935 resultados para Law enforcement


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Facebook disseminates messages for billions of users everyday. Though there are log files stored on central servers, law enforcement agencies outside of the U.S. cannot easily acquire server log files from Facebook. This work models Facebook user groups by using a random graph model. Our aim is to facilitate detectives quickly estimating the size of a Facebook group with which a suspect is involved. We estimate this group size according to the number of immediate friends and the number of extended friends which are usually accessible by the public. We plot and examine UML diagrams to describe Facebook functions. Our experimental results show that asymmetric Facebook friendship fulfills the assumption of applying random graph models.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The surveillance capacities of professional sports clubs and Leagues are directly related to their modes of governance. This paper identifies how private sports clubs enact surveillance through processes of inclusion and exclusion. Using three examples to demonstrate these processes, we argue that the surveillance mechanisms associated with sports governance at times replicate, at other times contradict, and at other times influence those associated with broader law enforcement and security developments. These examples also suggest potential increases in surveillance activities that emerge in club governance often flow from external concerns regarding allegations of crime, national security breaches and corruption. These context-specific case studies (Flyvbjerg 2001) demonstrate how surveillance and identity authentication are closely tied to the complex, multi-tiered governance structures and practices in three distinct sports. We then explore how these patterns can be interpreted as either connected to or distinct from equivalent developments involving the surveillance surge (Murakami Wood 2009) and concepts of inclusion and exclusion under the criminal law. We conclude by discussing how both internal and external regulatory forces can shape interrelated facets of surveillance, governance and exclusion in elite sports.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study examined the extent to which young adolescent alcohol use was related to alcohol-related norms and law enforcement of underage alcohol use, after accounting for known strong parent and peer correlates. Our sample consisted of 7,674 students (X̅ age = 12 years) from 30 Australian communities. Two-level (individuals nested within communities) binary logistic regression was used to examine relationships between recent alcohol use (last 30 days) and perceived community norms about alcohol use, perceived law enforcement of underage alcohol use, parent alcohol use, parent permissiveness of adolescent alcohol use, peer alcohol use, and demographic factors. Results indicated that community norms and perceived law enforcement of alcohol use were associated with alcohol use and this association was independent of parent and peer factors. After accounting for proximal social correlates, community factors were significantly associated with alcohol use among very young adolescents.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In recent years, a growing emphasis has been placed on the use of zonal banning to address violence and anti-social behaviour associated with alcohol consumption. While we recognise the longer historical links between territory and crime, this article focuses on recent efforts to govern territory through new zonal regulations. Recent processes in Australia involve the conflation criminal law principles with processes of managing order in and around private spaces through new administrative approaches to alcohol-related law enforcement. The article outlines the nature of sub-sovereign ‘police laws’ and the extent to which they have been used based on Victorian data. We conclude by suggesting these developments need ongoing critical scrutiny given evidence of the ongoing expansion of proprietary-based principles in the management of urban disorder, and the potential for these developments to promote the increased use of surveillance technologies to exclude undesirable populations from the nighttime economies of Australian cities.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Qualitative and quantitative methods were used in this research to distinguish the prevailing D/discourses (words, tools, beliefs, thinking styles) in police training and to analyse the ‘discourse-practice’ (Cherryholmes 1988, p.1) framework of policing in a training environment. The manifestations, functions and consequences of the D/discourses raise concerns about the efficacy of training (its doctrinal intent and value versus its educative intent and value) and its implications for individuals’ identity, subjectivity, agency, learning, and “membership” within the policing community. The literature revealed that police training acts as a formally sanctioned vehicle for police culture, subcultures, and D/discourses. This is complicated by (a) the predominance of pedagogical training practices that support a trainer-centred approach and standardised lecture format for training, (b) police training focusing predominantly on law enforcement at the cost of higher-order conceptual skills, and (c) Australian and international studies of police management education which reveal a subculture resistant to theoretical analysis and critical reflection, and a set of unconscious and unchallengeable assumptions regarding police work, conduct, and leadership. A backdrop to this research and findings is the agenda of Australian and New Zealand police services for police to become a profession.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Qualitative and quantitative methods were used in this research to distinguish the prevailing D/discourses (words, tools, beliefs, thinking styles) in police training and to analyse the ‘discourse-practice’ (Cherryholmes 1988: 1) framework of policing in a training environment. The manifestations, functions and consequences of the D/discourses raise concerns about the efficacy of training (its doctrinal intent and value versus its educative intent and value) and its implications for individuals’ identity, subjectivity, agency, learning, and “membership” within the policing community. The literature revealed that police training acts as a formally sanctioned vehicle for police culture, subcultures, and D/discourses. This is complicated by (a) the predominance of pedagogical training practices that support a trainer-centred approach and standardised lecture format for training, (b) police training focusing predominantly on law enforcement at the cost of higher- rder conceptual skills, and (c) Australian and international studies of police management education which  reveal a subculture resistant to theoretical analysis and critical reflection, and a set of unconscious and unchallengeable assumptions regarding police work, conduct, and leadership. The agenda of Australian and New Zealand police services for police to become a profession provides a backdrop to this research and findings.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In many jurisdictions, anyone convicted of a sexual offense is required to register with police, often for life. Nine different countries have now implemented sex offender registries in an attempt to protect the public from the perceived threat posed by sexual offenders. Yet such laws have been criticized as being overly inclusive, tying up limited law enforcement resources to track many offenders who pose little risk of sexual reoffending. This paper considers the available research evidence relevant to the effectiveness of such laws for the deterrence of sexual offending and the investigation of sex crimes. It is concluded that significant gaps persist in our knowledge of whether existing laws effectively reduce sexual offending or reoffending and that large-scale, well-designed studies of the impact of sex offender registration on rates of offending, the collateral consequences to offenders and their families, and the costs of such laws are needed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this paper we analyze some of the practical realities around deleting personal data on social networks with respect to the Canadian regime of privacy protection. We first discuss the extent to which Canadian privacy law imposes access, deletion, and retention requirements on data brokers. After this discussion we turn to corporate organizational practices. Our analyses of social networking sites’ privacy policies reveal how poorly companies recognize the right to be have one’s personal information deleted in their existing privacy commitments and practices. Next, we turn to Law Enforcement Authorities (LEAs) and how their practices challenge the deletion requirements because of LEAs’ own capture, processing, and retention of social networking information. We conclude by identifying lessons from the Canadian experience and raising them against the intense transatlantic struggle over the scope of deletion of data stored in cloud-based computing infrastructures.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Automatic face recognition is an area with immense practical potential which includes a wide range of commercial and law enforcement applications. Hence it is unsurprising that it continues to be one of the most active research areas of computer vision. Even after over three decades of intense research, the state-of-the-art in face recognition continues to improve, benefitting from advances in a range of different research fields such as image processing, pattern recognition, computer graphics, and physiology. Systems based on visible spectrum images, the most researched face recognition modality, have reached a significant level of maturity with some practical success. However, they continue to face challenges in the presence of illumination, pose and expression changes, as well as facial disguises, all of which can significantly decrease recognition accuracy. Amongst various approaches which have been proposed in an attempt to overcome these limitations, the use of infrared (IR) imaging has emerged as a particularly promising research direction. This paper presents a comprehensive and timely review of the literature on this subject. Our key contributions are (i) a summary of the inherent properties of infrared imaging which makes this modality promising in the context of face recognition; (ii) a systematic review of the most influential approaches, with a focus on emerging common trends as well as key differences between alternative methodologies; (iii) a description of the main databases of infrared facial images available to the researcher; and lastly (iv) a discussion of the most promising avenues for future research. © 2014 Elsevier Ltd.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Emergency work can expose personnel to sleep restriction. Inadequate amounts of sleep can negatively affect physiological and psychological stress responses. This review critiqued the emergency service literature (e.g., firefighting, police/law enforcement, defense forces, ambulance/paramedic personnel) that has investigated the effect of sleep restriction on hormonal, inflammatory and psychological responses. Furthermore, it investigated if a psycho-physiological approach can help contextualize the significance of such responses to assist emergency service agencies monitor the health of their personnel. The available literature suggests that sleep restriction across multiple work days can disrupt cytokine and cortisol levels, deteriorate mood and elicit simultaneous physiological and psychological responses. However, research concerning the interaction between such responses is limited and inconclusive. Therefore, it is unknown if a psycho-physiological relationship exists and as a result, it is currently not feasible for agencies to monitor sleep restriction related stress based on psycho- physiological interactions. Sleep restriction does however, appear to be a major stressor contributing to physiological and psychological responses and thus, warrants further investigation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Many aspects of our modern society now have either a direct or implicit dependence upon information technology. As such, a compromise of the availability or integrity in relation to these systems (which may encompass such diverse domains as banking, government, health care, and law enforcement) could have dramatic consequences from a societal perspective. These key systems are often referred to as critical infrastructure. Critical infrastructure can consist of corporate information systems or systems that control key industrial processes; these specific systems are referred to as ICS (Industry Control Systems) systems. ICS systems have devolved since the 1960s from standalone systems to networked architectures that communicate across large distances, utilise wireless network and can be controlled via the Internet. ICS systems form part of many countries’ key critical infrastructure, including Australia. They are used to remotely monitor and control the delivery of essential services and products, such as electricity, gas, water, waste treatment and transport systems. The need for security measures within these systems was not anticipated in the early development stages as they were designed to be closed systems and not open systems to be accessible via the Internet. We are also seeing these ICS and their supporting systems being integrated into organisational corporate systems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Networks are increasing in number and in importance across the security field as a means of providing inter-agency coordination. Based on a large qualitative study of networks in the field of national security in Australia, this article aims to advance our knowledge of the internal properties of public sector networks in the field of national security and the conditions shaping their performance. It puts forward a multi-level theoretical framework involving five interdependent levels of analysis—structural, cultural, policy, technological, and relational—which aims to account for the internal properties of networks and examines each of these levels in relation to public sector networks in the field of national security. Using detailed interviews with senior members of security, law enforcement, and intelligence agencies, the article aims to highlight the potential lessons this framework has for strategically organizing and managing dynamic networks within and beyond the field of national security.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Media Piracy in Emerging Economies is the first independent, large-scale study of music, film and software piracy in the developing world, with a focus on Brazil, India, Russia, South Africa, Mexico and Bolivia. Based on three years of work by some thirty-five researchers, the study tells two overarching stories: one tracing the explosive growth of piracy as digital technologies became cheap and ubiquitous around the world, and another following the growth of industry lobbies that have reshaped laws and law enforcement around copyright protection. The report argues that enforcement efforts have largely failed, and that the problem of piracy is better addressed as a failure of affordable access to media in legal markets.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Este trabalho faz uma abordagem acerca da política de segurança pública no Estado de Minas Gerais. Discute-se o próprio processo de formulação da política pública, procedendo-se a uma análise de seus fundamentos e da forma pela qual o Governo do Estado trata as questões a ela inerentes. Através de pesquisa seletiva, chegou-se a diagnósticos que demonstram a situação atual da política considerada, enfocando-se principalmente os aspectos relacionados a recursos humanos, logística e orçamento, sempre confrontados com os demais setores de atuação do Estado na vida social. A premissa básica que penneia toda a pesquisa é a de que não existe uma política de segurança pública, sistematizada, no Estado de Minas Gerais. A lógica da investigação da participação orçamentária da atividatfe de segurança pública, confrontada com a evolução do aparato policial, está na tentativa de se demonstrar a ausência do Estado no efetivo acompanhamento da necessidade social de segurança. Por meio da análise dos instrumentos utilizados na pesquisa, referendou-se o processo decisório da política, com a ausência de participação do staff político e gerencial do governo, mas centrado na divisão dicotômica dos organismos policiais do Estado, a Polícia Militar e a Polícia Civil, como planejadores, decisores e executores de toda a ação que envolva segurança pública. A dimensão institucional dessa atuação é calcada numa resposta pro ativa até certo ponto, mas a sua tônica é o "agir" ante as demandas surgidas e, principalmente, quando acionadas pelo clamor público. A alusão ao sistema de defesa social, previsto na Constituição do Estado, é a resposta da pesquisa para o atendimento dessa demanda social, aliado à adoção do policiamento comunitário.