798 resultados para Illegal armed actors
Resumo:
The Film Studio sheds new light on the evolution of global film production, highlighting the role of film studios worldwide. The authors explore the contemporary international production environment, alleging that global competition is best understood as an unequal and unstable partnership between the 'design interest' of footloose producers and the 'location interest' of local actors. Ben Goldsmith and Tom O'Regan identify various types of film studios and investigate the consequences for Hollywood, international film production, and the studio locations.
Resumo:
This article sketches some of the ways in which the language and concepts of cultural diversity are being taken up internationally. The debate has been driven in part by concerns about the treatment of cultural goods, services and knowledge in trade agreements. But it also involves larger questions about the role of the state, the role of non-state actors in domestic policy formation, and the shape and function of international policy communities comprising both state and non-state actors. The extent of the discussion of cultural diversity internationally is described through new formal and informal cultural networks and work towards an international instrument for cultural diversity to lay our ground rules for international trade, cultural exchange and policy principles to guide governmental responsibilities. The article concludes with analysis of some of these new networks, and investigates why Canada has been so prominent in these international efforts.
Resumo:
Since censorship was lifted in Korea in 1996, collaboration between Korean and foreign filmmakers has grown in both extent and visibility. Korean films have been shot in Australia, New Zealand and mainland China, while the Korean digital post-production and visual effects firms behind blockbusters infused with local effects have gone on to work with filmmakers from greater China and Hollywood Korean cinema has become known for its universal storylines, genre experimentation and high production values. The number of exported Korean films has increased, as has the number of Korean actors starring in films made in other countries. Korea has hosted major international industry events. These milestones have facilitated an unprecedented international expansion of the Korean film industry. With the advent of the 'digital wave in Korea the film industry's transition to digital production practices this expansion has accelerated Korean film agencies the pillars of the national cinema have played important parts in this internationalisation, particularly in promoting Korean films and filmmakers outside Korea and in facilitating international events in Korea itself Yet, for the most part, projects involving Korean filmmakers working in partnership with filmmakers from other countries are the products of individuals and businesses working outside official channels. That is, they are often better understood as 'transnational rather than 'national' or 'international' projects. In this article, we focus on a range of collaborations involving Korean, Australian, New Zealand and Chinese filmmakers and firms. These collaborations highlight some of the forces that have shaped the digital wave in the Korean film industry, and illustrate the increasingly influential role that the 'digital expertise of Korean filmmakers is playing in film industries, both regionally and around the world.
Resumo:
Many governments throughout the world rely heavily on traffic law enforcement programs to modify driver behaviour and enhance road safety. There are two related functions of traffic law enforcement, apprehension and deterrence, and these are achieved through three processes: the establishment of traffic laws, the policing of those laws, and the application of penalties and sanctions to offenders. Traffic policing programs can vary by visibility (overt or covert) and deployment methods (scheduled and non-scheduled), while sanctions can serve to constrain, deter or reform offending behaviour. This chapter will review the effectiveness of traffic law enforcement strategies from the perspective of a range of high-risk, illegal driving behaviours including drink/drug driving, speeding, seat belt use and red light running. Additionally, this chapter discusses how traffic police are increasingly using technology to enforce traffic laws and thus reduce crashes. The chapter concludes that effective traffic policing involves a range of both overt and covert operations and includes a mix of automatic and more traditional manual enforcement methods. It is important to increase both the perceived and actual risk of detection by ensuring that traffic law enforcement operations are sufficiently intensive, unpredictable in nature and conducted as widely as possible across the road network. A key means of maintaining the unpredictability of operations is through the random deployment of enforcement and/or the random checking of drivers. The impact of traffic enforcement is also heightened when it is supported by public education campaigns. In the future, technological improvements will allow the use of more innovative enforcement strategies. Finally, further research is needed to continue the development of traffic policing approaches and address emerging road safety issues.
Resumo:
We have always felt that “something very special” was happening in the 48hr and other similar game jams. This “something” is more than the intensity and challenge of the experience, although this certainly has appeal for the participants. We had an intuition that these intense 48 hour game jams exposed something pertinent to the changing shape of the Australian games industry where we see the demise of the late 20th century large studio - the “Night Elf” model and the growth of the small independent model. There are a large number of wider economic and cultural factors around this evolution but our interest is specifically in the change from “industry” to “creative industry” and the growth of games as a cultural media and art practice. If we are correct in our intuition, then illuminating this something also has important ramifications for those courses which teach game and interaction design and development. Rather than undertake a formal ethno-methodological approach, we decided to track as many of the actors in the event as possible. We documented the experience (Keith Novak’s beautiful B&W photography), the individual and their technology (IOGraph mouse tracking), the teams as a group (Time lapse photography) and movement tracking throughout the whole space (Blue tooth phone tracking). The raw data collected has given us opportunity to start a commentary on the “something special” happening in the 48hr.
Resumo:
The purpose of this study was to challenge the broadly based focus of injury prevention strategies towards concern with the needs of young adolescents who engage in multiple anti-social and delinquent behaviours. Five hundred and forty 13-14 year olds reported on injuries and truancy, violence, illegal road behaviours, drug, and alcohol use. Engagement in these behaviours was found to contribute to the likelihood of an injury. Those engaging in the most anti-social and delinquent behaviours were around five times more likely to report medically-treated injuries in the past three months. Their likelihood of future injury was 1.8 times more likely when they were followed up three months later. The engagement in multiple delinquent and illegal behaviours thus significantly increased the likelihood of injury and identifies a particularly vulnerable group. The findings also suggest that reaching these young people represents a key target for change strategies in injury prevention programs.
Resumo:
This paper reports an observation investigation of pedestrian crossing behaviors conducted at signalized crosswalks in urban areas in Singapore and Beijing on typical workdays. Each crosswalk was observed 3 times in different periods, i.e. normal hours, lunch hours, and rush hours. A total of 103,956 pedestrians were observed. The results showed that lane type, lane number, intersection type, and culture had significant effect on illegal pedestrian crossing in both cities; observation period had no significant effect on pedestrian violation in both cities; the violation rate in Singapore was lower than that in Beijing. However, observers reported that illegal crossing of vulnerable pedestrians, e.g. pregnant, the lame, old men and women, was more obvious in Singapore than that in Beijing. Evidence proved the hypothesis that the violations were related to pedestrians’ cognition of the definition of safety.
Resumo:
Public dialogue regarding the high concentration of drug use and crime in inner city locations is frequently legitimised through visibility of drug-using populations and a perception of high crime rates. The public space known as the Brunswick Street Mall (Valley mall), located in the inner city Brisbane suburb of Fortitude Valley, has long provided the focal point for discussions regarding the problem of illicit drug use and antisocial behaviour in Brisbane. During the late 1990s a range of stakeholders in Fortitude Valley became mobilised to tackle crime and illicit drugs. In particular they wanted to dismantle popular perceptions of the area as representing the dark and unsafe side of Brisbane. The aim of this campaign was to instil a sense of safety in the area and dislodge Fortitude Valley from its reputation as a =symbolic location of danger‘. This thesis is a case study about an urban site that became contested by the diverse aims of a range of stakeholders who were invested in an urban renewal program and community safety project. This case study makes visible a number of actors that were lured from their existing roles in an indeterminable number of heterogeneous networks in order to create a community safety network. The following analysis of the community safety network emphasises some specific actors: history, ideas, technologies, materialities and displacements. The case study relies on the work of Foucault, Latour, Callon and Law to draw out the rationalities, background contingencies and the attempts to impose order and translate a number of entities into the community safety project in Fortitude Valley. The results of this research show that the community safety project is a case of ontological politics. Specifically the data indicates that both the (reality) problem of safety and the (knowledge) solution to safety were created simultaneously. This thesis explores the idea that while violence continues to occur in the Valley, evidence that community safety got done is located through mapping its displacement and eventual disappearance. As such, this thesis argues that community safety is a =collateral reality‘.
Resumo:
This thesis develops a detailed conceptual design method and a system software architecture defined with a parametric and generative evolutionary design system to support an integrated interdisciplinary building design approach. The research recognises the need to shift design efforts toward the earliest phases of the design process to support crucial design decisions that have a substantial cost implication on the overall project budget. The overall motivation of the research is to improve the quality of designs produced at the author's employer, the General Directorate of Major Works (GDMW) of the Saudi Arabian Armed Forces. GDMW produces many buildings that have standard requirements, across a wide range of environmental and social circumstances. A rapid means of customising designs for local circumstances would have significant benefits. The research considers the use of evolutionary genetic algorithms in the design process and the ability to generate and assess a wider range of potential design solutions than a human could manage. This wider ranging assessment, during the early stages of the design process, means that the generated solutions will be more appropriate for the defined design problem. The research work proposes a design method and system that promotes a collaborative relationship between human creativity and the computer capability. The tectonic design approach is adopted as a process oriented design that values the process of design as much as the product. The aim is to connect the evolutionary systems to performance assessment applications, which are used as prioritised fitness functions. This will produce design solutions that respond to their environmental and function requirements. This integrated, interdisciplinary approach to design will produce solutions through a design process that considers and balances the requirements of all aspects of the design. Since this thesis covers a wide area of research material, 'methodological pluralism' approach was used, incorporating both prescriptive and descriptive research methods. Multiple models of research were combined and the overall research was undertaken following three main stages, conceptualisation, developmental and evaluation. The first two stages lay the foundations for the specification of the proposed system where key aspects of the system that have not previously been proven in the literature, were implemented to test the feasibility of the system. As a result of combining the existing knowledge in the area with the newlyverified key aspects of the proposed system, this research can form the base for a future software development project. The evaluation stage, which includes building the prototype system to test and evaluate the system performance based on the criteria defined in the earlier stage, is not within the scope this thesis. The research results in a conceptual design method and a proposed system software architecture. The proposed system is called the 'Hierarchical Evolutionary Algorithmic Design (HEAD) System'. The HEAD system has shown to be feasible through the initial illustrative paper-based simulation. The HEAD system consists of the two main components - 'Design Schema' and the 'Synthesis Algorithms'. The HEAD system reflects the major research contribution in the way it is conceptualised, while secondary contributions are achieved within the system components. The design schema provides constraints on the generation of designs, thus enabling the designer to create a wide range of potential designs that can then be analysed for desirable characteristics. The design schema supports the digital representation of the human creativity of designers into a dynamic design framework that can be encoded and then executed through the use of evolutionary genetic algorithms. The design schema incorporates 2D and 3D geometry and graph theory for space layout planning and building formation using the Lowest Common Design Denominator (LCDD) of a parameterised 2D module and a 3D structural module. This provides a bridge between the standard adjacency requirements and the evolutionary system. The use of graphs as an input to the evolutionary algorithm supports the introduction of constraints in a way that is not supported by standard evolutionary techniques. The process of design synthesis is guided as a higher level description of the building that supports geometrical constraints. The Synthesis Algorithms component analyses designs at four levels, 'Room', 'Layout', 'Building' and 'Optimisation'. At each level multiple fitness functions are embedded into the genetic algorithm to target the specific requirements of the relevant decomposed part of the design problem. Decomposing the design problem to allow for the design requirements of each level to be dealt with separately and then reassembling them in a bottom up approach reduces the generation of non-viable solutions through constraining the options available at the next higher level. The iterative approach, in exploring the range of design solutions through modification of the design schema as the understanding of the design problem improves, assists in identifying conflicts in the design requirements. Additionally, the hierarchical set-up allows the embedding of multiple fitness functions into the genetic algorithm, each relevant to a specific level. This supports an integrated multi-level, multi-disciplinary approach. The HEAD system promotes a collaborative relationship between human creativity and the computer capability. The design schema component, as the input to the procedural algorithms, enables the encoding of certain aspects of the designer's subjective creativity. By focusing on finding solutions for the relevant sub-problems at the appropriate levels of detail, the hierarchical nature of the system assist in the design decision-making process.
Resumo:
While governments are engaged in developing social policy responses to address wicked issues such as poverty, homelessness, drug addiction and crime, long term resolution of these issues through government policy making and state-based programmatic action has remained elusive. The use of vehicles for joint action and partnership between government and the community sector such as co-management has been offered as a way of harnessing productive capability and innovative capacity of both these sectors to resolve these complex problems. However, it is suggested that while there is a well advanced agenda with the intent for collaboration and partnership, working with the models for undertaking this joint action are not well understood and have not been fully developed or evaluated. This chapter examines new approaches to resolving the wicked issue of homelessness through applying the lens of co-management to understand the complexities of this issue and its resolution. The chapter analyses an attempt to move away from traditional bureaucratic structures of welfare departments, operating through single functional ‘silos’ to a new horizontal ‘hub-based’ model of service delivery that seeks to integrate actors across many different service areas and organizations. The chapter explores case studies of co-management in the establishment, development and operation of service hubs to address homelessness. We argue that the response to homelessness needs a ‘wicked solution’ that goes beyond simply providing shelter to those in need. The case of the hub models of community sector organizations working across organizational boundaries is evaluated to determine whether this approach can be considered successful co-managing of an innovative initiative, and understanding the requirements for developing, improving and extending this model. The role of the third sector in co-managing public services is examined through the in-depth case studies and the results are presented together with an assessment of how co-management can contribute to service quality and service management in public services.
Resumo:
Nowadays, Workflow Management Systems (WfMSs) and, more generally, Process Management Systems (PMPs) are process-aware Information Systems (PAISs), are widely used to support many human organizational activities, ranging from well-understood, relatively stable and structures processes (supply chain management, postal delivery tracking, etc.) to processes that are more complicated, less structured and may exhibit a high degree of variation (health-care, emergency management, etc.). Every aspect of a business process involves a certain amount of knowledge which may be complex depending on the domain of interest. The adequate representation of this knowledge is determined by the modeling language used. Some processes behave in a way that is well understood, predictable and repeatable: the tasks are clearly delineated and the control flow is straightforward. Recent discussions, however, illustrate the increasing demand for solutions for knowledge-intensive processes, where these characteristics are less applicable. The actors involved in the conduct of a knowledge-intensive process have to deal with a high degree of uncertainty. Tasks may be hard to perform and the order in which they need to be performed may be highly variable. Modeling knowledge-intensive processes can be complex as it may be hard to capture at design-time what knowledge is available at run-time. In realistic environments, for example, actors lack important knowledge at execution time or this knowledge can become obsolete as the process progresses. Even if each actor (at some point) has perfect knowledge of the world, it may not be certain of its beliefs at later points in time, since tasks by other actors may change the world without those changes being perceived. Typically, a knowledge-intensive process cannot be adequately modeled by classical, state of the art process/workflow modeling approaches. In some respect there is a lack of maturity when it comes to capturing the semantic aspects involved, both in terms of reasoning about them. The main focus of the 1st International Workshop on Knowledge-intensive Business processes (KiBP 2012) was investigating how techniques from different fields, such as Artificial Intelligence (AI), Knowledge Representation (KR), Business Process Management (BPM), Service Oriented Computing (SOC), etc., can be combined with the aim of improving the modeling and the enactment phases of a knowledge-intensive process. The 1st International Workshop on Knowledge-intensive Business process (KiBP 2012) was held as part of the program of the 2012 Knowledge Representation & Reasoning International Conference (KR 2012) in Rome, Italy, in June 2012. The workshop was hosted by the Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti of Sapienza Universita di Roma, with financial support of the University, through grant 2010-C26A107CN9 TESTMED, and the EU Commission through the projects FP7-25888 Greener Buildings and FP7-257899 Smart Vortex. This volume contains the 5 papers accepted and presented at the workshop. Each paper was reviewed by three members of the internationally renowned Program Committee. In addition, a further paper was invted for inclusion in the workshop proceedings and for presentation at the workshop. There were two keynote talks, one by Marlon Dumas (Institute of Computer Science, University of Tartu, Estonia) on "Integrated Data and Process Management: Finally?" and the other by Yves Lesperance (Department of Computer Science and Engineering, York University, Canada) on "A Logic-Based Approach to Business Processes Customization" completed the scientific program. We would like to thank all the Program Committee members for the valuable work in selecting the papers, Andrea Marrella for his valuable work as publication and publicity chair of the workshop, and Carola Aiello and the consulting agency Consulta Umbria for the organization of this successful event.
Resumo:
Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation and offender management and treatment practice in the area of Internet child abuse. Internet use has grown considerably over the last five years, and information technology now forms a core part of the formal education system in many countries. There is however, increasing evidence that the Internet is used by some adults to access children and young people in order to ‘groom’ them for the purposes of sexual abuse; as well as to produce and distribute indecent illegal images of children. This book presents and assesses the most recent and current research on internet child abuse, addressing: its nature, the behaviour and treatment of its perpetrators, international policy, legislation and protection, and policing. It will be required reading for an international audience of academics, researchers, policy-makers and criminal justice practitioners with interests in this area.
Resumo:
Contemporary rural crime is more varied and sophisticated than it once was. The new forms range from agricultural crimes, such as the theft of water designated for agricultural production, to environmental crimes such as the illegal dumping of waste. They take place side by side with “traditional” rural crimes such as cattle duffing while “urban” crimes such as drug and alcohol abuse and violent assaults are also prevalent, and on the rise. Crime in Rural Australia covers them all. It brings together leading academics who examine the major dimensions of crime and justice in rural and regional Australia including: •the extent of rural crime •farm crime •violence •juvenile crime •policing •Indigenous crime and justice •crime prevention •drugs •fear of crime, and •sentencing and punishment. It includes vignettes on rural policing and the stock squad from the perspectives of the NSW police. An ideal text for rural crime and criminology courses, Crime in Rural Australia will also be of interest to criminal justice practitioners, policy-makers, and criminology scholars. Three of the editors, Dr Elaine Barclay, Dr John Scott and Associate Professor Russell Hogg, are associated with the Centre for Rural Crime at the University of New England. Professor Joseph F. Donnermeyer is the International Research Co-ordinator for the Rural Crime Centre and is a leading US scholar on rural crime at Ohio State University.
Resumo:
Between the crimes in the suites and the crimes in the streets lies the mostly unexplored terrain within which we find crimes of ‘everyday life’. Not all of these are formally illegal, but all are generally seen as morally dubious. Most of the crimes of everyday life are committed in the contemporary marketplace, and by those who think of themselves (and are mostly considered by others) as respectable citizens. We contextualize normative orientations that are conducive to such types of behaviour using a framework that links E. P. Thompson’s (1963) concept of the ‘moral economy’ with Institutional Anomie Theory (Messner and Rosenfeld 1994, 2007). Findings from a comparative survey study in three economic change regions (England and Wales, Western and Eastern Germany) show that a syndrome of market anomie comprising distrust, fear and cynical attitudes toward law increases the willingness of respectable citizens to engage in illegal and unfair practices in the marketplace.
Resumo:
This volume aims to 'bring the state back into terrorism studies' and fill the notable gap that currently exists in our understanding of the ways in which states employ terrorism as a political strategy of internal governance or foreign policy. Within this broader context, the volume has a number of specific aims. First, it aims to make the argument that state terrorism is a valid and analytically useful concept which can do much to illuminate our understanding of state repression and governance, and illustrate the varieties of actors, modalities, aims, forms, and outcomes of this form of contemporary political violence. Secondly, by discussing a rich and diverse set of empirical case studies of contemporary state terrorism this volume explores and tests theoretical notions, generates new questions and provides a resource for further research. Thirdly, it contributes to a critical-normative approach to the study of terrorism more broadly and challenges dominant approaches and perspectives which assume that states, particularly Western states, are primarily victims and not perpetrators of terrorism. Given the scarceness of current and past research on state terrorism, this volume will make a genuine contribution to the wider field, particularly in terms of ongoing efforts to generate more critical approaches to the study of political terrorism. This book will be of much interest to students of critical terrorism studies, critical security studies, terrorism and political violence and political theory in general.