646 resultados para Crime detection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Taking an empirical, critical approach to the problem of drugs, this thesis explores the interaction of drug policies and young people's drug use in Brisbane. The research argues that criminalising drug users does not usually prevent harmful drug use, but it can exacerbate harm and change how young people use drugs. Contemporary understandings of drug use as either recreational or addictive can create a false binary, and influence how illicit drugs are used. These understandings interact with policy responses to the drug problem, with some very real implications for the lived experiences of drug users. This research opens up possibilities for new directions in drug research and allows for a redefinition of drug related harm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper elaborates the approach used by the Applied Data Mining Research Group (ADMRG) for the Social Event Detection (SED) Tasks of the 2013 MediaEval Benchmark. We extended the constrained clustering algorithm to apply to the first semi-supervised clustering task, and we compared several classifiers with Latent Dirichlet Allocation as feature selector in the second event classification task. The proposed approach focuses on scalability and efficient memory allocation when applied to a high dimensional data with large clusters. Results of the first task show the effectiveness of the proposed method. Results from task 2 indicate that attention on the imbalance categories distributions is needed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A nanostructured gold surface consisting of closely packed outwardly growing spikes is investigated for the electrochemical detection of dopamine and cytochrome c. A significant electrocatalytic effect for the electrooxidation of both dopamine and ascorbic acid at the nanostructured electrode was found due to the presence of surface active sites which allowed the detection of dopamine in the presence of excess ascorbic acid to be achieved by differential pulse voltammetry. By simple modification with a layer of Nafion, the enhanced electrocatalytic properties of the nanostructured surface was maintained while increasing the selectivity of dopamine detection in the presence of interfering species such as excess ascorbic and uric acids. Also, upon modification of the nanostructured surface with a monolayer of cysteine, the electrochemical response of immobilised cytochrome c in two distinct conformations was observed. This opens up the possibility of using such a nanostructured surface for the characterisation of other biomolecules and in bio-electroanalytical applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stress corrosion cracking (SCC) is a well known form of environmental attack in low carat gold jewellery. It is desirable to have a quick, easy and cost effective way to detect SCC in alloys and prevent them from being used and later failing in their application. A facile chemical method to investigate SCC of 9 carat gold alloys is demonstrated. It involves a simple application of tensile stress to a wire sample in a corrosive environment such as 1–10 % FeCl3 which induces failure in less than 5 minutes. In this study three quaternary (Au, Ag, Cu and Zn) 9 carat gold alloy compositions were investigated for their resistance to SCC and the relationship between time to failure and processing conditions is studied. It is envisaged that the use of such a rapid and facile screening procedure at the production stage may readily identify alloy treatments that produce jewellery that will be susceptible to SCC in its lifetime.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study considers the challenges in representing women from other cultures in the crime fiction genre. The study is presented in two parts; an exegesis and a creative practice component consisting of a full length crime fiction novel, Batafurai. The exegesis examines the historical period of a section of the novel—post-war Japan—and how the area of research known as Occupation Studies provides an insight into the conditions of women during this period. The exegesis also examines selected postcolonial theory and its exposition of representations of the 'other' as a western construct designed to serve Eurocentric ends. The genre of crime fiction is reviewed, also, to determine how characters purportedly representing Oriental cultures are constricted by established stereotypes. Two case studies are examined to investigate whether these stereotypes are still apparent in contemporary Australian crime fiction. Finally, I discuss my own novel, Batafurai, to review how I represented people of Asian background, and whether my attempts to resist stereotype were successful. My conclusion illustrates how novels written in the crime fiction genre are reliant on strategies that are action-focused, rather than character-based, and thus often use easily recognizable types to quickly establish frameworks for their stories. As a sub-set of popular fiction, crime fiction has a tendency to replicate rather than challenge established stereotypes. Where it does challenge stereotypes, it reflects a territory that popular culture has already visited, such as the 'female', 'black' or 'gay' detective. Crime fiction also has, as one of its central concerns, an interest in examining and reinforcing the notion of societal order. It repeatedly demonstrates that crime either does not pay or should not pay. One of the ways it does this is to contrast what is 'good', known and understood with what is 'bad', unknown, foreign or beyond our normal comprehension. In western culture, the east has traditionally been employed as the site of difference, and has been constantly used as a setting of contrast, excitement or fear. Crime fiction conforms to this pattern, using the east to add a richness and depth to what otherwise might become a 'dry' tale. However, when used in such a way, what is variously eastern, 'other' or Oriental can never be paramount, always falling to secondary side of the binary opposites (good/evil, known/unknown, redeemed/doomed) at work. In an age of globalisation, the challenge for contemporary writers of popular fiction is to be responsive to an audience that demands respect for all cultures. Writers must demonstrate that they are sensitive to such concerns and can skillfully manage the tensions caused by the need to deliver work that operates within the parameters of the genre, and the desire to avoid offence to any cultural or ethnic group. In my work, my strategy to manage these tensions has been to create a back-story for my characters of Asian background, developing them above mere genre types, and to situate them with credibility in time and place through appropriate historical research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organized crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises. Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organized crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing. Policing Transnational Organized Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Israeli Organised Crime (IOC) gained prominence in the 1990s for its involvement in the manufacturing and wholesale distribution of MDMA through traditional trafficking networks across Europe. Equipped with astute business acumen and an entrepreneurial spirit, IOC dominated MDMA trafficking in Europe for more than a decade and remains as a major participant in this drug market. The paper analyses the entrepreneurial activities of IOC within the context of the MDMA market in Europe between 1990 and 2005 using the Crime Business Analysis Matrix (CBAM) as proffered by Dean, et al (2010). The study is in two parts. Part A provides a review of the literature as it pertains to IOC and its involvement in the European drug market, while Part B provides a qualitative analysis of their criminal business practices and entrepreneurialism of IOC within this context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Determining what consequences are likely to serve as effective punishment for any given behaviour is a complex task. This chapter focuses specifically on illegal road user behaviours and the mechanisms used to punish and deter them. Traffic law enforcement has traditionally used the threat and/or receipt of legal sanctions and penalties to deter illegal and risky behaviours. This process represents the use of positive punishment, one of the key behaviour modification mechanisms. Behaviour modification principles describe four types of reinforcers: positive and negative punishments and positive and negative reinforcements. The terms ‘positive’ and ‘negative’ are not used in an evaluative sense here. Rather, they represent the presence (positive) or absence (negative) of stimuli to promote behaviour change. Punishments aim to inhibit behaviour and reinforcements aim to encourage it. This chapter describes a variety of punishments and reinforcements that have been and could be used to modify illegal road user behaviours. In doing so, it draws on several theoretical perspectives that have defined behavioural reinforcement and punishment in different ways. Historically, the main theoretical approach used to deter risky road use has been classical deterrence theory which has focussed on the perceived certainty, severity and swiftness of penalties. Stafford and Warr (1993) extended the traditional deterrence principles to include the positive reinforcement concept of punishment avoidance. Evidence of the association between punishment avoidance experiences and behaviour has been established for a number of risky road user behaviours including drink driving, unlicensed driving, and speeding. We chose a novel way of assessing punishment avoidance by specifying two sub-constructs (detection evasion and punishment evasion). Another theorist, Akers, described the idea of competing reinforcers, termed differential reinforcement, within social learning theory (1977). Differential reinforcement describes a balance of reinforcements and punishments as influential on behaviour. This chapter describes comprehensive way of conceptualising a broad range of reinforcement and punishment concepts, consistent with Akers’ differential reinforcement concept, within a behaviour modification framework that incorporates deterrence principles. The efficacy of three theoretical perspectives to explain self-reported speeding among a sample of 833 Australian car drivers was examined. Results demonstrated that a broad range of variables predicted speeding including personal experiences of evading detection and punishment for speeding, intrinsic sensations, practical benefits expected from speeding, and an absence of punishing effects from being caught. Not surprisingly, being younger was also significantly related to more frequent speeding, although in a regression analysis, gender did not retain a significant influence once all punishment and reinforcement variables were entered. The implications for speed management, as well as road user behaviour modification more generally, are discussed in light of these findings. Overall, the findings reported in this chapter suggest that a more comprehensive approach is required to manage the behaviour of road users which does not rely solely on traditional legal penalties and sanctions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an investigation into event detection in crowded scenes, where the event of interest co-occurs with other activities and only binary labels at the clip level are available. The proposed approach incorporates a fast feature descriptor from the MPEG domain, and a novel multiple instance learning (MIL) algorithm using sparse approximation and random sensing. MPEG motion vectors are used to build particle trajectories that represent the motion of objects in uniform video clips, and the MPEG DCT coefficients are used to compute a foreground map to remove background particles. Trajectories are transformed into the Fourier domain, and the Fourier representations are quantized into visual words using the K-Means algorithm. The proposed MIL algorithm models the scene as a linear combination of independent events, where each event is a distribution of visual words. Experimental results show that the proposed approaches achieve promising results for event detection compared to the state-of-the-art.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJECTIVES: To provide an overview of 1) traditional methods of skin cancer early detection, 2) current technologies for skin cancer detection, and 3) evolving practice models of early detection. DATA SOURCES: Peer-reviewed databased articles and reviews, scholarly texts, and Web-based resources. CONCLUSION: Early detection of skin cancer through established methods or newer technologies is critical for reducing both skin cancer mortality and the overall skin cancer burden. IMPLICATIONS FOR NURSING PRACTICE: A basic knowledge of recommended skin examination guidelines and risk factors for skin cancer, traditional methods to further examine lesions that are suspicious for skin cancer and evolving detection technologies can guide patient education and skin inspection decisions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The refereed papers contained in this set of conference proceedings were presented at the 2nd International Conference on Crime, Justice and Social Democracy, hosted by the Crime and Justice Research Centre, Faculty of Law, QUT. The conference attracted an impressive list of internationally distinguished keynote and panel speakers from the United Kingdom, United States, Australia, New Zealand, Canada and this time Latin America, as well as high quality paper submissions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To the editor...