Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Ideology (3)
- Security (3)
- Radicalisation (2)
- Analytics (1)
- Anti-social behaviour (1)
-
- At-risk (1)
- Ballistics system (1)
- Big data (1)
- Business intelligence (1)
- CPTED (1)
- Cloud Services (1)
- Conference (1)
- Counter violent-extremism (1)
- Counter-terrorism (1)
- Crime Prevention Through Environmental Design (1)
- Data discovery (1)
- Disengagement (1)
- Encryption (1)
- Entitativity (1)
- Event processing (1)
- Ffirearm identification (1)
- Grounded theory (1)
- Hadoop (1)
- Identification (1)
- Image processing (1)
- Intelligence (1)
- Investigation (1)
- Law (1)
- Leavers (1)
- Mobility (1)
Articles 1 - 9 of 9
Full-Text Articles in Entire DC Network
Violent-Extremism: An Examination Of A Definitional Dilemma, Jason-Leigh Striegher
Violent-Extremism: An Examination Of A Definitional Dilemma, Jason-Leigh Striegher
Australian Security and Intelligence Conference
This article aims to demonstrate how radicalisation, violent-extremism and terrorism are terms often used interchangeably – terms that do not have the same meaning and are generally poorly defined. It will reveal, as with other terminologies pertaining to this area of interest, how violent-extremism has no universally accepted definition, and remains tainted with ambiguity. Arguably, the term is predominantly used as a social label in discussions on terrorism and other forms of extreme violence – particularly applied to those who have a distorted interpretation of religious ideology to justify the use of violence to achieve specific socio-political aimsTo provide a …
Understanding The Role Of Social Groups In Radicalisation, Kira Harris, Eyal Gringart, Deirdre Drake
Understanding The Role Of Social Groups In Radicalisation, Kira Harris, Eyal Gringart, Deirdre Drake
Australian Security and Intelligence Conference
The inability to form psychological profiles of individual members across a variety of extremist groups, as well as the recognition in extremism and terrorism research indicates that no adequate personality profile exists. This requires an analysis of other factors that influence the radicalisation process. By drawing on social identity theory, this paper offers a psycho-social explanation for how people define themselves in relation to their social group, as well as how the intra-group relationships can lead to extreme behaviour and resistance to counter efforts. These groups promote a salient social identity that becomes intrinsic to the self to the extent …
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
Australian Security and Intelligence Conference
From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to the ethnic cleansing rumors in India and increasingly used by pedophiles, social media is a very powerful tool for pedophiles, troublemakers, criminals and even terrorists to target individuals and even to go against the establishment. On the other hand, social media can save lives in a disaster, and its a natural extension of community policing or engagement. Community engagement is a must-have strategy for any public safety and security agency. However, this strategy requires the removal of stovepipe processes and systems within an agency, allowing …
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
Australian Security and Intelligence Conference
Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
Australian Security and Intelligence Conference
No abstract provided.
Efficacy Of Property Marking: Police Identification Of Stolen Property, Craig Separovic, David J. Brooks Dr.
Efficacy Of Property Marking: Police Identification Of Stolen Property, Craig Separovic, David J. Brooks Dr.
Australian Security and Intelligence Conference
Property marking, as a situational crime prevention technique, has found to be largely ineffectual in the reduction of property theft, although past studies have not considered the role property marking as an aid to the return of stolen or lost property. However, automotive identification and some studies have found that in some cases property marking is effective. Furthermore, many crime prevention groups focus on property marking as a means to reduce crime and the fear of crime.
Therefore, the study investigated the processes of lost, stolen and seized goods by law enforcement personnel. The study undertook a qualitative analysis of …
Entitativity And Ideology: A Grounded Theory Of Disengagement, Kira J. Harris
Entitativity And Ideology: A Grounded Theory Of Disengagement, Kira J. Harris
Australian Security and Intelligence Conference
Highly entitative sub-groups with strong ideologies ensure members are committed to the groups cause making disengagement a significant life event. This paper provides an insight into the current study of the psychological and social factors influencing the experience of personal disengagement from HESGIs. Semi-structured interviews were held with former members of one percent motorcycle clubs, fundamental religious groups, a pseudopsychotherapeutic cult, political activist groups, and military Special Forces. Using purposive sampling, participants were recruited through informal networks, internet requests and snowballing methods. Data analysis is at the preliminary stages, but through the coding and analysis methods of Strauss and Corbin’s …
An Exploration Of 1st And 2nd Generation Cpted For End Of Year School Leavers At Rottnest Island, John Letch, Ellice Mcglinn, Johnathon F. Bell, Emma Downing, David M. Cook
An Exploration Of 1st And 2nd Generation Cpted For End Of Year School Leavers At Rottnest Island, John Letch, Ellice Mcglinn, Johnathon F. Bell, Emma Downing, David M. Cook
Australian Security and Intelligence Conference
The end-of-year post exam celebrations for Year 12 secondary school students presents a unique crime prevention proposition in Australia each year. Students of approximately 17 years of age congregate in a variety of locations in large groups known as ‘Leavers’. Traditionally a number of 'rite of passage' activities, fuelled by additional factors such as alcohol, drugs and peer pressure, have resulted in an increased risk of crime and anti-social behaviour. This paper examines mitigation strategies aligned with Crime Prevention Through Environmental Design (CPTED) when placed at an event. Using the annual Leavers cohort at Rottnest Island, W.A., a number of …
Firearm Forensics Based On Ballistics Cartridge Case Image Segmentation Using Colour Invariants, Dongguang Li
Firearm Forensics Based On Ballistics Cartridge Case Image Segmentation Using Colour Invariants, Dongguang Li
Australian Security and Intelligence Conference
Ballistics firearm identification based on image processing is of paramount importance in criminal investigation. The efficiency of traditional ballistics imaging system is heavily dependent upon the expertise and experience of end-user. An intelligent ballistics imaging system is highly demanded to address this issues. The segmentation of cartridge case object from the original image is a key step to subsequent process. It is very difficult to segment cartridge case from the original image using traditional threshold based methods due to the shadows or unlimited environments to acquire image. In this paper, we proposed a novel approach based upon the colour invariant …