167 resultados para cyber-violence
Resumo:
The issue of child sexual abuse in Christian institutions has been persistent and politicalised across the world. Images and stories of abusive clergy, and their superiors who protect them, are common fodder for commercial and public media. In November 2012 the Australian Prime Minister announced a Royal Commission into child sexual abuse in Australian institutions. This came on the back of multiple calls such an inquiry. At this same time in Victoria, Australia, a Parliamentary Inquiry in the same issue was completing its process and preparing a report. This study draws on submissions made to the Victorian Parliamentary Inquiry and data from 15 ethnographic interviews with survivors of child sexual abuse in Christian institutions of Australia. The common themes of these sources are of betrayal, grief, a persistent search for justice and for recognition of the trauma rendered, not only to the lives of survivors but also to their families and communities. These are not new themes in the literature of child sexual abuse in Christian Institutions, however the perceptions of victimisation in the Australian context has only been explored in limited ways.
Resumo:
This article is based on research we conducted in two agricultural communities as part of a broader study that included mining communities in rural Australia. The data from the agricultural locations tell a different story to that of the mining communities. In the latter, alcohol-fuelled, male-on-male assaults in public places caused considerable anxiety among informants. By contrast, people in the agricultural communities seemed more troubled by hidden violent harms which were largely privatised and individualised, including self-harm, suicide, isolation and threats to men’s general wellbeing and mental health; domestic violence; and other forms of violence largely unreported and thus unacknowledged within the wider community (including sexual assault and bullying linked to homophobia). We argue one reason for the different pattern in the agricultural communities is the decline of pub(lic) masculinity, and with this, the increasing isolation of rural men and the increasing propensity to internalise violence. We argue that the relatively high rates of suicide in agricultural communities experiencing rural decline are symptomatic of the internalisation of violence.
Resumo:
For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.
Resumo:
In Australia, protection orders are a key legal response to domestic violence, and are often viewed as a way of providing for victim safety. For instance, recently the joint Australian and New South Wales Law Reform Commissions recommended that a common core purpose of all state and territory domestic violence legislation should be ‘to ensure or maximise the safety and protection of persons who fear or experience family violence’ (2010:Recommendation 7-4). Drawing and building upon prior research in Australia and the United States (‘US’), this paper uses comparative quantitative content analysis to assess the victim safety focus of domestic violence protection order legislation in each Australian state and territory. The findings of this analysis show that the Northern Territory, South Australia and Victoria ‘stand out’ from the other jurisdictions, having the highest victim safety focus in their legislation. However, there remains sizeable scope for improvement in all Australian jurisdictions, in terms of the victim safety focus of their legislative provisions and the considerations of legislative inconsistency between jurisdictions.
Resumo:
Research has found that children exposed to family violence exhibit higher rates of maladjustment. We review relevant literature on family violence, marital conflict, and cognitive factors implicated in child behaviour problems. A bias toward perceiving threat in ambiguous contexts has been identified as one factor mediating both aggressive and anxious behaviour disorders. We conducted a study utilizing the ambiguous situations paradigm to assess whether children exposed to violent spousal conflict were more likely than children not exposed to violence (divided into children with an externalizing behaviour disorder and non-clinic children) to perceive threat in two classes of ambiguous situations: Peer and Inter-Parental. The results indicated that children exposed to violent spousal conflict perceived more threat in parental situations than either of the other two groups. A number of considerations were taken into account given the exploratory nature of the study, particularly sample limitations. We conclude with suggestions for improvements to the research design and the further relevance of exploring cognitive factors involved in the adjustment of children from backgrounds of violence.
Resumo:
In this paper I use the case study of Darren, derived from two interviews in a research study of racism in the city of Stoke, UK (Gadd, Dixon and Jefferson 2005; Gadd and Dixon 2011), to explore how best to approach the topic of hate-motivated violence. This entails discussing the relationships among racism (the original object of study), hate-motivated violence (the more general term) and prejudices of various sorts. Because that discussion, I argue, justifies a psychoanalytic starting point, and since violence has become, almost quintessentially, masculine, this leads on to an exploration of what can be learnt from psychoanalysis about the relations among sexuality, masculinity, hatred and violence. This involves brief discussions of some key psychoanalytic terms, but only what is needed to enable sense to be made of my chosen case, which I shall then interrogate using these psychoanalytic ideas, focused on understanding the origins and nature of Darren’s hatred.
Resumo:
Many health professionals in Vietnam have limited knowledge and experience in coordinating care for victims of Domestic Violence (DV). This qualitative study aimed to elicit the beliefs of nurses and doctors that are influencing the care of victims of DV. Data were collected by semistructured interviews with nineteen nurses and doctors. Data were analyzed by content analysis and organized by three main themes; behavioral beliefs, normative beliefs and control beliefs. The outcomes of this study will inform the development of intervention strategies that will enable health professionals to better respond to and manage care for women who experience domestic violence in Vietnam.
Resumo:
Violence in entertainment districts is a major problem across urban landscapes throughout the world. Research shows that licensed premises are the third most common location for homicides and serious assaults, accounting for one in ten fatal and nonfatal assaults. One class of interventions that aims to reduce violence in entertainment districts involves the use of civil remedies: a group of strategies that use civil or regulatory measures as legal “levers” to reduce problem behavior. One specific civil remedy used to reduce problematic behavior in entertainment districts involves manipulation of licensed premise trading hours. This article uses generalized linear models to analyze the impact of lockout legislation on recorded violent offences in two entertainment districts in the Australian state of Queensland. Our research shows that 3 a.m. lockout legislation led to a direct and significant reduction in the number of violent incidents inside licensed premises. Indeed, the lockouts cut the level of violent crime inside licensed premises by half. Despite these impressive results for the control of violence inside licensed premises, we found no evidence that the lockout had any impact on violence on streets and footpaths outside licensed premises that were the site for more than 80 percent of entertainment district violence. Overall, however, our analysis suggests that lockouts are an important mechanism that helps to control the level of violence inside licensed premises but that finely grained contextual responses to alcohol-related problems are needed rather than one-size-fits-all solutions.
Resumo:
Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.
Resumo:
A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.
Resumo:
The article introduces a novel platform for conducting controlled and risk-free driving and traveling behavior studies, called Cyber-Physical System Simulator (CPSS). The key features of CPSS are: (1) simulation of multiuser immersive driving in a threedimensional (3D) virtual environment; (2) integration of traffic and communication simulators with human driving based on dedicated middleware; and (3) accessibility of multiuser driving simulator on popular software and hardware platforms. This combination of features allows us to easily collect large-scale data on interesting phenomena regarding the interaction between multiple user drivers, which is not possible with current single-user driving simulators. The core original contribution of this article is threefold: (1) we introduce a multiuser driving simulator based on DiVE, our original massively multiuser networked 3D virtual environment; (2) we introduce OpenV2X, a middleware for simulating vehicle-to-vehicle and vehicle to infrastructure communication; and (3) we present two experiments based on our CPSS platform. The first experiment investigates the “rubbernecking” phenomenon, where a platoon of four user drivers experiences an accident in the oncoming direction of traffic. Second, we report on a pilot study about the effectiveness of a Cooperative Intelligent Transport Systems advisory system.
Resumo:
This paper provides an overview of ‘lessons learned’ from the author’s decade long involvement in online teaching and learning, including eight years in the development, implementation, teaching and administration of a wholly online Master of Arts in Applied Linguistics coursework degree program, which attracted several hundred students annually from around the world, and has won awards for innovation, including being identified as a ‘flagship’ program during an external review of the university.