833 resultados para Crimes in Internet
Resumo:
In late 2009, Sandra Haukka secured funding from the auDA Foundation to explore what older Australians who never or rarely use the Internet (referred to as ‘non-users’) know about the types of online products and services available to them, and how they might use these products and services to improve their daily life. This project aims to support current and future strategies and initiatives by: 1) exploring the extent to which non-users are aware of the types and benefits of online products and services, (such as e-shopping, e-banking, e-health, social networking, and general browsing and research) as well as their interest in them b) identifying how the Internet can improve the daily life of older Australians c) reviewing the effectiveness of support and services designed to educate and encourage older people to engage with the Internet d) recommending strategies that aim to raise non-user awareness of current and emerging online products and services, and provide non-users with the skills and knowledge needed to use those products and services that they believe can improve their daily life. The Productive Ageing Centre at National Seniors Australia, and Professor Trevor Barr from Swinburne University provided the project with in-kind support.
Resumo:
eZine and iRadio represent metaphors for multimedia communication on the Internet. Participating students experience a simulated Internet publishing environment in both their classroom and virtual learning environment. This chapter presents an autoethnographic account highlighting the voices of the learning designer and the teacher and provides evidence of the planning and implementation of two tertiary music elective courses over three iterations of each course. A blended learning environment was incorporated within each elective music course and a collaborative approach to development between lecturers, tutors, learning and technological designers using an iterative research design. The research suggests that learning design which provides real world examples and resources integrating authentic task design into their unit can provide meaningful and engaging experiences for students. The dialogue between learning designers and teachers and iterative review of the learning process and student outcomes, we believe, has engaged students meaningfully to achieve transferable learning outcomes.
Resumo:
In an attempt to curb online copyright infringement, copyright owners are increasingly seeking to enlist the assistance of Internet Service Providers (‘ISPs’) to enforce copyright and impose sanctions on their users.1 Commonly termed ‘graduated response’ schemes, these measures generally require that the ISP take some action against users suspected of infringing copyright, ranging from issuing warnings, to collating allegations made against subscribers and reporting to copyright owners, to suspension and eventual termination of service.
Resumo:
The aim of this work is to develop a Demand-Side-Response (DSR) model, which assists electricity end-users to be engaged in mitigating peak demands on the electricity network in Eastern and Southern Australia. The proposed innovative model will comprise a technical set-up of a programmable internet relay, a router, solid state switches in addition to the suitable software to control electricity demand at user's premises. The software on appropriate multimedia tool (CD Rom) will be curtailing/shifting electric loads to the most appropriate time of the day following the implemented economic model, which is designed to be maximizing financial benefits to electricity consumers. Additionally the model is targeting a national electrical load be spread-out evenly throughout the year in order to satisfy best economic performance for electricity generation, transmission and distribution. The model is applicable in region managed by the Australian Energy Management Operator (AEMO) covering states of Eastern-, Southern-Australia and Tasmania.
Resumo:
This chapter will begin by considering some of the distinctive features of media as creative industries, including their assessment of risk and return on investment, team-based production, the management of creativity, the value chain of production, distribution and circulation, and the significance of intellectual property in their revenue strategies. It will then critically appraise three strategies to capture new markets and revenue streams in the context of the rise of the Internet, digital media and globally networked distribution. The three strategies to be considered are conglomeration, networking and globalization, and the focus will be on the media giants such as News Corporation, Disney and Time-Warner. It will be argued that all three present considerable challenges in their application, and digital media technologies are weakening rather than strengthening their capacity to control the global media environment. The chapter will conclude with consideration of some implications of this analysis for questions of media power.
Resumo:
People all over the world are regularly hit by floods, cyclones, and other natural disasters. Many use smart phones and social media to stay connected, seek help, improvise, and cope with crises or challenging situations. This column discusses these practices after dark or during disasters to unveil challenges and opportunities for innovative designs that increase resilience and safety.
Resumo:
As the use of Twitter has become more commonplace throughout many nations, its role in political discussion has also increased. This has been evident in contexts ranging from general political discussion through local, state, and national elections (such as in the 2010 Australian elections) to protests and other activist mobilisation (for example in the current uprisings in Tunisia, Egypt, and Yemen, as well as in the controversy around Wikileaks). Research into the use of Twitter in such political contexts has also developed rapidly, aided by substantial advancements in quantitative and qualitative methodologies for capturing, processing, analysing, and visualising Twitter updates by large groups of users. Recent work has especially highlighted the role of the Twitter hashtag – a short keyword, prefixed with the hash symbol ‘#’ – as a means of coordinating a distributed discussion between more or less large groups of users, who do not need to be connected through existing ‘follower’ networks. Twitter hashtags – such as ‘#ausvotes’ for the 2010 Australian elections, ‘#londonriots’ for the coordination of information and political debates around the recent unrest in London, or ‘#wikileaks’ for the controversy around Wikileaks thus aid the formation of ad hoc publics around specific themes and topics. They emerge from within the Twitter community – sometimes as a result of pre-planning or quickly reached consensus, sometimes through protracted debate about what the appropriate hashtag for an event or topic should be (which may also lead to the formation of competing publics using different hashtags). Drawing on innovative methodologies for the study of Twitter content, this paper examines the use of hashtags in political debate in the context of a number of major case studies.
Resumo:
Innovation is vital for the future of Australia.s internet economy. Innovations rely on businesses. ability to innovate. Businesses. ability to innovate relies on their employees. The more these individual end users engage in the internet economy, the better businesses. engagement will be. The less these individual end users engage, the less likely a business is to engage and innovate. This means, for the internet economy to function at its fullest potential, it is essential that individual Australians have the capacity to engage with it and participate in it. The Australian federal government is working to facilitate the internet economy through policies, legislation and practices that implement high-speed broadband. The National Broadband Network will be a vital tool for Australia.s internet economy. Its .chief importance¡® is that it will provide faster internet access speeds that will facilitate access to internet services and content. However, an appropriate infrastructure and internet speed is only part of the picture. As the Organisation for Economic Co-operation and Development identified, appropriate government policies are also needed to ensure that vital services are more accessible by consumers. The thesis identifies essential theories and principles underpinning the internet economy and from which the concept of connectedness is developed. Connectedness is defined as the ability of end users to connect with internet content and services, other individuals and organisations, and government. That is, their ability to operate in the internet economy. The NBN will be vital in ensuring connectedness into the future. What is not currently addressed by existing access regimes is how to facilitate end user access capacity and participation. The thesis concludes by making recommendations to the federal government as to what the governing principles of the Australian internet economy should include in order to enable individual end user access capacity.
Resumo:
Social networks have proven to be an attractive avenue of investigation for researchers since humans are social creatures. Numerous literature have explored the term “social networks” from different perspectives and in diverse research fields. With the popularity of the Internet, social networking has taken on a new dimension. Online social communities therefore have become an emerging social avenue for people to communicate in today’s information age. People use online social communities to share their interests, maintain friendships, and extend their so-called circle of “friends”. Likewise, social capital, also known as human capital, is an important theory in sociology. Researchers usually utilise social capital theory when they investigate the topic relating to social networks. However, there is little literature that can provide an explicit and strong assertion in that research area due to the complexity of social capital. This thesis therefore focuses on the issue related to providing a better understanding about the relationship between social capital and online social communities. To enhance the value within the scope of this analysis, an online survey was conducted to examine the effects of the dimensions of social capital: relational capital, structural capital, and cognitive capital, determining the intensity of using online social communities. The data were derived from a total of 350 self-selected respondents completing an online survey during the research period. The main results indicate that social capital exists in online social communities under normal circumstances. Finally, this thesis also presents three contributions for both theory and practice in Chapter 5. The main results contribute to the understanding of connectivity in the interrelationships between individual social capital exchange within online social networks. Secondly, social trust was found to have a weak effect in influencing the intensity of individuals using online social communities. Third, the perpetual role of information sharing has an indirect influence on individual users participating in online social communities. This study also benefits online marketing consultants as marketers can not only gain consumer information easier from online social communities but also this understanding assists in designing effective communication within online social communities. The cross-sectional study, the reliability of Internet survey data, and sampling issues are the major three limitations in this research. The thesis provides a new research model and recommends that the mediating effects, privacy paradox, and social trust on online social communities should be further explored in future research.
Resumo:
We explored common reasons for non-use of the rapidly growing popularity of social networking sites among a sample of Australian adolescents (N = 69). Transcripts were coded by grouping responses along similar themes for non-use that had been commonly stated by participants. The primary reasons offered by adolescents were: lack of motivation, poor use of time, preference for other forms of communication, preference for engaging in other activities, cybersafety concerns, and a dislike of self-presentation online. The identification of these themes allows for a greater understanding of teenagers' decisions not to engage in the popular medium of communication and points to possible strategies that could be utilised by Web site developers in efforts to appeal to a wider teenage audience.
Resumo:
With the growth and development of communication technology there is an increasing need for the use of interception technologies in modern policing. Law enforcement agencies are faced with increasingly sophisticated and complex criminal networks that utilise modern communication technology as a basis for their criminal success. In particular, transnational organised crime (TOC) is a diverse and complicated arena, costing global society in excess of $3 trillion annually, a figure that continues to grow (Borger, 2007) as crime groups take advantage of disappearing borders and greater profit markets. However, whilst communication can be a critical success factor for criminal enterprise it is also a key vulnerability. It is this vulnerability that the use of CIT, such as phone taps or email interception, can exploit. As such, law enforcement agencies now need a method and framework that allows them to utilise CIT to combat these crimes efficiently and successfully. This paper provides a review of current literature with the specific purpose of considering the effectiveness of CIT in the fight against TOC and the groundwork that must be laid in order for it to be fully exploited. In doing so, it fills an important gap in current research, focusing on the practical implementation of CIT as opposed to the traditional area of privacy concerns that arise with intrusive methods of investigation. The findings support the notion that CIT is an essential intelligence gathering tool that has a strong place within the modern policing arena. It identifies that the most effective use of CIT is grounded within a proactive, intelligence‐led framework and concludes that in order for this to happen Australian authorities and law enforcement agencies must re‐evaluate and address the current legislative and operational constraints placed on the use of CIT and the culture that surrounds intelligence in policing.
Resumo:
The Web has become a worldwide repository of information which individuals, companies, and organizations utilize to solve or address various information problems. Many of these Web users utilize automated agents to gather this information for them. Some assume that this approach represents a more sophisticated method of searching. However, there is little research investigating how Web agents search for online information. In this research, we first provide a classification for information agent using stages of information gathering, gathering approaches, and agent architecture. We then examine an implementation of one of the resulting classifications in detail, investigating how agents search for information on Web search engines, including the session, query, term, duration and frequency of interactions. For this temporal study, we analyzed three data sets of queries and page views from agents interacting with the Excite and AltaVista search engines from 1997 to 2002, examining approximately 900,000 queries submitted by over 3,000 agents. Findings include: (1) agent sessions are extremely interactive, with sometimes hundreds of interactions per second (2) agent queries are comparable to human searchers, with little use of query operators, (3) Web agents are searching for a relatively limited variety of information, wherein only 18% of the terms used are unique, and (4) the duration of agent-Web search engine interaction typically spans several hours. We discuss the implications for Web information agents and search engines.