Service of SURF
© 2025 SURF
Background:Ecstasy (3,4-methylenedioxymethamphetamine (MDMA)) has a relatively low harm and low dependence liability but is scheduled on List I of the Dutch Opium Act (‘hard drugs’). Concerns surrounding increasing MDMA-related criminality coupled with the possibly inappropriate scheduling of MDMA initiated a debate to revise the current Dutch ecstasy policy.Methods:An interdisciplinary group of 18 experts on health, social harms and drug criminality and law enforcement reformulated the science-based Dutch MDMA policy using multi-decision multi-criterion decision analysis (MD-MCDA). The experts collectively formulated policy instruments and rated their effects on 25 outcome criteria, including health, criminality, law enforcement and financial issues, thematically grouped in six clusters.Results:The experts scored the effect of 22 policy instruments, each with between two and seven different mutually exclusive options, on 25 outcome criteria. The optimal policy model was defined by the set of 22 policy instrument options which gave the highest overall score on the 25 outcome criteria. Implementation of the optimal policy model, including regulated MDMA sales, decreases health harms, MDMA-related organised crime and environmental damage, as well as increases state revenues and quality of MDMA products and user information. This model was slightly modified to increase its political feasibility. Sensitivity analyses showed that the outcomes of the current MD-MCDA are robust and independent of variability in weight values.Conclusion:The present results provide a feasible and realistic set of policy instrument options to revise the legislation towards a rational MDMA policy that is likely to reduce both adverse (public) health risks and MDMA-related criminal burden.
MULTIFILE
In this article, the author will question the seemingly obvious boundary between civil disobedience, as conceptualised by Rawls and Arendt, and several examples of criminal, or simply annoying, activities which don't meet their criteria, such as the case of the ‘Top 50'. The ‘Top 50' are multi-problem Dutch-Caribbean men, who refuse to adapt to predominant norms in Dutch society. IThe author argues that political aspects of their behaviour should be acknowledged, even if they engage in criminal behaviour and don't present explicit political goals. Firstly, she questions the way in which Rawls based his definition on a centralistic conception of governmental power and contrast it with Foucault's conception of normalising power, in which power is diffuse and cannot be restricted to the enactment of formal laws. Secondly, she discusses what the minimum requirements are to be able to classifyacts as civil disobedience. Rawls and Arendt draw a clear line between criminal behaviour and civil disobedience, but their requirements may be too strict. We might miss signals of injustice if actions that do not meet these criteria are excluded from the political discourse. The conclusion is that comparing Arendt's and Rawls' conception of civil disobedience with the behaviour of a marginal migrant group may be useful in questioning the boundaries of this concept and in making it more inclusive. A wider conception of civil disobedience may help to explain the meaning of deviant behaviour in terms of social critique and to challenge the traditional understanding of civil disobedience.
Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types of offending and it is therefore unclear whether results are generalizable to online types of offending. This study attempted to identify the developmental trajectories of active hackers who perform web defacements. The data for this study consisted of 2,745,311 attacks performed by 66,553 hackers and reported to Zone-H between January 2010 and March 2017. Semi-parametric group-based trajectory models were used to distinguish six different groups of hackers based on the timing and frequency of their defacements. The results demonstrated some common relationships to traditional types of crime, as a small population of defacers accounted for the majority of defacements against websites. Additionally, the methods and targeting practices of defacers differed based on the frequency with which they performed defacements generally.