Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Criminology

Understanding The Role Of Social Groups In Radicalisation, Kira Harris, Eyal Gringart, Deirdre Drake Jan 2014

Understanding The Role Of Social Groups In Radicalisation, Kira Harris, Eyal Gringart, Deirdre Drake

Australian Security and Intelligence Conference

The inability to form psychological profiles of individual members across a variety of extremist groups, as well as the recognition in extremism and terrorism research indicates that no adequate personality profile exists. This requires an analysis of other factors that influence the radicalisation process. By drawing on social identity theory, this paper offers a psycho-social explanation for how people define themselves in relation to their social group, as well as how the intra-group relationships can lead to extreme behaviour and resistance to counter efforts. These groups promote a salient social identity that becomes intrinsic to the self to the extent …


The Bad Guys Are Using It, Are You?, Hong-Eng Koh Jan 2014

The Bad Guys Are Using It, Are You?, Hong-Eng Koh

Australian Security and Intelligence Conference

From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to the ethnic cleansing rumors in India and increasingly used by pedophiles, social media is a very powerful tool for pedophiles, troublemakers, criminals and even terrorists to target individuals and even to go against the establishment. On the other hand, social media can save lives in a disaster, and its a natural extension of community policing or engagement. Community engagement is a must-have strategy for any public safety and security agency. However, this strategy requires the removal of stovepipe processes and systems within an agency, allowing …


I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone Jan 2014

I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone

Australian Security and Intelligence Conference

Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …


7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University Jan 2014

7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University

Australian Security and Intelligence Conference

No abstract provided.


Efficacy Of Property Marking: Police Identification Of Stolen Property, Craig Separovic, David J. Brooks Dr. Jan 2014

Efficacy Of Property Marking: Police Identification Of Stolen Property, Craig Separovic, David J. Brooks Dr.

Australian Security and Intelligence Conference

Property marking, as a situational crime prevention technique, has found to be largely ineffectual in the reduction of property theft, although past studies have not considered the role property marking as an aid to the return of stolen or lost property. However, automotive identification and some studies have found that in some cases property marking is effective. Furthermore, many crime prevention groups focus on property marking as a means to reduce crime and the fear of crime.

Therefore, the study investigated the processes of lost, stolen and seized goods by law enforcement personnel. The study undertook a qualitative analysis of …


Firearm Forensics Based On Ballistics Cartridge Case Image Segmentation Using Colour Invariants, Dongguang Li Jan 2009

Firearm Forensics Based On Ballistics Cartridge Case Image Segmentation Using Colour Invariants, Dongguang Li

Australian Security and Intelligence Conference

Ballistics firearm identification based on image processing is of paramount importance in criminal investigation. The efficiency of traditional ballistics imaging system is heavily dependent upon the expertise and experience of end-user. An intelligent ballistics imaging system is highly demanded to address this issues. The segmentation of cartridge case object from the original image is a key step to subsequent process. It is very difficult to segment cartridge case from the original image using traditional threshold based methods due to the shadows or unlimited environments to acquire image. In this paper, we proposed a novel approach based upon the colour invariant …