SlideShare a Scribd company logo
Utilising the Victim Personal Statement
Scheme as a Vulnerable and Intimidated
Victim Early Detection Device
Louise Taylor and Jo Boylan-Kemp
Nottingham Law School
Our research focus
• In light of current practice is the UK capable of meeting
the individual needs assessment as required by the new
EU Victims Directive Directive 2012/29/EU)?
• In any event, could the process of early identification of
vulnerable and intimidated victims be improved?
• Would the Victim Personal Statement (VPS) Scheme be
a useful device in improving that identification process?
How does it compare as against the evidential
statement?

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
The Victim Personal
Statement Scheme
• Overview:
o National scheme introduced in Oct 2001.
o Voluntary.
o Usually in written form and given to the police at the same time as the
evidential statement.
o Outlines the impact that the crime has had upon the victim.
o Becomes part of the case papers.

• Literature has focused on:
o
o
o
o
o
Our research
focus

Participation rates.
Potential to raise then dashes victims’ expectations.
Effect on sentencing outcomes.
Impact on due process rights of defendants.
Scheme’s purpose.

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
The importance of early
identification
• The identification of a vulnerable or intimidated
witness at an early stage of an investigation is of
paramount importance. It will improve the quality of
an investigation by assisting the witness to give
information to the police; it will assist the legal
process by helping the witness to give their best
evidence in court. It can help to ensure that the
witness has been adequately supported so that
they turn up at the trial to give evidence and is,
therefore, likely to maximise the likelihood of fair
and equitable trials.
Vulnerable and Intimidated Witnesses.
A Police Service Guide, 2011, para 17
Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
What is meant by vulnerable
and intimidated?
• Definitions of witnesses who may be vulnerable or
intimidated for the purposes of special measures
assistance are contained in the Youth Justice and
Criminal Evidence Act 1999.

• Vulnerable witnesses are defined by s. 16.
• Intimidated witnesses are defined by s. 17.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Are current identification
practices adequate?
• In practice decision-makers apply a three-stage
test:
o 1) Is the witness potentially vulnerable/intimidated? If yes:
o 2) Is this likely to affect their willingness or capacity to give ‘best evidence’
in court, and to cause them undue stress in or before court? If yes:
o 3) What type of support or assistance will be most likely to alleviate these
difficulties?

• Speaking up for Justice (Home Office, 1998)
o

Official estimate that between 7-10% of witnesses are vulnerable or
intimidated.

• Burton et al (2006)
o 54% of all witnesses are possibly vulnerable or intimidated.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Special measures
• Screens (s 23);
• Live TV link (s 24);
• Giving evidence in private (limited to sexual offences
and those involving intimidation) (s 25)
• Removal of wigs and gowns (s 26)
• Video recorded interviews as evidence-in-chief (s 27)
• Communication through an intermediary (available for
vulnerable witnesses)(s 29)
• Special communication aids (s30) (available for
vulnerable witnesses)
• Video recorded cross-examination (s 28).
Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Methodology
• Content analysis of 100 evidential statements and
corresponding victim personal statements.
• Taken from Magistrates’ Court files for Cannock
Chase police division in Staffordshire.
• Sub-sample of 10 files used to refine research focus.
• Statements were coded and categorised to identify
vulnerability and intimidation indicators. This process
was informed by findings from the sub-sample and
themes from the literature.
Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Vulnerability indicators
• Age
• Offence type

• Mental illness/disability
• Physical illness/disability

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Intimidation indicators
•
•
•
•
•
•
•
•
•
•
•

Fear of returning to the scene of the crime
Fear of meeting the offender
Fear of retribution
Threats from the offender / associates
Fear of reoffending
Fear of going out
Difficulty sleeping
Fear of being alone
Request for relocation
Reluctance to attend court
Statement of general intimidation

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Sample overview
60

No. of victims by offence type

• Age

50

o Under 18 = 10%
o Over 18 = 89%
o Unknown = 1%

40

30

• Sex
o Male = 43%
o Female = 55%
o Unknown = 2%

20

10

0
OAPA (51) Crim Dam
(27)

Our research
focus

VPS Scheme

Identifying
victims

Property
(18)

Methodology

Fraud (1)

Public
Order (21)

Findings

Motoring
(1)

Drugs (1)

Conclusions
% of statements containing
intimidation indicator(s)

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Incidence of intimidation
indicator by statement type
30
25
20
15

10
Evidential
5

VPS

0

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Vulnerability
• 10 victims were under 18; one victim’s age was
unknown. This means a total of 11 victims were
potentially vulnerable due to age.
• Offence type = None of the files used in the sample
contained offences of the type highlighted in
YJCEA as giving rise to vulnerability.
• Physical disability = 5 (VPS = 3 ; evidential = 2)

• Mental disability = 9 (VPS = 8 ; evidential =4)
Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Conclusions
• Total no. of victims flagged as potentially vulnerable
= 25
• Total no. of victims flagged as potentially
intimidated = 65
• Accounting for victims who fell into both
categories, total no. of victims who are vulnerable
or intimidated = 72

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Conclusions
• Overall the VPS is better than the evidential
statement as a device to detect intimidated
victims.

• VPS (and evidential statements) are probably not
well suited to identifying vulnerable victims.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Recommendations for
changes to the VPS scheme
• National media campaign.
• Increased police training.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions
Further research
• Replication of the current study using files from
Nottinghamshire CPS.
• Expanding to include Crown Court files.
• Investigation of police practices in the
administration of the VPS scheme and the
identification of vulnerable and intimidated victims.

Our research
focus

VPS Scheme

Identifying
victims

Methodology

Findings

Conclusions

More Related Content

Similar to SLSA 2013 - Using vps to identify vulnerable and intimidated victims

Solomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policySolomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policy
Francisco J. Estrada Vásquez
 
B8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyB8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimology
VSE 2016
 
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
marginproject
 
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Adam Varn
 
Pushed (Back) In The Closet March 25 2010[1]
Pushed (Back) In The Closet  March 25 2010[1]Pushed (Back) In The Closet  March 25 2010[1]
Pushed (Back) In The Closet March 25 2010[1]
rcamer
 
Current imprisonment rates, future forecasts and security issues
Current imprisonment rates, future forecasts and security issuesCurrent imprisonment rates, future forecasts and security issues
Current imprisonment rates, future forecasts and security issues
Paul Colbert
 
110721 victim costs webinar final
110721 victim costs webinar final110721 victim costs webinar final
110721 victim costs webinar final
Cost-Benefit Knowledge Bank for Criminal Justice
 
Is Violent Crime Increasing or Decreasing?
Is Violent Crime Increasing or Decreasing?Is Violent Crime Increasing or Decreasing?
Is Violent Crime Increasing or Decreasing?
Lancaster University Library
 
Public Services Access and Domestic Violence Lessons from a Randomized Contro...
Public Services Access and Domestic Violence Lessons from a Randomized Contro...Public Services Access and Domestic Violence Lessons from a Randomized Contro...
Public Services Access and Domestic Violence Lessons from a Randomized Contro...
Stockholm Institute of Transition Economics
 
B8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyB8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimology
VSE 2016
 
Effectiveness of a prolonged incarcerationand rehabilitation
Effectiveness of a prolonged incarcerationand rehabilitationEffectiveness of a prolonged incarcerationand rehabilitation
Effectiveness of a prolonged incarcerationand rehabilitation
EvonCanales257
 
Economics of crime model
Economics of crime modelEconomics of crime model
Economics of crime model
Ha Bui
 
EU Practice in Monitoring Corruption
EU Practice in Monitoring CorruptionEU Practice in Monitoring Corruption
EU Practice in Monitoring Corruption
МЦМС | MCIC
 
Juvenile Incarceration and Crime after Release
Juvenile Incarceration and Crime after ReleaseJuvenile Incarceration and Crime after Release
Juvenile Incarceration and Crime after Release
contenidos-ort
 
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
National Center for Campus Public Safety
 
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
Page 1 of 5  Victims’ Rights Cory P. Haberman  U.docxPage 1 of 5  Victims’ Rights Cory P. Haberman  U.docx
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
alfred4lewis58146
 
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
BASPCAN
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
sociologyexchange.co.uk
 
Repeat offenders presentation
Repeat offenders presentationRepeat offenders presentation
Repeat offenders presentation
Roel Palmaers
 
Definitions and Historical Background.ppt
Definitions and Historical Background.pptDefinitions and Historical Background.ppt
Definitions and Historical Background.ppt
Regent University
 

Similar to SLSA 2013 - Using vps to identify vulnerable and intimidated victims (20)

Solomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policySolomon ppt Does parole work research findings and policy
Solomon ppt Does parole work research findings and policy
 
B8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyB8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimology
 
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
Annemieke Wolthuis: Restorative justice & domestic violence, a security i...
 
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
Risk Factors, Risk Assessments, and Collaboration to Prevent Domestic Violenc...
 
Pushed (Back) In The Closet March 25 2010[1]
Pushed (Back) In The Closet  March 25 2010[1]Pushed (Back) In The Closet  March 25 2010[1]
Pushed (Back) In The Closet March 25 2010[1]
 
Current imprisonment rates, future forecasts and security issues
Current imprisonment rates, future forecasts and security issuesCurrent imprisonment rates, future forecasts and security issues
Current imprisonment rates, future forecasts and security issues
 
110721 victim costs webinar final
110721 victim costs webinar final110721 victim costs webinar final
110721 victim costs webinar final
 
Is Violent Crime Increasing or Decreasing?
Is Violent Crime Increasing or Decreasing?Is Violent Crime Increasing or Decreasing?
Is Violent Crime Increasing or Decreasing?
 
Public Services Access and Domestic Violence Lessons from a Randomized Contro...
Public Services Access and Domestic Violence Lessons from a Randomized Contro...Public Services Access and Domestic Violence Lessons from a Randomized Contro...
Public Services Access and Domestic Violence Lessons from a Randomized Contro...
 
B8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimologyB8 Cross-cultural and comparative victimology
B8 Cross-cultural and comparative victimology
 
Effectiveness of a prolonged incarcerationand rehabilitation
Effectiveness of a prolonged incarcerationand rehabilitationEffectiveness of a prolonged incarcerationand rehabilitation
Effectiveness of a prolonged incarcerationand rehabilitation
 
Economics of crime model
Economics of crime modelEconomics of crime model
Economics of crime model
 
EU Practice in Monitoring Corruption
EU Practice in Monitoring CorruptionEU Practice in Monitoring Corruption
EU Practice in Monitoring Corruption
 
Juvenile Incarceration and Crime after Release
Juvenile Incarceration and Crime after ReleaseJuvenile Incarceration and Crime after Release
Juvenile Incarceration and Crime after Release
 
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
 
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
Page 1 of 5  Victims’ Rights Cory P. Haberman  U.docxPage 1 of 5  Victims’ Rights Cory P. Haberman  U.docx
Page 1 of 5 Victims’ Rights Cory P. Haberman U.docx
 
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
Characteristics od Sibling and Nonsibling Sexual Abuse Cases Under Canadian C...
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 
Repeat offenders presentation
Repeat offenders presentationRepeat offenders presentation
Repeat offenders presentation
 
Definitions and Historical Background.ppt
Definitions and Historical Background.pptDefinitions and Historical Background.ppt
Definitions and Historical Background.ppt
 

More from Louise Taylor

National spanish legal education conference 2013 dual degrees
National spanish legal education conference 2013   dual degreesNational spanish legal education conference 2013   dual degrees
National spanish legal education conference 2013 dual degrees
Louise Taylor
 
L&t presentation 2014
L&t presentation 2014L&t presentation 2014
L&t presentation 2014
Louise Taylor
 
Srhe poster final with refs
Srhe poster final with refsSrhe poster final with refs
Srhe poster final with refs
Louise Taylor
 
Alt numeracy in law presentation
Alt numeracy in law presentationAlt numeracy in law presentation
Alt numeracy in law presentation
Louise Taylor
 
Improving access to justice for vulnerable and intimidated victims: Analysing...
Improving access to justice for vulnerable and intimidated victims: Analysing...Improving access to justice for vulnerable and intimidated victims: Analysing...
Improving access to justice for vulnerable and intimidated victims: Analysing...
Louise Taylor
 
Slsa legal education presentation
Slsa legal education presentationSlsa legal education presentation
Slsa legal education presentation
Louise Taylor
 
SLS 2013 - Enhancing mathematical literacy to promote graduate employment
SLS 2013 - Enhancing mathematical literacy to promote graduate employmentSLS 2013 - Enhancing mathematical literacy to promote graduate employment
SLS 2013 - Enhancing mathematical literacy to promote graduate employment
Louise Taylor
 
NLS staff development 2013 - Creating academic posters for teaching and resea...
NLS staff development 2013 - Creating academic posters for teaching and resea...NLS staff development 2013 - Creating academic posters for teaching and resea...
NLS staff development 2013 - Creating academic posters for teaching and resea...
Louise Taylor
 
Durham university 2013 - Using VPS to inject restorative principles into crim...
Durham university 2013 - Using VPS to inject restorative principles into crim...Durham university 2013 - Using VPS to inject restorative principles into crim...
Durham university 2013 - Using VPS to inject restorative principles into crim...
Louise Taylor
 
Using victim personal statements to inject restorative principles into crimin...
Using victim personal statements to inject restorative principles into crimin...Using victim personal statements to inject restorative principles into crimin...
Using victim personal statements to inject restorative principles into crimin...
Louise Taylor
 

More from Louise Taylor (10)

National spanish legal education conference 2013 dual degrees
National spanish legal education conference 2013   dual degreesNational spanish legal education conference 2013   dual degrees
National spanish legal education conference 2013 dual degrees
 
L&t presentation 2014
L&t presentation 2014L&t presentation 2014
L&t presentation 2014
 
Srhe poster final with refs
Srhe poster final with refsSrhe poster final with refs
Srhe poster final with refs
 
Alt numeracy in law presentation
Alt numeracy in law presentationAlt numeracy in law presentation
Alt numeracy in law presentation
 
Improving access to justice for vulnerable and intimidated victims: Analysing...
Improving access to justice for vulnerable and intimidated victims: Analysing...Improving access to justice for vulnerable and intimidated victims: Analysing...
Improving access to justice for vulnerable and intimidated victims: Analysing...
 
Slsa legal education presentation
Slsa legal education presentationSlsa legal education presentation
Slsa legal education presentation
 
SLS 2013 - Enhancing mathematical literacy to promote graduate employment
SLS 2013 - Enhancing mathematical literacy to promote graduate employmentSLS 2013 - Enhancing mathematical literacy to promote graduate employment
SLS 2013 - Enhancing mathematical literacy to promote graduate employment
 
NLS staff development 2013 - Creating academic posters for teaching and resea...
NLS staff development 2013 - Creating academic posters for teaching and resea...NLS staff development 2013 - Creating academic posters for teaching and resea...
NLS staff development 2013 - Creating academic posters for teaching and resea...
 
Durham university 2013 - Using VPS to inject restorative principles into crim...
Durham university 2013 - Using VPS to inject restorative principles into crim...Durham university 2013 - Using VPS to inject restorative principles into crim...
Durham university 2013 - Using VPS to inject restorative principles into crim...
 
Using victim personal statements to inject restorative principles into crimin...
Using victim personal statements to inject restorative principles into crimin...Using victim personal statements to inject restorative principles into crimin...
Using victim personal statements to inject restorative principles into crimin...
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

SLSA 2013 - Using vps to identify vulnerable and intimidated victims

  • 1. Utilising the Victim Personal Statement Scheme as a Vulnerable and Intimidated Victim Early Detection Device Louise Taylor and Jo Boylan-Kemp Nottingham Law School
  • 2. Our research focus • In light of current practice is the UK capable of meeting the individual needs assessment as required by the new EU Victims Directive Directive 2012/29/EU)? • In any event, could the process of early identification of vulnerable and intimidated victims be improved? • Would the Victim Personal Statement (VPS) Scheme be a useful device in improving that identification process? How does it compare as against the evidential statement? Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 3. The Victim Personal Statement Scheme • Overview: o National scheme introduced in Oct 2001. o Voluntary. o Usually in written form and given to the police at the same time as the evidential statement. o Outlines the impact that the crime has had upon the victim. o Becomes part of the case papers. • Literature has focused on: o o o o o Our research focus Participation rates. Potential to raise then dashes victims’ expectations. Effect on sentencing outcomes. Impact on due process rights of defendants. Scheme’s purpose. VPS Scheme Identifying victims Methodology Findings Conclusions
  • 4. The importance of early identification • The identification of a vulnerable or intimidated witness at an early stage of an investigation is of paramount importance. It will improve the quality of an investigation by assisting the witness to give information to the police; it will assist the legal process by helping the witness to give their best evidence in court. It can help to ensure that the witness has been adequately supported so that they turn up at the trial to give evidence and is, therefore, likely to maximise the likelihood of fair and equitable trials. Vulnerable and Intimidated Witnesses. A Police Service Guide, 2011, para 17 Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 5. What is meant by vulnerable and intimidated? • Definitions of witnesses who may be vulnerable or intimidated for the purposes of special measures assistance are contained in the Youth Justice and Criminal Evidence Act 1999. • Vulnerable witnesses are defined by s. 16. • Intimidated witnesses are defined by s. 17. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 6. Are current identification practices adequate? • In practice decision-makers apply a three-stage test: o 1) Is the witness potentially vulnerable/intimidated? If yes: o 2) Is this likely to affect their willingness or capacity to give ‘best evidence’ in court, and to cause them undue stress in or before court? If yes: o 3) What type of support or assistance will be most likely to alleviate these difficulties? • Speaking up for Justice (Home Office, 1998) o Official estimate that between 7-10% of witnesses are vulnerable or intimidated. • Burton et al (2006) o 54% of all witnesses are possibly vulnerable or intimidated. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 7. Special measures • Screens (s 23); • Live TV link (s 24); • Giving evidence in private (limited to sexual offences and those involving intimidation) (s 25) • Removal of wigs and gowns (s 26) • Video recorded interviews as evidence-in-chief (s 27) • Communication through an intermediary (available for vulnerable witnesses)(s 29) • Special communication aids (s30) (available for vulnerable witnesses) • Video recorded cross-examination (s 28). Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 8. Methodology • Content analysis of 100 evidential statements and corresponding victim personal statements. • Taken from Magistrates’ Court files for Cannock Chase police division in Staffordshire. • Sub-sample of 10 files used to refine research focus. • Statements were coded and categorised to identify vulnerability and intimidation indicators. This process was informed by findings from the sub-sample and themes from the literature. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 9. Vulnerability indicators • Age • Offence type • Mental illness/disability • Physical illness/disability Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 10. Intimidation indicators • • • • • • • • • • • Fear of returning to the scene of the crime Fear of meeting the offender Fear of retribution Threats from the offender / associates Fear of reoffending Fear of going out Difficulty sleeping Fear of being alone Request for relocation Reluctance to attend court Statement of general intimidation Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 11. Sample overview 60 No. of victims by offence type • Age 50 o Under 18 = 10% o Over 18 = 89% o Unknown = 1% 40 30 • Sex o Male = 43% o Female = 55% o Unknown = 2% 20 10 0 OAPA (51) Crim Dam (27) Our research focus VPS Scheme Identifying victims Property (18) Methodology Fraud (1) Public Order (21) Findings Motoring (1) Drugs (1) Conclusions
  • 12. % of statements containing intimidation indicator(s) Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 13. Incidence of intimidation indicator by statement type 30 25 20 15 10 Evidential 5 VPS 0 Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 14. Vulnerability • 10 victims were under 18; one victim’s age was unknown. This means a total of 11 victims were potentially vulnerable due to age. • Offence type = None of the files used in the sample contained offences of the type highlighted in YJCEA as giving rise to vulnerability. • Physical disability = 5 (VPS = 3 ; evidential = 2) • Mental disability = 9 (VPS = 8 ; evidential =4) Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 15. Conclusions • Total no. of victims flagged as potentially vulnerable = 25 • Total no. of victims flagged as potentially intimidated = 65 • Accounting for victims who fell into both categories, total no. of victims who are vulnerable or intimidated = 72 Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 16. Conclusions • Overall the VPS is better than the evidential statement as a device to detect intimidated victims. • VPS (and evidential statements) are probably not well suited to identifying vulnerable victims. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 17. Recommendations for changes to the VPS scheme • National media campaign. • Increased police training. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions
  • 18. Further research • Replication of the current study using files from Nottinghamshire CPS. • Expanding to include Crown Court files. • Investigation of police practices in the administration of the VPS scheme and the identification of vulnerable and intimidated victims. Our research focus VPS Scheme Identifying victims Methodology Findings Conclusions