214 resultados para Law enforcement personnel.
Resumo:
While the majority of violent threats – defined as an expression of intent to do harm or act out violently against someone or something – do not progress to actual violence, a small proportion of threateners do go on to enact violence. Most researchers argue that violence risk assessments are inadequate for assessing threats of violence, which raises the question: how should a threat assessment (TA) be conducted? To begin to understand available frameworks for assessing threats, a systematic review of TA research literature was conducted. Most TA literature pertains to a specific domain (schools, public figure threats, workplaces) and target audience (clinicians, school personnel, law enforcement). TA guidelines are typically based on literature reviews with some based on empirical measures and others having no strong evidential basis. The most common concepts in TA are exploration of the threatener's mental health, the motivation for the threat and the presence of any plans. Rather than advocating for the development of a protocol for conducting TA, this article outlines the common areas of inquiry in assessing threats and highlights the limitations of current TA guidelines.
Resumo:
In the past decade, the utilization of ambulance data to inform the prevalence of nonfatal heroin overdose has increased. These data can assist public health policymakers, law enforcement agencies, and health providers in planning and allocating resources. This study examined the 672 ambulance attendances at nonfatal heroin overdoses in Queensland, Australia, in 2000. Gender distribution showed a typical 70/30 male-to-female ratio. An equal number of persons with nonfatal heroin overdose were between 15 and 24 years of age and 25 and 34 years of age. Police were present in only 1 of 6 cases, and 28.1% of patients reported using drugs alone. Ambulance data are proving to be a valuable population-based resource for describing the incidence and characteristics of nonfatal heroin overdose episodes. Future studies could focus on the differences between nonfatal heroin overdose and fatal heroin overdose samples.
Resumo:
Street racing and associated (hooning) behaviours have attracted increasing concern in recent years. While New Zealand and all Australian jurisdictions have introduced “antihooning” legislation and allocated significant police resources to managing the problem, there is limited evidence of the road safety implications of hooning. However, international and Australian data suggests that drivers charged with a hooning offence tend to be young males who are accompanied by one or more peers, and hooning-related crashes tend to occur at night. In this regard, there is considerable evidence that drivers under the age of 25 are over-represented in crash statistics, and are particularly vulnerable soon after obtaining a Provisional licence, when driving at night, and when carrying peer-aged passengers. The similarity between the nature of hooning offenders, offences and crashes, and road safety risks for young drivers in general, suggests that hooning is an issue that may be viewed as part of the broader young driver problem. Many jurisdictions have recently implemented a range of evidence-based strategies to address young driver road safety, and this paper will present Queensland crash and offence data to highlight the potential benefit of Graduated Driver Licensing initiatives, such as night driving restrictions and peer-aged passenger restrictions, to related road safety issues, including hooning. An understanding of potential flow-on effects is important for evaluations of anti-hooning legislation and Graduated Driver Licensing programs, and may have implications for future law enforcement resource allocation and policy development.
Resumo:
Traffic law enforcement is based on deterrence principles, whereby drivers control their behaviour in order to avoid an undesirable sanction. For “hooning”-related driving behaviours in Queensland, the driver’s vehicle can be impounded for 48 hours, 3 months, or permanently depending on the number of previous hooning offences. It is assumed that the threat of losing something of value, their vehicle, will discourage drivers from hooning. While official data shows that the rate of repeat offending is low, an in-depth understanding of the deterrent effects of these laws should involve qualitative research with targeted drivers. A sample of 22 drivers who reported engaging in hooning behaviours participated in focus group discussions about the vehicle impoundment laws as applied to hooning offences in Queensland. The findings suggested that deterrence theory alone cannot fully explain hooning behaviour, as participants reported hooning frequently, and intended to continue doing so, despite reporting that it is likely that they will be caught, and perceiving the vehicle impoundment laws to be extremely severe. The punishment avoidance aspect of deterrence theory appears important, as well as factors over and above legal issues, particularly social influences. A concerning finding was drivers’ willingness to flee from police in order to avoid losing their vehicle permanently for a third offence, despite acknowledging risks to their own safety and that of others. This paper discusses the study findings in terms of the implications for future research directions, enforcement practices and policy development for hooning and other traffic offences for which vehicle impoundment is applied.
Resumo:
This paper investigates the role of social capital on the reduction of short and long run negative health effects associated with stress, as well as indicators of burnout among police officers. Despite the large volume of research on either social capital or the health effects of stress, the interaction of these factors remains an underexplored topic. In this empirical analysis we aim to reduce such a shortcoming focusing on a highly stressful and emotionally draining work environment, namely law enforcement agents who perform as an essential part of maintaining modern society. Using a multivariate regression analysis focusing on three different proxies of health and three proxies for social capital conducting also several robustness checks, we find strong evidence that increased levels of social capital is highly correlated with better health outcomes. Additionally we observe that while social capital at work is very important, social capital in the home environment and work-life balance are even more important. From a policy perspective, our findings suggest that work and stress programs should actively encourage employees to build stronger social networks as well as incorporate better working/home life arrangements.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.
Resumo:
The advent of data breach notification laws in the United States (US) has unearthed a significant problem involving the mismanagement of personal information by a range of public and private sector organisations. At present, there is currently no statutory obligation under Australian law requiring public or private sector organisations to report a data breach of personal information to law enforcement agencies or affected persons. However, following a comprehensive review of Australian privacy law, the Australian Law Reform Commission (ALRC) has recommended the introduction of a mandatory data breach notification scheme. The issue of data breach notification has ignited fierce debate amongst stakeholders, especially larger private sector entities. The purpose of this article is to document the perspectives of key industry and government representatives to identify their standpoints regarding an appropriate regulatory approach to data breach notification in Australia.
Resumo:
Dhaka doesn’t have a mature transport system. Lacking in institutional arrangements, policy and planning, and law enforcement, the transport system operates has developed ad hoc and is situationally problematic. Absence of proper coordination between modes, poor public transport system, inadequate pedestrian facilities, and environmental degradation justify full consideration of Bus Rapid Transit (BRT) in Dhaka. BRT centres on sustainable transport principles. BRT is a system, which is capable to mitigate Dhaka’s transport problem if properly planned. In Strategic transport plan of Dhaka three BRT transport corridor has been proposed and BRT pre-feasibility study came up with one pilot corridor for early implementation of BRT. This paper first reviews international best practices then explores various BRT system packages and evaluates the suitability of these BRT packages by analyzing current bus service condition and physical and geometric configuration along the BRT pilot corridor. It concludes by proposing some BRT scenarios, which can be considered for further evaluation with respect to speed, delay, travel time and environmental pollution.
Resumo:
China is one of Asia’s many rapidly-motorising nations and recent increases in private-vehicle ownership have been coupled with an escalation in novice drivers. Several pieces of road safety legislation have been introduced in recent decades in China. While managing the legal aspects of road use is important, social influences on driver behaviour may offer alternative avenues to alter behaviour, particularly in a culture where such factors carry high importance. This paper reports qualitative research with Beijing drivers to investigate social influence factors that have, to date, received little attention in the literature. Findings indicated that family members, friends, and driving instructors appear influential on driver behaviour and that some newly licensed drivers seek additional assistance to facilitate the transition from learning to drive in a controlled environment to driving on the road in complex conditions. Strategies to avoid detection and penalties for inappropriate road use were described, many of which involved the use of a third person. These findings indicate potential barriers to implementing effective traffic enforcement and highlight the importance of understanding culturally-specific social factors relating to driver behaviour.
Resumo:
Given the serious nature of computer crime, and its global nature and implications, it is clear that there is a crucial need for a common understanding of such criminal activity internationally in order to deal with it effectively. Research into the extent to which legislation, international initiatives, and policy and procedures to combat and investigate computer crime are consistent globally is therefore of enormous importance. The challenge is to study, analyse, and compare the policies and practices of combating computer crime under different jurisdictions in order to identify the extent to which they are consistent with each other and with international guidelines; and the extent of their successes and limitations. The purpose ultimately is to identify areas where improvements are needed and what those improvements should be. This thesis examines approaches used for combating computer crime, including money laundering, in Australia, the UAE, the UK and the USA, four countries which represent a spectrum of economic development and culture. It does so in the context of the guidelines of international organizations such as the Council of Europe (CoE) and the Financial Action Task Force (FATF). In the case of the UAE, we examine also the cultural influences which differentiate it from the other three countries and which has necessarily been a factor in shaping its approaches for countering money laundering in particular. The thesis concludes that because of the transnational nature of computer crime there is a need internationally for further harmonisation of approaches for combating computer crime. The specific contributions of the thesis are as follows: „h Developing a new unified comprehensive taxonomy of computer crime based upon the dual characteristics of the role of the computer and the contextual nature of the crime „h Revealing differences in computer crime legislation in Australia, the UAE, the UK and the USA, and how they correspond to the CoE Convention on Cybercrime and identifying a new framework to develop harmonised computer crime or cybercrime legislation globally „h Identifying some important issues that continue to create problems for law enforcement agencies such as insufficient resources, coping internationally with computer crime legislation that differs between countries, having comprehensive documented procedures and guidelines for combating computer crime, and reporting and recording of computer crime offences as distinct from other forms of crime „h Completing the most comprehensive study currently available regarding the extent of money laundered in four such developed or fast developing countries „h Identifying that the UK and the USA are the most advanced with regard to anti-money laundering and combating the financing of terrorism (AML/CFT) systems among the four countries based on compliance with the FATF recommendations. In addition, the thesis has identified that local factors have affected how the UAE has implemented its financial and AML/CFT systems and reveals that such local and cultural factors should be taken into account when implementing or evaluating any country¡¦s AML/CFT system.
Resumo:
Resilient organised crime groups survive and prosper despite law enforcement activity, criminal competition and market forces. Corrupt police networks, like any other crime network, must contain resiliency characteristics if they are to continue operation and avoid being closed down through detection and arrest of their members. This paper examines the resilience of a large corrupt police network, namely The Joke which operated in the Australian state of Queensland for a number of decades. The paper uses social network analysis tools to determine the resilient characteristics of the network. This paper also assumes that these characteristics will be different to those of mainstream organised crime groups because the police network operates within an established policing agency rather than as an independent entity hiding within the broader community.
Resumo:
With the growth and development of communication technology there is an increasing need for the use of interception technologies in modern policing. Law enforcement agencies are faced with increasingly sophisticated and complex criminal networks that utilise modern communication technology as a basis for their criminal success. In particular, transnational organised crime (TOC) is a diverse and complicated arena, costing global society in excess of $3 trillion annually, a figure that continues to grow (Borger, 2007) as crime groups take advantage of disappearing borders and greater profit markets. However, whilst communication can be a critical success factor for criminal enterprise it is also a key vulnerability. It is this vulnerability that the use of CIT, such as phone taps or email interception, can exploit. As such, law enforcement agencies now need a method and framework that allows them to utilise CIT to combat these crimes efficiently and successfully. This paper provides a review of current literature with the specific purpose of considering the effectiveness of CIT in the fight against TOC and the groundwork that must be laid in order for it to be fully exploited. In doing so, it fills an important gap in current research, focusing on the practical implementation of CIT as opposed to the traditional area of privacy concerns that arise with intrusive methods of investigation. The findings support the notion that CIT is an essential intelligence gathering tool that has a strong place within the modern policing arena. It identifies that the most effective use of CIT is grounded within a proactive, intelligence‐led framework and concludes that in order for this to happen Australian authorities and law enforcement agencies must re‐evaluate and address the current legislative and operational constraints placed on the use of CIT and the culture that surrounds intelligence in policing.
Resumo:
A history and introduction to civil unmanned aircraft systems in Australia. Discussion is provided on some of the current challenges facing the civil UAS sector and the research being undertaken to address these challenges.
Resumo:
A qualitative approach was used to explore the impact of acculturation stress on the marital relationships of South Sudanese refugees settled in Brisbane, Australia. Thirteen refugees, who were currently or previously married, participated in three gender specific focus groups. The perceived causes and possible solutions of conflict were thoroughly explored. Hypothetical scenarios were used to facilitate group discussion. Major issues causing conflict between couples were identified as: the management of finances and lack of family and social support. Several other areas of acculturation stress also emerged as factors associated with marital stress. There was a dissonance regarding the adherence to cultural gender roles. Freedom provided to women in Australia caused tension between the couples. Law enforcement officers were perceived as lacking cultural understanding and misinterpreting the couple distress. Finally, limited information provided to refugees pre and post migration was considered to hinder adjustment. The participants suggested a number of practical solutions to these issues which are potentially useful in guiding future refugee settlement programs.