231 resultados para Forensic anthropology
Resumo:
Inter-individual variation in facial shape is one of the most noticeable phenotypes in humans, and it is clearly under genetic regulation; however, almost nothing is known about the genetic basis of normal human facial morphology. We therefore conducted a genome-wide association study for facial shape phenotypes in multiple discovery and replication cohorts, considering almost ten thousand individuals of European descent from several countries. Phenotyping of facial shape features was based on landmark data obtained from three-dimensional head magnetic resonance images (MRIs) and two-dimensional portrait images. We identified five independent genetic loci associated with different facial phenotypes, suggesting the involvement of five candidate genes-PRDM16, PAX3, TP63, C5orf50, and COL17A1-in the determination of the human face. Three of them have been implicated previously in vertebrate craniofacial development and disease, and the remaining two genes potentially represent novel players in the molecular networks governing facial development. Our finding at PAX3 influencing the position of the nasion replicates a recent GWAS of facial features. In addition to the reported GWA findings, we established links between common DNA variants previously associated with NSCL/P at 2p21, 8q24, 13q31, and 17q22 and normal facial-shape variations based on a candidate gene approach. Overall our study implies that DNA variants in genes essential for craniofacial development contribute with relatively small effect size to the spectrum of normal variation in human facial morphology. This observation has important consequences for future studies aiming to identify more genes involved in the human facial morphology, as well as for potential applications of DNA prediction of facial shape such as in future forensic applications.
Resumo:
When settling, people often use cultural schema from their original homeland to build familiarity in unfamiliar surrounds. This paper draws on ethnographic fieldwork conducted by the first author in Brisbane, with the Karen community from Burma, during which participant observation and interview methods were used. We present an ethnographic account of the Brisbane Karen wrist-tying ceremony. The ceremony acts as an insight into the challenges for Karen whilst settling into Australia. It reflects multiple accounts of history and tradition, but simultaneously speaks to emerging, contemporary Karen contexts. This research contributes to richer understandings of settlement: it frames transnational cultural practice as a flexible mode of integration, rather than an exclusionary mode of othering. We propose that the integrative discourse of the ceremony creates familiarity and social connection in local and diasporic spaces. This acts as a counter to the challenges of Karen settlement including the negotiations of local/global identity politics.
Resumo:
Although “refugees” are frequently represented in visual media, it is predominantly as the central subject matter and rarely are they positioned as the photographers of their own journeys. In this article we present photographic images that have been taken by refugee background youth portraying their experiences of the first years of settlement in Australia. We consider how, in our longitudinal research conducted with 120 refugee background youth, visual materials can provide equally important yet different insights in comparison to written or spoken narratives on the experiences of refugee settlement. Through an examination of over 1,000 photos taken by these youth, we explore the ways in which they portrayed their early experiences of external suburban settlement environments and their depictions of interior spaces and home-making practices. We discuss how these visual insights capture an alternative way of seeing the experiences of becoming at home as the youth become emplaced post-resettlement in Australia. We argue that the photographs taken by these refugee background youth illustrate how visual methods and materials can provide equally important but often overlooked insights into early settlement experiences. Importantly, the photographic images offer a way of portraying the people, places and sentiments that are central to the everyday lives of refugee background youths in ways that oral and written narratives can not.
Resumo:
Arson homicides are rare, representing only two percent of all homicides in Australia each year. In this study, data was collected from the AIC’s National Homicide Monitoring Program (NHMP) to build on previous research undertaken into arson-associated homicides (Davies & Mouzos 2007) and to provide more detailed analysis of cases and offenders. Over the period 1989 to 2010, there were 123 incidents of arson-associated homicide, involving 170 unique victims and 131 offenders. The majority of incidents (63%) occurred in the victim’s home and more than half (57%) of all victims were male. It was found that there has been a 44 percent increase in the number of incidents in the past decade. It is evident that a considerable proportion of the identified arson homicides involved a high degree of premeditation and planning. These homicides were commonly committed by an offender who was well known to the victim, with over half of the victims (56%) specifically targeted by the offender. This paper therefore provides a valuable insight into the nature of arson homicides and signposts areas for further investigation.
Resumo:
The measurement of illicit drug metabolites in raw wastewater is increasingly being adopted as an approach to objectively monitor population-level drug use, and is an effective complement to traditional epidemiological methods. As such, it has been widely applied in western countries. In this study, we utilised this approach to assess drug use patterns over nine days during April 2011 in Hong Kong. Raw wastewater samples were collected from the largest wastewater treatment plant serving a community of approximately 3.5 million people and analysed for excreted drug residues including cocaine, ketamine, methamphetamine, 3,4-methylenedioxymethamphetamine (MDMA) and key metabolites using liquid chromatography coupled with tandem mass spectrometry. The overall drug use pattern determined by wastewater analysis was consistent with that have seen amongst people coming into contact with services in relation to substance use; among our target drugs, ketamine (estimated consumption: 1400–1600 mg/day/1000 people) was the predominant drug followed by methamphetamine (180–200 mg/day/1000 people), cocaine (160–180 mg/day/1000 people) and MDMA (not detected). The levels of these drugs were relatively steady throughout the monitoring period. Analysing samples at higher temporal resolution provided data on diurnal variations of drug residue loads. Elevated ratios of cocaine to benzoylecgonine were identified unexpectedly in three samples during the evening and night, providing evidence for potential dumping events of cocaine. This study provides the first application of wastewater analysis to quantitatively evaluate daily drug use in an Asian metropolitan community. Our data reinforces the benefit of wastewater monitoring to health and law enforcement authorities for strategic planning and evaluation of drug intervention strategies.
Resumo:
This thesis presents the development of a rapid, sensitive and reproducible spectroscopic method for the detection of TNT in forensic and environmental applications. Simple nano sensors prepared by cost effective methods were utilized as sensitive platforms for the detection of TNT by surface enhanced Raman spectroscopy. The optimization of the substrate and the careful selection of a suitable recognition molecule contributed to the significant improvements of sensitive and selective targeting over current detection methods. The work presented in this thesis paves the way for effective detection and monitoring of explosives residues in law enforcement and environmental health applications.
Resumo:
It is 2015 and there are no indications that the relentless digital transformation of the music economy is about to slow down. Rather, the music economy continues to rapidly reinvent itself and industry powers, positions and practices that were redefined only a few years ago are being questioned once again. This paper examines the most recent changes of the music economy as it moves from a product-based towards an access-based logic. The paper starts out by recognising the essential role of technology in the evolution of the music economy. It then moves on to a discussion about the rise of so-called access-based music business models and points out some of the controversies and debates that are associated with these models and online services. With this as a background the paper explores how access-based music services and the algorithmically curated playlists developed by these services transform the relationship between artists, music and fans and challenges the music industrial power relationships and established industry practices once again.
Resumo:
Adopting a multi-theoretical approach, I examine external auditors’ perceptions of the reasons why organizations do or do not adopt cloud computing. I interview forensic accountants and IT experts about the adoption, acceptance, institutional motives, and risks of cloud computing. Although the medium to large accounting firms where the external auditors worked almost exclusively used private clouds, both private and public cloud services were gaining a foothold among many of their clients. Despite the advantages of cloud computing, data confidentiality and the involvement of foreign jurisdictions remain a concern, particularly if the data are moved outside Australia. Additionally, some organizations seem to understand neither the technology itself nor their own requirements, which may lead to poorly negotiated contracts and service agreements. To minimize the risks associated with cloud computing, many organizations turn to hybrid solutions or private clouds that include national or dedicated data centers. To the best of my knowledge, this is the first empirical study that reports on cloud computing adoption from the perspectives of external auditors.
Resumo:
A study examined the politics of dis/ability and curriculum. Data were obtained from a review of the new disability studies literature, focusing on the areas of history, sociology, anthropology, and critical legal theory. The results indicate that this new literature challenges popular psychoeducational models that assume disability as an objective medical, individual, and pathological deficiency, effectively restricting the systematic study of dis/ability as relational, external, shifting, and socially constituted. The findings suggest ways in which perceptions of “school problems” have to be adjusted to understand how the constant refiguration of normativities in everyday activities creates perceptions of disability-negative ontologies, generates experiences that incite efforts to modify those perceptions in multiple ways, and produces unintended effects from well-intended approaches that in the end remain irreducible to simplistic definitions for the one “ethical” or “politically correct” strategy.
Resumo:
Taking an interdisciplinary approach unmatched by any other book on this topic, this thoughtful Handbook considers the international struggle to provide for proper and just protection of Indigenous intellectual property (IP). In light of the United Nations Declaration on the Rights of Indigenous Peoples 2007, expert contributors assess the legal and policy controversies over Indigenous knowledge in the fields of international law, copyright law, trademark law, patent law, trade secrets law, and cultural heritage. The overarching discussion examines national developments in Indigenous IP in the United States, Canada, South Africa, the European Union, Australia, New Zealand, and Indonesia. The Handbook provides a comprehensive overview of the historical origins of conflict over Indigenous knowledge, and examines new challenges to Indigenous IP from emerging developments in information technology, biotechnology, and climate change. Practitioners and scholars in the field of IP will learn a great deal from this Handbook about the issues and challenges that surround just protection of a variety of forms of IP for Indigenous communities. Preface The Legacy of David Unaipon Matthew Rimmer Introduction: Mapping Indigenous Intellectual Property Matthew Rimmer PART I INTERNATIONAL LAW 1. The United Nations Declaration on the Rights of Indigenous Peoples: A Human Rights Framework for Indigenous Intellectual Property Mauro Barelli 2. The WTO, The TRIPS Agreement and Traditional Knowledge Tania Voon 3. The World Intellectual Property Organization and Traditional Knowledge Sara Bannerman 4. The World Indigenous Network: Rio+20, Intellectual Property, Indigenous Knowledge, and Sustainable Development Matthew Rimmer PART II COPYRIGHT LAW AND RELATED RIGHTS 5. Government Man, Government Painting? David Malangi and the 1966 One-Dollar Note Stephen Gray 6. What Wandjuk Wanted Martin Hardie 7. Avatar Dreaming: Indigenous Cultural Protocols and Making Films Using Indigenous Content Terri Janke 8. The Australian Resale Royalty for Visual Artists: Indigenous Art and Social Justice Robert Dearn and Matthew Rimmer PART III TRADE MARK LAW AND RELATED RIGHTS 9. Indigenous Cultural Expression and Registered Designs Maree Sainsbury 10. The Indian Arts and Crafts Act: The Limits of Trademark Analogies Rebecca Tushnet 11. Protection of Traditional Cultural Expressions within the New Zealand Intellectual Property Framework: A Case Study of the Ka Mate Haka Sarah Rosanowski 12 Geographical Indications and Indigenous Intellectual Property William van Caenegem PART IV PATENT LAW AND RELATED RIGHTS 13. Pressuring ‘Suspect Orthodoxy’: Traditional Knowledge and the Patent System Chidi Oguamanam, 14. The Nagoya Protocol: Unfinished Business Remains Unfinished Achmad Gusman Siswandi 15. Legislating on Biopiracy in Europe: Too Little, too Late? Angela Daly 16. Intellectual Property, Indigenous Knowledge, and Climate Change Matthew Rimmer PART V PRIVACY LAW AND IDENTITY RIGHTS 17. Confidential Information and Anthropology: Indigenous Knowledge and the Digital Economy Sarah Holcombe 18. Indigenous Cultural Heritage in Australia: The Control of Living Heritages Judith Bannister 19. Dignity, Trust and Identity: Private Spheres and Indigenous Intellectual Property Bruce Baer Arnold 20. Racial Discrimination Laws as a Means of Protecting Collective Reputation and Identity David Rolph PART VI INDIGENOUS INTELLECTUAL PROPERTY: REGIONAL PERSPECTIVES 21. Diluted Control: A Critical Analysis of the WAI262 Report on Maori Traditional Knowledge and Culture Fleur Adcock 22. Traditional Knowledge Governance Challenges in Canada Jeremy de Beer and Daniel Dylan 23. Intellectual Property protection of Traditional Knowledge and Access to Knowledge in South Africa Caroline Ncube 24. Traditional Knowledge Sovereignty: The Fundamental Role of Customary Law in Protection of Traditional Knowledge Brendan Tobin Index
Resumo:
DNA evidence has made a significant contribution to criminal investigations in Australia and around the world since it was widely adopted in the 1990s (Gans & Urbas 2002). The direct matching of DNA profiles, such as comparing one obtained from a crime scene with one obtained from a suspect or database, remains a widely used technique in criminal investigations. A range of new DNA profiling techniques continues to be developed and applied in criminal investigations around the world (Smith & Urbas 2012). This paper is the third in a series by the Australian Institute of Criminology (AIC) on DNA evidence. The first, published in 1990 when the technology was in its relative infancy, outlined the scientific background for DNA evidence, considered early issues such as scientific reliability and privacy and described its application in early criminal cases (Easteal & Easteal 1990). The second, published in 2002, expanded on the scientific background and discussed a significant number of Australian cases in a 12-year period, illustrating issues that had arisen in investigations, at trial and in the use of DNA in the review of convictions and acquittals (Gans & Urbas 2002). There have been some significant developments in the science and technology behind DNA evidence in the 13 years since 2002 that have important implications for law enforcement and the legal system. These are discussed through a review of relevant legal cases and the latest empirical evidence. This paper is structured in three sections. The first examines the scientific techniques and how they have been applied in police investigations, drawing on a number of recent cases to illustrate them. The second considers empirical research evaluating DNA evidence and databases and the impact DNA has on investigative and court outcomes. The final section discusses significant cases that establish legal precedent relating to DNA evidence in criminal trials where significant issues have arisen or new techniques have been applied that have not yet been widely discussed in the literature. The paper concludes by reflecting on implications for policy and practice.
Resumo:
Well into his ophthalmic journey of retinopexy, cryopexy, vitrectomy and IOL surgery, Professor Nathan Efron's pauses to undertake a forensic examination of his clinical records to identify the source of his refractive surprise.
Resumo:
Background Alcohol expectancies likely play a role in people’s perceptions of alcohol-involved sexual violence. However, no appropriate measure exists to examine this link comprehensively. Objective The aim of this research was to develop an alcohol expectancy measure which captures young adults’ beliefs about alcohol’s role in sexual aggression and victimization. Method Two cross-sectional samples of young Australian adults (18–25 years) were recruited for scale development (Phase 1) and scale validation (Phase 2). In Phase 1, participants (N = 201; 38.3% males) completed an online survey with an initial pool of alcohol expectancy items stated in terms of three targets (self, men, women) to identify the scale’s factor structure and most effective items. A revised alcohol expectancy scale was then administered online to 322 young adults (39.6% males) in Phase 2. To assess the predictive, convergent, and discriminant validity of the scale, participants also completed established measures of personality, social desirability, alcohol use, general and context-specific alcohol expectancies, and impulsiveness. Results Principal axis factoring (Phase 1) and confirmatory factor analysis (Phase 2) resulted in a target-equivalent five-factor structure for the final 66-item Drinking Expectancy Sexual Vulnerabilities Questionnaire (DESV-Q). The factors were labeled: - (1) Sexual Coercion - (2) Sexual Vulnerability - (3) Confidence - (4) Self-Centeredness - (5) Negative Cognitive and Behavioral Changes The measure demonstrated effective items, high internal consistency, and satisfactory predictive, convergent, and discriminant validity. Conclusions The DESV-Q is a purpose-specific instrument that could be used in future research to elucidate people’s attributions for alcohol-involved sexual aggression and victimization.
Resumo:
Network data packet capture and replay capabilities are basic requirements for forensic analysis of faults and security-related anomalies, as well as for testing and development. Cyber-physical networks, in which data packets are used to monitor and control physical devices, must operate within strict timing constraints, in order to match the hardware devices' characteristics. Standard network monitoring tools are unsuitable for such systems because they cannot guarantee to capture all data packets, may introduce their own traffic into the network, and cannot reliably reproduce the original timing of data packets. Here we present a high-speed network forensics tool specifically designed for capturing and replaying data traffic in Supervisory Control and Data Acquisition systems. Unlike general-purpose "packet capture" tools it does not affect the observed network's data traffic and guarantees that the original packet ordering is preserved. Most importantly, it allows replay of network traffic precisely matching its original timing. The tool was implemented by developing novel user interface and back-end software for a special-purpose network interface card. Experimental results show a clear improvement in data capture and replay capabilities over standard network monitoring methods and general-purpose forensics solutions.