866 resultados para Violent crimes
Resumo:
Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.
Resumo:
Sudden, violent and otherwise unexplained deaths are investigated in most western jurisdictions through a Coronial or medico-legal process. A crucial element of such an investigation is the legislative requirement to remove the body for autopsy and other medical interventions, processes which can disrupt traditional religious and cultural grieving practices. While recent legislative changes in an increasing number of jurisdictions allow families to raise objections based on religious and cultural grounds, such concerns can be over-ruled, often exacerbating the trauma and grief of families. Based on funded research which interviews a range of Coronial staff in one Australian jurisdiction, this paper explores the disjuncture between medico-legal discourses, which position the body as corpse, and the rise of more ‘therapeutic’ discourses which recognise the family’s wishes to reposition the body as beloved and lamented.
Resumo:
The sentencing of a self-confessed child sex offender and senior Brisbane Anglican priest Canon Barry Greaves in Brisbane District Court last Friday (April 24, 2009) is a significant event for many reasons and for many people. It is a significant event because Greaves was a priest at Boonah in the early 1980s when he committed the offences and because knowledge of his own sex offending against children failed to deter him from seeking and gaining high office in the Anglican Church. He accepted the position of being an Archbishop’s chaplain to Brisbane Archbishop Dr Peter Hollingworth in 1999. He stayed on as an Archbishop’s chaplain to the incoming Archbishop Dr Phillip Aspinall in 2002 and not even the disgrace of the sex scandal in the Brisbane Diocese resulted in a glimmer of guilt that maybe he was not an appropriate person to be providing pastoral care to other victims of sexual assault. Families of victims who were referred to Greaves for pastoral care are now flabbergasted by the double betrayal. “I went looking for comfort and now I discover I was confiding in a f***ing pedophile,” one woman said.
Resumo:
Sex, Love and Abuse intervenes in a timely way on some important issues that have become 'elephants in the room' for academic and policy considerations around sexual violence and abuse. In so doing, this book draws upon a range of literatures and novel empirical sources to encourage critical thinking about the relationship between sex, love and abuse, examining crimes including sexual assault, pornography, child sexual abuse and domestic violence. This provocative book seeks to destabilize essentialist understandings of these phenomena with a view to identifying the subtle and complex nature of relationships, which often defy easy explanation and categorisation. Focusing on theories, public discourses and moral ideals, Hayes connects romantic love, intimacy and harm in a unique philosophical analysis, exploring abuse in relationships and how such abuse is fostered.
Resumo:
Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata across forensic disk images, files, system and application logs and network packet captures. The results prove that metadata based associations can be used to extract meaningful relationships between digital artifacts, thus potentially benefiting real-life forensics investigations.
Resumo:
This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.
Resumo:
In 2005, governments around the world unanimously agreed to the principle of the responsibility to protect (R2P), which holds that all states have a responsibility to protect their populations from genocide and mass atrocities, that the international community should assist them to fulfil this duty, and that the international community should take timely and decisive measures to protect populations from such crimes when their host state fails to do so. Progressing R2P from words to deeds requires international consensus about the principle’s meaning and scope. To achieve a global consensus on this, we need to better understand the position of governments around the world, including in the Asia-Pacific region, which has long been associated with an enduring commitment to a traditional concept of sovereignty. The present article contributes to such an endeavour through its three sections. The first part charts the nature of the international consensus on R2P and examines the UN secretary-general’s approach. The second looks in detail at the positions of the Asia-Pacific region’s governments on the R2P principle. The final part explores the way forward for progressing the R2P principle in the Asia-Pacific region.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
Phishing and related cybercrime is responsible for billions of dollars in losses annually. Gartner reported more than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008 (Gartner 2009). This paper asks whether the majority of organised phishing and related cybercrime originates in Eastern Europe rather than elsewhere such as China or the USA. The Russian “Mafiya” in particular has been popularised by the media and entertainment industries to the point where it can be hard to separate fact from fiction but we have endeavoured to look critically at the information available on this area to produce a survey. We take a particular focus on cybercrime from an Australian perspective, as Australia was one of the first places where Phishing attacks against Internet banks were seen. It is suspected these attacks came from Ukrainian spammers. The survey is built from case studies both where individuals from Eastern Europe have been charged with related crimes or unsolved cases where there is some nexus to Eastern Europe. It also uses some earlier work done looking at those early Phishing attacks, archival analysis of Phishing attacks in July 2006 and new work looking at correlation between the Corruption Perception Index, Internet penetration and tertiary education in Russia and the Ukraine. The value of this work is to inform and educate those charged with responding to cybercrime where a large part of the problem originates and try to understand why.
Resumo:
The concept of the community is a key component of restorative justice theory and practice. In restorative justice scholarship, the community is constructed, alongside the victim and offender, as having a crucial role to play in responding to crimes in a restorative way. Indeed, it is often claimed that the perceived need for the community to be involved in responding to crime was a key rationale for the emergence of restorative practices around the world. Taking the emergence of youth justice conferencing – the most commonly-utilised restorative practice in Australia – as a case study, this article argues, however, that the idea of the community was peripheral to the emergence of restorative justice in Australia. The documentary analysis from which this article stems also found that while Indigenous young people are represented as belonging to communities, non-Indigenous young people are not – at least, not beyond their ‘community of care’. As such, this article raises concerns about the disproportionate responsibilisation of Indigenous young people, families and communities.
Resumo:
Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced.
Resumo:
In recent years air pollution has been referred to as an ‘invisible killer’, and ‘an invisible health crisis’ (European Respiratory Society 2012). As other chapters in this collection have argued, the invisibility of crime is manifested through various lenses: lack of knowledge, lack of political and media attention, an absence of policing and regulatory focus, and an unwitting and ill-informed public. All such arguments pertain to air pollution; however, toxic emissions are also literally invisible from sight and consciousness, as are the associated consequences.
Resumo:
Impulsivity, describing action without foresight, is an important feature of several psychiatric diseases, suicidality and violent behaviour. The complex origins of impulsivity hinder identification of the genes influencing it and the diseases with which it is associated. Here we perform exon-focused sequencing of impulsive individuals in a founder population, targeting fourteen genes belonging to the serotonin and dopamine domain. A stop codon in HTR2B was identified that is common (minor allele frequency > 1%) but exclusive to Finnish people. Expression of the gene in the human brain was assessed, as well as the molecular functionality of the stop codon, which was associated with psychiatric diseases marked by impulsivity in both population and family-based analyses. Knockout of Htr2b increased impulsive behaviours in mice, indicative of predictive validity. Our study shows the potential for identifying and tracing effects of rare alleles in complex behavioural phenotypes using founder populations, and indicates a role for HTR2B in impulsivity.
Resumo:
Favel Parrett’s second novel, When the Night Comes, opens with its teenage protagonist Isla lying awake in her bunk on a night ferry to Tasmania in the mid-1980s, ‘waiting for the rough seas’. Her younger brother sleeps beside her, and her distracted, emotionally distant mother – the kind of woman who is ‘always sitting places by herself in the night’ – is smoking on deck. Together, the three are weathering the roiling overnight passage in order to escape a violent past and make a new life in Hobart. The rough seas the novel goes on to navigate are, as one might expect, both literal and metaphorical...
Resumo:
This chapter introduces domestic and family violence. It defines the terms and the types of violence they encompass, and summarizes patterns in perpetration and victimisation. The chapter reviews the historical development of domestic and family violence as recognizable social problems. It also explains how domestic violence and family violence are shaped by gender norms. Finally, it explains some key differences between these and other crimes.