323 resultados para Crime and criminals


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Victim/survivors of human trafficking involving partner migration employ diverse help-seeking strategies, both formal and informal, to exit their exploitative situations. Drawing on primary research conducted by Lyneham and Richards (forthcoming), the authors highlight the importance of educating the community and professionals from a wide range of sectors—including health, mental health, child protection, social welfare, social work, domestic violence, migration, legal and law enforcement services—about human trafficking and the help-seeking strategies of victims/survivors in order to support them to leave exploitative situations. Enhancing Australia’s knowledge of victim/survivors’ help-seeking strategies will better inform government and community responses to this crime, improve detection and identification of human trafficking matters and subsequent referral to appropriate victim services.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Over the past quarter century, a growing volume of rural-focused criminological work has emerged. In this article, the literature related to three rural criminological issues are examined and discussed in terms of their lessons for critical criminology. Research on rural communities and crime is examined as a way to criticize and challenge mainstream criminological theories and concepts like social disorganisation and collective efficacy, and to remind critical criminologists of the importance for developing critical perspectives for place-based or ecological theories of crime. Agricultural crime studies are discussed in terms of the need to develop a critical criminology of agriculture and food. Finally, criminological studies of rural ‘others’ is used to show the need for critical criminologists to give greater analytic attention to divisions and marginalities of peoples living in smaller and more isolated places based on gender, race, and lifestyles, among other factors.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Recent analyses of National Crime Victimization Survey (NCVS) data show that male-to-female separation/divorce assault varies across geographic regions in the United States, with rural rates of such woman abuse being higher than those for suburban and urban areas. Using the same data set, the main objective of this paper is to present the results of an investigation into whether characteristics of female victims of separation/divorce assault also differ across urban, suburban, and rural communities.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to explore the role of leadership in problem-oriented policing (POP). Design/methodology/approach – This paper uses interrupted time series models to isolate the impact on crime trends of a transformational leader's efforts to spearhead the implementation of a program of POP, called the problem solving model (PSM), in a southern state in Australia. Findings – This paper finds that the PSM led directly to an impact on overall crime, with a significant reduction in crimes per 100,000 persons per year after the introduction of the PSM. The majority of the overall crime drop attributable to implementation of POP was driven by reductions in property crime. It was noted that the leadership influence of the PSM was not effective in reducing all types of crime. Crimes against the person where not affected by the introduction of the PSM and public nuisance crimes largely followed the forecasted, upward trajectory. Practical implications – The driver behind the PSM was Commissioner Hyde and the success of the PSM is largely attributable to his strong commitment to transformational leadership and a top-down approach to implementation. These qualities encapsulate the original ideas behind POP that Goldstein (1979, 2003), back in 1979, highlighted as critical for the success of future POP programs. Social implications – Reducing crime is an important part of creating safe communities and improving quality of life for all citizens. This research shows that successful implementation of the PSM within South Australia under the strong leadership of Commissioner Hyde was a major factor in reducing property crime and overall crime rates. Originality/value – This paper is valuable because it demonstrates the link between strong leadership in policing, the commissioner's vision for POP and how his vision then translated into widespread adoption of POP. The study empirically shows that the statewide adoption of POP led to significant reductions in crime, particularly property crime.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

After the terrorist attacks in the United States on 11 September 2001, terrorism and counter-terrorism efforts moved to the front of popular consciousness and became the focus of national security for governments worldwide. With this increased attention came an urgent interest in understanding and identifying what works in fighting terrorism (Belasco 2010). For Australia, understanding the relative effectiveness of counter-terrorism efforts in nearby neighbours of Indonesia, Thailand and the Philippines is highly relevant for our country's national security. Indonesia, Thailand and the Philippines are all countries that are important to Australia not just because of geographic proximity, but also because of a history of economic ties and the role these countries play as Australia’s regional partners...

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper considers constructions of institutional culture and power in the cover-up of child sexual abuse (CSA) by clergy in the Roman Catholic Church of Australia. The issue of cover-up has previously been considered in international inquiries as an institutional failing that has caused significant harm to victims of CSA by Catholic Clergy. Evidence given by select representatives of the Catholic Church in two government inquiries into institutional abuse carried out in Australia is considered here. This evidence suggests that, where cover-up has occurred, it has been reliant on the abuse of institutional power and resulted in direct emotional, psychological and spiritual harm to victims of abuse. Despite international recognition of cover-up as institutional abuse, evidence presented by Roman Catholic Representatives to the Victorian Inquiry denied there was an institutionalised cover-up. Responding to this evidence, this paper queries whether the primary foundation of cover-up conforms to the ‘bad apple theory’ in that it relates only to a few individuals, or the ‘bad barrel theory’ of institutional structure and culture.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Opposition to men’s violence against women who are their intimate partners has become politically popular in the United States. The Violence Against Women Act (VAWA) has enjoyed broad-based support for over 15 years. VAWA has been refined and expanded with each reauthorization. Resistance to the battered women’s movement is often overlooked in this political context. However, woman abuse and state responses to it are mired in cultural tensions about crime, law, gender, economics, scholarship, and the family. Based on interviews with 35 advocates in the United States, this paper outlines key tactics of antifeminist backlash against the battered women’s movement.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The available research literature on intimate partner violence is often centred around a heteronormative understanding of gender, relationships and violence. When it comes to intimate partner violence in the transgender community, the research is limited or nonexistent due in part to the methodological issues of visibility and access by those outside this community. Drawing from Renzetti (1992, 1995), McClennen (2003), and the feminist participatory research model, this paper examines the techniques for overcoming the methodological barriers as a cisgender or 'normatively gendered' woman in a transgender community. Throughout the research with the transgender community, five strategies for overcoming methodological barriers were developed: Cultural Immersion, Commitment and Visibility, Sensitivity and Acceptance, Honesty, and Communication. This paper explores how utilising these strategies enabled access to the transgender community in order to conduct effective research.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Online fraud occurs when an individual or a business responds in some manner to an unsolicited invitation received via the internet and suffers financial or other detrimental effects as a result. In 2010–11, the Australian Bureau of Statistics (2012) found that over 1.2 million Australians (6.7% of the population aged 15 years and over) had been a victim of personal fraud, losing approximately $1.4b in the preceding 12 months. More than half of these victims (55.7%) were contacted via the internet or email (online victimisation). In addition to monetary losses, victims of online fraud suffer serious psychological, emotional, social and even physical problems as a consequence of their victimisation. This paper explores the challenges of responding to online fraud victimisation in Australia and describes some of the specific support services that have recently emerged to support victims of this crime.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Objectives This study builds on research undertaken by Bernasco and Nieuwbeerta and explores the generalizability of a theoretically derived offender target selection model in three cross-national study regions. Methods Taking a discrete spatial choice approach, we estimate the impact of both environment- and offender-level factors on residential burglary placement in the Netherlands, the United Kingdom, and Australia. Combining cleared burglary data from all study regions in a single statistical model, we make statistical comparisons between environments. Results In all three study regions, the likelihood an offender selects an area for burglary is positively influenced by proximity to their home, the proportion of easily accessible targets, and the total number of targets available. Furthermore, in two of the three study regions, juvenile offenders under the legal driving age are significantly more influenced by target proximity than adult offenders. Post hoc tests indicate the magnitudes of these impacts vary significantly between study regions. Conclusions While burglary target selection strategies are consistent with opportunity-based explanations of offending, the impact of environmental context is significant. As such, the approach undertaken in combining observations from multiple study regions may aid criminology scholars in assessing the generalizability of observed findings across multiple environments.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Contents: 1. SOCIOLOGY: An Introduction to the Sociological Imagination. John Carl, Sarah Baker 2. SOCIOLOGICAL THEORY: An Introduction to the Theoretical Foundations of Sociology. John Carl, Sarah Baker 3. SOCIAL CLASS IN AUSTRALIA: Stratification in a Modern Society. John Carl, John Scott 4. RACE AND ETHNIC STRATIFICATION: Is it a Question of Colour? John Carl, John Scott 5. SEX AND GENDER: The Social Side of Sex. John Carl, Wendy Hillman 6. AGE AND AGEING: The Greying of Society. John Carl, Sarah Baker 7. CRIME AND THE LEGAL SYSTEM: How Do Societies Respond to Crime and Deviance? John Carl, John Scott 8. EDUCATION AND EMPLOYMENT: From the Classroom to the Workforce. John Carl, Sarah Baker and Brady Robards 9: MARRIAGE AND FAMILY: How Do Societies Perpetuate Themselves? John Carl, Wendy Hillman 10. THE BODY, HEALTH AND ILLNESS: A Weight on Australia’s Shoulder. John Carl, John Scott 11. GLOBALISATION: The Economy and Society. John Carl, Geoffrey Lawrence 12. CULTURE: A Framework for the Individual. John Carl, Sarah Baker and Brady Robards 13. RELIGION: Is Society Losing Faith? John Carl, Sarah Baker and Brady Robards 14. ENVIRONMENTAL SUSTAINABILITY AND SOCIAL MOVEMENTS: How Do Societies Connect with Nature? John Carl, Geoffrey Lawrence 15. SOCIOLOGICAL RESEARCH: How Do We Learn about Society? John Carl, Wendy Hillman

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In 1978 Donald Cressey commented on an emerging division in the study of crime with some scholars concentrating on the development of a “crime fi ghting coalition” and others concerned with the processes associated with “making laws, breaking laws, and the reaction to the breaking of laws” (1978: 175). Since Cressey’s paper, many others have refl ected on the distinction between criminology and the sociology of crime and deviance (Akers, 1992; Garland, 1999; Garland & Sparks, 2000; Konty, 2007). But does such a distinction actually exist? Adopting a pragmatic position, the immediate answer is yes, if we assume that these categories have substance on the basis that they are grounded in everyday beliefs, institutional preferences and research practice (Konty, 2007). Moreover, these are viable categories in that some people studying crime label themselves criminologists (or are given this label by others) while others prefer or are given the label sociologist. Of course, there are further labels that may apply to persons studying crime, which include psychologist, penologist, biologist, chemist, and so on. One could argue that such labels are unimportant, however, it remains that these categories have a practical character. For criminology and the sociology of crime in particular, scholarly discourse frames these categories as oppositional (Bader et al., 1996.; Bendle, 1989; Laub & Sampson, 1991; Sibley, 2002) and to the extent that this has occurred, the categories have social relevance.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.