportant Keywordshttps://doi.org/10.14220/9783737013444.259SectionsPDF/EPUB ToolsAdd to favoritesDownload CitationsTrack Citations ShareShare onFacebookTwitterLinkedInRedditEmail About Previous chapter Next FiguresReferencesRelatedDetails Download book coverOsnabrücker Studien zur Jüdischen und Christlichen Bibel.Volume 8 1st editionISBN: 978-3-8471-1344-7 eISBN: 978-3-7370-1344-4Hi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید