833 resultados para Crimes in Internet


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reports findings from a study of user behaviours and intentions towards online news and information in Australia, undertaken by the Queensland University of Technology Creative Industries Faculty and the Smart Services Cooperative Research Centre. It has used a literature review, online survey, focus groups and interviews to explore attitudes and behaviours towards online news and information. The literature review on consumer user of online media highlighted emerging technical opportunities, and flagged existing barriers to access experienced by consumers in the Australian digital media sector. The literature review highlighted multiple disconnects between consumer interests in online news and their ability to fulfil them. This presents an opportunity for news entities to appraise and resolve. Doing so may enhance their service offering, attract consumers and improve loyalty. These themes were further explored by the survey. The survey results revealed three typologies of user, described as ‘convenience’, ‘loyal’ and ‘customising’. Convenience users tend to access news by default, for example when they log out of email. Loyal users seek out a trusted brand such as mainstream news mastheads. Customising users tend to tailor news to their preferences, and be the first to use leading edge media. Respondents to the survey were then invited to participate in focus groups, which aimed to test the survey results. Consumer perceptions and attitudes are important factors in progression towards an information economy, because ultimately consumers are customers. By segmenting the online news market according to customer typology, media providers may identify new opportunities to attract and retain customers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In Orissa state, India, the DakNet system supports asynchronous Internet communication between an urban hub and rural nodes. DakNet is noteworthy in many respects, not least in how the system leverages existing transport infrastructure. Wi-Fi transceivers mounted on local buses send and receive user data from roadside kiosks, for later transfer to/from the Internet via wireless protocols. This store-and-forward system allows DakNet to offer asynchronous communication capacity to rural users at low cost. The original ambition of the DakNet system was to provide email and SMS facilities to rural communities. Our 2008 study of the communicative ecology surrounding the DakNet system revealed that this ambition has now evolved – in response to market demand – to the extent that e-shopping (rather than email) has become the primary driver behind the DakNet offer.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article surveys literature bearing on the issue of parental liability and responsibility for the crimes of young offenders, with a particular focus on comparing different approaches to dealing with the issue in Australia and Canada. This comparative analysis of Australian and Canadian legislative and policy approaches is situated within a broader discussion of arguments about the “punitive turn” in youth justice, responsibilisation, and cross-jurisdictional criminal justice policy transfer and convergence. Our findings suggest that there are significant differences in the manner and extent to which Australia and Canada have invoked parental responsibility laws and policies as part of the solution to dealing with youth crime. We conclude by speculating on some of the reasons for these differences and establishing an agenda for additional needed cross-jurisdictional research. In particular, we argue that it would be fruitful to undertake a cross-jurisdictional study that examines the development and effects of parental responsibility laws across a larger number of different Western countries as well as across individual states and provinces within these national jurisdictions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This document describes algorithms based on Elliptic Cryptography (ECC) for use within the Secure Shell (SSH) transport protocol. In particular, it specifies Elliptic Curve Diffie-Hellman (ECDH) key agreement, Elliptic Curve Menezes-Qu-Vanstone (ECMQV) key agreement, and Elliptic Curve Digital Signature Algorithm (ECDSA) for use in the SSH Transport Layer protocol.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The realities of new technological and social conditions since the 1990s demand a new approach to literacy teaching. Looking onward from the original statement of aims of the multiliteracies movement in 1996, this volume brings together top-quality scholarship and research that has embraced the notion and features new contributions by many of the originators of this approach to literacy. Drawing on large research projects and empirical evidence, the authors explore practical and educational issues that relate to multiliteracies, such as assessment, pedagogy and curriculum. The viewpoint taken is that multiliteracies is a complementary socio-cultural approach to the new literacies that includes pedagogy and learning. The differences are addressed from a multiliteracies perspective – one that does not discount or undermine the new literacies, but shows new ways in which they are complementary. Computers and the Internet are transforming the way we work and communicate and the very notion of literacy itself. This volume offers frontline information and a vital update for those wishing to understand the evolution of multiliteracies and the current state of literacy theory in relation to it.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"This book focuses on issues in literacy and technology at the K-12 level in a holistic manner so that the needs of teachers and researchers can be addressed through the use of state-of-the-art perspectives"

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this article we survey relevant international literature on the issue of parental liability and responsibility for the crimes of young offenders. In addition, as a starting point for needed cross-jurisdictional research, we focus on different approaches that have been taken to making parents responsible for youth crime in Australia and Canada. This comparative analysis of Australian and Canadian legislative and policy approaches is situated within a broader discussion of arguments about parental responsibility, the ‘punitive turn’ in youth justice, and cross-jurisdictional criminal justice policy transfer and convergence. One unexpected finding of our literature survey is the relatively sparse attention given to the issue of parental responsibility for youth crime in legal and criminological literature compared to the attention it receives in the media and popular-public culture. In Part I we examine the different views that have been articulated in the social science literature for and against parental responsibility laws, along with arguments that have been made about why such laws have been enacted in an increasing number of Western countries in recent years. In Part II, we situate our comparative study of Australian and Canadian legislative and policy approaches within a broader discussion of arguments about the ‘punitive turn’ in youth justice, responsibilisation, and cross-jurisdictional criminal justice policy transfer and convergence. In Part III, we identify and examine the scope of different parental responsibility laws that have been enacted in Australia and Canada; noting significant differences in the manner and extent to which parental responsibility laws and policies have been invoked as part of the solution to dealing with youth crime. In our concluding discussion, in Part IV, we try to speculate on some of the reasons for these differences and set an agenda for needed future research on the topic.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper you will be introduced to a number of principles which can be used to inform good teaching practice and rigorous curriculum design. Principles relate to: * Application of a common sequence of events for how learners learn; * Accommodating different learning styles; * Adopting a purposeful approach to teaching and learning; * Using assessment as a central driving force in the curriculum and as an organising structure leading to coherence of teaching and learning approach; and * The increasing emphasis that is being placed on the development of generic graduate competencies over and above discipline content knowledge. The principles are particularly significant in relation to adult learning. The paper will use three specific applications as illustrations to help you to learn how these principles can be applied. The illustrations are taken from a second year subject in supercomputing that uses scientific case studies. The subject has been developed (with support from Silicon Graphics Inc. and Intel) to be taught entirely via the Internet.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The internet infrastructure which supports high data rates has a major impact on the Australian economy and the world. However, in rural Australia, the provision of broadband services to an internet dispersed population over a large geographical area with low population densities remains both an economic and technical challenge [1]. Furthermore, the implementation of currently available technologies such as fibre-to-the-premise (FTTP), 3G, 4G and WiMAX seems to be impractical, considering the low population density that is distributed in a large area. Therefore, new paradigms and innovative telecommunication technologies need to be explored to overcome the challenges of providing faster and more reliable broadband internet services to internet dispersed rural areas. The research project implements an innovative Multi-User- Single-Antenna for MIMO (MUSA-MIMO) technology using the spectrum currently allocated to analogue TV. MUSAMIMO technology can be considered as a special case of MIMO technology, which is beneficial when provisioning reliable and high-speed communication channels. Particularly, the abstract describes the development of a novel MUSA-MIMO channel model that takes into account temporal variations in the rural wireless environment. This can be considered as a novel approach tailor-made to rural Australia for provisioning efficient wireless broadband communications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

High-speed broadband internet access is widely recognised as a catalyst to social and economic development, having a significant impact on global economy. Rural Australia’s inherent dispersed population over a large geographical area make the delivery of efficient, well-maintained and cost-effective internet a challenging task. The novel and highly-efficient Multi-User-Single-Antenna for MIMO (MUSA-MIMO) broadband wireless communication technology can effectively be used to deliver wireless broadband access to rural areas. This research aims to develop for the first time, an efficient and accurate algorithm for the tracking and prediction of Channel State Information (CSI) at the transmitter, by characterising time variation effects of the wireless communication channel on the performance of a highly-efficient MUSA-MIMO technology particularly suited for rural communities, improving their quality of life and economic prosperity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As part of the first-ever World Journalism Education Congress (WJEC), attracting 440 journalism and mass communication educators and professionals from 44 countries, and held in Singapore on June 26-28, 2007, panelists Alan Knight, Cherian George, and Alex Gerlis presented a lively debate on “Who Is a Journalist.” Knight argued that Journalism paradigms are in transition. Bloggers are providing competition through their often eye-witness reports. Quality blogs are influencing journalism practices. Knight argued that journalists must adapt to and embrace the Internet. Gerlis proposed that when we now ask “Who Is a Journalist”, the answer is no longer anyone who is employed as journalist. The answer is that potentially, anyone and everyone can be a journalist. George warns again uncritically invoking professional standards as the dividing line that separates journalists from non-journalists

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Official rates of female delinquency have been rising steadily in countries such as Australia, England, Canada and the United States since the 1960s. They have also generally been rising at a rate faster than that for boys. As yet there is little consensus about the reasons for these rises or even whether such rate rises reflect any real increase in female delinquency at all. Against this backdrop of rising official crimes rates for young women, this article revisits the various criminological explanations for these trends.