139 resultados para cyber-terrorism


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber bullying – or bullying through the use of technology – is a growing phenomenon which is currently most commonly experienced by young people and the consequences manifested in schools. Cyber bullying shares many of the same attributes as face-to-face bullying such as a power imbalance and a sense of helplessness on the part of the target. Not surprisingly, targets of face-to-face bullying are increasingly turning to the law, and it is likely that targets of cyber bullying may also do so in an appropriate case. This article examines the various criminal, civil and vilification laws that may apply to cases of cyber bullying and assesses the likely effectiveness of these laws as a means of redressing that power imbalance between perpetrator and target.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bullying and victimisation among school age children is recognised as a major public health problem. The Australian Covert Bullying Prevalence Study (ACBPS) reports that just over one quarter (27%) of school students aged 8 to 14 years were bullied and 9% bullied others on a frequent basis (every few weeks or more often) (Cross et al., 2009). Bullying is associated with a host of detrimental effects, including loneliness (Nansel, Overpeck, Pilla, & Ruan, 2001), low self‐esteem (Jankauskiene, Kardelis, Sukys, & Kardeliene, 2008; Salmivalli, Kaukiainen, Kaistaniemi, & Lagerspetz, 1999), anxiety, depression (Kaltiala‐Heino, Rimpela, Rantanen, & Rimpela, 2000), suicide ideation (Kaltiala‐Heino, Rimpela, Marttunen, Rimpela, & Rantanen, 1999), impaired academic achievement (Nansel et al., 2001), and poorer physical health (Wolke, Woods, Bloomfield, & Karstadt, 2001).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 1986 the then United States Secretary of State George Shultz asserted that: It is absurd to argue that international law prohibits us from capturing terrorists in international waters or airspace; from attacking them on the soil of other nations, even for the purpose of rescuing hostages; or from using force against states that support, train and harbor terrorists or guerrillas. At that time the United States’ claim of a right to use military force in self-defence against terrorism2 received little support from other states.3 The predominant view then was that terrorist attacks committed by private or non-state actors were a form of criminal activity to be combated through domestic and international criminal justice mechanisms. The notion that such terrorist acts should be treated as ‘armed attacks’ triggering a victim state’s right of self-defence was not accepted by the majority of states. To suggest, as Shultz had done, that a state not directly responsible for terrorist acts could have its territorial integrity violated by military action targeting terrorists located within that state, was a controversial proposition in 1986. However, some fifteen years later, when the United States and a coalition of allies launched a military campaign in Afghanistan following the 11 September 2001 (hereafter ‘9/11’) terrorist attacks, there was virtually unanimous international support for the use of force.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explored the reasons underlying adolescents’ perceptions of why their peers engage in bullying in the real and the cyber world. While there has been much research on why bullies engage in such behaviour, ranging from personality characteristics to social or familial reasons, the perceptions of young people on the motives of cyberbullies has not been researched. A new instrument, based on interviews and a literature review was piloted to measure young people’s perceptions of why their peers engage in both traditional and cyberbullying behaviour, according to their role in bullying. Four hundred students were surveyed in three co-educational independent secondary schools. A comparison between perceptions of bullies’ motives in traditional and cyberbullying was made. Implications for interventions with bullies are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As technology extends further into consumer daily lives, consumers develop significant relationships with their technology, particularly mobile devices. This conceptual paper aims to investigate the merging of consumers and their technology, termed the cyborg consumer, which has been previously overlooked in the marketing literature. More specifically, this investigation extends the marketing theories of consumer psychological motivation and ersonality traits in examining the influence of these elements on cyborg consumer behaviour, such as intensive consumption of technology and construction of an important part of the self on the Internet. A conceptual framework of the cyborg consumer is presented, which will help marketers to better understand how consumers’ relationships with technology are changing and how marketing practices can be better targeted to the cyborg consumers.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This volume aims to 'bring the state back into terrorism studies' and fill the notable gap that currently exists in our understanding of the ways in which states employ terrorism as a political strategy of internal governance or foreign policy. Within this broader context, the volume has a number of specific aims. First, it aims to make the argument that state terrorism is a valid and analytically useful concept which can do much to illuminate our understanding of state repression and governance, and illustrate the varieties of actors, modalities, aims, forms, and outcomes of this form of contemporary political violence. Secondly, by discussing a rich and diverse set of empirical case studies of contemporary state terrorism this volume explores and tests theoretical notions, generates new questions and provides a resource for further research. Thirdly, it contributes to a critical-normative approach to the study of terrorism more broadly and challenges dominant approaches and perspectives which assume that states, particularly Western states, are primarily victims and not perpetrators of terrorism. Given the scarceness of current and past research on state terrorism, this volume will make a genuine contribution to the wider field, particularly in terms of ongoing efforts to generate more critical approaches to the study of political terrorism. This book will be of much interest to students of critical terrorism studies, critical security studies, terrorism and political violence and political theory in general.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research has consistently found that school students who do not identify as self-declared completely heterosexual are at increased risk of victimization by bullying from peers. This study examined heterosexual and nonheterosexual university students’ involvement in both traditional and cyber forms of bullying, as either bullies or victims. Five hundred twenty-eight first-year university students (M= 19.52 years old) were surveyed about their sexual orientation and their bullying experiences over the previous 12 months. The results showed that nonheterosexual young people reported higher levels of involvement in traditional bullying, both as victims and perpetrators, in comparison to heterosexual students. In contrast, cyberbullying trends were generally found to be similar for heterosexual and nonheterosexual young people. Gender differences were also found. The implications of these results are discussed in terms of intervention and prevention of the victimization of nonheterosexual university students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This submission addresses the following terms of reference: 1) the nature, prevalence and level of cybersafety risks and threats experienced by senior Australians; 2) the impact and implications of those risks and threats on access and use of information and communication technologies by senior Australians; 3) the adequacy and effectiveness of current government and industry initiatives to respond to those threats, including education initiatives aimed at senior Australians; 4) best practice safeguards, and any possible changes to Australian law, policy or practice that will strengthen the cybersafety of senior Australians.