875 resultados para illegal arms trafficking


Relevância:

10.00% 10.00%

Publicador:

Resumo:

‘Hooning’ constitutes a set of illegal and high-risk vehicle related activities typically performed by males aged 17-25, a group that is over-represented in road trauma statistics. This study used an online survey of 422 participants to test the efficacy of the Five Factor Model of Personality in predicting ‘loss of traction’ (LOT) hooning behaviour. Drivers who engaged in LOT behaviour scored significantly lower on the factor of Agreeableness than those who did not. Regression analyses indicated that the Five Factor Model of Personality was a significant predictor of LOT behaviour over and above sex and age, although Agreeableness was the only significant personality factor in the model. The findings may be used to better understand those drivers likely to engage in LOT behaviours. Road safety advertising and educational campaigns can target less socially agreeable drivers, and aim to encourage more agreeable attitudes to driving, particularly for younger male drivers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The broad objective of this study was to understand the incidence and severity of aggression among sexually abused girls who were trafficked and who were then further used for commercial sexual exploitation (referred to subsequently as sexually abused trafficked girls). In addition, the impact of counseling for minimizing aggression in these girls was investigated. A group of 120 sexually abused trafficked Indian girls and a group of 120 nonsexually abused Indian girls, aged 13 to 18, participated in the study. The sexually abused trafficked girls were purposively selected from four shelters located in and around Kolkata, India. The nonsexually abused girls were selected randomly from four schools situated near the shelters, and these girls were matched by age with the sexually abused trafficked girls. Data were collected using a Background Information Schedule and a standardized psychological test, that is, The Aggression Scale. Results revealed that 16.7% of the girls were first sexually abused between 6 and 9 years of age, 37.5% between 10 and 13 years of age, and 45.8% between 14 and 17 years of age. Findings further revealed that 4.2% of the sexually abused trafficked girls demonstrated saturated aggression, and 26.7% were highly aggressive, that is, extremely frustrated and rebellious. Across age groups, the sexually abused trafficked girls suffered from more aggression (p < .05), compared with the nonvictimized girls. Psychological interventions, such as individual and group counseling, were found to have a positive impact on the sexually abused trafficked girls. These findings should motivate counselors to deal with sexually abused children. It is also hoped that authorities in welfare homes will understand the importance of counseling for sexually abused trafficked children, and will appoint more counselors for this purpose.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Despite the recognition of obesity in young people as a key health issue, there is limited evidence to inform health professionals regarding the most appropriate treatment options. The Eat Smart study aims to contribute to the knowledge base of effective dietary strategies for the clinical management of the obese adolescent and examine the cardiometablic effects of a reduced carbohydrate diet versus a low fat diet. Methods and design Eat Smart is a randomised controlled trial and aims to recruit 100 adolescents over a 2½ year period. Families will be invited to participate following referral by their health professional who has recommended weight management. Participants will be overweight as defined by a body mass index (BMI) greater than the 90th percentile, using CDC 2000 growth charts. An accredited 6-week psychological life skills program ‘FRIENDS for Life’, which is designed to provide behaviour change and coping skills will be undertaken prior to volunteers being randomised to group. The intervention arms include a structured reduced carbohydrate or a structured low fat dietary program based on an individualised energy prescription. The intervention will involve a series of dietetic appointments over 24 weeks. The control group will commence the dietary program of their choice after a 12 week period. Outcome measures will be assessed at baseline, week 12 and week 24. The primary outcome measure will be change in BMI z-score. A range of secondary outcome measures including body composition, lipid fractions, inflammatory markers, social and psychological measures will be measured. Discussion The chronic and difficult nature of treating the obese adolescent is increasingly recognised by clinicians and has highlighted the need for research aimed at providing effective intervention strategies, particularly for use in the tertiary setting. A structured reduced carbohydrate approach may provide a dietary pattern that some families will find more sustainable and effective than the conventional low fat dietary approach currently advocated. This study aims to investigate the acceptability and effectiveness of a structured reduced dietary carbohydrate intervention and will compare the outcomes of this approach with a structured low fat eating plan. Trial Registration: The protocol for this study is registered with the International Clinical Trials Registry (ISRCTN49438757).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The efficacy of road safety countermeasures to deter motorists from engaging in illegal behaviours is extremely important when considering the personal and economic impact of road accidents on the community. Within many countries, deterrence theory has remained a cornerstone to criminology and criminal justice policy, particularly within the field of road safety, as policy makers and enforcement agencies attempt to increase perceptions regarding the certainty, severity and swiftness of sanctions for those who engage in illegal motoring behaviours. Using the Australian experience (particularly the tremendous amount of research into drink driving), the current paper reviews the principles underpinning deterrence theory, the utilisation of the approach within some contemporary road safety initiatives (e.g., Random Breath Testing) as well as highlights some methods to enhance a deterrent effect. The paper also provides direction for future deterrence-based research, in particular, considering the powerful impact of non-legal sanctions, punishment avoidance as well as creating culturally embedded behavioural change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores the interplay between individual values, espoused organisational values and the values of the organisational culture in practice in light of a recent Royal Commission in Queensland, Australia, which highlighted systematic failures in patient care. The lack of congruence among values at these levels impacts upon the ethical decision making of health managers. The presence of institutional ethics regimes such as the Public Sector Ethics Act 1994 (Qld) and agency codes of conduct are not sufficient to counteract the negative influence of informal codes of practice that undermine espoused organisational values and community standards. The ethical decision-making capacity of health care managers remains at the front line in the battle against unethical and unprofessional practice. What is known about the topic? Value congruence theory focusses on the conflicts between individual and organisational values. Congruence between individual values, espoused values and values expressed in everyday practice can only be achieved by ensuring that such shared values are an ever-present factor in managerial decision making. What does this paper add? The importance of value congruence in building and sustaining a healthy organisational culture is confirmed by the evidence presented in the Bundaberg Hospital Inquiry. The presence of strong individual values among staff and strong espoused values in line with community expectations and backed up by legislation and ethics regimes were not, in themselves, sufficient to ensure a healthy organisational culture and prevent unethical, and possibly illegal, behaviour. What are the implications for practitioners? Managers must incorporate ethics in decision making to establish and maintain the nexus between individual and organisational values that is a vital component of a healthy organisational culture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Porous polylactide constructs were prepared by stereolithography, for the first time without the use of reactive diluents. Star-shaped poly(D,L-lactide) oligomers with 2, 3 and 6 arms were synthesised, end-functionalised with methacryloyl chloride and photocrosslinked in the presence of ethyl lactate as a non-reactive diluent. The molecular weights of the arms of the macromers were 0.2, 0.6, 1.1 and 5 kg/mol, allowing variation of the crosslink density of the resulting networks. Networks prepared from macromers of which the molecular weight per arm was 0.6 kg/mol or higher had good mechanical properties, similar to linear high molecular weight poly(D,L-lactide). A resin based on a 2-armed poly(D,L-lactide) macromer with a molecular weight of 0.6 kg/mol per arm (75 wt%), ethyl lactate (19 wt%), photo-initiator (6 wt%), inhibitor and dye was prepared. Using this resin, films and computer-designed porous constructs were accurately fabricated by stereolithography. Pre-osteoblasts showed good adherence to these photocrosslinked networks. The proliferation rate on these materials was comparable to that on high molecular weight poly(D,L-lactide) and tissue culture polystyrene.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Poly(D,L-lactide) is a degradable polymer with a long history of use in medical applications. It is strong and stiff and degrades over the course of months into lactic acid, a body-own substance. In the field of tissue engineering it is commonly used to fabricate scaffolds. Stereolithography is a high resolution rapid prototyping technique by which designed 3D objects can be built using photo-initiated radical polymerisations. Poly(D,Llactide) (PDLLA) networks can be obtained by photopolymerisation of oligomers functionalised with unsaturated groups. In this work, PDLLA oligomers of varying architectures (arm lengths, numbers of arms) were synthesised and end-functionalised with methacrylate groups. These macromers were photo-crosslinked in solution to yield PDLLA networks of different architectures. The influence of the network architecture on its physical properties was studied.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: Businesses cannot rely on their customers to always do the right thing. To help researchers and service providers better understand the dark (and light) side of customer behavior, this study aims to aggregate and investigate perceptions of consumer ethics from young consumers on five continents. The study seeks to present a profile of consumer behavioral norms, how ethical inclinations have evolved over time, and country differences. ---------- Design/methodology/approach: Data were collected from ten countries across five continents between 1997 and 2007. A self-administered questionnaire containing 14 consumer scenarios asked respondents to rate acceptability of questionable consumer actions. ---------- Findings: Overall, consumers found four of the 14 questionable consumer actions acceptable. Illegal activities were mostly viewed as unethical, while some legal actions that were against company policy were viewed less harshly. Differences across continents emerged, with Europeans being the least critical, while Asians and Africans shared duties as most critical of consumer actions. Over time, consumers have become less tolerant of questionable behaviors. ---------- Practical implications: Service providers should use the findings of this study to better understand the service customer. Knowing what customers in general believe is ethical or unethical can help service designers focus on the aspects of the technology or design most vulnerable to customer deviance. ---------- Multinationals already know they must adapt their business practices to the market in which they are operating, but they must also adapt their expectations as to the behavior of the corresponding consumer base. Originality/value: This investigation into consumer ethics helps businesses understand what their customer base believes is the right thing in their role as customer. This is a large-scale study of consumer ethics including 3,739 respondents on five continents offering an evolving view of the ethical inclinations of young consumers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A sample of 815 adults drawn from the general American population provided their perception of the appropriateness of 12 questionable consumer actions in the marketplace. The scenarios investigated ranged from illegal actions such as inflating one’s losses when filing an insurance claim to actions that while not illegal, may raise questions of ethics. The 12 scenarios exhibited a wide range of mean responses on the six-point scale thereby supporting an often stated premise that consumer ethics is situational in nature. An array of commonly employed demographic questions was also included on the Internet-based survey, and differences of opinion were documented across the various demographic segments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Project Procurement is a ‘great’ environment for ethical issues with its low-price state of mind and competition. It has many opportunities that could contribute to illegal activities or unethical behavior especially in the construction industry. In 2006 alone, 17.3% of 417 Malaysian government contract projects were considered sick due to the poor performance by the contractors. Therefore it is important to govern the project procurement, especially the plan procurement stage to ensure the accountability and transparency of the decision made in awarding the right contract to the best contractor. This is where project governance framework (PGF) is really needed in project procurement planning. Project governance is a subset of corporate governance focusing on the areas of corporate governance related to project activities, including: portfolio direction, project sponsorship, project and program management and efficiency and disclosure and reporting. This paper highlights the importance of implementing project governance framework (PGF) to ensure that the decision makers are answerable and accountable to the stakeholders, and the decision making is transparent to avoid any ethical issues arises. A comprehensive preliminary literature is carried out to discover the importance of executing PGF in project procurement in Malaysian public sector. By understanding the important of PGF, it is hoped that this will bring a signal to other developing countries to implement the similar method in ensuring the transparency of the decision making in project procurement planning in their countries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Louis Nowra wrote 'Radiance' especially for the three actors who performed it in the play’s premier season at Belvoir Street Theatre in September 1993. And the Currency Press playscript / programme produced for that season foregrounds these three performers – Rachael Maza, Lydia Miller and Rhoda Roberts – in such a way that the usual distinction between dramatis personae and the actors who play them is considerably diminished. Both the blurb on the back cover and Nowra’s introduction emphasise this special relationship between text and actors, but it is the front cover shot which particularly reflects the conjunction between the two. Rather than depicting a scene from performance, or a ‘graphic’ suggesting something of the play’s thematic content, the front cover of Radiance features the three actors in a posed promotional shot. Arms joined warmly, lovingly, about each other’s waist, bodies turned away from but faces towards the camera, it is the actors we see, not their characters. It’s a very joyful image; they’re positively beaming. Radiant. They look as if they could really be the three half-sisters they portray, except that such moments of blithe sorority are just about non-existent in the play.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the launch of the ‘Clean Delhi, Green Delhi’ campaign in 2003, slums have become a significant social and political issue in India’s capital city. Through this campaign, the state, in collaboration with Delhi’s middle class through the ‘Bhagidari system’ (literally translated as ‘participatory system’), aims to transform Delhi into a ‘world-class city’ that offers a sanitised, aesthetically appealing urban experience to its citizens and Western visitors. In 2007, Delhi won the bid to host the 2010 Commonwealth Games; since then, this agenda has acquired an urgent, almost violent, impetus to transform Delhi into an environmentally friendly, aesthetically appealing and ‘truly international city’. Slums and slum-dwellers, with their ‘filth, dirt, and noise’, have no place in this imagined city. The violence inflicted upon slum-dwellers, including the denial of their judicial rights, is justified on these accounts. In addition, the juridical discourse since 2000 has ‘re-problematised slums as ‘nuisance’. The rising antagonism of the middle-classes against the poor, supported by the state’s ambition to have a ‘world-class city’, has allowed a new rhetoric to situate the slums in the city. These representations articulate slums as homogenised spaces of experience and identity. The ‘illegal’ status of slum-dwellers, as encroachers upon public space, is stretched to involve ‘social, cultural, and moral’ decadence and depravity. This thesis is an ethnographic exploration of everyday life in a prominent slum settlement in Delhi. It sensually examines the social, cultural and political materiality of slums, and the relationship of slums with the middle class. In doing so, it highlights the politics of sensorial ordering of slums as ‘filthy, dirty, and noisy’ by the middle classes to calcify their position as ‘others’ in order to further segregate, exclude and discriminate the slums. The ethnographic experience in the slums, however, highlights a complex sensorial ordering and politics of its own. Not only are the interactions between diverse communities in slums highly restricted and sensually ordained, but the middle class is identified as a sensual ‘other’, and its sensual practices prohibited. This is significant in two ways. First, it highlights the multiplicity of social, cultural experience and engagement in the slums, thereby challenging its homogenised representation. Second, the ethnographic exploration allowed me to frame a distinct sense of self amongst the slums, which is denied in mainstream discourses, and allowed me to identify the slums’ own ’others’, middle class being one of them. This thesis highlights sound – its production, performances and articulations – as an act with social, cultural, and political implications and manifestations. ‘Noise’ can be understood as a political construct to identify ‘others’ – and both slum-dwellers and the middle classes identify different sonic practices as noise to situate the ‘other’ sonically. It is within this context that this thesis frames the position of Listener and Hearer, which corresponds to their social-political positions. These positions can be, and are, resisted and circumvented through sonic practices. For instance, amplification tactics in the Karimnagar slums, which are understood as ‘uncultured, callous activities to just create more noise’ by the slums’ middle-class neighbours, also serve definite purposes in shaping and navigating the space through the slums’ soundscapes, asserting a presence that is otherwise denied. Such tactics allow the residents to define their sonic territories and scope of sonic performances; they are significant in terms of exerting one’s position, territory and identity, and they are very important in subverting hierarchies. The residents of the Karimnagar slums have to negotiate many social, cultural, moral and political prejudices in their everyday lives. Their identity is constantly under scrutiny and threat. However, the sonic cultures and practices in the Karimnagar slums allow their residents to exert a definite sonic presence – which the middle class has to hear. The articulation of noise and silence is an act manifesting, referencing and resisting social, cultural, and political power and hierarchies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The queer studies field works to deconstruct dominant western discourses which cast gay men as hedonistic partygoers. Concurrently it examines the real social ramifications for some gay men for whom partying, illegal drugs and casual sex is an everyday reality. Another reality of gay male culture is HIV/AIDS and the legal prescribed medicines which accompany these conditions. Pleasure Consuming Medicine: The Queer Politics of Drugs explores these realities and the discourses surrounding them. Exploring the embodiments of illegal and prescription drug users, this book problematises the binary between prescription medicine use, where drug use is configured as a matter of consumer choice, and 'illicit' drug use which is heavily policed and condemned. Returning to the gay community it reviews community approaches to safe sex and drug use, and individual practices, to demonstrate alternative approaches to condemning drug usage.