833 resultados para Crimes in Internet
Resumo:
This study makes out the case for the use of the Conversational Analytic method as a research approach that might both extricate and chronicle the features of the journalism interview. It seeks to encourage such research to help inform understanding of this form and to provide further lessons as to the nature of journalism practice. Such studies might follow many paths but this paper focuses more particularly on the outcomes for the debate as to the continued relevance of "objectivity" in informing journalism professional practice. To make out the case for the veracity of CA as a means through which the conduct of journalism practice might be explored the paper examines: the theories of the interaction order that gave rise to the CA method; outlines the key features of the journalism interview as explicated through the CA approach; outlines the implications of such research for the establishment of the standing of "objectivity". It concludes as to the wider relevance of such studies of journalism practice for a fracturing journalism field, which suffers from a lack of benchmarks to measure the public benefit of the range of forms that now proliferate on the internet.
Resumo:
This study considers patterns of political participation in Australia in the early 21st Century, using recent data from the Australian Election Study. The paper reassesses how Australia fits within broader patterns of political participation and investigates major predictors of participation in Australia to see how these have or have not changed in a globalised era that has brought new challenges. Factors considered include socio-demographic variables, such as education, age, gender, birthplace and place of residence and also attitudinal orientations towards politics, such as political interest, efficacy and trust. The paper pays particular attention to those who have moved to Australia from other countries. One of the most important findings is that immigrants show little or no sign of any participatory disadvantage and indeed tend to participate more than the Australian-born in some modes of participation, such as campaign activities. The analysis also identifies a clear participatory divide within a number of socio-demographic groups in use of the internet for gaining election information.
Resumo:
This paper describes the socio-economic and environmental impacts of battery driven Auto Rickshaw at Rajshahi city in Bangladesh. Unemployment problem is one of the major problems in Bangladesh. The number of unemployed people in Bangladesh is 7 lacks. Auto Rickshaw reduces this unemployment problem near about 2%.In this thesis work various questions were asked to the Auto Rickshaw driver in the different point in the Rajshahi city. Then those data were calculated to know their socio economic condition. The average number of passenger per Auto Rickshaw was determined at various places of Rajshahi city (Talaimari mor, Hadir mor, Alupotti, Shaheb bazar zero point, Shodor Hospital mor, Fire brigade mor, CNB mor, Lakshipur mor, Bondo gate, Bornali, Panir tank, Rail gate, Rail Station, Bhodrar mor, Adorsha School mor). Air pollution is a great threat for human health. One of the major causes of the air pollution is the emission from various vehicles, which are running by the burning of the fossil fuel in different internal combustion(IC) engines. All the data’s about emission from various power plants were collected from internet. Then the amounts of emission (CO2, NOX and PM) from different power plant were calculated in terms of kg/km. The energy required by the Auto Rickshaw per km was also calculated. Then the histogram of emission from different vehicles in terms of kg/km was drawn. By analyzing the data and chart, it was found that, battery driven Auto Rickshaw increases income, social status, comfort and decreases unemployment problems.
Resumo:
The rapid growth of services available on the Internet and exploited through ever globalizing business networks poses new challenges for service interoperability. New services, from consumer “apps”, enterprise suites, platform and infrastructure resources, are vying for demand with quickly evolving and overlapping capabilities, and shorter cycles of extending service access from user interfaces to software interfaces. Services, drawn from a wider global setting, are subject to greater change and heterogeneity, demanding new requirements for structural and behavioral interface adaptation. In this paper, we analyze service interoperability scenarios in global business networks, and propose new patterns for service interactions, above those proposed over the last 10 years through the development of Web service standards and process choreography languages. By contrast, we reduce assumptions of design-time knowledge required to adapt services, giving way to run-time mismatch resolutions, extend the focus from bilateral to multilateral messaging interactions, and propose declarative ways in which services and interactions take part in long-running conversations via the explicit use of state.
Resumo:
Over the last two decades, the internet and e-commerce have reshaped the way we communicate, interact and transact. In the converged environment enabled by high speed broadband, web 2.0, social media, virtual worlds, user-generated content, cloud computing, VoIP, open source software and open content have rapidly become established features of our online experience. Business and government alike are increasingly using the internet as the preferred platform for delivery of their goods and services and for effective engagement with their clients. New ways of doing things online and challenges to existing business, government and social activities have tested current laws and often demand new policies and laws, adapted to the new realities. The focus of this book is the regulation of social, cultural and commercial activity on the World Wide Web. It considers developments in the law that have been, and continue to be, brought about by the emergence of the internet and e-commerce. It analyses how the law is applied to define rights and obligations in relation to online infrastructure, content and practices.
Resumo:
This thesis examines online spoof videos in China. It shows the relationship between user-created content and change and how such videos are impacting on social memory. In the West, we are witnessing two outstanding trends in media. On the one hand, media are turning more "demotic" (Turner, 2006) and "participatory" (Jenkins, 2006), whereby lay audiences use popular media for identity formation, representation and association, reconfiguring the media and cultural landscape, and rendering invalid the old paradigm based on the dichotomy of audience and author, creator and consumer, expert and amateur. On the other hand, in both mainstream media and user-creation online there is a trend towards "silly citizenship", with comedy, send-ups and spoofs that used to reside in the margin propelled to the central stage in both pleasure and politics (Hartley, 2010), as is shown in the rising popularity of the Daily Show, Colbert Report, and spoof videos in elections ,e.g. the 2008 presidential election in US (Gray, Jones, & Thompson, 2009; Tryon, 2008). User generated content—and spoof subcultures—is now much a debated phenomenon in China. However, with different political (one party rule and censorship) and cultural (media regarded mainly as instrument for education and social stabilization instead of a critical fourth estate) configurations, will the social and cultural impacts of the two trends in the West be as the same in China? If not, what will be the specificities in the China context? The project starts with a historical review of popular culture and user-created content in China, before turning to spoof videos and looking at how they are produced and shared, travel and diffused on the Internet, and how the communities and sub-cultures forming and emerging around spoof videos are changing the overall cultural landscape in China. By acting as a participant observer in online video sharing sites and conducting face-to face as well as online interviews, I identify lead users and creators of spoof videos and the social networks emerging around them. I call these lead users "skill hubs" and their networks "liquid communities", foregrounding the fact that their appeal doesn’t come from their amicable personality, but rather from their creative skills; and that the networks surrounding them are in a permanent flux, with members coming and going as they see fit. I argue that the "liquidness" (Bauman, 2000) of these communities is what makes them constantly creative and appealing. Textual analysis of online videos, their comments and derivatives are conducted to tease out the uses that that can be made of spoof videos, namely as phatic communication, as alternative memory and as political engagement. Through these analyses I show that spoof videos constitute not only a space where young generations can engage with each other, communicate their anger and dissatisfaction, fun and hope, and where they participate in socio-cultural and political debates, but also create a space where they can experiment with their new skills, new ideas, and new citizenship. The rise of spoof videos heralds the beginning of a trend in popular culture in contemporary China towards the "canonization of the jester" and the dethroning of the establishment. I also argue that a historical perspective is needed to understand the current surge of use creativity and user activism in China, and that many forms of popular media we experience today have their antecedents in various stages of Chinese history. The entrenched "control-resistance" binary is inadequate in interpreting the rich, flux and multilayered Internet space in China.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
The history of war is blighted with astonishing reminders of man’s ability to cast his sense of humanity aside and inflict unspeakable harm upon one another. The ruthless bombing of Dresden, the callousness of the Nazi concentration camps and the massacre of the Tutsis are but a few of the atrocities that have haunted our past. In response to these atrocities, society has imposed an ever-increasing number of laws and rules to regulate warfare. Amongst these is the doctrine of command responsibility. The doctrine of command responsibility states that a commander is criminally liable for the crimes of his subordinates if he knew or should have known of their crimes. This paper will examine whether the doctrine is an appropriate and realistic legal standard to hold commanders accountable to or whether the doctrine is more a reflection of social sentiment and legal rhetoric. If the doctrine, and indeed the law of war in general, is unrealistic then the law cannot fulfil its purpose - that is, the prevention of atrocities. Instead of being solely a reflection of moral authority and social sentiments the law must also be a tool that guides and shapes the decisions and actions of the military through the chaotic and brutal nature of war...
Resumo:
Background: Evidence demonstrates self-management programs are an effective approach to assist patients with chronic diseases such as type 2 diabetes or cardiac conditions to modify their lifestyle for better managing their conditions. Using information technology (IT) has great potential to support self-management programs and assist patients to fulfill their goals in managing their conditions more efficiently and effectively. Examples of different types of technology used in self-management programs that have limited research support include: text messages, telephone followup, web-based programs, and other internet-assisted education. But little is known about the applicability and feasiability of different forms of technology for patients with chronic diseases such as those with type 2 diabetes and critical cardiac conditions. Furthermore, although there is some evidence of the benefits of using IT in supporting self-management programs, further research on the use of IT in such programs is recommended. Objective: To develop and pilot test an integrated Cardiac- Diabetes Self-Management Program (CDSMP) incorporating telephone and text-message follow-up. Methods: A pilot study using randomised controlled trial is conducted in the coronary care unit (CCU) in a Brisbane metropolitan hospital in Australia to collect data on patients with type 2 diabetes admitted to CCU. The main outcomes included self-efficacy levels, knowledge, and quality of life. Results: Initial results reveal that patients with diabetes admitted to the CCU in the experimental group did improve their self-efficacy, and knowledge levels. Acknowledgements: This Project is funded by QUT Early Career Researcher Research Grant
Resumo:
This article examines how therapists and clients manage the therapeutic relationship in online psychotherapy. Our study focuses on early sessions of therapy involving 22 therapist-client pairs participating in online Cognitive Behavioural Therapy (CBT) for depression. Using Conversation Analysis (CA), we examine how therapists can orient to clients’ contributions, while also retaining control of the therapeutic trajectory. We report two practices that therapists can use, at their discretion, following clients’ responses to requests for information. The first, thanking, accepts clients’ responses, orienting to the neutral affective valence of those responses. The second, commiseration, orients to the negative affective valence of clients’ responses. We argue that both practices are a means by which therapists can simultaneously manage developing rapport, while also retaining control of the therapeutic process.
Resumo:
In an increasingly business technology (BT) dependent world, the impact of the extraordinary changes brought about by the nexus of mobile and cloud technologies, social media and big data is increasingly being felt in the board room. As leaders of enterprises of every type and size, board directors can no longer afford to ignore, delegate or avoid BT-related decisions. Competitive, financial and reputational risk is increased if boards fail to recognize their role in governing technology as an asset and in removing barriers to improving enterprise business technology governance (EBTG). Directors’ awareness of the need for EBTG is increasing. However, industry research shows that board level willingness to rectify the gap between awareness and action is very low or non-existent. This literature review-based research identifies barriers to EBTG effectiveness. It provides a practical starting point for board analysis. We offer four outcomes that boards might focus on to ensure the organizations they govern are not left behind by those led by the upcoming new breed of technology-savvy leaders. Most extant research looks backward for examples, examining data pre-2010, the time when a tipping point in the personal and business use of multimedia and mobile-internet devices significantly deepened the impacts of the identified nexus technology forces, and began rapidly changing the way many businesses engage with their customers, employees and stakeholders. We situate our work amidst these nexus forces, discuss the board’s role in EBTG in this context, and modernize current definitions of enterprise technology governance. The primary limitation faced is the lack of scholarly research relating to EBTG in the rapidly changing digital economy. Although we have used recent (2011 - 2013) industry surveys, the volume of these surveys and congruence across them is significant in terms of levels of increased awareness and calls for increased board attention and competency in EBTG and strategic information use. Where possible we have used scholarly research to illustrate or discuss industry findings.
Resumo:
The role of Information and Communications Technology (ICT) has been identified as an important factor by the United Nations in achieving the millennium development goals (UNAPCICT, 2012)1. The potential for ICT has been identified as a means to reducing poverty, creating global communities by providing access to the internet and mobile networks to rural communities, improving education services, medical services, and information availability. As of today, significant amounts of funds have been invested by the governments and donor organizations in ‘Information and Communication Technologies for Development (ICT4D)’projects by establishing telecenters, e-villages, e-health, electronic and mobile banking, and egovernment systems for citizens in general, and more specifically, rural communities to bridge the digital divide (Heeks & Molla, 2009).
Resumo:
Who watches pornography in Australia? If you listen to public debates about the genre the answer is clear – it’s children. Children are accessing pornography on smartphones (Murray and Tin 2011). Children are taking ‘lewd’ photographs of themselves, creating their own pornography (Nelligan and Etheridge 2011). Indigenous Australian children must be protected by banning pornography (the Age 2011). Pornographic magazines are placed where children can see them (O'Rourke 2011). Exposure to pornography is damaging children (Sundstrom 2011). The Australian Government insists that the Internet must be filtered to protect children from pornography (Collerton 2010). And if indeed any adults are watching pornography in Australia, then it’s child pornography (MacDonald 2011; Ralston and Howden 2011).In story after story, public debate about pornography focuses on children as its audience. There is no suggestion that children are numerically the largest audience of pornography in Australia. But emphatically the suggestion is that children are the most important audience to be taken into account when thinking about the genre. This chapter explores why this is the case, and notes the political advantages and disadvantages of focusing on children as the most important audience for pornography in Australia.
Online environmental citizenship : blogs, green marketing and consumer sentiment in the 21st Century
Resumo:
Over the last three decades, the rise in consumer generated content has enabled more environmentally conscious points of view to effect mainstream opinion (Kalafatis, Pollard, East & Tsogas, 1999; Barber, Taylor & Strick, 2009). Consequently, more people are buying into environmentalist ideology and organizing themselves to influence social change. Focus has shifted from attracting public awareness to concern for green ideas, discourse, and environmental citizenship, the latter becoming the guideline by which debates on such topics are regulated (Follows & Jobber, 2000; Dobson, 2003).