445 resultados para offender anonymity
Resumo:
Alcohol restrictions have been implemented in many Indigenous communities internationally, with the aim to reduce alcohol-related harm. Whilst a range of reviews have evaluated such restrictions using different measures, drink driving has been described in several reviews as increasing. Presently, this remains anecdotal; with limited empirical evidence to corroborate these reports. In Australia, the Queensland government introduced alcohol management plans in remote Indigenous communities, during 2002-2003, with total alcohol prohibition commencing in 2008 in some communities. Given road crashes are one of the leading causes of injuries for Indigenous peoples, this study aims to identify if the restrictions have been successful in reducing drink driving or have increased such behaviour. We examine this by reviewing changes in conviction rates and in offender and offence characteristics following the 2008 restrictions. Using de-identified Queensland court drink driving conviction data (2006-2011), from four Indigenous communities, Robust Poisson regression models compared counts of drink driving convictions pre (2006-2008) versus post SRS (2009-2011). Changes in offender characteristics and conviction details (blood alcohol concentration (BAC) and sentencing severity), were examined using chi-squares. Results indicate a decline in convictions after the 2008 SRS in three communities. However, a significant increase in convictions was identified in one study community. Community-level disparity included significant decline in BAC in one community (χ 2=5.58, p=0.02) compared with the three other communities that did not indicate change and a significant increase the number of women convicted in two communities (χ 2=17.36, p<0.01; χ 2=5.79, p=0.04). Alcohol restrictions may have important implications in road safety with these reductions in convictions and BAC in some communities. However, an increase in the number of women convicted and limited changes in BAC for other communities demonstrate the complex relationship between alcohol use, remoteness and driving. Greater focus on demand reduction strategies may be necessary to address alcohol misuse.
Resumo:
This study aimed to investigate drink driving in a sample of general drivers and convicted drunk driving offenders in Guangzhou, China. The study also aimed to explore some potential factors that impact on alcohol-related driving behaviour. Samples of 406 general drivers and 101 drunk driving offenders were recruited between May and October 2012. A survey was used to collect information about demographic characteristics, knowledge, attitudes and practices related to drink driving. The Alcohol Use Disorders Identification Test (AUDIT) was used to assess possible drinking problems. The average age reported for starting to drink alcohol for both groups of participants was around 19 years old. The mean AUDIT score of general drivers was 7.4 (SD = 5.4) representing a low level of alcohol problems, and for convicted drunk driving offenders was 11.1 (SD = 5.9) representing a medium level of alcohol problems (significant difference between means, t = 5.75, p < 0.001). AUDIT scores indicated that a substantial proportion (65%) of the offenders had medium to high levels of alcohol use disorders, compared with 38.5% among general drivers. Offenders who knew the drunk driving legal limit had a lower AUDIT score (M = 9.8, SD = 5.16) than those who did not know it (M = 12.2, SD = 6.257, t = -1.987. p = 0.05). In addition, offenders who were novice drivers (licensed less than 2 years) had a higher AUDIT score (M = 16.4, SD = 7.6) than the other three driver experience categories used.
Resumo:
This article examines the conditions of penal hope behind suggestions that the penal expansionism of the last three decades may be at a ‘turning point’. The article proceeds by outlining David Green’s (2013b) suggested catalysts of penal reform and considers how applicable they are in the Australian context. Green’s suggested catalysts are: the cycles and saturation thesis; shifts in the dominant conception of the offender; the global financial crisis (GFC) and budgetary constraints; the drop in crime; the emergence of the prisoner re‐entry movement; apparent shifts in public opinion; the influence of evangelical Christian ideas; and the Right on Crime initiative. The article then considers a number of other possible catalysts or forces: the role of trade unions; the role of courts; the emergence of recidivism as a political issue; the influence of ‘evidence based’/‘what works’ discourse; and the emergence of justice reinvestment (JR). The article concludes with some comments about the capacity of criminology and criminologists to contribute to penal reductionism, offering an optimistic assessment for the prospects of a reflexive criminology that engages in and engenders a wider politics around criminal justice issues.
Resumo:
Historically, children in criminal justice proceedings were treated much the same as adults and subject to the same criminal justice processes as adults. Until the early twentieth century, children in Australia were even subjected to the same penalties as adults, including hard labour and corporal and capital punishment (Carrington & Pereira 2009). Until the mid-nineteenth century, there was no separate category of ’juvenile offender’ in Western legal systems and children as young as six years of age were incarcerated in Australian prisons (Cunneen & White 2007). It is widely acknowledged today, however, both in Australia and internationally, that juveniles should be subject to a system of criminal justice that is separate from the adult system and that recognises their inexperience and immaturity. As such, juveniles are typically dealt with separately from adults and treated less harshly than their adult counterparts. The United Nations’ (1985: 2) Standard Minimum Rules for the Administration of Juvenile Justice (the ‘Beijing Rules’) stress the importance of nations establishing a set of laws, rules and provisions specifically applicable to juvenile offenders and institutions and bodies entrusted with the functions of the administration of juvenile justice and designed to meet the varying needs of juvenile offenders, while protecting their basic rights. In each Australian jurisdiction, except Queensland, a juvenile is defined as a person aged between 10 and 17 years of age, inclusive. In Queensland, a juvenile is defined as a person aged between 10 and 16 years, inclusive. In all jurisdictions, the minimum age of criminal responsibility is 10 years. That is, children under 10 years of age cannot be held legally responsible for their actions.
Resumo:
Sexual offending against children is a highly emotive issue. It is nonetheless important that public policy initiatives to prevent and/or respond to child sexual abuse are based on the available evidence about child sex offenders. This paper addresses five common misperceptions about the perpetrators of sexual offences against children. Specifically, the issues addressed include whether all child sex offenders are ‘paedophiles’, who sexually abuse children, whether most child sex offenders were victims of sexual abuse themselves, rates of recidivism among child sex offenders and the number of children sex offenders typically abuse before they are detected by police. The evidence outlined in this paper highlights that there are few black and white answers to these questions. Perpetrators of sexual crimes against children are not, contrary to widespread opinion, a homogenous group. Rather, there are a number of varied offending profiles that characterise child sex offenders. Gaining an understanding of the nuances of this offender population is critical if children are to be protected from sexual abuse.
Resumo:
Female imprisonment rates have dramatically increased over the last two decades at state, national and international levels. This paper reviews women's imprisonment in Australia and looks at sentence management and programs, highlighting the critical issues which impact daily on female inmates.
Resumo:
Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.
Resumo:
This paper grapples with the question of how progressive criminologists might approach working with people who have committed violent or predatory crimes, or are ‘at risk’ of doing so. Progressives have often been uneasy about ‘intervention’ with people who offend: but in the face of the destructiveness of violence, especially in some parts of the world, a posture of simple non-intervention won’t suffice. I suggest three central principles – which I call consciousness, solidarity and hope – that may guide us in developing ways of working with offenders that are both progressive and effective.
Resumo:
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Previous group signature constructions did not provide any disclosure capability, or at best a very limited one (such as subset membership). Our scheme offers a very powerful language for disclosing exactly in what capacity a subgroup of signers is making a signature on behalf of the group.
Resumo:
The sentencing of a self-confessed child sex offender and senior Brisbane Anglican priest Canon Barry Greaves in Brisbane District Court last Friday (April 24, 2009) is a significant event for many reasons and for many people. It is a significant event because Greaves was a priest at Boonah in the early 1980s when he committed the offences and because knowledge of his own sex offending against children failed to deter him from seeking and gaining high office in the Anglican Church. He accepted the position of being an Archbishop’s chaplain to Brisbane Archbishop Dr Peter Hollingworth in 1999. He stayed on as an Archbishop’s chaplain to the incoming Archbishop Dr Phillip Aspinall in 2002 and not even the disgrace of the sex scandal in the Brisbane Diocese resulted in a glimmer of guilt that maybe he was not an appropriate person to be providing pastoral care to other victims of sexual assault. Families of victims who were referred to Greaves for pastoral care are now flabbergasted by the double betrayal. “I went looking for comfort and now I discover I was confiding in a f***ing pedophile,” one woman said.
Resumo:
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
Resumo:
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.
Resumo:
Aggressive behavior at the steering wheel has been indicated as a contributing factor in a majority of crashes and anger has been compared to alcohol impairment in terms of probability to cause a crash. It has been shown that being in a state of anger or excitement while driving can decrease the drivers’ performances. . This paper reports the evaluation of 6 novel design alternatives of In-Vehicle Information Systems (IVIS) aimed at mitigating driver aggression. Each application presented was designed to tackle the following contributing factors to driver aggression: competitiveness, anonymity, territoriality, stress as well as social and emotional isolation. The 6 applications were simulated using computer vision algorithm to automatically overlay the real traffic conditions with ‘Head-Up Display’ visualizations. Two applications emerged over the others from participant’s evaluation: shared music combined the known calming effect of music with the sense of sympathy and intimacy caused by hearing other drivers’ music. The Shared Snapshot application provided an immediate gratification and was evaluated as a potential prevention of roadside quarrels. The paper presents Theoretical foundation, participant’s evaluations, implications and limitations of the study.
Resumo:
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions