995 resultados para Computer crimes - Prevention


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper grapples with the question of how progressive criminologists might approach working with people who have committed violent or predatory crimes, or are ‘at risk’ of doing so. Progressives have often been uneasy about ‘intervention’ with people who offend: but in the face of the destructiveness of violence, especially in some parts of the world, a posture of simple non-intervention won’t suffice. I suggest three central principles – which I call consciousness, solidarity and hope – that may guide us in developing ways of working with offenders that are both progressive and effective.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a distributed communication based active power curtailment (APC) control scheme for grid connected photovoltaic (PV) systems to address voltage rise. A simple distribution feeder model is presented and simulated using MATLAB. The resource sharing based control scheme proposed is shown to be effective at reducing voltage rise during times of peak generation and low load. Simulations also show the even distribution of APC using simple communications. Simulations demonstrate the versatility of the proposed control method under major communication failure conditions. Further research may lead to possible applications in coordinated electric vehicle (EV) charging.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Phishing is deceptive collection of personal information leading to embezzlement, identity theft, and so on. Preventive and combative measures have been taken by banking institutions, software vendors, and network authorities to fight phishing. At the forefront of this resilience are consortiums such as APWG (Anti-Phishing Working Group) and PhishTank, the latter being a collaborative platform where everyone can submit potentially phishing web-pages and classify web-pages as either phish or genuine. PhishTank also has an API that the browsers use to notify users when she tries to load a phishing page. There are some organizations and individuals who are very active and highly accurate in classifying web-pages on PhishTank. In this paper, we propose a defense model that uses these experts to fight phishing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention is given in the context of different strategies applied by cheaters.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objective. To test the impact of a theory-based, SMS (text message)-delivered behavioural intervention (Healthy Text) targeting sun protection or skin self-examination behaviours compared to attention-control. Method. Overall, 546 participants aged 18–42 years were randomised using a computer-generated number list to the skin self-examination (N = 176), sun protection (N = 187), or attention-control (N = 183) text messages group. Each group received 21 text messages about their assigned topic over 12 months (12 weekly messages for three months, then monthly messages for the next nine months). Data was collected via telephone survey at baseline, three-, and 12-months across Queensland from January 2012 to August 2013. Results. One year after baseline, the sun protection (mean change 0.12; P = 0.030) and skin self-examination groups (mean change 0.12; P = 0.035) had significantly greater improvement in their sun protection habits (SPH) index compared to the attention-control group (reference mean change 0.02). The increase in the proportion of participants who reported any skin self-examination from baseline to 12 months was significantly greater in the skin self-examination intervention group (103/163; 63%; P < 0.001) than the sun protection (83/173; 48%), or attention-control (65/165; 36%) groups. There was no significant effect of the intervention for participants who self-reported whole-body skin self-examination, sun tanning behaviour, or sunburn behaviours. Conclusion. The Healthy Text intervention was effective in inducing significant improvements in sun protection and any type of skin self-examination behaviours.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Overvoltage and overloading due to high utilization of PVs are the main power quality concerns for future distribution power systems. This paper proposes a distributed control coordination strategy to manage multiple PVs within a network to overcome these issues. PVs reactive power is used to deal with over-voltages and PVs active power curtailment are regulated to avoid overloading. The proposed control structure is used to share the required contribution fairly among PVs, in proportion to their ratings. This approach is examined on a practical distribution network with multiple PVs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dissertação apresentada à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Criminologia

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Predictability — the ability to foretell that an implementation will not violate a set of specified reliability and timeliness requirements - is a crucial, highly desirable property of responsive embedded systems. This paper overviews a development methodology for responsive systems, which enhances predictability by eliminating potential hazards resulting from physically-unsound specifications. The backbone of our methodology is a formalism that restricts expressiveness in a way that allows the specification of only reactive, spontaneous, and causal computation. Unrealistic systems — possessing properties such as clairvoyance, caprice, infinite capacity, or perfect timing — cannot even be specified. We argue that this "ounce of prevention" at the specification level is likely to spare a lot of time and energy in the development cycle of responsive systems - not to mention the elimination of potential hazards that would have gone, otherwise, unnoticed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The International Court of Justice has issued its long-awaited decision in the suit filed by Bosnia and Herzegovina against Serbia and Montenegro with respect to the 1992–1995 war. The decision confirms the factual and legal determinations of the International Criminal Tribunal for the former Yugoslavia, ruling that genocide was committed during the Srebrenica massacre in July 1995 but that the conflict as a whole was not genocidal in nature. The Court held that Serbia had failed in its duty to prevent genocide in Srebrenica, although—because, the Court said, there was no certainty that it could have succeeded in preventing the genocide—no damages were awarded. The judgment provides a strong and authoritative statement of the general duty upon states to prevent genocide that dovetails well with the doctrine of the responsibility to protect.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: Lipid-lowering therapy is costly but effective at reducing coronary heart disease (CHD) risk. OBJECTIVE: To assess the cost-effectiveness and public health impact of Adult Treatment Panel III (ATP III) guidelines and compare with a range of risk- and age-based alternative strategies. DESIGN: The CHD Policy Model, a Markov-type cost-effectiveness model. DATA SOURCES: National surveys (1999 to 2004), vital statistics (2000), the Framingham Heart Study (1948 to 2000), other published data, and a direct survey of statin costs (2008). TARGET POPULATION: U.S. population age 35 to 85 years. Time Horizon: 2010 to 2040. PERSPECTIVE: Health care system. INTERVENTION: Lowering of low-density lipoprotein cholesterol with HMG-CoA reductase inhibitors (statins). OUTCOME MEASURE: Incremental cost-effectiveness. RESULTS OF BASE-CASE ANALYSIS: Full adherence to ATP III primary prevention guidelines would require starting (9.7 million) or intensifying (1.4 million) statin therapy for 11.1 million adults and would prevent 20,000 myocardial infarctions and 10,000 CHD deaths per year at an annual net cost of $3.6 billion ($42,000/QALY) if low-intensity statins cost $2.11 per pill. The ATP III guidelines would be preferred over alternative strategies if society is willing to pay $50,000/QALY and statins cost $1.54 to $2.21 per pill. At higher statin costs, ATP III is not cost-effective; at lower costs, more liberal statin-prescribing strategies would be preferred; and at costs less than $0.10 per pill, treating all persons with low-density lipoprotein cholesterol levels greater than 3.4 mmol/L (>130 mg/dL) would yield net cost savings. RESULTS OF SENSITIVITY ANALYSIS: Results are sensitive to the assumptions that LDL cholesterol becomes less important as a risk factor with increasing age and that little disutility results from taking a pill every day. LIMITATION: Randomized trial evidence for statin effectiveness is not available for all subgroups. CONCLUSION: The ATP III guidelines are relatively cost-effective and would have a large public health impact if implemented fully in the United States. Alternate strategies may be preferred, however, depending on the cost of statins and how much society is willing to pay for better health outcomes. FUNDING: Flight Attendants' Medical Research Institute and the Swanson Family Fund. The Framingham Heart Study and Framingham Offspring Study are conducted and supported by the National Heart, Lung, and Blood Institute.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

réalisée en cotutelle entre les Universités de Montréal et de Paris 1 Panthéon-Sorbonne (France)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Il existe des associations entre les bars de danse érotique et les activités illicites, dans les écrits journalistiques et scientifiques. Nous avons vérifié ces associations en menant une description des crimes et déviances associés aux bars de danse érotique. Puis, nous avons tenté d’expliquer l’organisation et la structure de ces crimes, en nous appuyant sur l’approche du crime organisant et la théorie de l’écosystème du crime, de Felson (2006). Des entretiens semi-dirigés ont été conduits avec dix femmes danseuses, une femme shooter girl, un propriétaire, un portier et deux clients. Une analyse thématique à deux niveaux a montré que les délits se rapportent aux stupéfiants, à la prostitution, au proxénétisme, aux déviances, et à divers actes de violence. Des distinctions importantes, quant au contrôle selon les établissements sont notées. La structure et l’organisation des crimes peuvent s’expliquer par une logique propre aux relations symbiotiques et interdépendantes, tel que le suggère la théorie de l’écosystème du crime de Felson. Ainsi, la structure des délits peut prendre une forme mutualiste ou parasitaire. L’interrelation propre au neutralisme explique l’organisation générale de ces délits. Le milieu criminogène de la danse érotique offre de multiples opportunités, qui seront saisies par les acteurs motivés, en vue de réaliser un bénéfice personnel. Deux constats étonnants : les données suggèrent que l’implication des organisations criminelles est relativement limitée; et les conséquences occasionnées par les activités du milieu présentent un caractère inquiétant, particulièrement pour les femmes. Des efforts en matière de prévention situationnelle seraient appropriés pour réduire les opportunités.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Esta dissertação teve como diretriz principal percecionar até que ponto a educação se torna eficaz como política pública capaz de ajudar a enfrentar a criminalidade. Tal enfrentamento ocorre por dois vieses distintos; O primeiro tem caráter mais preventivo, de modo que a educação tem sua atuação voltada à prevenção da criminalidade; enquanto o segundo viés consiste em prevenir a reincidência criminal com a aplicação de políticas educativas a apenados. Neste trabalho de investigação realizou-se uma breve revisão bibliográfica, abrangendo alguns autores teóricos que enfatizaram como se dá o processo de aquisição e desenvolvimento do conhecimento no indivíduo, dentre os quais constam: Descartes, Rousseau, Kant, além de Piaget e Vygotsky. A pesquisa consistiu em levantamento nos processos julgados pela comarca de João Pessoa do Tribunal do Júri no ano de 2011, a fim de verificar o grau de escolaridade dos réus, bem como no Estabelecimento Prisional, com vistas a levantamentos sobre a reincidência criminal. Os resultados da pesquisa demonstraram que é latente a eficácia da educação como política pública de combate a criminalidade. Foi apurada também, a enorme economia financeira que produziria uma maior concentração de investimentos educativos em detrimento de investimentos em segurança pública.