320 resultados para Hate motivated crimes


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sex, Love and Abuse intervenes in a timely way on some important issues that have become 'elephants in the room' for academic and policy considerations around sexual violence and abuse. In so doing, this book draws upon a range of literatures and novel empirical sources to encourage critical thinking about the relationship between sex, love and abuse, examining crimes including sexual assault, pornography, child sexual abuse and domestic violence. This provocative book seeks to destabilize essentialist understandings of these phenomena with a view to identifying the subtle and complex nature of relationships, which often defy easy explanation and categorisation. Focusing on theories, public discourses and moral ideals, Hayes connects romantic love, intimacy and harm in a unique philosophical analysis, exploring abuse in relationships and how such abuse is fostered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Syrian hamster, Mesocricetus auratus, was first used in laboratory experiments some fifty years ago in the Middle East, from animals captured in the wild. 1 Since then the Syrian hamster has been domesticated and used extensively in laboratory studies of motivation, includuing reproduction, feeding, aggression and circadian behaviors. 2 In comparison to the rat, the male Syrian hamster is a solitary animal known for its territorial aggression, photoperiodic mating and hoarding behaviors. Many neural circuits controlling reproductive behaviors are now known. 3 While these motivated behaviors have been demonstrated to be regulated by endocrine status there is increasing evidence that dopamine within the nucleus accumbens conveys the rewarding tone of sexual motivation

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata across forensic disk images, files, system and application logs and network packet captures. The results prove that metadata based associations can be used to extract meaningful relationships between digital artifacts, thus potentially benefiting real-life forensics investigations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recognising that charitable behaviour can be motivated by public recognition and emotional satisfaction, not-for-profit organisations have developed strategies that leverage self-interest over altruism by facilitating individuals to donate conspicuously. Initially developed as novel marketing programs to increase donation income, such conspicuous tokens of recognition are being recognised as important value propositions to nurture donor relationships. Despite this, there is little empirical evidence that identifies when donations can be increased through conspicuous recognition. Furthermore, social media’s growing popularity for self-expression, as well as the increasing use of technology in donor relationship management strategies, makes an examination of virtual conspicuous tokens of recognition in relation to what value donors seek particularly insightful. Therefore, this research examined the impact of experiential donor value and virtual conspicuous tokens of recognition on blood donor intentions. Using online survey data from 186 Australian blood donors, results show that in fact emotional value is a stronger predictor of intentions to donate blood than altruistic value, while social value is the strongest predictor of intentions if provided with recognition. Clear linkages between dimensions of donor value (altruistic, emotional and social) and conspicuous donation behaviour (CDB) were identified. The findings provide valuable insights into the use of conspicuous donation tokens of recognition on social media, and contribute to our understanding into the under-researched areas of donor value and CDB.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2005, governments around the world unanimously agreed to the principle of the responsibility to protect (R2P), which holds that all states have a responsibility to protect their populations from genocide and mass atrocities, that the international community should assist them to fulfil this duty, and that the international community should take timely and decisive measures to protect populations from such crimes when their host state fails to do so. Progressing R2P from words to deeds requires international consensus about the principle’s meaning and scope. To achieve a global consensus on this, we need to better understand the position of governments around the world, including in the Asia-Pacific region, which has long been associated with an enduring commitment to a traditional concept of sovereignty. The present article contributes to such an endeavour through its three sections. The first part charts the nature of the international consensus on R2P and examines the UN secretary-general’s approach. The second looks in detail at the positions of the Asia-Pacific region’s governments on the R2P principle. The final part explores the way forward for progressing the R2P principle in the Asia-Pacific region.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In his January 2009 report, ‘Implementing the Responsibility to Protect’, UN Secretary General Ban Ki-moon noted that the protection of refugees and the internally displaced were important goals tied to R2P. 1 The Secretary General has suggested that the time has come for the international community to translate R2P from words to deeds. It would seem that the improvement of the protection of displaced persons ought to be a central component of this task. How useful a concept is R2P for advancing the protection of refugees and IDPs? What challenges confront attempts to reconcile R2P and the protection of the displaced? How might these challenges be overcome? These are the kinds of questions that have motivated the contributors to this volume. The volume has brought together some of the leading thinkers and practitioners on refugee, IDP and R2P issues in order to examine the relationship between R2P and the protection of the displaced, and to consider the conceptual and practical challenges that confront the international community if R2P is to add value to efforts to protect displaced persons.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Motivated by the analysis of the Australian Grain Insect Resistance Database (AGIRD), we develop a Bayesian hurdle modelling approach to assess trends in strong resistance of stored grain insects to phosphine over time. The binary response variable from AGIRD indicating presence or absence of strong resistance is characterized by a majority of absence observations and the hurdle model is a two step approach that is useful when analyzing such a binary response dataset. The proposed hurdle model utilizes Bayesian classification trees to firstly identify covariates and covariate levels pertaining to possible presence or absence of strong resistance. Secondly, generalized additive models (GAMs) with spike and slab priors for variable selection are fitted to the subset of the dataset identified from the Bayesian classification tree indicating possibility of presence of strong resistance. From the GAM we assess trends, biosecurity issues and site specific variables influencing the presence of strong resistance using a variable selection approach. The proposed Bayesian hurdle model is compared to its frequentist counterpart, and also to a naive Bayesian approach which fits a GAM to the entire dataset. The Bayesian hurdle model has the benefit of providing a set of good trees for use in the first step and appears to provide enough flexibility to represent the influence of variables on strong resistance compared to the frequentist model, but also captures the subtle changes in the trend that are missed by the frequentist and naive Bayesian models.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Solving indeterminate algebraic equations in integers is a classic topic in the mathematics curricula across grades. At the undergraduate level, the study of solutions of non-linear equations of this kind can be motivated by the use of technology. This article shows how the unity of geometric contextualization and spreadsheet-based amplification of this topic can provide a discovery experience for prospective secondary teachers and information technology students. Such experience can be extended to include a transition from a computationally driven conjecturing to a formal proof based on a number of simple yet useful techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A set system (X, F ) with X= {x 1,...,x m}) and F = {B1...,B n }, where B i ⊆ X, is called an (n, m) cover-free set system (or CF set system) if for any 1 ≤ i, j, k ≤ n and j ≠ k, |B i >2 |B j ∩ B k | +1. In this paper, we show that CF set systems can be used to construct anonymous membership broadcast schemes (or AMB schemes), allowing a center to broadcast a secret identity among a set of users in a such way that the users can verify whether or not the broadcast message contains their valid identity. Our goal is to construct (n, m) CF set systems in which for given m the value n is as large as possible. We give two constructions for CF set systems, the first one from error-correcting codes and the other from combinatorial designs. We link CF set systems to the concept of cover-free family studied by Erdös et al in early 80’s to derive bounds on parameters of CF set systems. We also discuss some possible extensions of the current work, motivated by different application.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing and related cybercrime is responsible for billions of dollars in losses annually. Gartner reported more than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008 (Gartner 2009). This paper asks whether the majority of organised phishing and related cybercrime originates in Eastern Europe rather than elsewhere such as China or the USA. The Russian “Mafiya” in particular has been popularised by the media and entertainment industries to the point where it can be hard to separate fact from fiction but we have endeavoured to look critically at the information available on this area to produce a survey. We take a particular focus on cybercrime from an Australian perspective, as Australia was one of the first places where Phishing attacks against Internet banks were seen. It is suspected these attacks came from Ukrainian spammers. The survey is built from case studies both where individuals from Eastern Europe have been charged with related crimes or unsolved cases where there is some nexus to Eastern Europe. It also uses some earlier work done looking at those early Phishing attacks, archival analysis of Phishing attacks in July 2006 and new work looking at correlation between the Corruption Perception Index, Internet penetration and tertiary education in Russia and the Ukraine. The value of this work is to inform and educate those charged with responding to cybercrime where a large part of the problem originates and try to understand why.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lawyering and Positive Professional Identities aims to help law students successfully navigate the demands of law studies and legal practice through the development of positive professional legal identities. It does this by focusing on the knowledge, skills and attitudes necessary for law students to be motivated and engaged learners, and psychologically healthy individuals. The text will fill an important gap for many law schools seeking to enact the threshold learning outcomes for law by addressing these important topics in their curricula. It is a valuable guide for all law students who wish to maximise their success and chances of thriving at law school and beyond. Positive lawyering knowledge and practice are central themes of this book, with a particular emphasis on lawyers’ roles as upholders of the rule of law, as dispute resolvers and as ethical professionals. Throughout, the authors provide practical, experience-based advice on the development of core skills for legal education and practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Business transformation is, without any doubt, one of those concepts attracting substantial attention in the boardrooms of corporations. However, and not uncommon for an emerging approach, there is currently a plethora of viewpoints on the core characteristics of a business transformation. Unlike well-established approaches such as change, lean, or quality management, business transformation is still under-specified in terms of methodologies and techniques. This status compromises the reaching of shared understanding and progress in an area of ever increasing importance. Motivated by this lack of consensus, this article proposes a new typology of business transformations based on the assessment of 20 global case studies