445 resultados para offender anonymity
Resumo:
Jaccard has been the choice similarity metric in ecology and forensic psychology for comparison of sites or offences, by species or behaviour. This paper applies a more powerful hierarchical measure - taxonomic similarity (s), recently developed in marine ecology - to the task of behaviourally linking serial crime. Forensic case linkage attempts to identify behaviourally similar offences committed by the same unknown perpetrator (called linked offences). s considers progressively higher-level taxa, such that two sites show some similarity even without shared species. We apply this index by analysing 55 specific offence behaviours classified hierarchically. The behaviours are taken from 16 sexual offences by seven juveniles where each offender committed two or more offences. We demonstrate that both Jaccard and s show linked offences to be significantly more similar than unlinked offences. With up to 20% of the specific behaviours removed in simulations, s is equally or more effective at distinguishing linked offences than where Jaccard uses a full data set. Moreover, s retains significant difference between linked and unlinked pairs, with up to 50% of the specific behaviours removed. As police decision-making often depends upon incomplete data, s has clear advantages and its application may extend to other crime types. Copyright © 2007 John Wiley & Sons, Ltd.
Resumo:
We assessed the feasibility of developing a virtual diabetes clinic for young people, using the Internet. The proposed content of the site would be based on self-efficacy theory, aiming to develop confidence in self-management of diabetes. A questionnaire about the proposed Website was delivered to 72 patients who attended a young person’s outpatient clinic in a district hospital. Thirty-nine replies were received, a response rate of 54%. The mean age of the respondents was 13 years. A positive attitude to the potential clinic was reported by 95% of respondents. The items rated as most useful were: quick and easy access to up-todate information about diabetes; the opportunity to ask an expert; good graphics; easy navigation; interactivity. Responses to open questions indicated that 24-hour access and anonymity in asking questions were also valued. A virtual clinic appears to be a possible method of health-care delivery to young people with diabetes.
Resumo:
Purpose: This paper sets out to contribute to the advancement of knowledge, particularly with regard to the processes of implementation and the role of managers engaged in such high commitment strategies and work practices. Design/methodology/approach: This study is part of a research project investigating the extent to which employee involvement predicts job performance (as well as job satisfaction, wellbeing and organisational commitment) in the NHS, using both quantitative and qualitative methods. The main focus of this paper is to present evidence from four of the 20 case studies to show the barriers to implementing employee involvement as well as highlighting the techniques and practices that have proven to be most successful. Findings: Employee involvement is used successfully by management and has enabled frontline staff to contribute their knowledge to their work. Research limitations/implications: The ethical issues of confidentiality and anonymity permeated the research process throughout. Practical implications: The link between "high commitment" strategies and organisational performance is of great interest to academics and practitioners alike. One of these "high commitment" strategies, namely employee involvement, has been an important HR strategy for the NHS in the UK. Originality/value: Other organisations can learn from the findings by implementing the successful parts. © Emerald Group Publishing Limited.
Resumo:
The purpose of the present study is to test the case linkage principles of behavioural consistency and behavioural distinctiveness using serial vehicle theft data. Data from 386 solved vehicle thefts committed by 193 offenders were analysed using Jaccard's, regression and Receiver Operating Characteristic analyses to determine whether objectively observable aspects of crime scene behaviour could be used to distinguish crimes committed by the same offender from those committed by different offenders. The findings indicate that spatial behaviour, specifically the distance between theft locations and between dump locations, is a highly consistent and distinctive aspect of vehicle theft behaviour; thus, intercrime and interdump distance represent the most useful aspects of vehicle theft for the purpose of case linkage analysis. The findings have theoretical and practical implications for understanding of criminal behaviour and for the development of decision-support tools to assist police investigation and apprehension of serial vehicle theft offenders.
Resumo:
This research paper presents an examination of the journey to and from crime for autotheft offenders in the UK. For 852 offences, ‘wheel’ distances are calculated for triangles formed by offenders’ home location, theft location, and vehicle disposal location. The study demonstrates typical isosceles mobility triangles; distances travelled to and from home locations are roughly equal, whereas distances between theft and disposal points were shorter. Distances travelled by offenders under 17 years old and offences involving drug and drink were shown to be shorter than comparison groups. Prolifi c offenders tend to travel further, although there is signifi cant variation in this subgroup. Explanations and implications are discussed.
Resumo:
The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.
Resumo:
Purpose – The purpose of this paper is to demonstrate how the conceptual lens of corporate social responsibility (CSR), business and civil society can be used to explore “less popular causes” (in this case, a community-based public sector empirical study of initiatives with offenders) and, in particular, respond to the question used by Walzer “In which society can lives be best led?” Design/methodology/approach – This is a formative and summative evaluation study of a National Offender Management “community payback” offender scheme based in the UK using a mixed method, predominantly qualitative approach that integrates theory and practice. Findings – The paper finds that citizenship actions of front-line public sector employees, working in partnership with other agencies in the community, embody the essence of Walzer's notion of CSR and civil society by going beyond the call of duty to provide additional training and moral support for the community offenders. Originality/value – The paper contributes towards an understanding of how CSR and civil society debates can inform wider aspects of public policy and business through its application to areas of society that are perceived to be “challenging” and “undeserving”.
Resumo:
This article discusses the emergence of cyberstalking as a means of victimising individuals and minority groups. However, rather than focusing on the activities of far-right groups, we discuss how technology can encourage individuals to harass others. The central argument made is that technology both enables and invites participation in criminal or antisocial behaviour from individuals who would not normally take part in such activities. One way in which this can be explained is by suggesting that some of the social and technological characteristics of the Internet act together in order to lower inhibitions and establish new norms. For instance, the anonymity offered by the Internet enables people to participate in activities such as encouraging violence against others with little fear of retaliation. In addition, by allowing a cyberstalker to harm another person at a distance, the victim is effectively depersonalised. In this way it can be argued that some of those who sympathise with the goals of far-right organisations may be reluctant to act in the offline world but more willing to act in the online world.
Resumo:
This article explores the settings and practices of translation at three types of political institutions, i.e. national, supranational, and non-governmental organisations. The three institutions are the translation service of the German Foreign Office, the translation department of the European Central Bank, and translation provision by the non-governmental organisation Amnesty International. The three case studies describe the specific translation practices in place at these institutions and illustrate some characteristic translation strategies. In this way, we reflect on how different translation practices can impact on translation agency and how these practices in turn are influenced by the type of institution and its organisational structure. The article also aims to explore to which extent the characteristics of collectivity, anonymity and standardisation, and of institutional translation as self-translation are applicable to the institutions under discussion.
Resumo:
Trust is a critical component of successful e-Commerce. Given the impersonality, anonymity, and automation of transactions, online vendor trustworthiness cannot be assessed by means of body language and other environmental cues that consumers typically use when deciding to trust offline retailers. It is therefore essential that the design of e-Commerce websites compensate by incorporating circumstantial cues in the form of appropriate trust triggers. This paper presents and discusses the results of a study which took an initial look at whether consumers with different personality types (a) are generally more trusting and (b) rely on different trust cues during their assessment of first impression vendor trustworthiness in B2C e-Commerce.
Resumo:
The popularity of online social media platforms provides an unprecedented opportunity to study real-world complex networks of interactions. However, releasing this data to researchers and the public comes at the cost of potentially exposing private and sensitive user information. It has been shown that a naive anonymization of a network by removing the identity of the nodes is not sufficient to preserve users’ privacy. In order to deal with malicious attacks, k -anonymity solutions have been proposed to partially obfuscate topological information that can be used to infer nodes’ identity. In this paper, we study the problem of ensuring k anonymity in time-varying graphs, i.e., graphs with a structure that changes over time, and multi-layer graphs, i.e., graphs with multiple types of links. More specifically, we examine the case in which the attacker has access to the degree of the nodes. The goal is to generate a new graph where, given the degree of a node in each (temporal) layer of the graph, such a node remains indistinguishable from other k-1 nodes in the graph. In order to achieve this, we find the optimal partitioning of the graph nodes such that the cost of anonymizing the degree information within each group is minimum. We show that this reduces to a special case of a Generalized Assignment Problem, and we propose a simple yet effective algorithm to solve it. Finally, we introduce an iterated linear programming approach to enforce the realizability of the anonymized degree sequences. The efficacy of the method is assessed through an extensive set of experiments on synthetic and real-world graphs.
Resumo:
This paper looks at the issue of privacy and anonymity through the prism of Scott's concept of legibility i.e. the desire of the state to obtain an ever more accurate mapping of its domain and the actors in its domain. We argue that privacy was absent in village life in the past, and it has arisen as a temporary phenomenon arising from the lack of appropriate technology to make all life in the city legible. Cities have been the loci of creativity for the major part of human civilisation. There is something specific about the illegibility of cities which facilitates creativity and innovation. By providing the technology to catalogue and classify all objects and ideas around us, this leads to a consideration of semantic web technologies, Linked Data and the Internet of Things as unwittingly furthering this ever greater legibility. There is a danger that the over description of a domain will lead to a loss in creativity and innovation. We conclude by arguing that our prime concern must be to preserve illegibility because the survival of some form, any form, of civilisation depends upon it.
Resumo:
The paper attempts to develop a suitable accessibility index for networks where each link has a value such that a smaller number is preferred like distance, cost, or travel time. A measure called distance sum is characterized by three independent properties: anonymity, an appropriately chosen independence axiom, and dominance preservation, which requires that a node not far to any other is at least as accessible. We argue for the need of eliminating the independence property in certain applications. Therefore generalized distance sum, a family of accessibility indices, will be suggested. It is linear, considers the accessibility of vertices besides their distances and depends on a parameter in order to control its deviation from distance sum. Generalized distance sum is anonymous and satisfies dominance preservation if its parameter meets a sufficient condition. Two detailed examples demonstrate its ability to reflect the vulnerability of accessibility to link disruptions.
Resumo:
Business angels are natural persons who provide equity financing for young enterprises and gain ownership in them. They are usually anonym investors and they operate in the background of the companies. Their important feature is that over the funding of the enterprises based on their business experiences they can contribute to the success of the companies with their special expertise and with strategic support. As a result of the asymmetric information between the angels and the companies their matching is difficult (Becsky-Nagy – Fazekas 2015), and the fact, that angel investors prefer anonymity makes it harder for entrepreneurs to obtain informal venture capital. The primary aim of the different type of business angel organizations and networks is to alleviate this matching process with intermediation between the two parties. The role of these organizations is increasing in the informal venture capital market compared to the individually operating angels. The recognition of their economic importance led many governments to support them. There were also public initiations that aimed the establishment of these intermediary organizations that led to the institutionalization of business angels. This study via the characterization of business angels focuses on the progress of these informational intermediaries and their ways of development with regards to the international trends and the current situation of Hungarian business angels and angel networks.
Resumo:
One of the main factors that makes the poetry of the Argentine Alberto Girri (1919–1991) a whole world of its own is my argument that in a fragmentary world like the present, poets search for a formal integrity which in the act of reading creates not only their own inner world but also the readers'. It is important to insist on this turning point in which most of the Symbolist work is circumscribed. Later, this would be of capital importance for the avant-garde as well as for the post-avant-garde: Mallarmé's Un coup de dés jamais n'abolira le hasard would make poetry something absolutely modern. An original distribution of the white and black opened a new space for the text, shifting the then dominant phonocentrism. My close reading of this author as well as the given theoretical frame avoids the failure into an instrumental use either of the page or of the writing but ignoring physical reciprocity. What follows is, that this “shift” privileged heightened vision over audition of the “musical score”. Thus, an intense materialization of the language is achieved that increases the anonymity of the text. ^ Following this new arrangement of words, so to speak, Girri's poetic work now drives deeply inside words in order to lend them dignity from meaning. I conclude that the best way to “render” this poetry with religious aim (L. “re-ligare” to bind the fragmented) is by way of the philosophy of language. I also propose that Girri's task as a translator, mainly from English poetry, represented—with Jorge Luis Borges—a paradigmatic shift in the Spanish American horizon which had been under “logocentric” French rule since the time of Independence. This seismic change of perspective in late Modernism and post-Modernism is represented by a radical screening of Romance rhetoric, it was a shift not only over the inherited mother tongue but over his own work which was increasingly moving towards transcendent and/or metaphysical poetry. ^ Therefore, I did find that Girri's poem was constructed as a mirror closely related to that which was represented in the angelological tradition. ^