5,619 research outputs found

    Gene Technology in the eyes of the public and experts. Moral opinions, attitudes and risk perception.

    Get PDF
    Risk perceptions and attitudes to genetically modified food (GMF) were investigated in a survey study of the public (N=469) and experts (N=49). The response rate was 47 percent for the public. For the experts, response rate was 60 percent. GMF technology was rated as the worst of 18 technologies by members of the public and highly replaceable. Experts had a very different view but also saw GMF as replaceable. Models of risk perceptions and attitudes with regard to policy and consumer intentions were fitted to data. It was found that a very large share of the variance, about 70 percent, was accounted for in the latter cases, while risk perception was somewhat harder to account for (about 50 percent was explained). Traditional explanatory factors such as Dread and Novelty were weak explanatory factors as compared to new approaches, which included Interfering with Nature, Moral value of technology and Epistemic trust. Experts were throughout much more positive to GMF than were members of the public. However, their attitudes and risk perceptions still showed dynamic properties similar to those found in the data from the public. The differences between experts and the public could be well explained in terms of the models tested. In comparisons with recent Eurobarometer studies of attitudes towards GMF, risk emerged in the present study as a more important factor in attitudes, equally important as benefits. The models formulated for the present data were about twice as powerful as those in published analyses of Eurobarometer data.Gene technology; risk perception; policy attitude; consumer behavior; experts; epistemic trust; risk sensitivity

    TLAD 2011 Proceedings:9th international workshop on teaching, learning and assesment of databases (TLAD)

    Get PDF
    This is the ninth in the series of highly successful international workshops on the Teaching, Learning and Assessment of Databases (TLAD 2011), which once again is held as a workshop of BNCOD 2011 - the 28th British National Conference on Databases. TLAD 2011 is held on the 11th July at Manchester University, just before BNCOD, and hopes to be just as successful as its predecessors.The teaching of databases is central to all Computing Science, Software Engineering, Information Systems and Information Technology courses, and this year, the workshop aims to continue the tradition of bringing together both database teachers and researchers, in order to share good learning, teaching and assessment practice and experience, and further the growing community amongst database academics. As well as attracting academics from the UK community, the workshop has also been successful in attracting academics from the wider international community, through serving on the programme committee, and attending and presenting papers.Due to the healthy number of high quality submissions this year, the workshop will present eight peer reviewed papers. Of these, six will be presented as full papers and two as short papers. These papers cover a number of themes, including: the teaching of data mining and data warehousing, databases and the cloud, and novel uses of technology in teaching and assessment. It is expected that these papers will stimulate discussion at the workshop itself and beyond. This year, the focus on providing a forum for discussion is enhanced through a panel discussion on assessment in database modules, with David Nelson (of the University of Sunderland), Al Monger (of Southampton Solent University) and Charles Boisvert (of Sheffield Hallam University) as the expert panel

    TLAD 2011 Proceedings:9th international workshop on teaching, learning and assesment of databases (TLAD)

    Get PDF
    This is the ninth in the series of highly successful international workshops on the Teaching, Learning and Assessment of Databases (TLAD 2011), which once again is held as a workshop of BNCOD 2011 - the 28th British National Conference on Databases. TLAD 2011 is held on the 11th July at Manchester University, just before BNCOD, and hopes to be just as successful as its predecessors.The teaching of databases is central to all Computing Science, Software Engineering, Information Systems and Information Technology courses, and this year, the workshop aims to continue the tradition of bringing together both database teachers and researchers, in order to share good learning, teaching and assessment practice and experience, and further the growing community amongst database academics. As well as attracting academics from the UK community, the workshop has also been successful in attracting academics from the wider international community, through serving on the programme committee, and attending and presenting papers.Due to the healthy number of high quality submissions this year, the workshop will present eight peer reviewed papers. Of these, six will be presented as full papers and two as short papers. These papers cover a number of themes, including: the teaching of data mining and data warehousing, databases and the cloud, and novel uses of technology in teaching and assessment. It is expected that these papers will stimulate discussion at the workshop itself and beyond. This year, the focus on providing a forum for discussion is enhanced through a panel discussion on assessment in database modules, with David Nelson (of the University of Sunderland), Al Monger (of Southampton Solent University) and Charles Boisvert (of Sheffield Hallam University) as the expert panel

    Analysis of digital evidence in identity theft investigations

    Get PDF
    Identity Theft could be currently considered as a significant problem in the modern internet driven era. This type of computer crime can be achieved in a number of different ways; various statistical figures suggest it is on the increase. It intimidates individual privacy and self assurance, while efforts for increased security and protection measures appear inadequate to prevent it. A forensic analysis of the digital evidence should be able to provide precise findings after the investigation of Identity Theft incidents. At present, the investigation of Internet based Identity Theft is performed on an ad hoc and unstructured basis, in relation to the digital evidence. This research work aims to construct a formalised and structured approach to digital Identity Theft investigations that would improve the current computer forensic investigative practice. The research hypothesis is to create an analytical framework to facilitate the investigation of Internet Identity Theft cases and the processing of the related digital evidence. This research work makes two key contributions to the subject: a) proposing the approach of examining different computer crimes using a process specifically based on their nature and b) to differentiate the examination procedure between the victim’s and the fraudster’s side, depending on the ownership of the digital media. The background research on the existing investigation methods supports the need of moving towards an individual framework that supports Identity Theft investigations. The presented investigation framework is designed based on the structure of the existing computer forensic frameworks. It is a flexible, conceptual tool that will assist the investigator’s work and analyse incidents related to this type of crime. The research outcome has been presented in detail, with supporting relevant material for the investigator. The intention is to offer a coherent tool that could be used by computer forensics investigators. Therefore, the research outcome will not only be evaluated from a laboratory experiment, but also strengthened and improved based on an evaluation feedback by experts from law enforcement. While personal identities are increasingly being stored and shared on digital media, the threat of personal and private information that is used fraudulently cannot be eliminated. However, when such incidents are precisely examined, then the nature of the problem can be more clearly understood

    Complete Issue 52(1)

    Get PDF
    Complete digitized issue (volume 52, issue 1) of Speaker & Gavel

    Graph-based Temporal Analysis in Digital Forensics

    Get PDF
    Establishing a timeline as part of a digital forensics investigation is a vital part of understanding the order in which system events occurred. However, most digital forensics tools present timelines as histogram or as raw artifacts. Consequently, digital forensics examiners are forced to rely on manual, labor-intensive practices to reconstruct system events. Current digital forensics analysis tools are at their technological limit with the increasing storage and complexity of data. A graph-based timeline can present digital forensics evidence in a structure that can be immediately understood and effortlessly focused. This paper presents the Temporal Analysis Integration Management Application (TAIMA) to enhance digital forensics analysis via information visualization (infovis) techniques. TAIMA is a prototype application that provides a graph-based timeline for event reconstruction using abstraction and visualization techniques. A workflow illustration and pilot usability study provided evidence that TAIMA assisted digital forensics specialists in identifying key system events during digital forensics analysis

    Treatments and predictors of violent behaviour: the role of fantasy and schizotypal personality traits

    Get PDF
    This research project primarily investigated the relationship between fantasy, schizotypal personality traits, psychological distress, criminal thinking styles and violent offending behaviour. A number of studies have explored the relationship between fantasy life and sexual offending, but few have investigated this in relation to non -sexual violence. This is the first of its kind to do so with a forensic sample, where violent behaviour is corroborated, rather than self-reported. Firstly a systematic review of the literature around the impact of psychological therapies on reducing violent behaviour was completed. Ten papers were identified and critically reviewed. The resulting synthesis of these studies indicated that psychological intervention, at least in the short term, can reduce violent behaviour. However, there was little evidence of a long -term impact of psychological therapies on reducing violent behaviour. The second part of the research project was a survey of 138 male prisoners which investigated the relationships between psychological distress, schizotypal personality traits and criminal thinking styles. In addition, differences in fantasy styles: negative, positive and narcissistic, and schizotypal personality according to level of violent behaviour were explored, as were differences in fantasy styles between criminal thinking style groups. Kendall's Tau -b correlation analyses, Kruskal-Wallis test and post hoc specific comparison tests indicated no significant differences in fantasy style scores between the violent behaviour groups or thinking style categories, but revealed that many of the variables explored were strongly correlated. The findings differed from those of a previous general population study, by finding that fantasy style did not differ according to level of violence, but provided new findings in terms of relationships between criminal thinking styles and fantasy style. In an area with little existing research this warrants further exploration

    Doctorate in Clinical Psychology: Main Research Portfolio

    Get PDF
    • 

    corecore