38 research outputs found

    RSPCA and the criminology of social control

    Full text link
    This paper contributes to a rethinking of animal abuse control and animal welfare protection in criminology, specifically, and in the social sciences more broadly. We do this, first, through a broad mapping of the institutional control complex around animal abuse in contemporary Britain. Second, we focus on the institutional strategies and practices, past and present, of the main agency of animal protection, and the policing thereof, in this society, namely the Royal Society for the Prevention of Cruelty to Animals (RSPCA). In looking back to this charity’s growth since the first decades of the nineteenth century at the time of the birth of modern industrial capitalism and also to its current rationale and practices as a late-modern, corporate organisation, we explore the seeming paradox of a private body taking a lead on the regulation and prosecution of illegalities associated with animal-human relationships. Finally, the ideology and strategy of the RSPCA are explored in the context of the often visceral and culturally influential ‘morality war’ associated with proponents, respectively, of animal rights (‘abolition’) and ‘anthropic’ welfare proponents (‘regulation’ and ‘protection’)

    Thoughts on sovereignty

    No full text

    Breaking the Cyber Kill Chain by Modelling Resource Costs

    Get PDF
    To combat cybercrime, a clearer understanding of the attacks and the offenders is necessary. When there is little available data about attack incidents, which is usually the case for new technology, one can make estimations about the necessary investments an offender would need to compromise the system. The next step would be to implement measures that increase these costs to a level that makes the attack unattractive. Our research method follows the principles of design science, where cycles of research activities are used to create artefacts intended to solve real-world problems. Our artefacts are an approach for creating a resource costs model (RCM) and an accompanying modelling tool implemented as a web application. These are used to find the required attacker resources at each stage of the cyber kill chain. End user feedback show that structured visualisation of the required resources raises the awareness of the cyberthreat. This approach has its strength and provides best accuracy with specific attacks, but is more limited when there are many possible attack vectors of different types
    corecore