Javascript must be enabled to continue!
Stealing
View through CrossRef
Abstract
This chapter argues that the norm against stealing is clearly an essential ingredient in a wide range of criminal law offenses, often combined with some other moral norm to create a distinctive crime: thus, stealing plus deception constitutes fraud or false pretenses; stealing plus disloyalty constitutes embezzlement; stealing plus coercion equals extortion; stealing plus the use of unjustified force equals robbery; and so forth. The fit between stealing and the law of theft is far from perfect. Until recently, the criminal law of theft was quite narrow, applying only to the misappropriation of tangible property, and excluding such intangibles as a ride on a train, a deed to land, and stocks and securities. Thus, there were many instances in which X could be said to have ‘stolen’ something in the moral sense of the term, without being subject to criminal sanctions for theft. Conversely, there are cases in which X is subject to what is referred to by the law as ‘theft’ even though many people would say that he has not stolen anything.
Title: Stealing
Description:
Abstract
This chapter argues that the norm against stealing is clearly an essential ingredient in a wide range of criminal law offenses, often combined with some other moral norm to create a distinctive crime: thus, stealing plus deception constitutes fraud or false pretenses; stealing plus disloyalty constitutes embezzlement; stealing plus coercion equals extortion; stealing plus the use of unjustified force equals robbery; and so forth.
The fit between stealing and the law of theft is far from perfect.
Until recently, the criminal law of theft was quite narrow, applying only to the misappropriation of tangible property, and excluding such intangibles as a ride on a train, a deed to land, and stocks and securities.
Thus, there were many instances in which X could be said to have ‘stolen’ something in the moral sense of the term, without being subject to criminal sanctions for theft.
Conversely, there are cases in which X is subject to what is referred to by the law as ‘theft’ even though many people would say that he has not stolen anything.
Related Results
Symptom Severity and Its Clinical Correlates in Kleptomania
Symptom Severity and Its Clinical Correlates in Kleptomania
Background
Kleptomania (compulsive stealing) remains poorly understood, with limited data regarding its underlying pathophysiology and appropriate treatment choices.
...
Lifeline-based global load balancing
Lifeline-based global load balancing
On shared-memory systems, Cilk-style work-stealing has been used to effectively parallelize irregular task-graph based applications such as Unbalanced Tree Search (UTS). There are ...
Horse stealing in the Samara province in 1923-1925
Horse stealing in the Samara province in 1923-1925
This paper considers the problem of horse stealing in the Samara province in 1923-1925. The author conducted a study of causes and dynamics of horse thefts in the region, as well a...
A Comprehensive Method of Recovering Electricity Stealing Based on Data Mining
A Comprehensive Method of Recovering Electricity Stealing Based on Data Mining
Abstract
Aiming at the current situation that the current methods of recovering the stolen electricity often use manual analysis and estimation, which leads to unsat...
Mix En Meng It Op: Emile YX?'s Alternative Race and Language Politics in South African Hip-Hop
Mix En Meng It Op: Emile YX?'s Alternative Race and Language Politics in South African Hip-Hop
This paper explores South African hip-hop activist Emile YX?'s work to suggest that he presents an alternative take on mainstream US and South African hip-hop. While it is arguable...
DT-DFRS: Enhanced Data-Free Robustness Stealing via Dual Teacher Guidance in Black-Box Settings
DT-DFRS: Enhanced Data-Free Robustness Stealing via Dual Teacher Guidance in Black-Box Settings
Abstract
Model Stealing Attacks (MSAs) are identified as a significant privacy threat to Machine Learning as a Service (MLaaS). MSAs aim to craft a substitute model that ha...
Patterns of Digital Misconduct: A Survey of Cyberbullying Behaviors in a High School Setting
Patterns of Digital Misconduct: A Survey of Cyberbullying Behaviors in a High School Setting
This study examined the patterns of cyberbullying among high-school students using a quantitative, questionnaire-based survey design. Conducted at Geetanjali Secondary Higher Schoo...
Penyesuaian Batasan Tindak Pidana Ringan dan Jumlah Denda Dalam Kuhp Terhadap Perkara Tindak Pidana Pencurian (Analisis Peraturan Mahkamah Agung Nomor 02 Tahun 2012 Tentang Penyesuaian Batasan Tindak Pidana Ringan dan Jumlah Denda Dalam Kuhp)
Penyesuaian Batasan Tindak Pidana Ringan dan Jumlah Denda Dalam Kuhp Terhadap Perkara Tindak Pidana Pencurian (Analisis Peraturan Mahkamah Agung Nomor 02 Tahun 2012 Tentang Penyesuaian Batasan Tindak Pidana Ringan dan Jumlah Denda Dalam Kuhp)
Abstract: Compliance of the Limitation of Minor Crimes and the Amount of Fines in Criminal Code towards Stealing Case. After the Rise of Supreme Court Decision Number 02 Year 2012,...


