185 research outputs found

    How can we use realist evaluation to better inform research into alcohol-related assaults in night-time economies? A case study using CCTV

    Get PDF
    The problem of alcohol-related assaults (ARAs) in night-time economy (NTE) precincts is an ongoing issue of policy concern and research interest. One punch truly can kill. This thesis examines the feasibility of a multi-agency linking method to more accurately count these kinds of assaults in close to real-time in order to inform suitable responses by Queensland liquor accords. This can provide more timely evidence to evaluate interventions. This thesis was the first Australian research to achieve this. The Cairns Hospital Emergency Department, the Queensland Police Service and the Cairns Regional Council Closed Circuit Television (CCTV) system are capable of providing relevant data regularly. Venues can provide relevant data but capacity to do so regularly is limited. Results support previous research regarding prevalence and time of occurrence of NTE ARAs. The thesis also uses Realist Evaluation to examine how an urban, open-space CCTV system responds to, and reduces, these NTE ARAs. The realist evaluation approach explains why quasi-experimental studies have found CCTV has no effect on this type of offence, but practitioners see CCTV as vital. The thesis shows why the theory of deterrence through CCTV does not apply to NTE ARAs. Conflicting empirical results regarding the efficacy of CCTV in broader crime reduction are explained. A case study analysis of CCTV to address NTE ARAs identifies initial context-mechanism-outcome configurations. The thesis provides evidence that suggests realist evaluation is an appropriate approach to address ongoing methodological problems in studying ways to reduce NTE ARAs

    An evaluation of the impact of the Non-ferrous Metals Crime Combating Committee on copper cable theft

    Get PDF
    English, Zulu and Northern Sotho summariesThis study aims to evaluate the Non-Ferrous Metals Crime Combating Committee's impact on combating copper cable theft in South Africa. Data was collected via in-depth interviews with awaiting trial detainees charged with copper cable theft at the Pollsmoor Correctional Centre in the Western Cape; members of the Mpumalanga and Gauteng Provincial Non-Ferrous Metals Crime Combating Committee; members of Business Against Crime South Africa; and investigators attached to Combined Private Investigations who investigate copper theft nationally. The in-depth interviews provided a comprehensive understanding of participant experiences relating to the impact of the Non-Ferrous Metals Crime Combating Committee on the combating of copper cable theft in South Africa. Moreover, the researcher performed a thorough literature study of the phenomenon locally and internationally. Research findings indicate shortcomings in the Non-Ferrous Metals Crime Combating Committee's effectiveness, limiting its impact on preventing copper cable theft. Based on these findings, the study recommends that the Non-Ferrous Metals Crime Combating Committee be replaced with a specialised South African Police Service Non-Ferrous Metals Theft Unit. Consequently, this study puts forward a set of recommendations proposing a systematic pro-active plan to address and minimise copper cable theft in South Africa. The proposed plan convincingly presents practical solutions to minimise copper cable theft and contributes to the current body of scholarship on copper cable theft in South Africa.Inhloso yalolu cwaningo ukuhlola umthelela wohlelo lwe-Non-Ferrous Metals Crime Combating Committee mayelana nokuqedwa kokutshontshwa kwentambo yogesi (copper cable). Idatha iqoqwe ngokusebenzisa izinhlolovo ezijulile ezenziwa ngokusebenzisa iziboshwa eziboshelwe izintambo zikagesi ezisamele ukugwetshwa ejele lase Pollsmoor Correctional Centre ngaseNtshonalanga Kapa, amalunga eMpumalanga and Gauteng Provincial Non-Ferrous Metals Crime Combating Committee, amalunga eBusiness Against Crime South Africa kanye nabaphenyi abahambisana nophiko lweCombined Private Investigations oluphenya ukutshontshwa kwezintambo zikagesi ezweni lonke. Lezi zinhlolovo ezijulile zinikeze ulwazi olubanzi lwabadlalindima olumayelana nomthelela weNon-Ferrous Metals Crime Combating Committee mayelana nokuqedwa kokutshontshwa kwezintambo zikagesi. Ngaphezu kwalokho, umcwaningi wenze ucwaningo olunzulu lombhalo wobuciko mayelana nokutshontshwa kwezintambo zikagesi lapha ekhaya kanye nasemhlabeni wonke jikelele. Ulwazi olutholakele lukhombisa iziqi ezikhinyabeza ukusebenza kahle kweKomithi mayelana nokuvimbela umthelela walo mayelana nokutshontshwa kwezintambo zikagesi. Ngezizathu ezisuselwa phezu kwalolu lwazi, lolu cwaningo lubeka phambili isethi lezincomo ezinganceda iKomiti ekuqiniseni umthintela walo ngokuhlongoza uhlelo olugqugquzelayo lokunciphisa izinga lokutshontshwa kwezintambo zikagesi eNingizimu Afrika. Lolu hlelo oluhlongoziwe ngaphandle kokungabaza lwethula izixazululo ezenzeka empilweni yangempela ukunciphisa ukwetshiwa kwezintambo zikagesi kanti lokhu kunegalelo kwiziko lamanje futhi luqhubekisa iziko lamanje lwezifundo esimayelana nokwetshiwa kwezintambo zikagesi.Maikemisetso a thutelo ye ke go lekola khuetso ya Komiti ya Twantsho ya Bosenyi bja Dimetale tse di Sego tsa Tshipi ka ga go lwantsha kutso ya megala ya koporo. Datha e kgobokeditswe ka mokgwa wa ditherisano tse di tseneletsego tseo di sepeditswego le mahodu a megala ya koporo ao a golegilwego ao a letetsego go sekiswa Senthareng ya Tshokollo ya Pollsmoor go la Kapa Bodikela, maloko a Diprofense tsa Mpumalanga le Gauteng a Komiti ya Twantsho ya Bosenyi bja Dimetale tse di sego tsa Tshipi, maloko a Dikgwebo tsa Kgahlanong le Bosenyi tsa Afrika Borwa le banyakisisi bao ba dirisanago le Dinyakisiso tsa Praebete tse Kopantswego tseo di nyakisisago kutso ya koporo kemong ya bosetshaba. Ditherisano tse di tseneletsego tse di file kwesiso ka botlalo ya maitemogelo a batseakarolo ye e sepelelanago le khuetso ya Komiti ya Twantsho ya Bosenyi bja Dimetale tse di sego tsa Tshipi ka ga go lwantsha kutso ya megala ya koporo. Gape, monyakisisi o dirile thutelo ya dingwalo ka botebo ya kutso ya megala ya koporo tikologong ya leagong le kemong ya boditshabatshaba. Dikhwetso tsa dinyakisiso di supa mafokodi ao a lebanego bokgoni bja Komiti tshitisong ya khuetso ya yona go kutso ya megala ya koporo. Go ya ka dikhwetso tse, thutelo ye e hlagisa sehlopha sa dikeletso tseo di ka thusago Komiti go tswetsa khuetso ya yona pele ka go sisinya leano la go itokisetsa seemo se ka diregago ka mokgwa wo o beakantswego go fokotsa kutso ya megala ya koporo ka Afrika Borwa. Leano leo le sisintswego le hlagisa ka mo go kgodisago ditharollo tse di ka phethagatswago go fokotsa kutso ya megala ya koporo ka gona la ba la seabe go le go tswetsa pele popego ya bjale ya borutegi ka ga kutso ya megala ya koporo.Criminology and Security SciencePh. D. (Criminal Justice

    Lost in translation? An examination of the implication of problem-oriented projects.

    Get PDF
    Problem-oriented policing is an approach to policing within which primacy is attached to preventing the recurrence of problem behaviours which fall within the remit of the police rather than merely reacting to individual calls for service as and when they occur. This study was born of weaknesses in existing accounts of the delivery of problem-oriented projects. Framed almost entirely in top-down conceptions of project implementation, existing studies tend to neglect the behavioural features that shape what projects deliver and the links between the behavioural and structural features of them. This study will examine the legitimacy of the dominant top-down approach to studying patterns of implementation and whether top-down and bottom-up approaches are sufficient to explain the implementation of problem-oriented projects. Drawing on evidence from in-depth case studies of two problem-oriented projects, it identifies the factors that shaped their execution. Top-down features of leadership, resources, theory, guidance, accountability and management all played a role in shaping what the projects achieved but bottom-up features of practitioner re-negotiation of aims, values, routines and conflict were also present. The study concludes that neither approach is sufficient for explaining the delivery of problem-oriented projects. Both top-down and bottom-up factors play a role and there are strong dependencies and relationships between them. An alternative approach to conceiving implementation is proposed, drawing on a broad theoretical framework developed by Giddens (1984). First, it is contended that the structural and behavioural features of projects are mutually dependent. Project structures both transform and are transformed by their interaction and reproduction by practitioners. Second, it is suggested that there may be limits to the nature of constraint in project settings as formal systems of project management may have limited authority unless they are sanctioned and mobilized by the very people they are trying to monitor and control. Third, projects are inserted into organisational contexts where there are existing taken-for-granted sets of routinely understood organisational processes and practices. New project structures interact with these and are likely to transform and be transformed by interaction with them. As such they are not likely to be implemented in a straightforward manner. Fourth, project structures change over time as they are re-negotiated by practitioners and are influenced by unanticipated events and unintended consequences of actions

    Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach

    Get PDF
    Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, which are text-based, client-server, request-response signaling protocols aimed at enabling multimedia sessions over IP networks. RTSP was conceived to set up streaming sessions from a Content / Streaming Server to a Streaming Client, while SIP was conceived to set up media (e.g.: voice, video, chat, file sharing, …) sessions among users. However, their scope has evolved and expanded over time to cover virtually any type of content and media session. As mobile networks progressively evolved towards an IP-only (All-IP) concept, particularly in 4G and 5G networks, 3GPP had to select IP-based signaling protocols for core mobile services, as opposed to traditional SS7-based protocols used in the circuit-switched domain in use in 2G and 3G networks. In that context, rather than reinventing the wheel, 3GPP decided to leverage Internet protocols and the work carried on by the IETF. Hence, it was not surprise that when 3GPP defined the so-called Packet-switched Streaming Service (PSS) for real-time continuous media delivery, it selected RTSP as its signaling protocol and, more importantly, SIP was eventually selected as the core signaling protocol for all multimedia core services in the mobile (All-)IP domain. This 3GPP decision to use off-the-shelf IETF-standardized signaling protocols has been a key cornerstone for the future of All-IP fixed / mobile networks convergence and Next Generation Networks (NGN) in general. In this context, the main goal of our work has been analyzing how such general purpose IP multimedia signaling protocols are deployed and behave over 3GPP mobile networks. Effectively, usage of IP protocols is key to enable cross-vendor interoperability. On the other hand, due to the specific nature of the mobile domain, there are scenarios where it might be possible to leverage some additional “context” to enhance the performance of such protocols in the particular case of mobile networks. With this idea in mind, the bulk of this thesis work has consisted on analyzing and optimizing the performance of SIP and RTSP multimedia signaling protocols and defining optimized deployment architectures, with particular focus on the 3GPP PSS and the 3GPP Mission Critical Push-to-Talk (MCPTT) service. This work was preceded by a detailed analysis work of the performance of underlying IP, UDP and TCP protocol performance over 3GPP networks, which provided the best baseline for the future work around IP multimedia signaling protocols. Our contributions include the proposal of new optimizations to enhance multimedia streaming session setup procedures, detailed analysis and optimizations of a SIP-based Presence service and, finally, the definition of new use cases and optimized deployment architectures for the 3GPP MCPTT service. All this work has been published in the form of one book, three papers published in JCR cited International Journals, 5 articles published in International Conferences, one paper published in a National Conference and one awarded patent. This thesis work provides a detailed description of all contributions plus a comprehensive overview of their context, the guiding principles beneath all contributions, their applicability to different network deployment technologies (from 2.5G to 5G), a detailed overview of the related OMA and 3GPP architectures, services and design principles. Last but not least, the potential evolution of this research work into the 5G domain is also outlined as well.Els mecanismes de Senyalització en xarxes de nova generació es fonamenten en protocols de senyalització definits per IETF. En particular, SIP i RTSP són dos protocols extensibles basats en missatges de text i paradigma petició-resposta. RTSP va ser concebut per a establir sessions de streaming de continguts, mentre SIP va ser creat inicialment per a facilitar l’establiment de sessions multimèdia (veu, vídeo, xat, compartició) entre usuaris. Tot i així, el seu àmbit d’aplicació s’ha anat expandint i evolucionant fins a cobrir virtualment qualsevol tipus de contingut i sessió multimèdia. A mesura que les xarxes mòbils han anat evolucionant cap a un paradigma “All-IP”, particularment en xarxes 4G i 5G, 3GPP va seleccionar els protocols i arquitectures destinats a gestionar la senyalització dels serveis mòbils presents i futurs. En un moment determinat 3GPP decideix que, a diferència dels sistemes 2G i 3G que fan servir protocols basats en SS7, els sistemes de nova generació farien servir protocols estandarditzats per IETF. Quan 3GPP va començar a estandarditzar el servei de Streaming sobre xarxes mòbils PSS (Packet-switched Streaming Service) va escollir el protocol RTSP com a mecanisme de senyalització. Encara més significatiu, el protocol SIP va ser escollit com a mecanisme de senyalització per a IMS (IP Multimedia Subsystem), l’arquitectura de nova generació que substituirà la xarxa telefònica tradicional i permetrà el desplegament de nous serveis multimèdia. La decisió per part de 3GPP de seleccionar protocols estàndards definits per IETF ha representat una fita cabdal per a la convergència del sistemes All-IP fixes i mòbils, i per al desenvolupament de xarxes NGN (Next Generation Networks) en general. En aquest context, el nostre objectiu inicial ha estat analitzar com aquests protocols de senyalització multimèdia, dissenyats per a xarxes IP genèriques, es comporten sobre xarxes mòbils 3GPP. Efectivament, l’ús de protocols IP és fonamental de cara a facilitar la interoperabilitat de solucions diferents. Per altra banda, hi ha escenaris a on és possible aprofitar informació de “context” addicional per a millorar el comportament d’aquests protocols en al cas particular de xarxes mòbils. El cos principal del treball de la tesi ha consistit en l’anàlisi i optimització del rendiment dels protocols de senyalització multimèdia SIP i RTSP, i la definició d’arquitectures de desplegament, amb èmfasi en els serveis 3GPP PSS i 3GPP Mission Critical Push-to-Talk (MCPTT). Aquest treball ha estat precedit per una feina d’anàlisi detallada del comportament dels protocols IP, TCP i UDP sobre xarxes 3GPP, que va proporcionar els fonaments adequats per a la posterior tasca d’anàlisi de protocols de senyalització sobre xarxes mòbils. Les contribucions inclouen la proposta de noves optimitzacions per a millorar els procediments d’establiment de sessions de streaming multimèdia, l’anàlisi detallat i optimització del servei de Presència basat en SIP i la definició de nous casos d’ús i exemples de desplegament d’arquitectures optimitzades per al servei 3GPP MCPTT. Aquestes contribucions ha quedat reflectides en un llibre, tres articles publicats en Revistes Internacionals amb índex JCR, 5 articles publicats en Conferències Internacionals, un article publicat en Congrés Nacional i l’adjudicació d’una patent. La tesi proporciona una descripció detallada de totes les contribucions, així com un exhaustiu repàs del seu context, dels principis fonamentals subjacents a totes les contribucions, la seva aplicabilitat a diferents tipus de desplegaments de xarxa (des de 2.5G a 5G), així una presentació detallada de les arquitectures associades definides per organismes com OMA o 3GPP. Finalment també es presenta l’evolució potencial de la tasca de recerca cap a sistemes 5G.Postprint (published version

    Exploring the meaning of crime prevention within the Tshwane Metropolitan Police Department

    Get PDF
    The purpose of this research was to investigate how members of the Tshwane Metropolitan Police Department (TMPD) perceive crime prevention within the context of metropolitan policing. Based on the social constructionist paradigm, the researcher collected data relating to the crime-prevention phenomenon from all rank groups within the organisation by making use of various focus-group and in-depth interviews. Collected data were transcribed, coded, analysed and arranged into themes, subthemes and categories. This analysis indicated that various opinions as to how the crime-prevention phenomenon applies to a metropolitan police department (MPD) currently exist within the Tshwane Metropolitan Police Department. Various opinions were identified as to why a MPD was created, what the focal point of a MPD should be and what the current focal point of the TMPD is. Participants had different views on how a MPD should participate in functions like road-traffic and by-law policing, and how these functions contribute to crime prevention. Crime prevention proved to be an ambiguous term indeed, as no common understanding of this complicated phenomenon could have been identified amongst participants. It seemed that participants were not familiar with the crime-prevention capabilities of the organisation as they advocated a comprehensive participation in crime-prevention models like situational crime prevention, social crime prevention, crime prevention through environmental design, and crime prevention through effective criminal justice, while the organisation can actually participate in these crime-prevention models only to a very limited extent. The lack of a central philosophy or strategy that describes how the TMPD should conduct its business became evident during the study, and resulted in an organisation with no uniform understanding of crime prevention. Consequently, crime prevention means different things to different members of the TMPD.Police PracticeM. Tech. (Policing

    Investigating Factors Associated with Burglary Crime Analysis using Logistic Regression Modeling

    Get PDF
    This study conducted a logistic regression to determine the relationship of factors associated with burglary to determine the variables necessary to predict criminal activity. Predictors utilized in the study; included time of day, day of week, connectors, barriers, and repeat victimization. These predictors were all incorporated to develop a model that would best predict burglary activity as it relates from a determine epicenter of activity. The predictors selected have all be shown, through research to be significant, characteristics of activity as they relate to burglary but have not been incorporated together to develop a significant model. The model compared the strength of the predictors as they relate to the distance they occur from the identified epicenter of a density plot. Data was collected from a statistically significant area associated with burglary activity. Additional information was extrapolated from criminal activity records provided by the local law enforcement. The predictors and model were statistically evaluated to determine the significance of the predictors and the ability of the model to accurately predict burglary activity within the sampled area. Analysis showed the model was significant, however the comparison in area size in association with the predictors showed to be insignificant. Multiple comparisons of area sizes were observed only to discover that greater comparison in area yielded less significant results. Further research would benefit by observing smaller clusters of activity within a one kilometer area utilizing the same predictors

    Dynamics and Social Impact of Migration

    Get PDF

    Strategies to Secure a Voice Over Internet Protocol Telephone System

    Get PDF
    Voice over internet protocol (VoIP) provides cost-effective phone service over a broadband internet connection rather than analog telephone services. While VoIP is a fast-growing technology, there are issues with intercepting and misusing transmissions, which are security concerns within telecommunication organizations and for customers. Grounded in the routine activity theory, the purpose of this multiple case study was to explore strategies information technology (IT) security managers used to secure VoIP telephone systems in telecommunication organizations. The participants consisted of nine IT security managers from three telecommunication organizations in New York who possessed the knowledge and expertise to secure a VoIP telephone system. The data were collected using semi structured interviews, note taking, and one document from one organization. Four themes emerged from the thematic analysis: best practices for VoIP security, using a secure VoIP provider, VoIP security recommendations, and awareness of future security concerns. A key recommendation for IT security professionals is to ensure encryption to secure a VoIP telephone system. The implications for positive social change include the potential for IT security managers and telecommunication organizations to reduce data breaches and the theft of their customers’ identities and credit card information
    corecore