684 resultados para Cyber-rencontre
Resumo:
Over less than a decade, we have witnessed a seismic shift in the way knowledge is produced and exchanged. This is opening up new opportunities for civic and community engagement, entrepreneurial behaviour, sustainability initiatives and creative practices. It also has the potential to create fresh challenges in areas of privacy, cyber-security and misuse of data and personal information. The field of urban informatics focuses on the use and impacts of digital media technology in urban environments. Urban informatics is a dynamic and cross-disciplinary area of inquiry that encapsulates social media, ubiquitous computing, mobile applications and location-based services. Its insights suggest the emergence of a new economic force with the potential for driving innovation, wealth and prosperity through technological advances, digital media and online networks that affect patterns of both social and economic development. Urban informatics explores the intersections between people, place and technology, and their implications for creativity, innovation and engagement. This paper examines how the key learnings from this field can be used to position creative and cultural institutions such as galleries, libraries, archives and museums (GLAM) to take advantage of the opportunities presented by these changing social and technological developments. This paper introduces the underlying principles, concepts and research areas of urban informatics, against the backdrop of modern knowledge economies. Both theoretical ideas and empirical examples are covered in this paper. The first part discusses three challenges: a. People, and the challenge of creativity: The paper explores the opportunities and challenges of urban informatics that can lead to the design and development of new tools, methods and applications fostering participation, the democratisation of knowledge, and new creative practices. b. Technology, and the challenge of innovation: The paper examines how urban informatics can be applied to support user-led innovation with a view to promoting entrepreneurial ideas and creative industries. c. Place, and the challenge of engagement: The paper discusses the potential to establish place-based applications of urban informatics, using the example of library spaces designed to deliver community and civic engagement strategies. The discussion of these challenges is illustrated by a review of projects as examples drawn from diverse fields such as urban computing, locative media, community activism, and sustainability initiatives. The second part of the paper introduces an empirically grounded case study that responds to these three challenges: The Edge, the Queensland Government’s Digital Culture Centre which is an initiative of the State Library of Queensland to explore the nexus of technology and culture in an urban environment. The paper not only explores the new role of libraries in the knowledge economy, but also how the application of urban informatics in prototype engagement spaces such as The Edge can provide transferable insights that can inform the design and development of responsive and inclusive new library spaces elsewhere. To set the scene and background, the paper begins by drawing the bigger picture and outlining some key characteristics of the knowledge economy and the role that the creative and cultural industries play in it, grasping new opportunities that can contribute to the prosperity of Australia.
Resumo:
Cyberbullying is a threat to student mental health and wellbeing. As predicted the consequences of cyberbullying have been shown to be more detrimental to students than traditional bullying because of the wider audience and the 24/7 nature of this form of bullying. It is becoming an increasingly vexatious problem for victims, students who bully, educators and parents. Parents and the community are turning to schools to provide preventative strategies and to manage incidents of cyberbullying. Some sections of the community believe there is a technological solution to the problem, or that the law should be overhauled to address the problem more effectively. However, bullying is a deeply embedded social relationship problem, of which cyberbullying is one form. Therefore, planned prevention and intervention strategies need to be considered in the context of the social relationships in the whole school community.
Resumo:
We explored common reasons for non-use of the rapidly growing popularity of social networking sites among a sample of Australian adolescents (N = 69). Transcripts were coded by grouping responses along similar themes for non-use that had been commonly stated by participants. The primary reasons offered by adolescents were: lack of motivation, poor use of time, preference for other forms of communication, preference for engaging in other activities, cybersafety concerns, and a dislike of self-presentation online. The identification of these themes allows for a greater understanding of teenagers' decisions not to engage in the popular medium of communication and points to possible strategies that could be utilised by Web site developers in efforts to appeal to a wider teenage audience.
Resumo:
It is well recognised that there are serious correlates for victims of traditional bullying. These have been shown to include increased levels of depression, anxiety and psychosomatic symptoms, in addition to often severe physical harm and even suicide. Bullied students also feel more socially ineffective; have greater interpersonal difficulties, together with higher absenteeism from school and lower academic competence. In the emerging field of cyberbullying many researchers have hypothesised a greater impact and more severe consequences for victims because of the 24/7 nature and the possibility of the wider audience with this form of bullying. However, to date there is scarce empirical evidence to support this. This study sought to compare victims’ perceptions of the harshness and impact of bullying by traditional and cyber means. The major findings showed that although students who had been victimised by traditional bullying reported that they felt their bullying was harsher, crueller and had more impact on their lives than those students who had been cyberbullied, the correlates of their mental health revealed that cyber victims reported significantly more social difficulties, higher anxiety levels and depression than traditional victims. The implications for school counsellors and mental health workers are discussed.
Resumo:
On 24 March 2011, Attorney-General Robert McClelland referred the National Classification Scheme to the ALRC and asked it to conduct widespread public consultation across the community and industry. The review considered issues including: existing Commonwealth, State and Territory classification laws the current classification categories contained in the Classification Act, Code and Guidelines the rapid pace of technological change the need to improve classification information available to the community the effect of media on children and the desirability of a strong content and distribution industry in Australia. During the inquiry, the ALRC conducted face-to-face consultations with stakeholders, hosted two online discussion forums, and commissioned pilot community and reference group forums into community attitudes to higher level media content. The ALRC published two consultation documents—an Issues Paper and a Discussion Paper—and invited submissions from the public. The Final Report was tabled in Parliament on 1 March 2012. Recommendations: The report makes 57 recommendations for reform. The net effect of the recommendations would be the establishment of a new National Classification Scheme that: applies consistent rules to content that are sufficiently flexible to be adaptive to technological change; places a regulatory focus on restricting access to adult content, helping to promote cyber-safety and protect children from inappropriate content across media platforms; retains the Classification Board as an independent classification decision maker with an essential role in setting benchmarks; promotes industry co-regulation, encouraging greater industry content classification, with government regulation more directly focused on content of higher community concern; provides for pragmatic regulatory oversight, to meet community expectations and safeguard community standards; reduces the overall regulatory burden on media content industries while ensuring that content obligations are focused on what Australians most expect to be classified; and harmonises classification laws across Australia, for the benefit of consumers and content providers.
Resumo:
Chatrooms, for example Internet Relay Chat, are generally multi-user, multi-channel and multiserver chat-systems which run over the Internet and provide a protocol for real-time text-based conferencing between users all over the world. While a well-trained human observer is able to understand who is chatting with whom, there are no efficient and accurate automated tools to determine the groups of users conversing with each other. A precursor to analysing evolving cyber-social phenomena is to first determine what the conversations are and which groups of chatters are involved in each conversation. We consider this problem in this paper. We propose an algorithm to discover all groups of users that are engaged in conversation. Our algorithms are based on a statistical model of a chatroom that is founded on our experience with real chatrooms. Our approach does not require any semantic analysis of the conversations, rather it is based purely on the statistical information contained in the sequence of posts. We improve the accuracy by applying some graph algorithms to clean the statistical information. We present some experimental results which indicate that one can automatically determine the conversing groups in a chatroom, purely on the basis of statistical analysis.
Resumo:
The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure industrial control systems. Our curriculum is unique in that it provides security awareness but also the advanced skills required for security specialists in this area. We are aware that in the Australian context there is a cultural gap between the thinking of control system engineers who are responsible for maintaining and designing critical infrastructure and information technology professionals who are responsible for protecting these systems from cyber attacks. Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.
Resumo:
The current discourse surrounding victims of online fraud is heavily premised on an individual notion of greed. The strength of this discourse permeates the thinking of those who have not experienced this type of crime, as well as victims themselves. The current discourse also manifests itself in theories of victim precipitation, which again assigns the locus of blame to individuals for their actions in an offence. While these typologies and categorisations of victims have been critiqued as “victim blaming” in other fields, this has not occurred with regard to online fraud victims, where victim focused ideas of responsibility for the offence continue to dominate. This paper illustrates the nature and extent of the greed discourse and argues that it forms part of a wider construction of online fraud that sees responsibility for victimisation lie with the victims themselves and their actions. It argues that the current discourse does not take into account the level of deception and the targeting of vulnerability that is employed by the offender in perpetrating this type of crime. It concludes by advocating the need to further examine and challenge this discourse, especially with regard to its potential impact for victim’s access to support services and the wider criminal justice system.
Resumo:
Rises recorded for girls’ violence in countries like Australia, Canada, United Kingdom and United States have been hotly contested. One view is these rising rates of violence are an artefact of new forms of policy, policing, criminalisation and social control over young women. Another view is that young women may indeed have become more violent as they have increasingly participated in youth subcultural activities involving gangs and drugs, and cyber‐cultural activities that incite and reward girls’ violence. Any comprehensive explanation will need to address how a complex interplay of cultural, social, behavioural, and policy responses contribute to these rises. This article argues that there is no singular cause, explanation or theory that accounts for the rises in adolescent female violence, and that many of the simple explanations circulating in popular culture are driven by an anti‐feminist ideology. By concentrating on females as victims of violence and very rarely as perpetrators, feminist criminology has for the most part ducked the thorny issue of female violence, leaving a discursive space for anti‐feminist sentiment to reign. The article concludes by arguing the case for developing a feminist theory of female violence.
Resumo:
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.
Resumo:
In order to dynamically reduce voltage unbalance along a low voltage distribution feeder, a smart residential load transfer system is discussed. In this scheme, residential loads can be transferred from one phase to another to minimize the voltage unbalance along the feeder. Each house is supplied through a static transfer switch and a controller. The master controller, installed at the transformer, observes the power consumption in each house and will determine which house(s) should be transferred from an initially connected phase to another in order to keep the voltage unbalance minimum. The performance of the smart load transfer scheme is demonstrated by simulations.
Resumo:
A novel intelligent online demand management system is discussed in this chapter for peak load management in low voltage residential distribution networks based on the smart grid concept. The discussed system also regulates the network voltage, balances the power in three phases and coordinates the energy storage within the network. This method uses low cost controllers, with two-way communication interfaces, installed in costumers’ premises and at distribution transformers to manage the peak load while maximizing customer satisfaction. A multi-objective decision making process is proposed to select the load(s) to be delayed or controlled. The efficacy of the proposed control system is verified by a MATLAB-based simulation which includes detailed modeling of residential loads and the network.
Resumo:
Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.
Resumo:
Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata across forensic disk images, files, system and application logs and network packet captures. The results prove that metadata based associations can be used to extract meaningful relationships between digital artifacts, thus potentially benefiting real-life forensics investigations.