David PERRIER - Academia.edu (original) (raw)
Papers by David PERRIER
Thomson Profesional Publishing, 1999
Introduction Gambling in Canada has been stimulated by the decriminalization and subsequent legal... more Introduction Gambling in Canada has been stimulated by the decriminalization and subsequent legalization of new products and services, and by the consolidation of provincial governmental authority over many gambling markets, policies, regulations, operations and profits. The proliferation of " grind gambling " in the form of video lottery machines (VLTs) and casino-based slot devices has not only extended the scope of gambling, it has radically reordered the entertainment industry, consumer spending patterns, and prevalence gambling rates, while adding to both has been designed to improve the industry's sensitivity to the market, provide advice to political decision makers and control the industry's darker sides. Social research, while sparse, has emphasized the demographics and psychographics of player involvement, the social and economic benefits and costs of gambling and the In addition, the gambling marketplace in Canada includes a viable illegal industry with ...
Journal of Applied Biomechanics, 2004
The aim of this study was to determine the effect of wearing a triathlon wet suit on the technica... more The aim of this study was to determine the effect of wearing a triathlon wet suit on the technical parameters of the front crawl stroke. Eight highly trained male triathletes were filmed with underwater camcorders during two 1500-m swim tests: one with a wet suit (WS) and the other with a standard suit (SS). Two conditions were considered: Condition I (CI) and Condition XV (CXV), representing the 1st and the 15th 100-m, respectively. Views were synchronized and digitized using kinematic analysis software (Schleihauf, 1994) to obtain 3-D coordinates of the anatomical landmarks of the body. Results showed that the wet suit and duration of the exercise significantly influenced stroke parameters. The swim with WS was characterized by greater stroke length and a progressive increase in stroke frequency, resulting from a more extended elbow position during the stroke and from a decrease in the absolute and relative times of the propulsive phase. These changes indicated more efficient uppe...
Police Practice and Research, 2007
... McIntosh, M. 1973. The growth of racketeering. Economy and Society , 2: 3569. [Taylor & ... more ... McIntosh, M. 1973. The growth of racketeering. Economy and Society , 2: 3569. [Taylor & Francis Online], [CSA] View all references, 197534. McIntosh, M. 1975. ... Interpreting police work , London: Allen & Unwin. View all references; McBarnet, 197831. McBarnet, DJ 1978. ...
Law & Society Review, 2002
This article studies law in action as it relates to organized lobster poaching in Canada. It exam... more This article studies law in action as it relates to organized lobster poaching in Canada. It examines the distinct pattern of relationships that constitutes poaching as a business enterprise and analyzes how living law operates as an ironic facilitative form for that which it tries to control. We argue that business poachers evade, avoid, and neutralize fishery laws and regulations by creatively using and manipulating the legal boundaries and organizational resources at their disposal. In effect, the law is an enabling structure for blue water illegality. We analyze business poaching activities as a type of workplace crime, and we account for regulatory failure in the lobster fishery
The Journal of Legal Pluralism and Unofficial Law, 1993
Journal of Gambling Studies, 2004
International Journal of Mental Health and Addiction, 2012
International Gambling Studies, 2007
Criminologie, 2006
Résumé Le présent rapport est l’objet d’une étude du lien entre les organisations criminelles et ... more Résumé Le présent rapport est l’objet d’une étude du lien entre les organisations criminelles et le contrôle social dans le domaine de la criminalité informatique. D’abord, nous examinerons quelques attaques montées contre des appareils de jeu électronique. Ensuite, nous analyserons de quelle façon ces cyberattaques ont été commises et quelle est la capacité de l’État et du secteur industriel à les combattre. Enfin, nous comparerons nos conclusions à celles tirées d’autres études sur le piratage dans l’industrie des jeux de hasard et nous discuterons de l’importance de nos conclusions pour les systèmes d’application de la loi, de sécurité et de protection des consommateurs.
Canadian Journal of Criminology and Criminal Justice, 2003
This paper examines the criminal technologies and criminal organization associated with gambling-... more This paper examines the criminal technologies and criminal organization associated with gambling-related computer crimes that occurred in the video lottery terminal industry in the province of Nova Scotia. We emphasize the techniques of VLT crime, such as cracking protection codes, boot tracing, ghost programming and down-lining, as rationally geared to neutralizing social control. We analyze how the cyber-attacks were socially organized and we conclude by discussing the implications that our case study has for the field of computer crime.
Thomson Profesional Publishing, 1999
Introduction Gambling in Canada has been stimulated by the decriminalization and subsequent legal... more Introduction Gambling in Canada has been stimulated by the decriminalization and subsequent legalization of new products and services, and by the consolidation of provincial governmental authority over many gambling markets, policies, regulations, operations and profits. The proliferation of " grind gambling " in the form of video lottery machines (VLTs) and casino-based slot devices has not only extended the scope of gambling, it has radically reordered the entertainment industry, consumer spending patterns, and prevalence gambling rates, while adding to both has been designed to improve the industry's sensitivity to the market, provide advice to political decision makers and control the industry's darker sides. Social research, while sparse, has emphasized the demographics and psychographics of player involvement, the social and economic benefits and costs of gambling and the In addition, the gambling marketplace in Canada includes a viable illegal industry with ...
Journal of Applied Biomechanics, 2004
The aim of this study was to determine the effect of wearing a triathlon wet suit on the technica... more The aim of this study was to determine the effect of wearing a triathlon wet suit on the technical parameters of the front crawl stroke. Eight highly trained male triathletes were filmed with underwater camcorders during two 1500-m swim tests: one with a wet suit (WS) and the other with a standard suit (SS). Two conditions were considered: Condition I (CI) and Condition XV (CXV), representing the 1st and the 15th 100-m, respectively. Views were synchronized and digitized using kinematic analysis software (Schleihauf, 1994) to obtain 3-D coordinates of the anatomical landmarks of the body. Results showed that the wet suit and duration of the exercise significantly influenced stroke parameters. The swim with WS was characterized by greater stroke length and a progressive increase in stroke frequency, resulting from a more extended elbow position during the stroke and from a decrease in the absolute and relative times of the propulsive phase. These changes indicated more efficient uppe...
Police Practice and Research, 2007
... McIntosh, M. 1973. The growth of racketeering. Economy and Society , 2: 3569. [Taylor & ... more ... McIntosh, M. 1973. The growth of racketeering. Economy and Society , 2: 3569. [Taylor & Francis Online], [CSA] View all references, 197534. McIntosh, M. 1975. ... Interpreting police work , London: Allen & Unwin. View all references; McBarnet, 197831. McBarnet, DJ 1978. ...
Law & Society Review, 2002
This article studies law in action as it relates to organized lobster poaching in Canada. It exam... more This article studies law in action as it relates to organized lobster poaching in Canada. It examines the distinct pattern of relationships that constitutes poaching as a business enterprise and analyzes how living law operates as an ironic facilitative form for that which it tries to control. We argue that business poachers evade, avoid, and neutralize fishery laws and regulations by creatively using and manipulating the legal boundaries and organizational resources at their disposal. In effect, the law is an enabling structure for blue water illegality. We analyze business poaching activities as a type of workplace crime, and we account for regulatory failure in the lobster fishery
The Journal of Legal Pluralism and Unofficial Law, 1993
Journal of Gambling Studies, 2004
International Journal of Mental Health and Addiction, 2012
International Gambling Studies, 2007
Criminologie, 2006
Résumé Le présent rapport est l’objet d’une étude du lien entre les organisations criminelles et ... more Résumé Le présent rapport est l’objet d’une étude du lien entre les organisations criminelles et le contrôle social dans le domaine de la criminalité informatique. D’abord, nous examinerons quelques attaques montées contre des appareils de jeu électronique. Ensuite, nous analyserons de quelle façon ces cyberattaques ont été commises et quelle est la capacité de l’État et du secteur industriel à les combattre. Enfin, nous comparerons nos conclusions à celles tirées d’autres études sur le piratage dans l’industrie des jeux de hasard et nous discuterons de l’importance de nos conclusions pour les systèmes d’application de la loi, de sécurité et de protection des consommateurs.
Canadian Journal of Criminology and Criminal Justice, 2003
This paper examines the criminal technologies and criminal organization associated with gambling-... more This paper examines the criminal technologies and criminal organization associated with gambling-related computer crimes that occurred in the video lottery terminal industry in the province of Nova Scotia. We emphasize the techniques of VLT crime, such as cracking protection codes, boot tracing, ghost programming and down-lining, as rationally geared to neutralizing social control. We analyze how the cyber-attacks were socially organized and we conclude by discussing the implications that our case study has for the field of computer crime.