90,412 research outputs found

    The Cyber Crime and Internet and Internet Sexual Exploitation of Children

    Get PDF
    The availability of the Internet has become increasingly easier to children due to technological advancements. An increasing number of children have access to smart phones and tablets, hence, allowing their susceptibility to become a cyber victim, as parental control is lacking. Concerns about the role of technological change in relation to sexual crimes against children, sexual exploitation and potential harm have been expressed in the USA for some considerable time. These have been reflected in a change in legislation with respect to abusive images of children (child pornography) and its attendant violent content. This study examined the impact of child cyber sexual exploitation. The study also explored the methods predators used to prey on children, the role child’s behavior played in their susceptibility to being seduced, and the role education system play to protect children. It was important to conduct this study as previous studies did not really address the fact that security measures are lacking as well as knowledge on the potential dangers of the Internet. The researcher used interview questions to carry out this study by getting the opinions of the Police Officers at the Bradley Police Department, Bradley, Illinois since these are the officers who work on the Cyber Crime against the children. The study identified the security measures that are lacking as well as knowledge of the potential dangers of the Internet. Also the education systems are not mandated to incorporate Internet safety courses into the curriculum as many educators themselves lack the necessary knowledge on the subject. The study also revealed that many parents lack knowledge on Internet safety and feel their children may be more tech-savvy, making Internet safety conversations more difficult. This allows a child the opportunity to utilize the Internet unsupervised, as many parental controls can be bypassed

    Ethical and Social Aspects of Self-Driving Cars

    Full text link
    As an envisaged future of transportation, self-driving cars are being discussed from various perspectives, including social, economical, engineering, computer science, design, and ethics. On the one hand, self-driving cars present new engineering problems that are being gradually successfully solved. On the other hand, social and ethical problems are typically being presented in the form of an idealized unsolvable decision-making problem, the so-called trolley problem, which is grossly misleading. We argue that an applied engineering ethical approach for the development of new technology is what is needed; the approach should be applied, meaning that it should focus on the analysis of complex real-world engineering problems. Software plays a crucial role for the control of self-driving cars; therefore, software engineering solutions should seriously handle ethical and social considerations. In this paper we take a closer look at the regulative instruments, standards, design, and implementations of components, systems, and services and we present practical social and ethical challenges that have to be met, as well as novel expectations for software engineering.Comment: 11 pages, 3 figures, 2 table

    Ready or Not? Protecting the Public's Health From Diseases, Disasters, and Bioterrorism, 2011

    Get PDF
    Highlights examples of preparedness programs and capacities at risk of federal budget cuts or elimination, examines state and local public health budget cuts, reviews ten years of progress and shortfalls, and outlines policy issues and recommendations

    Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks

    Full text link
    The benefits of autonomous vehicles (AVs) are widely acknowledged, but there are concerns about the extent of these benefits and AV risks and unintended consequences. In this article, we first examine AVs and different categories of the technological risks associated with them. We then explore strategies that can be adopted to address these risks, and explore emerging responses by governments for addressing AV risks. Our analyses reveal that, thus far, governments have in most instances avoided stringent measures in order to promote AV developments and the majority of responses are non-binding and focus on creating councils or working groups to better explore AV implications. The US has been active in introducing legislations to address issues related to privacy and cybersecurity. The UK and Germany, in particular, have enacted laws to address liability issues, other countries mostly acknowledge these issues, but have yet to implement specific strategies. To address privacy and cybersecurity risks strategies ranging from introduction or amendment of non-AV specific legislation to creating working groups have been adopted. Much less attention has been paid to issues such as environmental and employment risks, although a few governments have begun programmes to retrain workers who might be negatively affected.Comment: Transport Reviews, 201

    Vulnerability analysis of three remote voting methods

    Get PDF
    This article analyses three methods of remote voting in an uncontrolled environment: postal voting, internet voting and hybrid voting. It breaks down the voting process into different stages and compares their vulnerabilities considering criteria that must be respected in any democratic vote: confidentiality, anonymity, transparency, vote unicity and authenticity. Whether for safety or reliability, each vulnerability is quantified by three parameters: size, visibility and difficulty to achieve. The study concludes that the automatisation of treatments combined with the dematerialisation of the objects used during an election tends to substitute visible vulnerabilities of a lesser magnitude by invisible and widespread vulnerabilities.Comment: 15 page

    Designing and Operating Safe and Secure Transit Systems: Assessing Current Practices in the United States and Abroad, MTI Report 04-05

    Get PDF
    Public transit systems around the world have for decades served as a principal venue for terrorist acts. Today, transit security is widely viewed as an important public policy issue and is a high priority at most large transit systems and at smaller systems operating in large metropolitan areas. Research on transit security in the United States has mushroomed since 9/11; this study is part of that new wave of research. This study contributes to our understanding of transit security by (1) reviewing and synthesizing nearly all previously published research on transit terrorism; (2) conducting detailed case studies of transit systems in London, Madrid, New York, Paris, Tokyo, and Washington, D.C.; (3) interviewing federal officials here in the United States responsible for overseeing transit security and transit industry representatives both here and abroad to learn about efforts to coordinate and finance transit security planning; and (4) surveying 113 of the largest transit operators in the United States. Our major findings include: (1) the threat of transit terrorism is probably not universal—most major attacks in the developed world have been on the largest systems in the largest cities; (2) this asymmetry of risk does not square with fiscal politics that seek to spread security funding among many jurisdictions; (3) transit managers are struggling to balance the costs and (uncertain) benefits of increased security against the costs and (certain) benefits of attracting passengers; (4) coordination and cooperation between security and transit agencies is improving, but far from complete; (5) enlisting passengers in surveillance has benefits, but fearful passengers may stop using public transit; (6) the role of crime prevention through environmental design in security planning is waxing; and (7) given the uncertain effectiveness of antitransit terrorism efforts, the most tangible benefits of increased attention to and spending on transit security may be a reduction in transit-related person and property crimes

    Securing By Design

    Get PDF
    This article investigates how modern neo-liberal states are 'securing by design' harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward 'securing by design' and the policy agendas it produces of 'designing out insecurity' and 'designing in protection' because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate 'security solutions' to readymade 'security problems'. This critique leads us to propose a new research agenda we call Redesigning Security. A Redesigning Security Approach begins from a recognition that the achievement of security is more often than not illusive, which means that the desire for security is itself problematic. Rather than encouraging the design of 'security solutions' a securing by design a Redesigning Security Approach explores how we might insecure securing by design. By acknowledging and then moving beyond the new security studies insight that security often produces insecurity, our approach uses design as a vehicle through which to raise questions about security problems and security solutions by collaborating with political and critical design practitioners to design concrete material objects that themselves embody questions about traditional security and about traditional design practices that use technology to depoliticise how technology is deployed by states and corporations to make us 'safe'

    Participatory Lawyering & The Ivory Tower: Conducting a Forensic Law Audit in the Aftermath of Virginia Tech

    Get PDF
    The tragic events at Virginia Tech in 2007 sent a cold wind blowing through the halls of higher education institutions: a Virginia Tech student, who had fallen through the cracks of the school\u27s mental health services and disciplinary procedures, armed himself with firearms and murdered thirty-two students and a professor before committing suicide. In the wake of that massacre, several states and individual interest groups issued reports on campus readiness for similar catastrophes. A consistent theme throughout those reports emphasized the necessity for individual institutions to review their procedures to deal with campus violence. This Article focuses on that institutional review and the role of lawyers in assisting colleges and universities in formulating better and more comprehensive procedures for preventing campus violence in general, but with an emphasis on preventing similar catastrophes, or at worst, minimizing their devastation. The lawyer has the best opportunity to assist by participating in the process rather than either dictating its conduct or reviewing the product after the fact. Preventive lawyering and collaborating with the academy are the only successful means for adequately addressing comprehensive plans that manage the risks raised by the needs of the new consumer student and that create a campus culture that does not tolerate campus violence. Specifically, this Article summarizes how the lawyer\u27s collaboration with the academy should neatly incorporate the academic ends of the institution with legal ends that could minimize both the harm and the costs of campus violence

    Food System and Food Security Study for the City of Cape Town

    Get PDF
    Food insecurity is a critical, but poorly understood, challenge for the health and development of Capetonians. Food insecurity is often imagined as hunger, but it is far broader than that. Households are considered food secure when they have “physical and economic access to sufficient and nutritious food that meets their dietary needs and food preferences for an active and healthy life” (WHO/FAO 1996). Health is not merely the absence of disease, but also encompasses good nutrition and healthy lifestyles. Individuals in a food insecure household and/or community are at greater risk due to diets of poor nutritional value, which lowers immunity against diseases. In children, food insecurity is known to stunt growth and development and this places the child in a disadvantaged position from early on in life. Any improvement in the nutritional profile of an individual is beneficial and as the family and community become more food secure, the greater the benefit. It further reduces the demand on health services. In the Cape Town context, food insecurity manifests not just as hunger, but as long term consumption of a limited variety of foods, reduction in meal sizes and choices to eat calorie dense, nutritionally poor foods in an effort to get enough food to get by. Associated with this food insecurity are chronic malnutrition and micronutrient deficiency, particularly among young children, and an increase in obesity, diabetes and other diet related illnesses. Food insecurity is therefore not about food not being available, it is about households not having the economic or physical resources to access enough of the right kind of food. The latest study of food insecurity in Cape Town found that 75 percent of households in sampled low-income areas were food insecure, with 58 percent falling into the severely food insecurity category. Food insecurity is caused by household scale characteristics, such as income poverty, but also by wider structural issues, such as the local food retail environment and the price and availability of healthy relative to less healthy foods. The City of Cape Town therefore commissioned a study based on the following understanding of the food security challenge facing the City. “Food security or the lack thereof is the outcome of complex and multi-dimensional factors comprising a food system. Therefore, food insecurity is the result of failures or inefficiencies in one or more dimensions of the food system. This necessitates a holistic analysis of the food system that than can provide insights into the various components of the system, especially in our context as a developing world city.” The call for a food system study sees the City of Cape Town taking the lead nationally, being the first metropolitan area to seek to engage in the food system in a holistic manner and attempting to understand what role the city needs to play in the food system. The City must work towards a food system that is reliable, sustainable and transparent. Such a system will generate household food security that is less dependent on welfarist responses to the challenge. In this context, reliability is taken to mean stable and consistent prices, the nutritional quality of available and accessible food, and food safety. Sustainability means that the food system does not degrade the environmental, economic and social environment. Finally, transparency refers to the legibility of the system and its control by the state and citizens
    corecore