870 resultados para social event detection
Resumo:
In an Australian context, the term hooning refers to risky driving behaviours such as illegal street racing and speed trials, as well as behaviours that involve unnecessary noise and smoke, which include burn outs, donuts, fish tails, drifting and other skids. Hooning receives considerable negative media attention in Australia, and since the 1990s all Australian jurisdictions have implemented vehicle impoundment programs to deal with the problem. However, there is limited objective evidence of the road safety risk associated with hooning behaviours. Attempts to estimate the risk associated with hooning are limited by official data collection and storage practices, and the willingness of drivers to admit to their illegal behaviour in the event of a crash. International evidence suggests that illegal street racing is associated with only a small proportion of fatal crashes; however, hooning in an Australian context encompasses a broader group of driving behaviours than illegal street racing alone, and it is possible that the road safety risks will differ with these behaviours. There is evidence from North American jurisdictions that vehicle impoundment programs are effective for managing drink driving offenders, and drivers who continue to drive while disqualified or suspended both during and post-impoundment. However, these programs used impoundment periods of 30 – 180 days (depending on the number of previous offences). In Queensland the penalty for a first hooning offence is 48 hours, while the vehicle can be impounded for up to 3 months for a second offence, or permanently for a third or subsequent offence within three years. Thus, it remains unclear whether similar effects will be seen for hooning offenders in Australia, as no evaluations of vehicle impoundment programs for hooning have been published. To address these research needs, this program of research consisted of three complementary studies designed to: (1) investigate the road safety implications of hooning behaviours in terms of the risks associated with the specific behaviours, and the drivers who engage in these behaviours; and (2) assess the effectiveness of current approaches to dealing with the problem; in order to (3) inform policy and practice in the area of hooning behaviour. Study 1 involved qualitative (N = 22) and quantitative (N = 290) research with drivers who admitted engaging in hooning behaviours on Queensland roads. Study 2 involved a systematic profile of a large sample of drivers (N = 834) detected and punished for a hooning offence in Queensland, and a comparison of their driving and crash histories with a randomly sampled group of Queensland drivers with the same gender and age distribution. Study 3 examined the post-impoundment driving behaviour of hooning offenders (N = 610) to examine the effects of vehicle impoundment on driving behaviour. The theoretical framework used to guide the research incorporated expanded deterrence theory, social learning theory, and driver thrill-seeking perspectives. This framework was used to explore factors contributing to hooning behaviours, and interpret the results of the aspects of the research designed to explore the effectiveness of vehicle impoundment as a countermeasure for hooning. Variables from each of the perspectives were related to hooning measures, highlighting the complexity of the behaviour. This research found that the road safety risk of hooning behaviours appears low, as only a small proportion of the hooning offences in Study 2 resulted in a crash. However, Study 1 found that hooning-related crashes are less likely to be reported than general crashes, particularly when they do not involve an injury, and that higher frequencies of hooning behaviours are associated with hooning-related crash involvement. Further, approximately one fifth of drivers in Study 1 reported being involved in a hooning-related crash in the previous three years, which is comparable to general crash involvement among the general population of drivers in Queensland. Given that hooning-related crashes represented only a sub-set of crash involvement for this sample, this suggests that there are risks associated with hooning behaviour that are not apparent in official data sources. Further, the main evidence of risk associated with the behaviour appears to relate to the hooning driver, as Study 2 found that these drivers are likely to engage in other risky driving behaviours (particularly speeding and driving vehicles with defects or illegal modifications), and have significantly more traffic infringements, licence sanctions and crashes than drivers of a similar (i.e., young) age. Self-report data from the Study 1 samples indicated that Queensland’s vehicle impoundment and forfeiture laws are perceived as severe, and that many drivers have reduced their hooning behaviour to avoid detection. However, it appears that it is more common for drivers to have simply changed the location of their hooning behaviour to avoid detection. When the post-impoundment driving behaviour of the sample of hooning offenders was compared to their pre-impoundment behaviour to examine the effectiveness of vehicle impoundment in Study 3, it was found that there was a small but significant reduction in hooning offences, and also for other traffic infringements generally. As Study 3 was observational, it was not possible to control for extraneous variables, and is, therefore, possible that some of this reduction was due to other factors, such as a reduction in driving exposure, the effects of changes to Queensland’s Graduated Driver Licensing scheme that were implemented during the study period and affected many drivers in the offender sample due to their age, or the extension of vehicle impoundment to other types of offences in Queensland during the post-impoundment period. However, there was a protective effect observed, in that hooning offenders did not show the increase in traffic infringements in the post period that occurred within the comparison sample. This suggests that there may be some effect of vehicle impoundment on the driving behaviour of hooning offenders, and that this effect is not limited to their hooning driving behaviour. To be more confident in these results, it is necessary to measure driving exposure during the post periods to control for issues such as offenders being denied access to vehicles. While it was not the primary aim of this program of research to compare the utility of different theoretical perspectives, the findings of the research have a number of theoretical implications. For example, it was found that only some of the deterrence variables were related to hooning behaviours, and sometimes in the opposite direction to predictions. Further, social learning theory variables had stronger associations with hooning. These results suggest that a purely legal approach to understanding hooning behaviours, and designing and implementing countermeasures designed to reduce these behaviours, are unlikely to be successful. This research also had implications for policy and practice, and a number of recommendations were made throughout the thesis to improve the quality of relevant data collection practices. Some of these changes have already occurred since the expansion of the application of vehicle impoundment programs to other offences in Queensland. It was also recommended that the operational and resource costs of these laws should be compared to the road safety benefits in ongoing evaluations of effectiveness to ensure that finite traffic policing resources are allocated in a way that produces maximum road safety benefits. However, as the evidence of risk associated with the hooning driver is more compelling than that associated with hooning behaviour, it was argued that the hooning driver may represent the better target for intervention. Suggestions for future research include ongoing evaluations of the effectiveness of vehicle impoundment programs for hooning and other high-risk driving behaviours, and the exploration of additional potential targets for intervention to reduce hooning behaviour. As the body of knowledge regarding the factors contributing to hooning increases, along with the identification of potential barriers to the effectiveness of current countermeasures, recommendations for changes in policy and practice for hooning behaviours can be made.
Resumo:
This chapter explores some of the practical and theoretical obstacles and opportunities for self-expression experienced by a group of Queer Dig- ital Storytellers who primarily make and distribute their stories online. “Queer” in this chapter encompasses a diverse range of gender and sexual identities and perspectives on same, including the heterosexual children of queer parents and heterosexual parents of queer children. As such it is also used as a unifying moniker by participants in the Rainbow Family Tree case study that is examined in this chapter. The Digital Storytellers in this case study are largely motivated by a desire to have an impact on social attitudes towards gender and sexuality, both in their personal province of friends and family, and in public domains constituted of unknown or invisible audiences. The privacy and publicity dilemmas that will be considered arise out of positioning personal stories in the public domain and the quandaries that emerge from an activist desire to speak truth to power that is located across a wide cross section of audiences.
Resumo:
Distributed Denial-of-Service (DDoS) attacks continue to be one of the most pernicious threats to the delivery of services over the Internet. Not only are DDoS attacks present in many guises, they are also continuously evolving as new vulnerabilities are exploited. Hence accurate detection of these attacks still remains a challenging problem and a necessity for ensuring high-end network security. An intrinsic challenge in addressing this problem is to effectively distinguish these Denial-of-Service attacks from similar looking Flash Events (FEs) created by legitimate clients. A considerable overlap between the general characteristics of FEs and DDoS attacks makes it difficult to precisely separate these two classes of Internet activity. In this paper we propose parameters which can be used to explicitly distinguish FEs from DDoS attacks and analyse two real-world publicly available datasets to validate our proposal. Our analysis shows that even though FEs appear very similar to DDoS attacks, there are several subtle dissimilarities which can be exploited to separate these two classes of events.
Resumo:
The construction of timelines of computer activity is a part of many digital investigations. These timelines of events are composed of traces of historical activity drawn from system logs and potentially from evidence of events found in the computer file system. A potential problem with the use of such information is that some of it may be inconsistent and contradictory thus compromising its value. This work introduces a software tool (CAT Detect) for the detection of inconsistency within timelines of computer activity. We examine the impact of deliberate tampering through experiments conducted with our prototype software tool. Based on the results of these experiments, we discuss techniques which can be employed to deal with such temporal inconsistencies.
Resumo:
INTRODUCTION: Workforce planning for first aid and medical coverage of mass gatherings is hampered by limited research. In particular, the characteristics and likely presentation patterns of low-volume mass gatherings of between several hundred to several thousand people are poorly described in the existing literature. OBJECTIVES: This study was conducted to: 1. Describe key patient and event characteristics of medical presentations at a series of mass gatherings, including events smaller than those previously described in the literature; 2. Determine whether event type and event size affect the mean number of patients presenting for treatment per event, and specifically, whether the 1:2,000 deployment rule used by St John Ambulance Australia is appropriate; and 3. Identify factors that are predictive of injury at mass gatherings. METHODS: A retrospective, observational, case-series design was used to examine all cases treated by two Divisions of St John Ambulance (Queensland) in the greater metropolitan Brisbane region over a three-year period (01 January 2002-31 December 2004). Data were obtained from routinely collected patient treatment forms completed by St John officers at the time of treatment. Event-related data (e.g., weather, event size) were obtained from event forms designed for this study. Outcome measures include: total and average number of patient presentations for each event; event type; and event size category. Descriptive analyses were conducted using chi-square tests, and mean presentations per event and event type were investigated using Kruskal-Wallis tests. Logistic regression analyses were used to identify variables independently associated with injury presentation (compared with non-injury presentations). RESULTS: Over the three-year study period, St John Ambulance officers treated 705 patients over 156 separate events. The mean number of patients who presented with any medical condition at small events (less than or equal to 2,000 attendees) did not differ significantly from that of large (>2,000 attendees) events (4.44 vs. 4.67, F = 0.72, df = 1, 154, p = 0.79). Logistic regression analyses indicated that presentation with an injury compared with non-injury was independently associated with male gender, winter season, and sporting events, even after adjusting for relevant variables. CONCLUSIONS: In this study of low-volume mass gatherings, a similar number of patients sought medical treatment at small (<2,000 patrons) and large (>2,000 patrons) events. This demonstrates that for low-volume mass gatherings, planning based solely on anticipated event size may be flawed, and could lead to inappropriate levels of first-aid coverage. This study also highlights the importance of considering other factors, such as event type and patient characteristics, when determining appropriate first-aid resourcing for low-volume events. Additionally, identification of factors predictive of injury presentations at mass gatherings has the potential to significantly enhance the ability of event coordinators to plan effective prevention strategies and response capability for these events.
Resumo:
Measuring the business value that Internet technologies deliver for organisations has proven to be a difficult and elusive task, given their complexity and increased embeddedness within the value chain. Yet, despite the lack of empirical evidence that links the adoption of Information Technology (IT) with increased financial performance, many organisations continue to adopt new technologies at a rapid rate. This is evident in the widespread adoption of Web 2.0 online Social Networking Services (SNSs) such as Facebook, Twitter and YouTube. These new Internet based technologies, widely used for social purposes, are being employed by organisations to enhance their business communication processes. However, their use is yet to be correlated with an increase in business performance. Owing to the conflicting empirical evidence that links prior IT applications with increased business performance, IT, Information Systems (IS), and E-Business Model (EBM) research has increasingly looked to broader social and environmental factors as a means for examining and understanding the broader influences shaping IT, IS and E-Business (EB) adoption behaviour. Findings from these studies suggest that organisations adopt new technologies as a result of strong external pressures, rather than a clear measure of enhanced business value. In order to ascertain if this is the case with the adoption of SNSs, this study explores how organisations are creating value (and measuring that value) with the use of SNSs for business purposes, and the external pressures influencing their adoption. In doing so, it seeks to address two research questions: 1. What are the external pressures influencing organisations to adopt SNSs for business communication purposes? 2. Are SNSs providing increased business value for organisations, and if so, how is that value being captured and measured? Informed by the background literature fields of IT, IS, EBM, and Web 2.0, a three-tiered theoretical framework is developed that combines macro-societal, social and technological perspectives as possible causal mechanisms influencing the SNS adoption event. The macro societal view draws on the concept of Castells. (1996) network society and the behaviour of crowds, herds and swarms, to formulate a new explanatory concept of the network vortex. The social perspective draws on key components of institutional theory (DiMaggio & Powell, 1983, 1991), and the technical view draws from the organising vision concept developed by Swanson and Ramiller (1997). The study takes a critical realist approach, and conducts four stages of data collection and one stage of data coding and analysis. Stage 1 consisted of content analysis of websites and SNSs of many organisations, to identify the types of business purposes SNSs are being used for. Stage 2 also involved content analysis of organisational websites, in order to identify suitable sample organisations in which to conduct telephone interviews. Stage 3 consisted of conducting 18 in-depth, semi-structured telephone interviews within eight Australian organisations from the Media/Publishing and Galleries, Libraries, Archives and Museum (GLAM) industries. These sample organisations were considered leaders in the use of SNSs technologies. Stage 4 involved an SNS activity count of the organisations interviewed in Stage 3, in order to rate them as either Advanced Innovator (AI) organisations, or Learning Focussed (LF) organisations. A fifth stage of data coding and analysis of all four data collection stages was conducted, based on the theoretical framework developed for the study, and using QSR NVivo 8 software. The findings from this study reveal that SNSs have been adopted by organisations for the purpose of increasing business value, and as a result of strong social and macro-societal pressures. SNSs offer organisations a wide range of value enhancing opportunities that have broader benefits for customers and society. However, measuring the increased business value is difficult with traditional Return On Investment (ROI) mechanisms, ascertaining the need for new value capture and measurement rationales, to support the accountability of SNS adoption practices. The study also identified the presence of technical, social and macro-societal pressures, all of which influenced SNS adoption by organisations. These findings contribute important theoretical insight into the increased complexity of pressures influencing technology adoption rationales by organisations, and have important practical implications for practice, by reflecting the expanded global online networks in which organisations now operate. The limitations of the study include the small number of sample organisations in which interviews were conducted, its limited generalisability, and the small range of SNSs selected for the study. However, these were compensated in part by the expertise of the interviewees, and the global significance of the SNSs that were chosen. Future research could replicate the study to a larger sample from different industries, sectors and countries. It could also explore the life cycle of SNSs in a longitudinal study, and map how the technical, social and macro-societal pressures are emphasised through stages of the life cycle. The theoretical framework could also be applied to other social fad technology adoption studies.
Resumo:
Reducing road crashes and associated trauma is a critical focus as the Decade of Action for Road Safety commences. China is one of many rapidly-motorizing nations to experience recent increases in private-vehicle ownership and an associated escalation in novice drivers. Unfortunately, however, China also experiences a high rate of death and injury from road crashes. Several key pieces of legislation have been introduced in recent decades in China to deal with these changes. While managing the legal aspects of road use is important, social influences on driver behaviour may offer additional avenues for promoting safe driving, particularly in a culture where such factors carry high importance. To date, there is limited research on the role of social influence factors on driver behaviour in China, yet we know that Chinese society is strongly based on social rules, customs, and relationships. There is reason to assume therefore, that road use and driving-related issues may also be strongly influenced by social relationships. One previous study that has investigated such issues highlighted the need to consider culturally-specific issues such as interpersonal networks and social hierarchy when examining driver behaviour in China (Xie & Parker, 2002). Those authors suggested that there are some concepts relating to Chinese driving culture that may not necessarily have been identified from research conducted in western contexts and that research conducted in China must be considered in light of such concepts. The current paper reports qualitative research conducted with Beijing drivers to investigate such social influence factors. Findings indicated that family members, friends, and driving instructors appear influential on driver behaviour and that some novice drivers seek additional assistance after obtaining their licence. The finding relating to the influence of driving instructors was not surprising, given the substantial number of new drivers in China. In Beijing, driving instruction is conducted off-road in purpose-specific driving facilities rather than on the road network. Once licensed, it is common for new drivers to have little or no experience driving in complex traffic situations. This learning situation is unlikely to provide all the skills necessary to successfully negotiate crowded city streets and assess the related risk associated with such driving. Therefore, it was not surprising to find that one reported strategy to assist new drivers was to employ the services of an ‘accompanying driver’ to provide ongoing driving instruction once licensed. In more highly motorised countries supervised practice is part of a graduated licensing system where it is compulsory for new drivers to be supervised by a more experienced driver for a requisite period of time before progressing to solo driving. However, as this system is not in place in China, it appears that some drivers seek out and pay for additional support once they commence on-road driving. Additionally, strategies to avoid detection and penalties for inappropriate road use were discussed, many of which involve the use of a third person. These findings indicate potential barriers to implementing effective traffic enforcement and highlight the importance of understanding culturally-specific social factors relating to driver behaviour.
Resumo:
Associations between young children's attributions of emotion at different points in a story, and with regard to their own prediction about the story's outcome, were investigated using two hypothetical scenarios of social and emotional challenge (social entry and negative event). First grade children (N = 250) showed an understanding that emotions are tied to situational cues by varying the emotions they attributed both between and within scenarios. Furthermore, emotions attributed to the main protagonist at the beginning of the scenarios were differentially associated with children's prediction of a positive or negative outcome and with the valence of the emotion attributed at the end of the scenario. Gender differences in responses to some items were also found. © 2010 The British Psychological Society.
Resumo:
Social media networks have emerged as a powerful tool in allowing collaboration and sharing of information during times of crisis (Bruns, The Centre for Creative Industries Blog, comment posted on January 19,2011). The 2011 Queensland floods provided a unique opportunity to explore social media use during an emergency. This paper presents the findings of a pilot study that explored the information experiences of people using social media during the flooding of the Brisbane River. Analysis of data from four interviews supported the emergence of four categories of information experience. Examination of the categories revealed variation between the way in which individuals experienced social media and the point of the flooding at which each category of experience occurred. Information regarding individual’s use of social media has the potential to inform the development of social media platforms that can provide relevant and accessible information for the general public in event of a natural disaster.
Resumo:
The birth of a baby is a significant event for women and their families, with the event being influenced by the prevailing social and cultural context. Historically, women throughout the world have given birth at home assisted by other women who helped them cope with the stress of labour and birth. In the middle of the twentieth century, the togetherness, caring and support that were provided within the social and cultural context of childbirth began to change; women in most developed countries, and to some extent in developing countries, laboured and gave birth in institutions that isolated them from the support of family and friends. This practice is referred to as the medical model of childbirth and, over time, birthing within this model has come to be viewed by women as a dehumanising experience. In an attempt to secure a more supportive experience, women began to demand the presence of a supportive companion; namely their partner. This event became the catalyst for a number of studies focusing on different types of support providers and their contribution to the phenomenon of social support during labour. More recently, it has become a common practice for some women to be supported during labour by a number of people from their social network. However, research on the influence of such supportive people on women’s experience of labour and birth and on birth outcomes is scarce. The aim of this study is to examine the influence of various support arrangements from a woman’s family and social network on her experience of labour and birth and on birth outcomes. The mixed-method study was conducted to answer three research questions: 1. Do women with more than one support person present during labour and birth have similar perceptions and experiences of support compared to women with one support person? 2. Do women with more than one support person present during labour and birth have similar birth outcomes compared to women with one support person? 3. Do women with different types of support providers during labour and birth have similar birth outcomes? Methods Phase one of this study developed, pilot tested and administered a newly developed instrument designed to measure women’s perceptions of supportive behaviours provided during labour. Specific birth outcome data were extracted from the medical records. Phase two consisted of in-depth interviews with a sample of women who had completed the survey. Results: The results identified a statistically significant relationship between women’s perceptions of social support and the number of support providers: women supported by one person only rated the supportive behaviours of that person more highly compared to women who were supported by a number of people. The results also identified that women supported by one person used less analgesia. An additional qualitative finding was that some women sacrificed the support of female relatives at the request of their partners. Conclusion: By using a mixed-method approach, this study found that women were selective in their choice of support providers, as they chose individuals with whom they had an enduring affectionate attachment. Women place more emphasis on a support person’s ability to fulfil their attachment needs of close proximity and a sense of security and safety, rather than their ability to provide the expected functional supportive behaviours.
Resumo:
If the current discourses of progress are to be believed, the new or social media promise a kaleidoscope of opportunity for connecting and informing citizens. This is by allegedly revitalizing the fading legitimacy and practice of institutions and providing an agent for social interaction. However, as social media adoption has increased, it has revealed a wealth of contradictions both of its own making and reproduction of past action. This has created a crisis for traditional media as well as for public relations. For example, social media such as WikiLeaks have bypassed official channels about government information. In other cases, social media such as Facebook and Twitter informed BBC coverage of the Rio Olympics. Although old media are unlikely to go away, social media have had an impact with several large familybased media companies collapsing or being reintegrated into the new paradigm. To use Walter Lippman’s analogy of the phantom public, the social media contradictorily serve to both disparate the phantom in part and reinforce it...
Resumo:
and sexual violence on the social adjustment of Grade 8 and 9 school children in the state of Tripura, India. The study participants, 160 boys and 160 girls, were randomly selected from classes in eight English and Bengali medium schools in Agartala city, Tripura. Data were collected using a self-administered Semi-structured Questionnaire for Children/Students and a Social Adjustment Inventory which were custom-made for the study based on measures in the extant research adapted for the Indian context. Findings revealed that students experienced physical (21.9%), psychological (20.9%), and sexual (18.1%) violence at home, and 29.7% of the children had witnessed family violence. Boys were more often victims of physical and psychological violence while girls were more often victims of sexual violence. The social adjustment scores of school children who experienced violence, regardless of the nature of the violence, was significantly lower when compared with scores of those who had not experienced violence (p<0.001). Social adjustment was poorer for girls than boys (p<0.001). The study speaks in favour of early detection and intervention for all child maltreatment subtypes and for children exposed to interparental violence, and highlights the crucial role of schools and school psychology in addressing the problem.
Resumo:
A Flash Event (FE) represents a period of time when a web-server experiences a dramatic increase in incoming traffic, either following a newsworthy event that has prompted users to locate and access it, or as a result of redirection from other popular web or social media sites. This usually leads to network congestion and Quality-of-Service (QoS) degradation. These events can be mistaken for Distributed Denial-of-Service (DDoS) attacks aimed at disrupting the server. Accurate detection of FEs and their distinction from DDoS attacks is important, since different actions need to be undertaken by network administrators in these two cases. However, lack of public domain FE datasets hinders research in this area. In this paper we present a detailed study of flash events and classify them into three broad categories. In addition, the paper describes FEs in terms of three key components: the volume of incoming traffic, the related source IP-addresses, and the resources being accessed. We present such a FE model with minimal parameters and use publicly available datasets to analyse and validate our proposed model. The model can be used to generate different types of FE traffic, closely approximating real-world scenarios, in order to facilitate research into distinguishing FEs from DDoS attacks.
Resumo:
This paper outlines a method for studying online activity using both qualitative and quantitative methods: topical network analysis. A topical network refers to "the collection of sites commenting on a particular event or issue, and the links between them" (Highfield, Kirchhoff, & Nicolai, 2011, p. 341). The approach is a complement for the analysis of large datasets enabling the examination and comparison of different discussions as a means of improving our understanding of the uses of social media and other forms of online communication. Developed for an analysis of political blogging, the method also has wider applications for other social media websites such as Twitter.
Resumo:
News blog hot topics are important for the information recommendation service and marketing. However, information overload and personalized management make the information arrangement more difficult. Moreover, what influences the formation and development of blog hot topics is seldom paid attention to. In order to correctly detect news blog hot topics, the paper first analyzes the development of topics in a new perspective based on W2T (Wisdom Web of Things) methodology. Namely, the characteristics of blog users, context of topic propagation and information granularity are unified to analyze the related problems. Some factors such as the user behavior pattern, network opinion and opinion leader are subsequently identified to be important for the development of topics. Then the topic model based on the view of event reports is constructed. At last, hot topics are identified by the duration, topic novelty, degree of topic growth and degree of user attention. The experimental results show that the proposed method is feasible and effective.