6 resultados para cyber-bullying

em WestminsterResearch - UK


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The relationship between violent digital games and youth behavior remains contested in the scholarly literature. To date considerable scholarship has focused on university students with fewer studies of adolescents or children. The current study examines correlational relationships between violent game exposure and bullying behaviors, antisocial attitudes, civic attitudes and civic behaviors in a sample of 304 children from the United Kingdom (Mean age = 12.81). The paper also considered motivational influences on use of violent digital games. Results indicated that violent game exposure did not correlate meaningfully with either antisocial or civic behaviors or attitudes. These results are discussed in a motivational and developmental context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks. It first identifies when cyber attacks qualify as ‘attacks’ under the law of armed conflict and then examines the two elements of the definition of ‘military objective’ contained in Article 52(2) of the 1977 Protocol I additional to the 1949 Geneva Conventions on the Protection of Victims of War. The Chapter concludes that this definition is flexible enough to apply in the cyber context without significant problems and that none of the challenges that characterize cyber attacks hinders the application of the principle of distinction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article describes findings from research funded by the Metropolitan Police and Crimestoppers which aimed to explore children's online experiences. A non-random, stratified sample of 200 London school children aged 10- 13 participated in focus groups. Preliminary findings are also presented from unpublished ongoing PhD research, which seeks to explore sex offender behaviour online and the policing of the internet (Martellozzo, 2005 ongoing). The findings are discussed in the context of sex offender's use of the internet. This research indicates that children do have some basic knowledge about 'stranger danger' but are not necessarily applying these lessons to cyberspace. The children in this study had sufficient awareness to not give personal details to strangers on the internet, and would not arrange to meet them. However, they made a distinction between 'strangers' and 'virtual friends' and this is an important point. Preliminary findings also highlight the difficulty of policing the internet and serve to illustrate the manner in which the Sexual Offences Act 2003 is applied to internet sexual offending in practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Online Romance Scam is a relatively new form of fraud that became apparent in about 2008. In this crime, criminals pretend to initiate a relationship through online dating sites then defraud their victims of large sums of money. This paper presents some descriptive statistics about knowledge and victimization of the online dating romance scam in Great Britain. Our study found that despite its newness, an estimated 230,000 British citizens may have fallen victim to this crime. We conclude that there needs to be some rethinking about providing avenues for victims to report the crime or at least making them more comfortable when doing so.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work explores the development of MemTri. A memory forensics triage tool that can assess the likelihood of criminal activity in a memory image, based on evidence data artefacts generated by several applications. Fictitious illegal suspect activity scenarios were performed on virtual machines to generate 60 test memory images for input into MemTri. Four categories of applications (i.e. Internet Browsers, Instant Messengers, FTP Client and Document Processors) are examined for data artefacts located through the use of regular expressions. These identified data artefacts are then analysed using a Bayesian Network, to assess the likelihood that a seized memory image contained evidence of illegal activity. Currently, MemTri is under development and this paper introduces only the basic concept as well as the components that the application is built on. A complete description of MemTri coupled with extensive experimental results is expected to be published in the first semester of 2017.