16,361 research outputs found

    Community Self Help

    Get PDF
    This paper advocates controlling crime through a greater emphasis on precautions taken not by individuals, but by communities. The dominant battles in the literature today posit two central competing models of crime control. In one, the standard policing model, the government is responsible for the variety of acts that are necessary to deter and prosecute criminal acts. In the other, private self-help, public law enforcement is largely supplanted by providing incentives to individuals to self-protect against crime. There are any number of nuances and complications in each of these competing stories, but the literature buys into this binary matrix

    The Development and Failure of Social Norms in Second Life

    Get PDF
    This Note analyzes the development and efficacy of social norms in maximizing the welfare of participants in the virtual community of Second Life. Although some of these norms developed appropriately in response to the objectives and purposes of this virtual world, Second Life is so thoroughly steeped in conditions that have impeded the development of successful social norms in other communities that any system of social norms in Second Life will ultimately fail. Because social norms will likely,fail to successfully maximize resident welfare, regulatory schemes imposed both by the operators of the virtual world and by real-world governing institutions are needed to enhance the functioning of this particular alternative reality inhabited by millions

    The Development and Failure of Social Norms in Second Life

    Get PDF
    This Note analyzes the development and efficacy of social norms in maximizing the welfare of participants in the virtual community of Second Life. Although some of these norms developed appropriately in response to the objectives and purposes of this virtual world, Second Life is so thoroughly steeped in conditions that have impeded the development of successful social norms in other communities that any system of social norms in Second Life will ultimately fail. Because social norms will likely,fail to successfully maximize resident welfare, regulatory schemes imposed both by the operators of the virtual world and by real-world governing institutions are needed to enhance the functioning of this particular alternative reality inhabited by millions

    Improving health and public safety through knowledge management

    Get PDF
    This paper reports on KM in public healthcare and public safety. It reflects the experiences of the author as a CIO (Chief Information Officer) in both industries in Australia and New Zealand. There are commonalities in goals and challenges in KM in both industries. In the case of public safety a goal of modern policing theory is to move more towards intelligence-driven practice. That means interventions based upon research and analysis of information. In healthcare the goals include investment in capacity based upon knowledge of healthcare needs, evidence-based service planning and care delivery, capture of information and provision of knowledge at the point-of-care and evaluation of outcomes. The issue of knowledge management is explored from the perspectives of the user of information and from the discipline of Information Technology and its application to healthcare and public safety. Case studies are discussed to illustrate knowledge management and limiting or enabling factors. These factors include strategy, architecture, standards, feed-back loops, training, quality processes, and social factors such as expectations, ownership of systems and politics

    CGAMES'2009

    Get PDF

    Detect the unexpected: a science for surveillance

    Get PDF
    Purpose – The purpose of this paper is to outline a strategy for research development focused on addressing the neglected role of visual perception in real life tasks such as policing surveillance and command and control settings. Approach – The scale of surveillance task in modern control room is expanding as technology increases input capacity at an accelerating rate. The authors review recent literature highlighting the difficulties that apply to modern surveillance and give examples of how poor detection of the unexpected can be, and how surprising this deficit can be. Perceptual phenomena such as change blindness are linked to the perceptual processes undertaken by law-enforcement personnel. Findings – A scientific programme is outlined for how detection deficits can best be addressed in the context of a multidisciplinary collaborative agenda between researchers and practitioners. The development of a cognitive research field specifically examining the occurrence of perceptual “failures” provides an opportunity for policing agencies to relate laboratory findings in psychology to their own fields of day-to-day enquiry. Originality/value – The paper shows, with examples, where interdisciplinary research may best be focussed on evaluating practical solutions and on generating useable guidelines on procedure and practice. It also argues that these processes should be investigated in real and simulated context-specific studies to confirm the validity of the findings in these new applied scenarios

    Taking UCITA on the Road: What Lessons Have We Learned?

    Get PDF

    Open Home Networks: the TEAHA Approach

    Get PDF
    The current trend for home appliances is networking. Although more and more of these appliances are networked, there is not a standard way of interaction, which restrains the development of services for in-home networks. The lack of standardisation is partly due to a legacy of business interests; white goods, audio video equipment, security, and personal digital appliances all have a different background and have different business models. Rather than profound standardisation we propose secure seamless interworking of technologies, applications, and business interests. In this paper we present an architecture which is embedded in legacy technology. Our approach combines known design patterns, augments existing technology, and facilitates so-called business clusters. Further, we discuss a prototype implementation that integrates as an example OSGI, ZIGBEE, and UPNP technology with CECED (white goods) business interests. The work reported in this paper has been executed in an international industrial project: TEAHA
    corecore