Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Security (3)
- Analytics (1)
- Big data (1)
- Business intelligence (1)
- Cloud Services (1)
-
- Conference (1)
- Data discovery (1)
- Encryption (1)
- Event processing (1)
- Hadoop (1)
- Identification (1)
- Ideology (1)
- Intelligence (1)
- Investigation (1)
- Law (1)
- Mobility (1)
- NoSQL. (1)
- Ontology (1)
- Pattern recognition (1)
- Privacy (1)
- Property marking (1)
- Psychology (1)
- Radicalisation (1)
- Semantic (1)
- Sentiment analysis (1)
- Situational crime prevention (1)
- Social Identity (1)
- Social media (1)
- Stolen property (1)
Articles 1 - 5 of 5
Full-Text Articles in Criminology
Understanding The Role Of Social Groups In Radicalisation, Kira Harris, Eyal Gringart, Deirdre Drake
Understanding The Role Of Social Groups In Radicalisation, Kira Harris, Eyal Gringart, Deirdre Drake
Australian Security and Intelligence Conference
The inability to form psychological profiles of individual members across a variety of extremist groups, as well as the recognition in extremism and terrorism research indicates that no adequate personality profile exists. This requires an analysis of other factors that influence the radicalisation process. By drawing on social identity theory, this paper offers a psycho-social explanation for how people define themselves in relation to their social group, as well as how the intra-group relationships can lead to extreme behaviour and resistance to counter efforts. These groups promote a salient social identity that becomes intrinsic to the self to the extent …
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
Australian Security and Intelligence Conference
From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to the ethnic cleansing rumors in India and increasingly used by pedophiles, social media is a very powerful tool for pedophiles, troublemakers, criminals and even terrorists to target individuals and even to go against the establishment. On the other hand, social media can save lives in a disaster, and its a natural extension of community policing or engagement. Community engagement is a must-have strategy for any public safety and security agency. However, this strategy requires the removal of stovepipe processes and systems within an agency, allowing …
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
Australian Security and Intelligence Conference
Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
Australian Security and Intelligence Conference
No abstract provided.
Efficacy Of Property Marking: Police Identification Of Stolen Property, Craig Separovic, David J. Brooks Dr.
Efficacy Of Property Marking: Police Identification Of Stolen Property, Craig Separovic, David J. Brooks Dr.
Australian Security and Intelligence Conference
Property marking, as a situational crime prevention technique, has found to be largely ineffectual in the reduction of property theft, although past studies have not considered the role property marking as an aid to the return of stolen or lost property. However, automotive identification and some studies have found that in some cases property marking is effective. Furthermore, many crime prevention groups focus on property marking as a means to reduce crime and the fear of crime.
Therefore, the study investigated the processes of lost, stolen and seized goods by law enforcement personnel. The study undertook a qualitative analysis of …