11,492 research outputs found

    Application of a news quality monitoring methodology

    Get PDF
    This set of case studies has two main purposes Case studies illustrating the usefulness of the quality monitoring framework set out in chapter one of The Future of Quality News Journalism: a cross-continental analysis The material that is produced below is still under development and may be modified when the final draft is produced shortly. a) Introduction This set of case studies has two main purposes. First, to provide examples of how the quality monitoring framework outlined in chapter one might be applied to online news stories of quality mainstream news providers. Second, to provide some representative sample evidence of the quality of the hard news provision of some of the best of the mainstream news providers. This is intended to back up the case for their continuing importance that is made within the bonus chapter (available only online at: HTTP://CLOK.UCLAN.AC.UK/7824) There are several things that it is important to emphasise. First, as chapter one makes clear, the preferred means of quality assessment would be via the kind of expert/professional panels outlined and suggested there. This should enhance the rigour of the evaluative process in so far as several pairs of expert eyes are likely to pick up inconsistencies in the application of that process in a way that would not be possible for one. Given that such panels do not yet exist to apply it and that the purpose here is mainly illustrative, the evaluations have been made by the author alone. That means that they should be treated with greater caution than had they been panel produced, but providing that is remembered it does not detract from their illustrative value. For the purposes of transparency and the need to provide readers with enough information to help them cross-check the judgments for themselves if they so wish, concise sample reasons are provided at the end of each piece as to why the individual quality ratings have been arrive

    The discourse of Olympic security 2012 : London 2012

    Get PDF
    This paper uses a combination of CDA and CL to investigate the discursive realization of the security operation for the 2012 London Olympic Games. Drawing on Didier Bigo’s (2008) conceptualisation of the ‘banopticon’, it address two questions: what distinctive linguistic features are used in documents relating to security for London 2012; and, how is Olympic security realized as a discursive practice in these documents? Findings suggest that the documents indeed realized key banoptic features of the banopticon: exceptionalism, exclusion and prediction, as well as what we call ‘pedagogisation’. Claims were made for the exceptional scale of the Olympic events; predictive technologies were proposed to assess the threat from terrorism; and documentary evidence suggests that access to Olympic venues was being constituted to resemble transit through national boundarie

    POINTER:a GDPR-compliant framework for human pentesting (for SMEs)

    Get PDF
    Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to repel human-targeted attacks. There are two problems with current frameworks: (1) few of these have been developed with SMEs in mind, and (2) many deploy spear phishing, thereby invading employee privacy, which could be illegal under the new European General Data Protection Regulation (GDPR) legislation. We therefore propose the PoinTER (Prepare TEst Remediate) Human Pentesting Framework. We subjected this framework to expert review and present it to open a discourse on the issue of formulating a GDPR- compliant Privacy-Respecting Employee Pentest for SMEs

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Enhancing relationships between criminology and cybersecurity

    Full text link
    ‘Cybercrime’ is an umbrella concept used by criminologists to refer to traditional crimes that are enhanced via the use of networked technologies (i.e. cyber-enabled crimes) and newer forms of crime that would not exist without networked technologies (i.e. cyber-dependent crimes). Cybersecurity is similarly a very broad concept and diverse field of practice. For computer scientists, the term ‘cybersecurity’ typically refers to policies, processes and practices undertaken to protect data, networks and systems from unauthorised access. Cybersecurity is used in subnational, national and transnational contexts to capture an increasingly diverse array of threats. Increasingly, cybercrimes are presented as threats to cybersecurity, which explains why national security institutions are gradually becoming involved in cybercrime control and prevention activities. This paper argues that the fields of cyber-criminology and cybersecurity, which are segregated at the moment, are in much need of greater engagement and cross-fertilisation. We draw on concepts of ‘high’ and ‘low’ policing (Brodeur, 2010) to suggest it would be useful to consider ‘crime’ and ‘security’ on the same continuum. This continuum has cybercrime at one end and cybersecurity at the other, with crime being more the domain of ‘low’ policing while security, as conceptualised in the context of specific cybersecurity projects, falls under the responsibility of ‘high’ policing institutions. This unifying approach helps us to explore the fuzzy relationship between cyber-crime and cyber-security and to call for more fruitful alliances between cybercrime and cybersecurity researchers

    The dawn of the age of the drones: an Australian privacy law perspective

    Get PDF
    Examines Australia\u27s privacy laws in relation to unmanned aerial vehicles, to identify deficiencies that may need to be addressed. Introduction Suppose a homeowner habitually enjoys sunbathing in his or her backyard, protected by a high fence from prying eyes, including those of an adolescent neighbour. In times past such homeowners could be assured that they might go about their activities without a threat to their privacy. However, recent years have seen technological advances in the development of unmanned aerial vehicles (‘UAVs’), also known colloquially as drones, that have allowed them to become reduced in size, complexity and price. UAVs today include models retailing to the public for less than $350 and with an ease of operation that enables them to serve as mobile platforms for miniature cameras. These machines now mean that for individuals like the posited homeowner’s adolescent neighbour, barriers such as high fences no longer constitute insuperable obstacles to their voyeuristic endeavours. Moreover, ease of access to the internet and video sharing websites provides a ready means of sharing any recordings made with such cameras with a wide audience. Persons in the homeowner’s position might understandably seek some form of redress for such egregious invasions of their privacy. Other than some form of self-help, what alternative measures may be available? Under Australian law this problem yields no easy answer. In this country, a fractured landscape of common law, Commonwealth and state/territory legislation provides piecemeal protection against invasions of privacy by cameras mounted on UAVs. It is timely, at what may be regarded as the early days of the drone age, to consider these laws and to identify deficiencies that may need to be addressed lest, to quote words that are as apt today as they were when written over 120 years ago, ‘modern enterprise and invention 
 through invasions upon [their] privacy, [subject victims] to mental pain and distress, far greater than could be inflicted by mere bodily injury.

    Organisational network analysis in marketing for the Quality Management System Standard Operating Procedure of the Finnish Defence Forces International Centre - Network Approach with the Value Marketing Model

    Get PDF
    Objectives The objectives of this study were to identify the potential customer organisations of FINCENT and utilise the network approach and the value marketing model to further and aid the marketing of the Quality Management System Standard Operating Procedure. The other objectives were to discuss and explore the possibility of creating a visualization of the network of FINCENT. Summary Over one hundred possible customer organisation were identified and listed. The network was suggested to be visualised by using the sphere model created by combining the network approach and the value marketing model. Theory and knowledge gaps were identified for further research. Conclusions The value marketing model and the network approach were combined and a new visualisation type was suggested and recommended to be used by the marketing team of FINCENT. The visualisation was not created due resource and ethical reasons

    The Industry and Policy Context for Digital Games for Empowerment and Inclusion:Market Analysis, Future Prospects and Key Challenges in Videogames, Serious Games and Gamification

    Get PDF
    The effective use of digital games for empowerment and social inclusion (DGEI) of people and communities at risk of exclusion will be shaped by, and may influence the development of a range of sectors that supply products, services, technology and research. The principal industries that would appear to be implicated are the 'videogames' industry, and an emerging 'serious games' industry. The videogames industry is an ecosystem of developers, publishers and other service providers drawn from the interactive media, software and broader ICT industry that services the mainstream leisure market in games, The 'serious games' industry is a rather fragmented and growing network of firms, users, research and policy makers from a variety of sectors. This emerging industry is are trying to develop knowledge, products, services and a market for the use of digital games, and products inspired by digital games, for a range of non-leisure applications. This report provides a summary of the state of play of these industries, their trajectories and the challenges they face. It also analyses the contribution they could make to exploiting digital games for empowerment and social inclusion. Finally, it explores existing policy towards activities in these industries and markets, and draws conclusions as to the future policy relevance of engaging with them to support innovation and uptake of effective digital game-based approaches to empowerment and social inclusion.JRC.J.3-Information Societ
    • 

    corecore