181 resultados para cyber-terrorism


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Regulation, governance and harms stemming from the use of virtual worlds and other Massive Multi Media Online Role Playing Games (MMMORPGs) in higher education, are poorly understood and under-researched issues. Second Life, developed by Linden Labs, provides users with a series of generic ‘terms of service’ and codes of conduct, yet place the bulk of responsibility on individual users or groups to report misbehaviour or develop their own behavioural codes, enforcement procedures and punishments suited to their particular needs. There is no guidebook to assist users in the processes of risk identification and management. As such, the various benefits of MMMORPG technologies could be offset by the risks to users and user-groups from a range of possible harms, including the impact of actual or perceived violence within teaching and learning settings.

While cautioning against the direct translation of real-world regulatory principles into the governance of virtual worlds, this paper suggests theoretical and practical guidance on these issues can be taken from recent criminological developments. Using Lawrence Lessig’s (1999) landmark work on cyber-regulation as a starting point, this paper examines the literature on video-game violence to illustrate the need for educators show awareness of both real and perceived risks in virtual worlds as a core element of an emerging educational pedagogy. We identify how the multiple roles of the virtual-world educator become useful in framing this pedagogy to improve student learning, to dispel myths about the risks of immersive technologies and advocate for their adoption and acceptance in the educational community.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Brings together a range of specially-commissioned chapters to provide an accessible introduction to security studies in the 21st century. The second edition has been expanded to cover developments in global and regional security; nuclear proliferation; terrorism; intervention and peacekeeping. C. Snyder, Deaking Uni.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Summary: "In the wake of the September 11 and subsequent terrorist attacks, the academic and media commentaries on Islam the religion and Islam the basis for political ideology haves received an unprecedented high level of exposure and attention. The acts of political violence by extremist groups and the omnipresent war on terror have added fresh uncertainties to an already complex global order. Just as terrorism and counter-terrorism are locked in a mutually re-enforcing symbiosis, the sense of insecurity felt by Muslims and non-Muslims alike is mutually dependent and has the potential to escalate. This general assessment holds true for Muslims living in the Muslim world and beyond. The pervasive sense of being under attack physically and culturally by the United States and its allies has contributed to a growing unease among Muslims and re-enforced deep-seated mistrust of the ʻWestʼ. Public articulation of such misgivings has in turn, lent credence to Western observers who posit an inherent antipathy between the West and the Muslim world. The subsequent policies that have emerged in this context of fear and mutual distrust have contributed to the vicious cycle of insecurity. The present volume is anchored in the current debates on the uneasy and potentially mutually destructive relationship between the Muslim world and certain West countries. It brings together leading international scholars in this interdisciplinary field to deal with such inter-related questions as the nature of Islamism, the impact of the ʻwar on terrorʼ on the spread of militancy, the growing sense of being under siege by Muslim Diasporas and the many unintended ramifications of a security-minded world order. This volume deliberately focuses on these issues both at a broad theoretical level but more importantly in the form of a number of prominent case studies including Indonesia, Algeria and Turkey."--Publisher description.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to investigate the level and nature of criminal abuse of financial products that are classified as posing a low anti-money laundering/combating of financing of terrorists (AML/CFT) risk in South Africa to determine the effectiveness of the simplified due diligence measures that apply to these products.

Design/methodology/approach – The paper presents empirical research on the views of bank officials and law enforcement officials regarding the criminal abuse of South African financial products that are subject to simplified customer due diligence controls.

Findings – South Africa's AML/CFT laws allow certain deposit-taking institutions and money remitters to implement simplified customer due diligence measures in relation to specific low-risk products that are mainly designed to allow previously unbanked persons to access financial services. The paper finds that the products have been abused by criminals but that the incidence of such abuse and the amounts involved are low. The paper investigates possible weaknesses in the current system that allow limited criminal abuse to occur. It concludes with a number of guidelines that emerge from the study and are of value to regulators that wish to implement a similar system.

Originality/value –
The South African AML/CFT scheme in relation to low-risk products is of interest to many international regulators that are grappling with the interplay between effective AML/CFT controls and the impact of strict controls on the ability of socially and economically excluded persons to access appropriate financial services. This paper provides evidence that appropriately designed controls can facilitate financial inclusion while limiting the risk of criminal abuse.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to investigate Financial Action Task Force (FATF)'s risk-based guidance to combat money laundering and terrorist financing to determine its approach to the identification and management of low-risk providers, products and transactions.

Design/methodology/approach – The paper analyses the relevant FATF recommendations and its guidance notes and reflects on key questions for regulators and financial institutions.

Findings –
FATF has not defined “risk” for purposes of the risk-based approach. The absence of a clear definition complicates the identification of low-risk products. FATF do provide an example of a risk matrix that can be used to identify low-risk banks, but the example is based on assumptions and generalisations that are not sustainable. In addition, it identifies certain low-value transactions as “low risk” transactions. The paper reflects on the role of value as an indicator of risk and concludes with a number of suggestions to clarify the conceptual framework.

Originality/value –
Low-risk products and transactions are often overlooked because the risk-based approach focuses attention on high-risk matters. Low-risk products are however crucial to the efforts to increase financial inclusion. The paper identifies gaps in the current conceptual framework and indicates ways in which they can be addressed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the emergent security risk that information warfare poses to critical infrastructure systems, particularly as governments are increasingly concerned with protecting these assets against attack or disruption. Initially it outlines critical infrastructure systems and the notion of information warfare. It then discusses the potential implications and examining the concerns and vulnerabilities such cyber attacks would pose, utilising exemplar online attack occurrences. It then examines the current Australian situation before suggesting some considerations to mitigate the potential risk that information warfare poses to critical infrastructure systems, and by association: government, industry and the wider community.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Disasters, emergencies, incidents, and major incidents - they all come back to the same thing regardless of what they are called. The common denominator is that there is loss of life, injury to people and animals and damage and destruction of property. The management of such events relies on four phases: 1. Prevention 2. Preparation 3. Response 4. Recovery Each of these phases is managed in a different way and often by different teams. Here, concentration has been given to phases 2 and 3, with particular emphasis on phase 3, Response. The words used to describe such events are often related to legislation. The terminology is detailed later. However, whatever the description, whenever prevention is not possible, or fails, then the need is to respond. Response is always better when the responders are prepared. Training is a major part of response preparation and this book is designed to assist those in the health industry who need to be ready when something happens. One of the training packages for responders is the Major Incident Medical Management and Support (MIMMS) Course and this work was designed to supplement the manual prepared by Hodgetts and Macway-Jones(87) in the UK. Included is what the health services responder, who may be sent to an event in which the main concern is trauma, should know. Concentration is on the initial response and does not deal in any detail with hospital reaction, the public health aspects, or the mental health support that provides psychological help to victims and responders, and which are also essential parts of disaster management. People, in times of disaster, have always been quick to offer assistance. It is now well recognised however, that the 'enthusiastic amateur', whilst being a well meaning volunteer, isn't always what is needed. All too often such people have made things worse and have sometimes ended up as victims themselves. There is a place now for volunteers and there probably always will be. The big difference is that these people must be well informed, well trained and well practiced if they are to be effective. Fortunately such people and organisations do exist. Without the work of the St John Ambulance, the State Emergency Service, the Rural Fire Service the Red Cross and the Volunteer Rescue Association, to mention only a few, our response to disasters would be far less effective. There is a strong history of individuals being available to help the community in times of crisis. Mostly these people were volunteers but there has also always been the need for a core of professional support. In the recent past, professional support mechanisms have been developed from lessons learned, particularly to situations that need a rapid and well organised response. As lessons are learned from an analysis of events, philosophy and methods have changed. Our present system is not perfect and perhaps never will be. The need for an 'all-hazards approach' makes detailed planning very difficult and so there will probably always be criticisms about the way an event was handled. Hindsight is a wonderful thing, provided we learn from it. That means that this text is certainly not the 'last word' and revisions as we learn from experience will be inevitable. Because the author works primarily in New South Wales, many of the explanations and examples are specific to that state. In Australia disaster response is a State, rather than a Commonwealth, responsibility and consequently, and inevitably, there are differences in management between the states and territories within Australia. With the influence of Emergency Management Australia, these differences are being reduced. This means that across state and territory boundaries, assistance is common and interstate teams can be deployed and assimilated into the response rapidly, safely, effectively and with minimum explanation. This text sets out to increase the understanding of what is required, what is in place and how the processes of response are managed. By way of introduction and background, examples are given of those situations that have occurred, or could happen. Man Made Disasters has been divided into two distinct sections. Those which are related to structures or transport and those related directly to people. The first section, Chapter 3, includes: • Transport accidents involving land, rail, sea or air vehicles. • Collapse of buildings for reasons other than earthquakes or storms. • Industrial accidents, including the release of hazardous substances and nuclear events. A second section dealing with the consequences of the direct actions of people is separated as Chapter 4, entitled 'People Disasters'. Included are: • Crowd incidents involving sports and entertainment venues. • Terrorism From Chapter 4 on, the emphasis is on the Response phase and deals with organisation and response techniques in detail. Finally there is a section on terminology and abbreviations. An appendix details a typical disaster pack content. War, the greatest of all man made disasters is not considered in this text.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter a group of writers from very diverse academic backgrounds deal with the embodied and disembodied arts - from an exploration of dance with preschool children to the use of the webblog for eleven and twelve year olds to reflect on the creation of a group performance about how to change the world. The Deans & Young case study takes the reader into the world of the preschooler and the delicate craft of the dance and drama teachers who guide their small dancers through myriad choreographic and conceptual tasks in their pursuit of kinaesthetic learning. Jo Raphael allow the young bloggers to speak from themselves in her case study. How to Change the World. Through the voices of the Year 6 students, Jo raises the critical question of how to build meaningful reflection into the arts-making process, and suggests that for the current generation of 'cyber-natives', the digital world offers many great possibilities. Theory concerning forms of expression and representation in the embodies and digital world is also discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a concurring judgment in Thomas v Mowbray, a High Court of Australia case turning on the Constitutional validity of terrorism-related control orders, Callinan J offers a re-evaluation of the Court’s earlier decision in the Australian Communist Party case to curtail executive power. According to Callinan J, factual matters knowable (but not known) at the time of the earlier decision might have given rise to a different outcome. In a dissenting judgment by Kirby J in the same case the Court’s reasoning in the Australian Communist Party case is robustly defended. These contested issues connect with the theoretical dispute between ‘common law constitutionalism’ and ‘constitutional positivism’ analysed by Dyzenhaus in the context of states of emergency where the limits of executive action and the role of supporting facts become particularly salient. They press the question of the status of the rule of law in the international as well as in the municipal sphere.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Words work in powerful ways in the world. We work from and with an understanding that the ways we talk about people, places and practices matter. If this was ever in doubt, witness recent media reports of the 'attacks on America' and the aftermath of the 'war on terrorism': the world's people have been re-divided both metaphorically and materially in these phrases. Meaning is constructed in and through language as categories, metaphors, rationales, stories, and tropes (Game & Metcalfe, 1996) and, while these are just representations of ideas, practices and material events and circumstances (Hall, 1997), we nevertheless act on those meanings (Fairclough, 1989; Gee, 1999). For example, whether people are described as 'border crossers,' 'invaders,' 'nomads,' 'gypsies,' 'asylum seekers' or 'refugees' affects how they treated, what they can be and what they can do. And in education, whether it's the 'literacy hour' or 'catching children in the net' or reading 'recovery,' words are inevitably tied to programs and proposals for solutions. How the problems are described and defined are crucial in how decisions are made.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Targeting terrorist financing involves international cooperation and coordination. However, the primacy of domestic interests over collective good and a predisposition to unilateral action, notably on the part of the US, have completely overwhelmed the spirit of cooperation among states and have undermined the effectiveness of the regimes against terrorist financing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis found that a provision of Australia's counter-terrorism policy, preventative detention, does not comply with a major international treaty, the ICCPR. This thesis provides an alternative model by which the Australian Government could achieve the legitimate purposes of preventative detention within the existing constraints of the Australian criminal law.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Deployment of applications and scientific workflows that require resources from multiple distributed platforms are fuelling the federation of autonomous clouds to create cyber infrastructure environments. As the scope of federated cloud computing enlarges to ubiquitous and pervasive computing, there will be a need to assess and maintain the trustworthiness of the cloud computing entities. In this paper, we present a fully distributed framework that enable interested parties determine the trustworthiness of federated cloud computing entities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Technologically-mediated learning environments are an increasingly common component of university experience. In this paper, the authors consider how the interrelated domains of policy contexts, new learning cultures and the consumption of information and communication technologies might be explored using the concept of technography. Understood here as a term referring to “the apprehension, reception, use, deployment, depiction and representation of technologies” (Woolgar, 2005, pp. 27-28), we consider how technographic studies in education might engage in productive dialogues with interdisciplinary research from the fields of cultural and cyber studies. We argue that what takes place in online learning and teaching environments is shaped by the logics and practices of technologies and their role in the production of new consumer cultures.