Font Size: a A A

Regional Peacekeeping Research Under Control Of Pirates Of Crime

Posted on:2012-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:M ChenFull Text:PDF
GTID:2216330338959426Subject:Police Science
Abstract/Summary:PDF Full Text Request
The pirates into crime control theory of crime is the logical starting point, this paper, in view of the pirates are divided into the traditional mode and crime modern mode. In the traditional mode, pirates of the definition of political leanings, depends on the city-state piracy, belong to the state behavior category as a political tool, pirates in the ocean for sea state assistance right position. Seems irrelevant and crime control, experienced medieval religious piracy until after the modern period before be defined as crime, its essence is to the transformation of political points, such into crime control system provides space, the establishment of the theory of crime control, namely "defense form of space" will be applied adequately to modern pirates crime control. Modern day pirates are crime group, specialization and appears to have new features, militarization of traditional control mode to renew brilliant, the purely military strikes, single economic sanctions and traditional regional control have been serious behind the development of The Times, may also cause pirates to the maritime terrorism crime evolution, the cost of increased crime control, how to establish a kind of josh, controlled by those who control and message into a "defense space" is a topic worth; Should notice, who was accused of mainly include formal subject and informal subject, formal subject mainly including the national legislative, judicial institutions and the government or party, informal subject is represented by the legal community. The modern pirates controlled, of course, is a crime, focus on the status and the behavior of investigation of various crime numerical, according to malignant pirates crime rates, pirates crime levels and material loss and personnel damage by factors such as statistical number, who was accused of feedback mechanism guiding corresponding control measures are crime control. System of the role of runners are in many ways is in control according to the actual situation of a choice, thus will the above three organically, to form a more perfect control system. And the purpose of this essay is will such a system used in modern pirates crime control, modern pirates crime presents more new characteristics, according to these characteristics, the international community gradually formed a international organizations as the main body of the global fight against mode, which typically regional peacekeeping model, in this mode, who was accused of general for multinational combined fleet, folk security forces and each member's legislation and judicial institution, controlled for control area of the pirates, it is important to note that crime areas of the secondary crime also belongs to the scope of controlled, those, such as money laundering, bribery crimes, etc. This article mainly focuses on the analysis of the nature of josh, accused the state controlled and message corresponding change; Second explains the characteristics of modern pirates in crime control mode, how should choose specific can be divided into social control and legal control, social control with "defense space" system, for example, is the preferred means of control pirates crime; Legal control is the national laws and international relations from criminal legislation and criminal justice, the interaction of reasonable configuration, two aspects to control the goal. All the way for such a purpose, are coming in a pirate crime control within safe limits, and avoid to other political crime pirates crime transformation. This paper will take the analysis method of sociology and jurisprudence, using comparative research on this way listed are analyzed, in order to view the contents of finish will discusses.
Keywords/Search Tags:Crime control, Pirates behavior, Regional peacekeeping, Defense space
PDF Full Text Request
Related items