Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Community-Based Rehabilitation's Effectiveness In Reducing Singapore Juvenile Recidivism, Denzil Neo, June Hyuk Lee, Mervin Xin Hong Chew, Munisraj Sarfoji, Timothy Prakash Dec 2021

Community-Based Rehabilitation's Effectiveness In Reducing Singapore Juvenile Recidivism, Denzil Neo, June Hyuk Lee, Mervin Xin Hong Chew, Munisraj Sarfoji, Timothy Prakash

Introduction to Research Methods RSCH 202

Singapore's juvenile recidivism rate has climbed by around 5% since 2013, putting the country at risk of increased youth crime. With several mandatory rehabilitative programmes classified into two categories, Community-Based Rehabilitation (CBR) and Institutional-Based Rehabilitation (IBR), it is unclear whether the mandatory individual rehabilitative programmes for offenders were actually effective in achieving their corrective goals. This proposal would undertake a regression analysis to compare the effectiveness of CBR and IBR programmes utilizing secondary data gathered by the Ministry of Social and Family Development (MSF) and primary data from a survey. The survey will provide previously unstudied insights into the offender's …


Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam Jan 2007

Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam

Journal of Digital Forensics, Security and Law

Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …