107 resultados para CRIME DEFENSE

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This essay appraises the work of fiction in representing and generating semiotic consciousness in education by examining three intertextual continuities between crime fiction and stories of educational inquiry. First, many reports of educational research resemble detective stories in their quests to determine the (or a) “truth” about something that is problematic or puzzling and this essay describes some of the ways in which the characteristic investigatory methods of fictional detectives resemble forms of educational inquiry. Second, the characteristic ways in which detective stories generate interpretations are compared with the textual strategies deployed in producing meanings and narratives in educational inquiry. Third, recent transformations of both detective fiction and educational inquiry are shown to be comparable — and intertextually linked — manifestations of cultural and semiotic shifts associated with postmodernity. I conclude by suggesting that authors of “anti-detective” crime fiction might provide more appropriate models of educational inquiry than do fictional detectives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are many different ways in which law and truth may be said to be related. It is perhaps in the criminal trial that connections between them are of most significance. An orthodox way of describing a criminal trial is that the criminal procedure is seeking to establish the truth concerning some past event, and that success of the procedure is measured by how close its outcome converges with that truth. Criminal justice presents the community with challenging dilemmas in this regard, such as those arising from the notion of double jeopardy. This paper discusses the Rawlsian notions of 'imperfect', 'perfect' and 'pure' procedural justice, and suggests against Rawls that it is pure procedural justice that best represents what we want from a criminal justice system. Good procedure makes good criminal law. A comparison is made with the writings of Habermas and Posner, and given that pure procedural justice eschews transcendental truths, some brief comments are made on the convergence of that position with the realm of the fictional.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed defense is a promising way to neutralize the distributed Denial-of-Service attacks by detecting and responding the attacking sources widespread around the Internet. Components of the distributed defense system will cooperate with each other to combat the attacks. Compared with the centralized defense systems, distributed defense systems can discover the attacks more timely from both source end and victim end, fight the attacks with more resources and take advantage of more flexible strategies. This paper investigates 7 distributed defense systems which make use of various strategies to mitigate the DDoS attacks. Different architectures are designed in these 7 systems to provide distributed DDoS defense solutions. We evaluate these systems in terms of deployment, detection, response, security, robustness and implementation. For each criteria, we give a recommendation on which technologies are best suitable for a successful distributed defense system based on the analysis result. Finally we propose our idea on the design of an effective distributed defense system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Torture and the legitimate powers of the state - why are psychoanalysts involved - torture can be seen as an information gathering device - psychoanalysis may play a role in the creation of information gathering coercion techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DDoS) attacks against high-profile government and commercial websites have made people aware of the importance of providing data and services security to users. A DDoS attack is an availability attack, which is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from using the desired resources. This paper introduces the vulnerability of web applications to DDoS attacks, and presents an active distributed defense system that has a deployment mixture of sub-systems to protect web applications from DDoS attacks. According to the simulation experiments, this system is effective in that it is able to defend web applications against attacks. It can avoid overall network congestion and provide more resources to legitimate web users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security is now recognised as critical factor within the healthcare industry. With the gradual move from paper -based to electronic information there is an even greater need for protection. However, financial and operational constraints often exist which influence the practicality of developing a secure system. A new baseline security standard, the Health Information Security Management Implementation Guide, has been drafted which applies specifically to the unique information security requirements of the healthcare industry. The aim of this paper is to look at the effectiveness of the health information security standard and the development of information security within the Australian healthcare industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present a new approach, called Flexible Deterministic Packet Marking (FDPM), to perform a large-scale IP traceback to defend against Distributed Denial of Service (DDoS) attacks. In a DDoS attack the victim host or network is usually attacked by a large number of spoofed IP packets coming from multiple sources. IP traceback is the ability to trace the IP packets to their sources without relying on the source address field of the IP header. FDPM provides many flexible features to trace the IP packets and can obtain better tracing capability than current IP traceback mechanisms, such as Probabilistic Packet Marking (PPM), and Deterministic Packet Marking (DPM). The flexibilities of FDPM are in two ways, one is that it can adjust the length of marking field according to the network protocols deployed; the other is that it can adjust the marking rate according to the load of participating routers. The implementation and evaluation demonstrates that the FDPM needs moderately only a small number of packets to complete the traceback process; and can successfully perform a large-scale IP traceback, for example, trace up to 110,000 sources in a single incident response. It has a built-in overload prevention mechanism, therefore this scheme can perform a good traceback process even it is heavily loaded.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Currently Distributed Denial of Service (DDoS) attacks have been identified as one of the most serious problems on the Internet. The aim of DDoS attacks is to prevent legitimate users from accessing desired resources, such as network bandwidth. Hence the immediate task of DDoS defense is to provide as much resources as possible to legitimate users when there is an attack. Unfortunately most current defense approaches can not efficiently detect and filter out attack traffic. Our approach is to find the network anomalies by using neural network, deploy the system at distributed routers, identify the attack packets, and then filter them. The marks in the IP header that are generated by a group of IP traceback schemes, Deterministic Packet Marking (DPM)/Flexible Deterministic Packet Marking (FDPM), assist this process of identifying attack packets. The experimental results show that this approach can be used to defend against both intensive and subtle DDoS attacks, and can catch DDoS attacks’ characteristic of starting from multiple sources to a single victim. According to results, we find the marks in IP headers can enhance the sensitivity and accuracy of detection, thus improve the legitimate traffic throughput and reduce attack traffic throughput. Therefore, it can perform well in filtering DDoS attack traffic precisely and effectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the popularity of reintegrative shaming theory in the field of criminology, only a small number of studies purporting to test it have been published to date. The aim of the present study, therefore, is to provide an empirical test of Braithwaite's (1989; Braithwaite and Braithwaite 2001) theory of reintegrative shaming in the white-collar crime context. The data on which the study is based came from survey data collected from a group of 652 tax offenders. Consistent with predictions, it was found that feelings of reintegration/stigmatization experienced during an enforcement event were related to reoffending behaviour. Those taxpayers who felt that their enforcement experience had been reintegrative in nature were less likely to report having evaded their taxes two years later. Consistent with Braithwaite and Braithwaite's (2001) hypotheses, shame-related emotions were also found to partially mediate the effect of reintegration on subsequent offending behaviour. Implications for the effective regulation of white-collar offenders are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Issue addressed: Mental health promotion aimed at populations with low socio-economic status (SES) may benefit by investigating prevention strategies that effectively address related child and adolescent problems.
Methods: Evidence from a number of literature reviews and program evaluations was synthesised. First, the impact of SES on development from childhood to adulthood is considered in light of research on substance
abuse, violence, crime, and child development problems. Second, evaluations of interventions are reviewed to identify those that have shown outcomes in research studies (efficacy) or in real-world settings (effectiveness) in reducing developmental problems associated with low SES. Low SES is measured in different ways including low levels of education and/or income or definitions that combine several variables into a new indicator of low SES.
Results: Factors associated with low SES are also associated to varying extent with the development of violence and crime, substance abuse and child health problems. Interventions that address underlying determinants of low SES show strong efficacy in decreasing adolescent crime and violence and effectiveness in improving child health outcomes. Although there is limited efficacy evidence that substance abuse prevention can be effectively addressed by targeting low SES, programs designed to improve educational pathways show some efficacy in reducing aspects of adolescent substance use.
Conclusion: Mental health promotion strategies can draw on the approaches outlined here that are associated with the prevention of child and adolescent problems within low SES communities. Alternatively, such interventions could be supported in mental health promotion policy as they may assist in preventing related problems that undermine mental health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is on adaptive real-time searching of credit application data streams for identity crime with many search parameters. Specifically, we concentrated on handling our domain-specific adversarial activity problem with the adaptive Communal Analysis Suspicion Scoring (CASS) algorithm. CASS's main novel theoretical contribution is in the formulation of State-of- Alert (SoA) which sets the condition of reduced, same, or heightened watchfulness; and Parameter-of-Change (PoC) which improves detection ability with pre-defined parameter values for each SoA. With pre-configured SoA policy and PoC strategy, CASS determines when, what, and how much to adapt its search parameters to ongoing adversarial activity. The above approach is validated with three sets of experiments, where each experiment is conducted on several million real credit applications and measured with three appropriate performance metrics. Significant improvements are achieved over previous work, with the discovery of some practical insights of adaptivity into our domain.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study shows that cyber crime is a recent addition to the list of crimes that can adversely affec tbusinesses directly or indirectly. This phenomenon was not directly prosecutable in South Africa until the enactment of the ECT Act in July 2002. However this Act also prevents businesses to fully prosecute a hacker due to incompleteness. Any kind of commercially related crime can be duplicated as cyber crime. Therefore very little research appears or has been documented about cyber crime in South African companies before 2003. The motivation to do this study was
that businesses often loose millions in cyber attacks, not necessarily through direct theft but by the loss of service and damage to the image of the company. Most of the companies that were approached for interviews on cyber crime were reluctant to share the fact that they were hacked
or that cyber crime occurred at their company as it violates their security policies and may expose their fragile security platforms.
The purpose of this study was to attempt to get an overall view on how South African businesses are affected by cyber crime in the banking and short term insurance sector of the South African industry and also to determine what legislation exist in this country to protect them.
The case study approach was used to determine the affect of cyber crime on businesses like banks and insurance companies and higher education institutions. Each case was interviewed, monitored and was observed over a period of a year. This study discloses the evaluation of the results of how cyber crime affected the cases, which were part of this study. The banks and higher education institutions felt that they were at an increased risk both externally and internally, which is likely to increase as the migration towards electronic commerce occurs. The insurance industry felt that they are not yet affected by external cyber crime attacks in this country.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

I want to begin my talk at this colloquium by saying from the start that I am outclassed here. I have published one crime novel, and while I have used some aspects of the crime genre in my current novel - notably a kind of mystery and a movement towards resolution - I would not classify myself as an expert. What I do know about is the teaching of writing, the value of plot and the ever-important idea of story. Story and aspects of plot are vital ingredients in crime fiction and so I come to the task of writing this paper searching for more clues about how to write story in crime fiction.