...Criminology & Criminal Justice © 2006 SAGE Publications (London, Thousand Oaks & New Delhi) and the British Society of Criminology. www.sagepublications.com ISSN 1748–8958; Vol: 6(1): 39–62 DOI: 10.1177/1748895806060666 A desistance paradigm for offender management FERGUS McNEILL Universities of Glasgow and Strathclyde, UK Abstract In an influential article published in the British Journal of Social Work in 1979, Anthony Bottoms and Bill McWilliams proposed the adoption of a ‘non-treatment paradigm’ for probation practice. Their argument rested on a careful and considered analysis not only of empirical evidence about the ineffectiveness of rehabilitative treatment but also of theoretical, moral and philosophical questions about such interventions. By 1994, emerging evidence about the potential effectiveness of some intervention programmes was sufficient to lead Peter Raynor and Maurice Vanstone to suggest significant revisions to the ‘non-treatment paradigm’. In this article, it is argued that a different but equally relevant form of empirical evidence—that derived from desistance studies—suggests a need to re-evaluate these earlier paradigms for probation practice. This reevaluation is also required by the way that such studies enable us to understand and theorize both desistance itself and the role that penal professionals might play in supporting it. Ultimately, these empirical and theoretical insights drive us back to the complex interfaces between technical and moral...
Words: 10652 - Pages: 43
...An Overview of Computer Viruses in a Research Environment Matt Bishop Department of Mathematics and Computer Science Dartmouth College Hanover, NH 03755 ABSTRACT The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example...
Words: 12539 - Pages: 51