Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (1)
- Computer Law (1)
- Computer Sciences (1)
- Development Studies (1)
- Electrical and Computer Engineering (1)
-
- Engineering (1)
- Family, Life Course, and Society (1)
- Forensic Science and Technology (1)
- Information Security (1)
- Juvenile Law (1)
- Legal Studies (1)
- Physical Sciences and Mathematics (1)
- Public Administration (1)
- Public Affairs, Public Policy and Public Administration (1)
- Social Work (1)
- Sociology (1)
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Law
Community-Based Rehabilitation's Effectiveness In Reducing Singapore Juvenile Recidivism, Denzil Neo, June Hyuk Lee, Mervin Xin Hong Chew, Munisraj Sarfoji, Timothy Prakash
Community-Based Rehabilitation's Effectiveness In Reducing Singapore Juvenile Recidivism, Denzil Neo, June Hyuk Lee, Mervin Xin Hong Chew, Munisraj Sarfoji, Timothy Prakash
Introduction to Research Methods RSCH 202
Singapore's juvenile recidivism rate has climbed by around 5% since 2013, putting the country at risk of increased youth crime. With several mandatory rehabilitative programmes classified into two categories, Community-Based Rehabilitation (CBR) and Institutional-Based Rehabilitation (IBR), it is unclear whether the mandatory individual rehabilitative programmes for offenders were actually effective in achieving their corrective goals. This proposal would undertake a regression analysis to compare the effectiveness of CBR and IBR programmes utilizing secondary data gathered by the Ministry of Social and Family Development (MSF) and primary data from a survey. The survey will provide previously unstudied insights into the offender's …
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Journal of Digital Forensics, Security and Law
Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …