141 resultados para Crimes graves internationaux
Resumo:
Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.
Resumo:
Objective To examine the impact of applying for funding on personal workloads, stress and family relationships. Design Qualitative study of researchers preparing grant proposals. Setting Web-based survey on applying for the annual National Health and Medical Research Council (NHMRC) Project Grant scheme. Participants Australian researchers (n=215). Results Almost all agreed that preparing their proposals always took top priority over other work (97%) and personal (87%) commitments. Almost all researchers agreed that they became stressed by the workload (93%) and restricted their holidays during the grant writing season (88%). Most researchers agreed that they submitted proposals because chance is involved in being successful (75%), due to performance requirements at their institution (60%) and pressure from their colleagues to submit proposals (53%). Almost all researchers supported changes to the current processes to submit proposals (95%) and peer review (90%). Most researchers (59%) provided extensive comments on the impact of writing proposals on their work life and home life. Six major work life themes were: (1) top priority; (2) career development; (3) stress at work; (4) benefits at work; (5) time spent at work and (6) pressure from colleagues. Six major home life themes were: (1) restricting family holidays; (2) time spent on work at home; (3) impact on children; (4) stress at home; (5) impact on family and friends and (6) impact on partner. Additional impacts on the mental health and well-being of researchers were identified. Conclusions The process of preparing grant proposals for a single annual deadline is stressful, time consuming and conflicts with family responsibilities. The timing of the funding cycle could be shifted to minimise applicant burden, give Australian researchers more time to work on actual research and to be with their families.
Resumo:
The sentencing of a self-confessed child sex offender and senior Brisbane Anglican priest Canon Barry Greaves in Brisbane District Court last Friday (April 24, 2009) is a significant event for many reasons and for many people. It is a significant event because Greaves was a priest at Boonah in the early 1980s when he committed the offences and because knowledge of his own sex offending against children failed to deter him from seeking and gaining high office in the Anglican Church. He accepted the position of being an Archbishop’s chaplain to Brisbane Archbishop Dr Peter Hollingworth in 1999. He stayed on as an Archbishop’s chaplain to the incoming Archbishop Dr Phillip Aspinall in 2002 and not even the disgrace of the sex scandal in the Brisbane Diocese resulted in a glimmer of guilt that maybe he was not an appropriate person to be providing pastoral care to other victims of sexual assault. Families of victims who were referred to Greaves for pastoral care are now flabbergasted by the double betrayal. “I went looking for comfort and now I discover I was confiding in a f***ing pedophile,” one woman said.
Resumo:
Chronic leg ulcers are costly to manage for health service providers. Although evidence-based care leads to improved healing rates and reduced costs, a significant evidence-practice gap is known to exist. Lack of access to specialist skills in wound care is one reason suggested for this gap. The aim of this study was to model the change to total costs and health outcomes under two versions of health services for patients with leg ulcers: routine health services for community-living patients; and care provided by specialist wound clinics. Mean weekly treatment and health services costs were estimated from participants’ data (n=70) for the twelve months prior to their entry to a study specialist wound clinic, and prospectively for 24 weeks after entry. For the retrospective phase mean weekly costs of care were $AU130.30 (SD $12.64) and these fell to $AU53.32 (SD $6.47) for the prospective phase. Analysis at a population level suggests if 10,000 individuals receive 12 weeks of specialist evidence-based care, the cost savings are likely to be AU$9,238,800. Significant savings could be made by the adoption of evidence-based care such as that provided by the community and outpatient specialist wound clinics in this study.
Resumo:
Background Southeast Asia has been at the epicentre of recent epidemics of emerging and re-emerging zoonotic diseases. Community-based surveillance and control interventions have been heavily promoted but the most effective interventions have not been identified. Objectives This review evaluated evidence for the effectiveness of community-based surveillance interventions at monitoring and identifying emerging infectious disease; the effectiveness of community-based control interventions at reducing rates of emerging infectious disease; and contextual factors that influence intervention effectiveness. Inclusion criteria Participants Communities in Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand and Viet Nam. Types of intervention(s) Non-pharmaceutical, non-vaccine, and community-based surveillance or prevention and control interventions targeting rabies, Nipah virus , dengue, SARS or avian influenza. Types of outcomes Primary outcomes: measures: of infection or disease; secondary outcomes: measures of intervention function. Types of studies Original quantitative studies published in English. Search strategy Databases searched (1980 to 2011): PubMed, CINAHL, ProQuest, EBSCOhost, Web of Science, Science Direct, Cochrane database of systematic reviews, WHOLIS, British Development Library, LILACS, World Bank (East Asia), Asian Development Bank. Methodological quality Two independent reviewers critically appraised studies using standard Joanna Briggs Institute instruments. Disagreements were resolved through discussion. Data extraction A customised tool was used to extract quantitative data on intervention(s), populations, study methods, and primary and secondary outcomes; and qualitative contextual information or narrative evidence about interventions. Data synthesis Data was synthesised in a narrative summary with the aid of tables. Meta-analysis was used to statistically pool quantitative results. Results Fifty-seven studies were included. Vector control interventions using copepods, environmental cleanup and education are effective and sustainable at reducing dengue in rural and urban communities, whilst insecticide spraying is effective in urban outbreak situations. Community-based surveillance interventions can effectively identify avian influenza in backyard flocks, but have not been broadly applied. Outbreak control interventions for Nipah virus and SARS are effective but may not be suitable for ongoing control. Canine vaccination and education is more acceptable than culling, but still fails to reach coverage levels required to effectively control rabies. Contextual factors were identified that influence community engagement with, and ultimately effectiveness of, interventions. Conclusion Despite investment in community-based disease control and surveillance in Southeast Asia, published evidence evaluating interventions is limited in quantity and quality. Nonetheless this review identified a number of effective interventions, and several contextual factors influencing effectiveness. Identification of the best programs will require comparative evidence of effectiveness acceptability, cost-effectiveness and sustainability.
Resumo:
Sex, Love and Abuse intervenes in a timely way on some important issues that have become 'elephants in the room' for academic and policy considerations around sexual violence and abuse. In so doing, this book draws upon a range of literatures and novel empirical sources to encourage critical thinking about the relationship between sex, love and abuse, examining crimes including sexual assault, pornography, child sexual abuse and domestic violence. This provocative book seeks to destabilize essentialist understandings of these phenomena with a view to identifying the subtle and complex nature of relationships, which often defy easy explanation and categorisation. Focusing on theories, public discourses and moral ideals, Hayes connects romantic love, intimacy and harm in a unique philosophical analysis, exploring abuse in relationships and how such abuse is fostered.
Resumo:
Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata across forensic disk images, files, system and application logs and network packet captures. The results prove that metadata based associations can be used to extract meaningful relationships between digital artifacts, thus potentially benefiting real-life forensics investigations.
Resumo:
This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.
Resumo:
In 2005, governments around the world unanimously agreed to the principle of the responsibility to protect (R2P), which holds that all states have a responsibility to protect their populations from genocide and mass atrocities, that the international community should assist them to fulfil this duty, and that the international community should take timely and decisive measures to protect populations from such crimes when their host state fails to do so. Progressing R2P from words to deeds requires international consensus about the principle’s meaning and scope. To achieve a global consensus on this, we need to better understand the position of governments around the world, including in the Asia-Pacific region, which has long been associated with an enduring commitment to a traditional concept of sovereignty. The present article contributes to such an endeavour through its three sections. The first part charts the nature of the international consensus on R2P and examines the UN secretary-general’s approach. The second looks in detail at the positions of the Asia-Pacific region’s governments on the R2P principle. The final part explores the way forward for progressing the R2P principle in the Asia-Pacific region.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
Phishing and related cybercrime is responsible for billions of dollars in losses annually. Gartner reported more than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008 (Gartner 2009). This paper asks whether the majority of organised phishing and related cybercrime originates in Eastern Europe rather than elsewhere such as China or the USA. The Russian “Mafiya” in particular has been popularised by the media and entertainment industries to the point where it can be hard to separate fact from fiction but we have endeavoured to look critically at the information available on this area to produce a survey. We take a particular focus on cybercrime from an Australian perspective, as Australia was one of the first places where Phishing attacks against Internet banks were seen. It is suspected these attacks came from Ukrainian spammers. The survey is built from case studies both where individuals from Eastern Europe have been charged with related crimes or unsolved cases where there is some nexus to Eastern Europe. It also uses some earlier work done looking at those early Phishing attacks, archival analysis of Phishing attacks in July 2006 and new work looking at correlation between the Corruption Perception Index, Internet penetration and tertiary education in Russia and the Ukraine. The value of this work is to inform and educate those charged with responding to cybercrime where a large part of the problem originates and try to understand why.
Resumo:
Objective To summarise how costs and health benefits will change with the adoption of total laparoscopic hysterectomy compared to total abdominal hysterectomy for the treatment of early stage endometrial cancer. Design Cost-effectiveness modelling using the information from a randomised controlled trial. Participants Two hypothetical modelled cohorts of 1000 individuals undergoing total laparoscopic hysterectomy and total abdominal hysterectomy. Outcome measures Surgery costs; hospital bed days used; total healthcare costs; quality-adjusted life years; and net monetary benefits. Results For 1000 individuals receiving total laparoscopic hysterectomy surgery, the costs were $509 575 higher, 3548 hospital fewer bed days were used and total health services costs were reduced by $3 746 221. There were 39.13 more quality-adjusted life years for a 5 year period following surgery. Conclusions The adoption of total laparoscopic hysterectomy is almost certainly a good decision for health services policy makers. There is 100% probability that it will be cost saving to health services, a 86.8% probability that it will increase health benefits and a 99.5% chance that it returns net monetary benefits greater than zero.
Resumo:
The concept of the community is a key component of restorative justice theory and practice. In restorative justice scholarship, the community is constructed, alongside the victim and offender, as having a crucial role to play in responding to crimes in a restorative way. Indeed, it is often claimed that the perceived need for the community to be involved in responding to crime was a key rationale for the emergence of restorative practices around the world. Taking the emergence of youth justice conferencing – the most commonly-utilised restorative practice in Australia – as a case study, this article argues, however, that the idea of the community was peripheral to the emergence of restorative justice in Australia. The documentary analysis from which this article stems also found that while Indigenous young people are represented as belonging to communities, non-Indigenous young people are not – at least, not beyond their ‘community of care’. As such, this article raises concerns about the disproportionate responsibilisation of Indigenous young people, families and communities.
Resumo:
Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced.
Resumo:
Background. Interventions that prevent healthcare-associated infection should lead to fewer deaths and shorter hospital stays. Cleaning hands (with soap or alcohol) is an effective way to prevent the transmission of organisms, but rates of compliance with hand hygiene are sometimes disappointingly low. The National Hand Hygiene Initiative in Australia aimed to improve hand hygiene compliance among healthcare workers, with the goal of reducing rates of healthcare-associated infection. Methods. We examined whether the introduction of the National Hand Hygiene Initiative was associated with a change in infection rates. Monthly infection rates for healthcare-associated Staphylococcus aureus bloodstream infections were examined in 38 Australian hospitals across 6 states. We used Poisson regression and examined 12 possible patterns of change, with the best fitting pattern chosen using the Akaike information criterion. Monthly bed-days were included to control for increased hospital use over time. Results. The National Hand Hygiene Initiative was associated with a reduction in infection rates in 4 of the 6 states studied. Two states showed an immediate reduction in rates of 17% and 28%, 2 states showed a linear decrease in rates of 8% and 11% per year, and 2 showed no change in infection rates. Conclusions. The intervention was associated with reduced infection rates in most states. The failure in 2 states may have been because those states already had effective initiatives before the national initiative’s introduction or because infection rates were already low and could not be further reduced.