SlideShare una empresa de Scribd logo
1 de 18
Utilising the Victim Personal Statement
Scheme as a Vulnerable and Intimidated
Victim Early Detection Device
Louise Taylor and Jo Boylan-Kemp
Nottingham Law School
Our research focus
• In light of current practice is the UK capable of meeting
the individual needs assessment as required by the new
EU Victims Directive Directive 2012/29/EU)?
• In any event, could the process of early identification of
vulnerable and intimidated victims be improved?
• Would the Victim Personal Statement (VPS) Scheme be
a useful device in improving that identification process?
How does it compare as against the evidential
statement?

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
The Victim Personal
Statement Scheme
• Overview:
o National scheme introduced in Oct 2001.
o Voluntary.
o Usually in written form and given to the police at the same time as the
evidential statement.
o Outlines the impact that the crime has had upon the victim.
o Becomes part of the case papers.

• Literature has focused on:
o
o
o
o
o
Our research
focus

Participation rates.
Potential to raise then dashes victims’ expectations.
Effect on sentencing outcomes.
Impact on due process rights of defendants.
Scheme’s purpose.

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
The importance of early
identification
• The identification of a vulnerable or intimidated
witness at an early stage of an investigation is of
paramount importance. It will improve the quality of
an investigation by assisting the witness to give
information to the police; it will assist the legal
process by helping the witness to give their best
evidence in court. It can help to ensure that the
witness has been adequately supported so that
they turn up at the trial to give evidence and is,
therefore, likely to maximise the likelihood of fair
and equitable trials.
Vulnerable and Intimidated Witnesses.
A Police Service Guide, 2011, para 17
Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
What is meant by vulnerable
and intimidated?
• Definitions of witnesses who may be vulnerable or
intimidated for the purposes of special measures
assistance are contained in the Youth Justice and
Criminal Evidence Act 1999.

• Vulnerable witnesses are defined by s. 16.
• Intimidated witnesses are defined by s. 17.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Are current identification
practices adequate?
• In practice decision-makers apply a three-stage
test:
o 1) Is the witness potentially vulnerable/intimidated? If yes:
o 2) Is this likely to affect their willingness or capacity to give ‘best evidence’
in court, and to cause them undue stress in or before court? If yes:
o 3) What type of support or assistance will be most likely to alleviate these
difficulties?

• Speaking up for Justice (Home Office, 1998)
o

Official estimate that between 7-10% of witnesses are vulnerable or
intimidated.

• Burton et al (2006)
o 54% of all witnesses are possibly vulnerable or intimidated.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Special measures
• Screens (s 23);
• Live TV link (s 24);
• Giving evidence in private (limited to sexual offences
and those involving intimidation) (s 25)
• Removal of wigs and gowns (s 26)
• Video recorded interviews as evidence-in-chief (s 27)
• Communication through an intermediary (available for
vulnerable witnesses)(s 29)
• Special communication aids (s30) (available for
vulnerable witnesses)
• Video recorded cross-examination (s 28).
Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Methodology
• Content analysis of 100 evidential statements and
corresponding victim personal statements.
• Taken from Magistrates’ Court files for Cannock
Chase police division in Staffordshire.
• Sub-sample of 10 files used to refine research focus.
• Statements were coded and categorised to identify
vulnerability and intimidation indicators. This process
was informed by findings from the sub-sample and
themes from the literature.
Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Vulnerability indicators
• Age
• Offence type

• Mental illness/disability
• Physical illness/disability

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Intimidation indicators
•
•
•
•
•
•
•
•
•
•
•

Fear of returning to the scene of the crime
Fear of meeting the offender
Fear of retribution
Threats from the offender / associates
Fear of reoffending
Fear of going out
Difficulty sleeping
Fear of being alone
Request for relocation
Reluctance to attend court
Statement of general intimidation

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Sample overview
60

No. of victims by offence type

• Age

50

o Under 18 = 10%
o Over 18 = 89%
o Unknown = 1%

40

30

• Sex
o Male = 43%
o Female = 55%
o Unknown = 2%

20

10

0
OAPA (51) Crim Dam
(27)

Our research
focus

VPS Scheme

Identifying
victims

Property
(18)

Methodology

Fraud (1)

Public
Order (21)

Findings

Motoring
(1)

Drugs (1)

Conclusions
% of statements containing
intimidation indicator(s)

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Incidence of intimidation
indicator by statement type
30
25
20
15

10
Evidential
5

VPS

0

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Vulnerability
• 10 victims were under 18; one victim’s age was
unknown. This means a total of 11 victims were
potentially vulnerable due to age.
• Offence type = None of the files used in the sample
contained offences of the type highlighted in
YJCEA as giving rise to vulnerability.
• Physical disability = 5 (VPS = 3 ; evidential = 2)

• Mental disability = 9 (VPS = 8 ; evidential =4)
Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Conclusions
• Total no. of victims flagged as potentially vulnerable
= 25
• Total no. of victims flagged as potentially
intimidated = 65
• Accounting for victims who fell into both
categories, total no. of victims who are vulnerable
or intimidated = 72

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Conclusions
• Overall the VPS is better than the evidential
statement as a device to detect intimidated
victims.

• VPS (and evidential statements) are probably not
well suited to identifying vulnerable victims.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Recommendations for
changes to the VPS scheme
• National media campaign.
• Increased police training.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Further research
• Replication of the current study using files from
Nottinghamshire CPS.
• Expanding to include Crown Court files.
• Investigation of police practices in the
administration of the VPS scheme and the
identification of vulnerable and intimidated victims.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions

Más contenido relacionado

Similar a SLSA 2013 - Using vps to identify vulnerable and intimidated victims

Solomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policySolomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policyFrancisco J. Estrada Vásquez
 
B8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyB8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyVSE 2016
 
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...marginproject
 
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...Adam Varn
 
Pushed (Back) In The Closet March 25 2010[1]
Pushed (Back) In The Closet  March 25 2010[1]Pushed (Back) In The Closet  March 25 2010[1]
Pushed (Back) In The Closet March 25 2010[1]rcamer
 
Current imprisonment rates, future forecasts and security issues
Current imprisonment rates, future forecasts and security issuesCurrent imprisonment rates, future forecasts and security issues
Current imprisonment rates, future forecasts and security issuesPaul Colbert
 
Public Services Access and Domestic Violence Lessons from a Randomized Contro...
Public Services Access and Domestic Violence Lessons from a Randomized Contro...Public Services Access and Domestic Violence Lessons from a Randomized Contro...
Public Services Access and Domestic Violence Lessons from a Randomized Contro...Stockholm Institute of Transition Economics
 
B8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyB8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyVSE 2016
 
Effectiveness of a prolonged incarcerationand rehabilitation
Effectiveness of a prolonged incarcerationand rehabilitationEffectiveness of a prolonged incarcerationand rehabilitation
Effectiveness of a prolonged incarcerationand rehabilitationEvonCanales257
 
Economics of crime model
Economics of crime modelEconomics of crime model
Economics of crime modelHa Bui
 
EU Practice in Monitoring Corruption
EU Practice in Monitoring CorruptionEU Practice in Monitoring Corruption
EU Practice in Monitoring CorruptionМЦМС | MCIC
 
Juvenile Incarceration and Crime after Release
Juvenile Incarceration and Crime after ReleaseJuvenile Incarceration and Crime after Release
Juvenile Incarceration and Crime after Releasecontenidos-ort
 
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...National Center for Campus Public Safety
 
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
Page 1 of 5  Victims’ Rights Cory P. Haberman  U.docxPage 1 of 5  Victims’ Rights Cory P. Haberman  U.docx
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docxalfred4lewis58146
 
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...BASPCAN
 
Repeat offenders presentation
Repeat offenders presentationRepeat offenders presentation
Repeat offenders presentationRoel Palmaers
 
Definitions and Historical Background.ppt
Definitions and Historical Background.pptDefinitions and Historical Background.ppt
Definitions and Historical Background.pptRegent University
 

Similar a SLSA 2013 - Using vps to identify vulnerable and intimidated victims (20)

Solomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policySolomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policy
 
B8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyB8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimology
 
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
 
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
 
Pushed (Back) In The Closet March 25 2010[1]
Pushed (Back) In The Closet  March 25 2010[1]Pushed (Back) In The Closet  March 25 2010[1]
Pushed (Back) In The Closet March 25 2010[1]
 
Current imprisonment rates, future forecasts and security issues
Current imprisonment rates, future forecasts and security issuesCurrent imprisonment rates, future forecasts and security issues
Current imprisonment rates, future forecasts and security issues
 
110721 victim costs webinar final
110721 victim costs webinar final110721 victim costs webinar final
110721 victim costs webinar final
 
Is Violent Crime Increasing or Decreasing?
Is Violent Crime Increasing or Decreasing?Is Violent Crime Increasing or Decreasing?
Is Violent Crime Increasing or Decreasing?
 
Public Services Access and Domestic Violence Lessons from a Randomized Contro...
Public Services Access and Domestic Violence Lessons from a Randomized Contro...Public Services Access and Domestic Violence Lessons from a Randomized Contro...
Public Services Access and Domestic Violence Lessons from a Randomized Contro...
 
B8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyB8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimology
 
Effectiveness of a prolonged incarcerationand rehabilitation
Effectiveness of a prolonged incarcerationand rehabilitationEffectiveness of a prolonged incarcerationand rehabilitation
Effectiveness of a prolonged incarcerationand rehabilitation
 
Economics of crime model
Economics of crime modelEconomics of crime model
Economics of crime model
 
EU Practice in Monitoring Corruption
EU Practice in Monitoring CorruptionEU Practice in Monitoring Corruption
EU Practice in Monitoring Corruption
 
Juvenile Incarceration and Crime after Release
Juvenile Incarceration and Crime after ReleaseJuvenile Incarceration and Crime after Release
Juvenile Incarceration and Crime after Release
 
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
 
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
Page 1 of 5  Victims’ Rights Cory P. Haberman  U.docxPage 1 of 5  Victims’ Rights Cory P. Haberman  U.docx
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
 
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 
Repeat offenders presentation
Repeat offenders presentationRepeat offenders presentation
Repeat offenders presentation
 
Definitions and Historical Background.ppt
Definitions and Historical Background.pptDefinitions and Historical Background.ppt
Definitions and Historical Background.ppt
 

Más de Louise Taylor

National spanish legal education conference 2013 dual degrees
National spanish legal education conference 2013   dual degreesNational spanish legal education conference 2013   dual degrees
National spanish legal education conference 2013 dual degreesLouise Taylor
 
L&t presentation 2014
L&t presentation 2014L&t presentation 2014
L&t presentation 2014Louise Taylor
 
Srhe poster final with refs
Srhe poster final with refsSrhe poster final with refs
Srhe poster final with refsLouise Taylor
 
Alt numeracy in law presentation
Alt numeracy in law presentationAlt numeracy in law presentation
Alt numeracy in law presentationLouise Taylor
 
Improving access to justice for vulnerable and intimidated victims: Analysing...
Improving access to justice for vulnerable and intimidated victims: Analysing...Improving access to justice for vulnerable and intimidated victims: Analysing...
Improving access to justice for vulnerable and intimidated victims: Analysing...Louise Taylor
 
Slsa legal education presentation
Slsa legal education presentationSlsa legal education presentation
Slsa legal education presentationLouise Taylor
 
SLS 2013 - Enhancing mathematical literacy to promote graduate employment
SLS 2013 - Enhancing mathematical literacy to promote graduate employmentSLS 2013 - Enhancing mathematical literacy to promote graduate employment
SLS 2013 - Enhancing mathematical literacy to promote graduate employmentLouise Taylor
 
NLS staff development 2013 - Creating academic posters for teaching and resea...
NLS staff development 2013 - Creating academic posters for teaching and resea...NLS staff development 2013 - Creating academic posters for teaching and resea...
NLS staff development 2013 - Creating academic posters for teaching and resea...Louise Taylor
 
Durham university 2013 - Using VPS to inject restorative principles into crim...
Durham university 2013 - Using VPS to inject restorative principles into crim...Durham university 2013 - Using VPS to inject restorative principles into crim...
Durham university 2013 - Using VPS to inject restorative principles into crim...Louise Taylor
 
Using victim personal statements to inject restorative principles into crimin...
Using victim personal statements to inject restorative principles into crimin...Using victim personal statements to inject restorative principles into crimin...
Using victim personal statements to inject restorative principles into crimin...Louise Taylor
 

Más de Louise Taylor (10)

National spanish legal education conference 2013 dual degrees
National spanish legal education conference 2013   dual degreesNational spanish legal education conference 2013   dual degrees
National spanish legal education conference 2013 dual degrees
 
L&t presentation 2014
L&t presentation 2014L&t presentation 2014
L&t presentation 2014
 
Srhe poster final with refs
Srhe poster final with refsSrhe poster final with refs
Srhe poster final with refs
 
Alt numeracy in law presentation
Alt numeracy in law presentationAlt numeracy in law presentation
Alt numeracy in law presentation
 
Improving access to justice for vulnerable and intimidated victims: Analysing...
Improving access to justice for vulnerable and intimidated victims: Analysing...Improving access to justice for vulnerable and intimidated victims: Analysing...
Improving access to justice for vulnerable and intimidated victims: Analysing...
 
Slsa legal education presentation
Slsa legal education presentationSlsa legal education presentation
Slsa legal education presentation
 
SLS 2013 - Enhancing mathematical literacy to promote graduate employment
SLS 2013 - Enhancing mathematical literacy to promote graduate employmentSLS 2013 - Enhancing mathematical literacy to promote graduate employment
SLS 2013 - Enhancing mathematical literacy to promote graduate employment
 
NLS staff development 2013 - Creating academic posters for teaching and resea...
NLS staff development 2013 - Creating academic posters for teaching and resea...NLS staff development 2013 - Creating academic posters for teaching and resea...
NLS staff development 2013 - Creating academic posters for teaching and resea...
 
Durham university 2013 - Using VPS to inject restorative principles into crim...
Durham university 2013 - Using VPS to inject restorative principles into crim...Durham university 2013 - Using VPS to inject restorative principles into crim...
Durham university 2013 - Using VPS to inject restorative principles into crim...
 
Using victim personal statements to inject restorative principles into crimin...
Using victim personal statements to inject restorative principles into crimin...Using victim personal statements to inject restorative principles into crimin...
Using victim personal statements to inject restorative principles into crimin...
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

SLSA 2013 - Using vps to identify vulnerable and intimidated victims

  • 1. Utilising the Victim Personal Statement Scheme as a Vulnerable and Intimidated Victim Early Detection Device Louise Taylor and Jo Boylan-Kemp Nottingham Law School
  • 2. Our research focus • In light of current practice is the UK capable of meeting the individual needs assessment as required by the new EU Victims Directive Directive 2012/29/EU)? • In any event, could the process of early identification of vulnerable and intimidated victims be improved? • Would the Victim Personal Statement (VPS) Scheme be a useful device in improving that identification process? How does it compare as against the evidential statement? Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 3. The Victim Personal Statement Scheme • Overview: o National scheme introduced in Oct 2001. o Voluntary. o Usually in written form and given to the police at the same time as the evidential statement. o Outlines the impact that the crime has had upon the victim. o Becomes part of the case papers. • Literature has focused on: o o o o o Our research focus Participation rates. Potential to raise then dashes victims’ expectations. Effect on sentencing outcomes. Impact on due process rights of defendants. Scheme’s purpose. VPS Scheme Identifying victims Methodology Findings Conclusions
  • 4. The importance of early identification • The identification of a vulnerable or intimidated witness at an early stage of an investigation is of paramount importance. It will improve the quality of an investigation by assisting the witness to give information to the police; it will assist the legal process by helping the witness to give their best evidence in court. It can help to ensure that the witness has been adequately supported so that they turn up at the trial to give evidence and is, therefore, likely to maximise the likelihood of fair and equitable trials. Vulnerable and Intimidated Witnesses. A Police Service Guide, 2011, para 17 Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 5. What is meant by vulnerable and intimidated? • Definitions of witnesses who may be vulnerable or intimidated for the purposes of special measures assistance are contained in the Youth Justice and Criminal Evidence Act 1999. • Vulnerable witnesses are defined by s. 16. • Intimidated witnesses are defined by s. 17. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 6. Are current identification practices adequate? • In practice decision-makers apply a three-stage test: o 1) Is the witness potentially vulnerable/intimidated? If yes: o 2) Is this likely to affect their willingness or capacity to give ‘best evidence’ in court, and to cause them undue stress in or before court? If yes: o 3) What type of support or assistance will be most likely to alleviate these difficulties? • Speaking up for Justice (Home Office, 1998) o Official estimate that between 7-10% of witnesses are vulnerable or intimidated. • Burton et al (2006) o 54% of all witnesses are possibly vulnerable or intimidated. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 7. Special measures • Screens (s 23); • Live TV link (s 24); • Giving evidence in private (limited to sexual offences and those involving intimidation) (s 25) • Removal of wigs and gowns (s 26) • Video recorded interviews as evidence-in-chief (s 27) • Communication through an intermediary (available for vulnerable witnesses)(s 29) • Special communication aids (s30) (available for vulnerable witnesses) • Video recorded cross-examination (s 28). Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 8. Methodology • Content analysis of 100 evidential statements and corresponding victim personal statements. • Taken from Magistrates’ Court files for Cannock Chase police division in Staffordshire. • Sub-sample of 10 files used to refine research focus. • Statements were coded and categorised to identify vulnerability and intimidation indicators. This process was informed by findings from the sub-sample and themes from the literature. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 9. Vulnerability indicators • Age • Offence type • Mental illness/disability • Physical illness/disability Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 10. Intimidation indicators • • • • • • • • • • • Fear of returning to the scene of the crime Fear of meeting the offender Fear of retribution Threats from the offender / associates Fear of reoffending Fear of going out Difficulty sleeping Fear of being alone Request for relocation Reluctance to attend court Statement of general intimidation Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 11. Sample overview 60 No. of victims by offence type • Age 50 o Under 18 = 10% o Over 18 = 89% o Unknown = 1% 40 30 • Sex o Male = 43% o Female = 55% o Unknown = 2% 20 10 0 OAPA (51) Crim Dam (27) Our research focus VPS Scheme Identifying victims Property (18) Methodology Fraud (1) Public Order (21) Findings Motoring (1) Drugs (1) Conclusions
  • 12. % of statements containing intimidation indicator(s) Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 13. Incidence of intimidation indicator by statement type 30 25 20 15 10 Evidential 5 VPS 0 Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 14. Vulnerability • 10 victims were under 18; one victim’s age was unknown. This means a total of 11 victims were potentially vulnerable due to age. • Offence type = None of the files used in the sample contained offences of the type highlighted in YJCEA as giving rise to vulnerability. • Physical disability = 5 (VPS = 3 ; evidential = 2) • Mental disability = 9 (VPS = 8 ; evidential =4) Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 15. Conclusions • Total no. of victims flagged as potentially vulnerable = 25 • Total no. of victims flagged as potentially intimidated = 65 • Accounting for victims who fell into both categories, total no. of victims who are vulnerable or intimidated = 72 Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 16. Conclusions • Overall the VPS is better than the evidential statement as a device to detect intimidated victims. • VPS (and evidential statements) are probably not well suited to identifying vulnerable victims. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 17. Recommendations for changes to the VPS scheme • National media campaign. • Increased police training. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 18. Further research • Replication of the current study using files from Nottinghamshire CPS. • Expanding to include Crown Court files. • Investigation of police practices in the administration of the VPS scheme and the identification of vulnerable and intimidated victims. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions