Zoekresultaat: 3 artikelen

x
De zoekresultaten worden gefilterd op:
Tijdschrift Justitiële verkenningen x Jaar 2012 x

    In the past decades, telecommunications traffic has grown explosively. There has been an enormous expansion of the use of mobile phones. In addition, the way in which these phones are used has changed as well. An ever growing number of mobile phones is connected to the Internet, and a growing share of communications take place through the Internet. As a result, communication gets increasingly fragmented, because of the various ways and channels available for communication. In this article, the authors discuss the possible implications of these developments for the use of the telephone tap as an investigative tool during criminal investigations. Furthermore, the authors examine the ways in which the internet tap can support or replace the use of the telephone tap. Finally, alternative investigation tools are discussed that might compensate the changing results of the telephone tap.


G. Odinot
Dr. G. Odinot is onderzoeker bij het WODC.

D. de Jong
D. de Jong, MSc is onderzoeker bij het WODC.

    As a contribution to literature drawing together green criminology and studies of organized and corporate crime, this paper provides a case study of crimes and public health harms linked to the Naples garbage disposal crisis. The context is the inability of modern consumer society to cope with the problem of mass production of waste. In turn this leads to opportunities for both legal and criminal entrepreneurs to offer services that promise but fail to ‘dispose’ of the problem. The analysis draws upon environmental law and classic studies of organised crime.


V. Ruggiero
Prof. Vincenzo Ruggiero is als hoogleraar sociologie verbonden aan de Middlesex University in Londen.

N. South
Prof. Nigel South is hoogleraar sociologie aan de University of Essex.

    When it comes to cybersecurity usually little attention is payed to internal threats, i.e. from within organizations themselves which may - intentional or not - breach the confidentiality of digitally stored information. When a secret reaches the media, it often generates a lot of public attention. Not only because of the content or the curiosity-value of the secret itself, but also because of the - sometimes shockingly simple - way the secret has been leaked. This kind of security breach in particular gives rise to negative publicity, which not only impacts the organization which it concerns, but also reflects badly on other peers in the sector, especially in the case of breaches that are government-related. In this article, the author explores the issues of the leaking of secrets in ‘cyberspace’ by using several examples - such as the WikiLeaks affair - to illustrate the effects of ICT developments in the last two to three decades on vulnerabilities in information security. The article then focuses on new developments in ‘Alternative Workplace Strategies’ and the related use of new technologies in relation to the vulnerabilities in information security. Organizations can reduce the threats by facilitating their employees with smart solutions which are also results of new technologies.


J.H. Maat
Mr. Johri Maat, MSSM is senior adviseur bij het ministerie van Binnenlandse Zaken en Koninkrijksrelaties en gespecialiseerd in security science & management. Dit artikel is op persoonlijke titel geschreven.
Interface Showing Amount
U kunt door de volledige tekst zoeken naar alle artikelen door uw zoekterm in het zoekveld in te vullen. Als u op de knop 'Zoek' heeft geklikt komt u op de zoekresultatenpagina met filters, die u helpen om snel bij het door u gezochte artikel te komen. Er zijn op dit moment twee filters: rubriek en jaar.