104 resultados para offender anonymity
Resumo:
This paper grapples with the question of how progressive criminologists might approach working with people who have committed violent or predatory crimes, or are ‘at risk’ of doing so. Progressives have often been uneasy about ‘intervention’ with people who offend: but in the face of the destructiveness of violence, especially in some parts of the world, a posture of simple non-intervention won’t suffice. I suggest three central principles – which I call consciousness, solidarity and hope – that may guide us in developing ways of working with offenders that are both progressive and effective.
Resumo:
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Previous group signature constructions did not provide any disclosure capability, or at best a very limited one (such as subset membership). Our scheme offers a very powerful language for disclosing exactly in what capacity a subgroup of signers is making a signature on behalf of the group.
Resumo:
The sentencing of a self-confessed child sex offender and senior Brisbane Anglican priest Canon Barry Greaves in Brisbane District Court last Friday (April 24, 2009) is a significant event for many reasons and for many people. It is a significant event because Greaves was a priest at Boonah in the early 1980s when he committed the offences and because knowledge of his own sex offending against children failed to deter him from seeking and gaining high office in the Anglican Church. He accepted the position of being an Archbishop’s chaplain to Brisbane Archbishop Dr Peter Hollingworth in 1999. He stayed on as an Archbishop’s chaplain to the incoming Archbishop Dr Phillip Aspinall in 2002 and not even the disgrace of the sex scandal in the Brisbane Diocese resulted in a glimmer of guilt that maybe he was not an appropriate person to be providing pastoral care to other victims of sexual assault. Families of victims who were referred to Greaves for pastoral care are now flabbergasted by the double betrayal. “I went looking for comfort and now I discover I was confiding in a f***ing pedophile,” one woman said.
Resumo:
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
Resumo:
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.
Resumo:
Aggressive behavior at the steering wheel has been indicated as a contributing factor in a majority of crashes and anger has been compared to alcohol impairment in terms of probability to cause a crash. It has been shown that being in a state of anger or excitement while driving can decrease the drivers’ performances. . This paper reports the evaluation of 6 novel design alternatives of In-Vehicle Information Systems (IVIS) aimed at mitigating driver aggression. Each application presented was designed to tackle the following contributing factors to driver aggression: competitiveness, anonymity, territoriality, stress as well as social and emotional isolation. The 6 applications were simulated using computer vision algorithm to automatically overlay the real traffic conditions with ‘Head-Up Display’ visualizations. Two applications emerged over the others from participant’s evaluation: shared music combined the known calming effect of music with the sense of sympathy and intimacy caused by hearing other drivers’ music. The Shared Snapshot application provided an immediate gratification and was evaluated as a potential prevention of roadside quarrels. The paper presents Theoretical foundation, participant’s evaluations, implications and limitations of the study.
Resumo:
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions
Resumo:
The concept of the community is a key component of restorative justice theory and practice. In restorative justice scholarship, the community is constructed, alongside the victim and offender, as having a crucial role to play in responding to crimes in a restorative way. Indeed, it is often claimed that the perceived need for the community to be involved in responding to crime was a key rationale for the emergence of restorative practices around the world. Taking the emergence of youth justice conferencing – the most commonly-utilised restorative practice in Australia – as a case study, this article argues, however, that the idea of the community was peripheral to the emergence of restorative justice in Australia. The documentary analysis from which this article stems also found that while Indigenous young people are represented as belonging to communities, non-Indigenous young people are not – at least, not beyond their ‘community of care’. As such, this article raises concerns about the disproportionate responsibilisation of Indigenous young people, families and communities.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
Despite policies of deinstitutionalisation, many people with intellectual disabilities in developed western countries continue to live in mainstream institutional settings, such as correctional facilities, rather than in the community with support from disability services. This paper reports on the life stories of 10 people with intellectual disabilities, who had been imprisoned in adult correctional facilities in Queensland. The pathways taken by these 10 people into and out of prison are marked by significant abuse, neglect, and poverty. Significant disparity and disconnection is also displayed between the policies and service approaches, particularly between the disability, mental health, and correctional systems in Queensland. Based on these findings, a framework for practice, which spans both generic and specialist services, is suggested.
Resumo:
Until quite recently, most Australian jurisdictions gave statutory force to the principle of imprisonment as a sanction of last resort, reflecting its status as the most punitive sentencing option open to the court.1 That principle gave primary discretion as to whether incarceration was the most appropriate means of achieving the purpose of a sentence to the sentencing court, which received all of the information relevant to the offence, the offender and any victim(s). The disestablishment of this principle is symptomatic of an increasing erosion of judicial discretion with respect to sentencing, which appears to be resulting in some extremely punitive consequences.
Resumo:
Many intervention programs have been designed to decrease the rate of drink driving by altering the behavioural characteristics that may lead a person to drink and drive. However, most programs target high risk and repeat offenders. There is very little research on the feasibility and effectiveness of first offender programs. This project is part of a larger program of research that focuses on first time offenders, in order to reduce the rate of subsequent drink driving which may result in a repeat offence. A number of professional stakeholders were approached and interviewed with a view to capturing and reflecting current drink driving related concerns while developing an intervention in the context of Australian drink driving related legislation. The qualitative interviews involved open ended questioning which led to the themes discussed in the analysis. Included in the interviews were senior representatives from the Magistrates Court, Queensland Transport, Probation & Parole, Queensland Corrective Services, Royal Automobile Club Queensland (RACQ), Intraface Consulting (drug & alcohol EAP), Brisbane Police Prosecution Corps, Queensland Police Service and private practice psychology. Issues such as delivery of interventions, feasibility and cost-effectiveness were discussed, as were potential content and design. It was generally agreed that a tailored online intervention imposed as a sentencing option would be the most effective for first time offenders in terms of cost, ease of delivery and feasibility. The development of an online intervention program for first offenders is widely supported by professional stakeholders.
Resumo:
Objectives This study builds on research undertaken by Bernasco and Nieuwbeerta and explores the generalizability of a theoretically derived offender target selection model in three cross-national study regions. Methods Taking a discrete spatial choice approach, we estimate the impact of both environment- and offender-level factors on residential burglary placement in the Netherlands, the United Kingdom, and Australia. Combining cleared burglary data from all study regions in a single statistical model, we make statistical comparisons between environments. Results In all three study regions, the likelihood an offender selects an area for burglary is positively influenced by proximity to their home, the proportion of easily accessible targets, and the total number of targets available. Furthermore, in two of the three study regions, juvenile offenders under the legal driving age are significantly more influenced by target proximity than adult offenders. Post hoc tests indicate the magnitudes of these impacts vary significantly between study regions. Conclusions While burglary target selection strategies are consistent with opportunity-based explanations of offending, the impact of environmental context is significant. As such, the approach undertaken in combining observations from multiple study regions may aid criminology scholars in assessing the generalizability of observed findings across multiple environments.
Resumo:
This paper reports profiling information for speeding offenders and is part of a larger project that assessed the deterrent effects of increased speeding penalties in Queensland, Australia, using a total of 84,456 speeding offences. The speeding offenders were classified into three groups based on the extent and severity of an index offence: once-only low-rang offenders; repeat high-range offenders; and other offenders. The three groups were then compared in terms of personal characteristics, traffic offences, crash history and criminal history. Results revealed a number of significant differences between repeat high-range offenders and those in the other two offender groups. Repeat high-range speeding offenders were more likely to be male, younger, hold a provisional and a motorcycle licence, to have committed a range of previous traffic offences, to have a significantly greater likelihood of crash involvement, and to have been involved in multiple-vehicle crashes than drivers in the other two offender types. Additionally, when a subset of offenders’ criminal histories were examined, results revealed that repeat high-range speeding offenders were also more likely to have committed a previous criminal offence compared to once only low-range and other offenders and that 55.2% of the repeat high-range offenders had a criminal history. They were also significantly more likely to have committed drug offences and offences against order than the once only low-range speeding offenders, and significantly more likely to have committed regulation offences than those in the other offenders group. Overall, the results indicate that speeding offenders are not an homogeneous group and that, therefore, more tailored and innovative sanctions should be considered and evaluated for high-range recidivist speeders because they are a high-risk road user group.