8 resultados para grooming
em Queensland University of Technology - ePrints Archive
Resumo:
Multi-agent systems (MAS) advocate an agent-based approach to software engineering based on decomposing problems in terms of decentralized, autonomous agents that can engage in flexible, high-level interactions. This chapter introduces scalable fault tolerant agent grooming environment (SAGE), a second-generation Foundation for Intelligent Physical Agents (FIPA)-compliant multi-agent system developed at NIIT-Comtec, which provides an environment for creating distributed, intelligent, and autonomous entities that are encapsulated as agents. The chapter focuses on the highlight of SAGE, which is its decentralized fault-tolerant architecture that can be used to develop applications in a number of areas such as e-health, e-government, and e-science. In addition, SAGE architecture provides tools for runtime agent management, directory facilitation, monitoring, and editing messages exchange between agents. SAGE also provides a built-in mechanism to program agent behavior and their capabilities with the help of its autonomous agent architecture, which is the other major highlight of this chapter. The authors believe that the market for agent-based applications is growing rapidly, and SAGE can play a crucial role for future intelligent applications development. © 2007, IGI Global.
Resumo:
The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.
Resumo:
Executive Summary Child sexual abuse (CSA) in Christian Institutions continues to be of serious concern in public, criminal justice and institutional discourse. This study was conducted in conjunction with Project Kidsafe Foundation and sought the perspectives of Australian survivors of CSA by Personnel in Christian Institutions (PICIs). In total, 81 individual survivors responded to an online survey which asked them a range of questions about their current and childhood life circumstance; the nature, extent and location of abuse; grooming strategies utilised by perpetrators; their experiences of disclosure; and outcomes of official reporting to both criminal justice agencies and also official processes Christian institutions. Survey participants were given the option to further participate in a qualitative interview with the principal researcher. These interviews are not considered within this report. In summary, survey data examined here indicate that: • Instances of abuse included a range of offences from touching outside of clothing to serious penetrative offences. • The onset of abuse occurred at a young age: between 6 and 10 years for most female participants, and 11 and 13 years for male participants. • In the majority of cases the abuse ceased because of actions by survivors, not by adults within families or the Christian institution. • Participants waited significant time before disclosing their abuse, with many waiting 20 years or more. • Where survivors disclosed to family members or PICIs, they were often met with disbelief and unhelpful responses aimed at minimising the harm. • Where an official report was made, it was most often made to police. In these cases 53% resulted in an official investigations. • The primary reasons for reporting were to protect others from the perpetrator and make the Christian institution accountable to an external agency. • Where reports to Christian institutions were made, most survivors were dissatisfied with outcomes, and a smaller majority was extremely dissatisfied. This report reflects the long-held understanding that responding to CSA is a complex and difficult task. If effective and meaningful responses are not made, however, trauma to the survivor is most often compounded and recovery delayed. This report demonstrates the need for further independent analysis and oversight of responses made to CSA by both criminal justice, religious and social institutions. Meaningful change will only be accessible, however, if family, community and institutional environments are safe places for survivors to disclose their experiences of abuse and begin to seek ways of healing. There is much to be learnt from survivors that have already made this journey.
Resumo:
Social networking sites have become increasingly popular destinations for people wishing to chat, play games, make new friends or simply stay in touch. Furthermore, many organizations have been quick to grasp the potential they offer for marketing, recruitment and economic activities. Nevertheless, counterclaims depict such spaces as arenas where deception, social grooming and the posting of defamatory content flourish. Much research in this area has focused on the ends to which people deploy the technology, and the consequences arising, with a view to making policy recommendations and ethical interventions. In this paper, we argue that tracing where morality lies is more complex than these efforts suggest. Using the case of a popular social networking site, and concepts about the morality of technology, we disclose the ethics of Facebook as diffuse and multiple. In our conclusions we provide some reflections on the possibilities for action in light of this disclosure.
Resumo:
Minnie’s Bow-Toons follows the adventures of Minnie Mouse and her best friend Daisy Duck as they run Minnie's Bow-tique, a specialty shop stocked only with colorful bows and bowties. In the third season Minnie, Daisy and their assistant Cuckoo Loca opens a pet grooming salon adjacent to the Bow-tique. In the fourth season Minnie, Daisy and Cuckoo Loca travel around the world, visiting cities like London, Venice and Tokyo.
Resumo:
This demonstration highlights the applications of our research work i.e. second generation (Scalable Fault Tolerant Agent Grooming Environment - SAGE) Multi Agent System, Integration of Software Agents and Grid Computing and Autonomous Agent Architecture in the Agent Platform. It is a conference planner application that uses collaborative effort of services deployed geographically wide in different technologies i.e. Software Agents, Grid computing and Web services to perform useful tasks as required. Copyright 2005 ACM.
Resumo:
Multi-agent systems implicate a high degree of concurrency at both the Inter- and Intra-Agent levels. Scalable, fault tolerant, Agent Grooming Environment (SAGE), the second generation, FIPA compliant MAS requires a built in mechanism to achieve both the Inter- and Intra-Agent concurrency. This paper dilates upon an attempt to provide a reliable, efficient and light-weight solution to provide intra-agent concurrency with-in the internal agent architecture of SAGE. It addresses the issues related to using the JAVA threading model to provide this level of concurrency to the agent and provides an alternative approach that is based on an eventdriven, concurrent and user-scalable multi-tasking model for the agent's internal model. The findings of this paper show that our proposed approach is suitable for providing an efficient and lightweight concurrent task model for SA GE and considerably outweighs the performance of multithreaded tasking model based on JAVA in terms of throughput and efficiency. This has been illustrated using the practical implementation and evaluation of both models. © 2004 IEEE.
Resumo:
This paper highlights the Hybrid agent construction model being developed that allows the description and development of autonomous agents in SAGE (Scalable, fault Tolerant Agent Grooming Environment) - a second generation FIPA-Compliant Multi-Agent system. We aim to provide the programmer with a generic and well defined agent architecture enabling the development of sophisticated agents on SAGE, possessing the desired properties of autonomous agents - reactivity, pro-activity, social ability and knowledge based reasoning. © Springer-Verlag Berlin Heidelberg 2005.