684 resultados para Cyber-rencontre
Resumo:
To harness safe operation of Web-based systems in Web environments, we propose an SSPA (Server-based SHA-1 Page-digest Algorithm) to verify the integrity of Web contents before the server issues an HTTP response to a user request. In addition to standard security measures, our Java implementation of the SSPA, which is called the Dynamic Security Surveillance Agent (DSSA), provides further security in terms of content integrity to Web-based systems. Its function is to prevent the display of Web contents that have been altered through the malicious acts of attackers and intruders on client machines. This is to protect the reputation of organisations from cyber-attacks and to ensure the safe operation of Web systems by dynamically monitoring the integrity of a Web site's content on demand. We discuss our findings in terms of the applicability and practicality of the proposed system. We also discuss its time metrics, specifically in relation to its computational overhead at the Web server, as well as the overall latency from the clients' point of view, using different Internet access methods. The SSPA, our DSSA implementation, some experimental results and related work are all discussed
Resumo:
This study investigated bullying amongst siblings in both traditional and cyber forms, and the associations of gender, grade, peer bullying perpetration, trait anger and moral disengagement. The participants were 455 children in grades 5 to 12 (262 girls and 177 boys with 16 unknown gender) who had a sibling. As the number of siblings who only bullied by technology was low, these associations were not able to be calculated. However, the findings showed that the percentage of sibling traditional bullying perpetration (31.6%) was higher than peer bullying perpetration (9.8%). Sibling bullies reported engaging in complex behaviours of perpetration and victimisation in both the physical and in cyber settings, although the number was small. Gender, trait anger, moral disengagement and bullying peers at school (but not grade) were all significantly associated with sibling traditional bullying perpetration. The implications of the findings are discussed for bullying intervention and prevention programs to understand childhood bullying in diverse contexts.
Resumo:
In this paper the author considers the possibilities for establishing democratic governance in virtual worlds. He looks at the freedoms currently available to players in “Second Life”, contrasting these to those established in Raph Koster’s “A Declaration of the Rights of Avatars”, and assess whether some restrictions are more necessary in game spaces than social spaces. The author looks at the early implementations of self-governance in online spaces, and consider what lessons can be taken from these, investigating what a contemporary democratic space looks like, in the form of “A Tale in the Desert”, and finally considers how else we may think of giving players more rights in these developing social spaces.
Resumo:
This book is an introduction to key issues in the area of crime as it connects to society. The book is divided into three parts: Understanding Crime and Criminality: introduces topics such as the social construction of crime and deviance, social control, the fear of crime, poverty and exclusion, white collar crime, victims of crime, race/gender and crime. Types of Crime and Criminality: explores examples including human trafficking, sex work, drug crime, environmental crime, cyber crime, war crime, terrorism, and interpersonal violence. Responses to Crime: looks at areas such as crime and the media, policing, moral panics, deterrence, prisons and rehabilitation.
Resumo:
Aim Our pedagogical research addressed the following research questions: 1) Can shared ‘cyber spaces’, such as a ‘wiki’, be occupied by undergraduate women’s health students to improve their critical thinking skills? 2) What are the learning processes via which this occurs? 3) What are the implications of this assessment trial for achieving learning objectives and outcomes in future public health undergraduate courses? Methods The students contributed written, critical reflections (approximately 250 words) to the Wiki each week following the lecture. Students reflected on a range of topics including the portrayal of women in the media, femininity, gender inequality, child bearing and rearing, domestic violence, mental health, Indigenous women, older women, and LGBTIQ communities. Their entries were anonymous, but visible to their peers. Each wiki entry contained a ‘discussion tab’ wherein online conversations were initiated. We used a social constructivist approach to grounded theory to analyse the 480 entries posted over the semester. (http://pub336womenshealth.wikispaces.com/) Results The social constructivist approach initiated by Vygotsky (1978) and further developed by Jonasson (1994) was used to analyse the students’ contributions in relation to four key thematic outcomes including: 1) Complexities in representations across contexts; 2) Critical evaluation in real world scenarios; 3) Reflective practice based on experience, and; 4) Collaborative co-construction of knowledge. Both text and image/visual contributions are provided as examples within each of these learning processes. A theoretical model depicting the interactive learning processes that occurred via discussion of the textual and visual stimulus is presented.
Resumo:
Given their ubiquitous presence as witnesses to school-yard bullying, the role of the ‘bystander’ has been studied extensively. The prevalence and behaviour of bystanders to cyberbullying, however, is less understood. In an anonymous, school-based questionnaire, 716 secondary school students from South-East Queensland reported whether they had witnessed traditional and/or cyberbullying, and how they responded to each type. Overlap in bystander roles between online and offline environments was examined, as was their relationship to age and gender. Students who witnessed traditional bullying were more likely to have witnessed cyberbullying. Bystanders’ behaviour was sometimes similar in both contexts of traditional and cyberbullying, mainly if they were outsiders but half of the 256 students who reported witnessing both traditional and cyberbullying, acted in different roles across the two environments. The implications of the findings are discussed in the context of previous research on cyberbullying and traditional-bystanders. Future research should further explore the role of bystanders online, including examining whether known predictors of traditional-bystander behaviour similarly predict cyber-bystander behaviour.
Resumo:
An estimated A$75,000 is lost by Australians everyday to online fraud, according to the Australian Competition and Consumer Commission (ACCC). Given that this is based on reported crime, the real figure is likely to be much higher. It is well known that fraud, particularly online fraud, has a very low reporting rate. This also doesn’t even begin to encompass non-financial costs to victims. The real cost is likely to be much, much higher. There are many challenges to policing this type of crime, and victims who send money to overseas jurisdictions make it even harder, as does the likelihood of offenders creating false identities or simply stealing legitimate ones. But despite these challenges police have started to do something to prevent the impact and losses of online fraud. By accessing financial intelligence, police are able to identify individuals who are sending money to known high-risk countries for fraud. They then notify these people with their suspicions that they may be involved in fraud. In many cases the people don’t even know they may be victims or involved in online fraud.
Resumo:
This article investigates the perceptions of 156 students who were victims of both traditional and cyberbullying (117 female, 45 male), ages 10 to 17 years, as to which form of bullying was more hurtful. Overall, students perceived traditional victimization to be more hurtful than cyber victimization. Reasons identified in the data to explain the different perceptions of victims were categorized and found to relate to: the bully, the bystanders, the bullying incidents, the emotional impact on the victim, and the victim’s ability to respond. The perceptions of these students challenge a number of suppositions presented in the literature that attempt to explain why cyberbullying is associated with more negative outcomes than traditional bullying. The implications for antibullying programs to address these issues are discussed.
Resumo:
We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modified machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.
Resumo:
This article argues that copyright law is not just a creature of statute, but it is also a social and imaginative contruct. It evaluates a number of critiques of legal formalism. Part 1 examines whether the positive rules and principles of copyright law are the product of historical contingency and political expediency. Part 2 considers the social operation of copyright law in terms of its material effects and cultural significance. Part 3 investigates the future of copyright law, in light of the politics of globalisation and the impact of new information technologies.
Resumo:
This report describes the Year One Pilot Study processes, and articulates findings from the major project components designed to address these challenges noted above (See Figure 1). Specifically, the pilot study tested the campaign research and development process involving participatory design with young people and sector partners, and the efficacy and practicality of conducting a longitudinal, randomised control trial online with minors, including ways oflinking survey data to campaign data. Each sub-study comprehensively considered the ethical requirements of conducting online research with minors in school settings. The theoretical and methodological framework for measuring campaign engagement and efficacy (Sub-studies 3, 4 and 5) drew on the Model of Goal-Directed Behaviour (MGB) (Perugini & Bagozzi 2001) and Nudge Theory (Thaler & Sunstein, 2008).
Resumo:
Little is known about the prevalence of cyberbullying among university students and less about whether they utilise anti-bullying policies. However, failure to report cyberbullying incidents to authorities would lessen the efficacy of these policies. This study investigated the prevalence of cyberbullying among university students and their reporting intentions for cyberbullying incidents. Two hundred and eighty- two students completed a survey on their intentions to report cyberbullying. Results found cyberbullying exists among university students and they would report to authorities if the policy outlined specific information. Students who had been cyber victimised were more likely to report than those students who had not been cyberbullied. Implications for universities are discussed.
Resumo:
The beliefs, attitudes and understandings of pre-service teachers towards bullying and more recently, cyberbullying remains unclear. Previous studies have found them to be generally lacking confidence to address bullying, which could impact negatively on school climate if, when they enter the profession, these beliefs undermine existing anti-bullying initiatives. This study explores Australian pre-service teachers' (N= 717) understanding and knowledge of traditional bullying and cyberbullying and their confidence and capacity to deal with it. Findings from self-report, anonymous questionnaires from students attending three universities in Australia indicated that two thirds (66%) of current pre-service teachers felt informed to very informed and capable to very capable (62%) of dealing with school bullying and 90% could discern cyber and traditional bullying behaviours from other online and offline aggressive acts. Gender and Year level differences were found. The potential impact of their knowledge and understanding of bullying and cyberbullying on school climate, and sustaining and maintaining anti-bullying interventions as they enter the profession is discussed.
Resumo:
The importance of developing effective disaster management strategies has significantly grown as the world continues to be confronted with unprecedented disastrous events. Factors such as climate instability, recent urbanization along with rapid population growth in many cities around the world have unwittingly exacerbated the risks of potential disasters, leaving a large number of people and infrastructure exposed to new forms of threats from natural disasters such as flooding, cyclones, and earthquakes. With disasters on the rise, effective recovery planning of the built environment is becoming imperative as it is not only closely related to the well-being and essential functioning of society, but it also requires significant financial commitment. In the built environment context, post-disaster reconstruction focuses essentially on the repair and reconstruction of physical infrastructures. The reconstruction and rehabilitation efforts are generally performed in the form of collaborative partnerships that involve multiple organisations, enabling the restoration of interdependencies that exist between infrastructure systems such as energy, water (including wastewater), transport, and telecommunication systems. These interdependencies are major determinants of vulnerabilities and risks encountered by critical infrastructures and therefore have significant implications for post-disaster recovery. When disrupted by natural disasters, such interdependencies have the potential to promote the propagation of failures between critical infrastructures at various levels, and thus can have dire consequences on reconstruction activities. This paper outlines the results of a pilot study on how elements of infrastructure interdependencies have the potential to impede the post-disaster recovery effort. Using a set of unstructured interview questionnaires, plausible arguments provided by seven respondents revealed that during post-disaster recovery, critical infrastructures are mutually dependent on each other’s uninterrupted availability, both physically and through a host of information and communication technologies. Major disruption to their physical and cyber interdependencies could lead to cascading failures, which could delay the recovery effort. Thus, the existing interrelationship between critical infrastructures requires that the entire interconnected network be considered when managing reconstruction activities during the post-disaster recovery period.