Katherine S. Williams
Aberystwyth University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Katherine S. Williams.
Crime Law and Social Change | 2000
Katherine S. Williams; Craig Johnstone
This paper gives first an explanation for therapid development of Closed Circuit Television (CCTV)throughout Britain. This considers the implicationsof its rapid proliferation on the geographies ofpublic space and highlights the selectivity of thegaze of the surveillance cameras and the consequentpotential for the exclusion of certain groups frompublic space. The paper then extends this by usingresearch from two rural towns to address three basicquestions: how the cameras are used for direct lawenforcement; how this use is governed; and how thepublic react to the use of CCTV. It concludes that bystressing the selectivity of the surveillance anddrawing the implications of this for enforcement andgovernance, and also stressing the extent to which theplacing and timing of the use of the cameras fails toreflect the revealed preferences of the communitiesinvolved.
Journal of Social Welfare and Family Law | 2004
Katherine S. Williams
This article examines the ways in which the legal system attempts, through actual legislation and a graded sentencing policy, to control child pornography. The motives for legislating in this area are discussed through looking at parliamentary, ministerial and judicial comments before the article offers some analysis of the discrepancies between intentions and realities. Finally, some issues concerning effective enforcement are briefly raised. It concludes by suggesting that the function of law needs to be more carefully defined so as to focus more clearly on child protection and on the surest means of delivering this.
International Review of Law, Computers & Technology | 2008
Katherine S. Williams
This article studies Tittles control balance theory that bases criminal and deviant behaviour on the desire to increase levels of autonomy and uses this to deconstruct Internet crime. It suggests that anonymity and deindividuation are facets of opportunity and means of reducing the likelihood that normal constraints will interfere and questions their position as causative elements of computer mediated crime. It suggests that the control balance theory can help to understand why there may be high levels of computer crime and why individuals who might refrain from deviance in the real world may participate in deviant behaviour on-line. Finally, there are tentative suggestions for policy initiatives as well as a recognition that both these and the application of control balance in this area would benefit from further analysis.
Chromosome Research | 1996
Huw M. Thomas; Katherine S. Williams; John Harper
Primedin situ DNA labelling (PRINS) labels the telomeres ofAvena, Triticum, Secale, Hordeum, Lolium, Festuca andTrifolium when primers are used that correspond to the repeat unit ofArabidopsis telomeres. There are interstitial sites labelled in aLolium x Festuca hybrid.
Youth Justice | 2017
Diana Johns; Katherine S. Williams; Kevin Haines
This article outlines a social-ecological approach to understanding young people’s prolific offending and effective youth justice responses to it. Seeing young people through the lens of interactions and relationships – with family, peers, community and the broader socio-cultural-political context – gives insight into the type of interventions that can most effectively disrupt their offending and enhance their wellbeing. These insights have implications for the way in which youth offending teams engage with young people, in their social context, to bring about positive change in their lives. Effective interventions, we argue, focus on engaging young people in normalising relationships, over time.
Computer Law & Security Review | 2000
Indira Carr; Katherine S. Williams
Abstract “Computers have ushered in a new age filled with the potential for good. Unfortunately, the computer age also has ushered in new types of crime for the police to address. law enforcement must seek ways to keep drawbacks from overshadowing the great promise of the computer age.” (Carter & Katz) 1 The growth in the use of computers and of electronic trading around the world has highlighted the economic potential of computer technology both to industry and states. The importance of encouraging a flourishing market in all aspects of this technology has been fairly central to most national governments and many regional groupings. In an attempt to secure the investment which will follow this industry governments seem to compete to provide the most advantageous legal environment in which to facilitate the potential wealth creating aspects of IT. To this end many governments have passed legislation to secure the electronic environment from intrusion. This article considers three such attempts (the UK, Malaysia and Singapore). It compares the laws, the powers of investigation and the penalty levels, as well as the amount of use to which these laws are put once enacted and suggests that these criminal laws have more to do with political and economic competition than with any genuine attempt to curtail intrusive and destructive activities directed at computers. It suggests that the laws may actually be economically destructive and recommends other measures that might be more usefully employed to control these activities.
Computer Law & Security Review | 2002
Indira Carr; Katherine S. Williams
Abstract This article explores the substantive criminal law provisions of the (Draft) Council of Europe Convention on Cyber-crime. The authors argue that while the draft Convention has succeeded in protecting economic interests, it has done so partly at the expense of individual rights and dignity. Suggestions are made as to how the draft Convention might be improved.
Child Abuse Review | 2005
Katherine S. Williams
Archive | 1994
Indira Carr; Katherine S. Williams
Legal Studies | 2002
Katherine S. Williams; Bernadette Rainey