3,500 research outputs found
Examining Perceptions of Online Harassment among Constables in England and Wales
The ubiquity of the Internet and computer technology has enabled individuals to engage in bullying, threats, and harassing communications online. Limited research has found that local line officers may not view these offenses as serious compared to real world crimes despite their negative physical and emotional impact on victims. The perceptions of officers can produce poor interactions with victims during calls for service, particularly victim blaming, which can reduce citizens’ confidence in police agencies generally. However, local law enforcement agencies are increasingly mandated to respond to these cases, calling to question how their views may impact the community. This study examined the attitudinal and demographic factors associated with the negative views of online harassment and bullying within a sample of 1,348 constables from 34 local agencies across England and Wales. The study found that constables with negative views toward cybercrimes and worked in agencies with inconsistent messaging related to online crimes were more likely to view online harassment as less serious and believe that these offenses could be avoided by victims. The implications of this study for local police staff and command are discussed in detail
Applying Normal Accident Theory to Ideological and Nation-State-Sponsored Cybercrimes
This project aims to explore a new perspective on cyberattacks by applying normal accident theory, typically used to analyze complex system failures, to the realm of cybersecurity. The goal is to gain insights into the factors contributing to cyberattacks and identify potential strategies to prevent and mitigate them. Applying normal accident theory to cyberattacks reveals that while complete prevention is challenging, focusing on human and organizational aspects of cybersecurity can significantly reduce risks. Encouraging adherence to best practices and establishing cybersecurity audit and compliance entities are critical steps toward a more resilient cybersecurity landscape
The Growth of Transplanted Tumours in Mice after Chronic Inhalation of Fresh Cigarette Smoke
The subcutaneous growth of the Lewis lung tumour in C57BL mice chronically exposed to fresh cigarette smoke was increased above that in age-matched control mice. When murine sarcoma virus (Harvey) induced tumour cells were introduced to the lungs of groups of BALB/c mice, only mice chronically exposed to fresh cigarette smoke died with tumour cells in the lungs. Tumour cell growth in mice during short term cigarette smoke exposure was indistinguishable from that in controls
Recommended from our members
Interviewing cybercrime offenders
Research on cybercrime offending and victimization has increased dramatically over the past two decades, though qualitative scholarship on more technical offenses such as computer misuse have not kept pace with this broader trend. The aim of this research is to identify potential best practices for researchers considering qualitative interviews as a method for researching computer misuse offenses, more commonly involving hacking techniques. The authors interviewed six experienced researchers who conducted qualitative examinations of active or incarcerated cybercriminals to understand their common experiences with recruitment, ways in which they interviewed research participants, ethical issues, and publishing their research. This analysis explores the difficulties associated with this area of research that are not typically discussed in the methods section of a research paper. The findings demonstrate the problems that emerge in research and the precautions researchers may need to take to protect themselves, their participants, and the research data
A qualitative analysis of advance fee fraud e-mail schemes.
Abstract Criminals utilize the Internet to perpetrate all manner of fraud, with the largest dollar losses attributed to advance fee fraud e-mail messages. These messages come from individuals who claim to need assistance moving a large sum of money out of their country. Individuals who respond to the messages often become victims of fraud and identity theft. Few criminologists have examined this type of fraud, thus this study explores the mechanisms employed by scammers through a qualitative analysis of 412 fraudulent e-mail messages. The findings demonstrate that multiple writing techniques are used to generate responses and information from victims. Half of all the messages also request that the recipient forward their personal information to the sender, thereby enabling identity theft. The implications of this study for law enforcement and computer security are also discussed
Positive youth development in swimming: clarification and consensus of key psychosocial assets
The purpose of this study was to gain a more cohesive understanding of the assets considered necessary to develop in young swimmers to ensure both individual and sport specific development. This two stage study involved (a) a content analysis of key papers to develop a list of both psychosocial skills for performance enhancement and assets associated with positive youth development, and (b) in-depth interviews involving ten expert swim coaches, practitioners and youth sport scholars. Five higher order categories containing seventeen individual assets emerged. These results are discussed in relation to both existing models of positive youth development and implications for coaches, practitioners and parents when considering the psychosocial development of young British swimmers
Recommended from our members
A Manual for the Economic Evaluation of Energy Efficiency and Renewable Energy Technologies
This manual is a guide for analyzing the economics of energy efficiency and renewable energy (EE) technologies and projects. It is intended (1) to help analysts determine the appropriate approach or type of analysis and the appropriate level of detail and (2) to assist EE analysts in completing consistent analyses using standard assumptions and bases, when appropriate. Included are analytical techniques that are commonly required for the economic analysis of EE technologies and projects. The manual consists of six sections: Introduction, Fundamentals, Selection Criteria Guide, Economic Measures, Special Considerations for Conservation and Renewable Energy Systems, and References. A glossary and eight appendices are also included. Each section has a brief introductory statement, a presentation of necessary formulae, a discussion, and when appropriate, examples and descriptions of data and data availability. The objective of an economic analysis is to provide the information needed to make a judgment or a decision. The most complete analysis of an investment in a technology or a project requires the analysis of each year of the life of the investment, taking into account relevant direct costs, indirect and overhead costs, taxes, and returns on investment, plus any externalities, such as environmental impacts, that are relevant to the decision to be made. However, it is important to consider the purpose and scope of a particular analysis at the outset because this will prescribe the course to follow. The perspective of the analysis is important, often dictating the approach to be used. Also, the ultimate use of the results of an analysis will influence the level of detail undertaken. The decision-making criteria of the potential investor must also be considered
Building Community Practice Competencies Globally through the Community Tool Box
People throughout the world are working together to improve conditions in which they live. Although the issues and resources vary by context, what people actually do to effect change—core competencies of assessment, planning, action, evaluation, and sustainability—may be quite similar. To examine what competencies may be most valued in community practice, this report uses data analytics for what users are accessing in the Community Tool Box http://ctb.ku.edu/. This free resource for community health and development, with over 1.7 million unique visitors annually from over 200 countries, showed a six-fold increase in users during the past year (from November 2011 to November 2012). When we examined what users were accessing, the results showed greater interest in some particular competencies such as assessing community needs and resources, developing strategic and action plans, and enhancing cultural competence. Patterns of use suggest that there may be core competencies valued by community members seeking to change conditions and outcomes that matter, which may help inform training and professional development for the millions of people worldwide working to promote health, human development, and social justice. 
Building Community Practice Competencies Globally through the Community Tool Box
People throughout the world are working together to improve conditions in which they live. Although the issues and resources vary by context, what people actually do to effect change—core competencies of assessment, planning, action, evaluation, and sustainability—may be quite similar. To examine what competencies may be most valued in community practice, this report uses data analytics for what users are accessing in the Community Tool Box http://ctb.ku.edu/. This free resource for community health and development, with over 1.7 million unique visitors annually from over 200 countries, showed a six-fold increase in users during the past year (from November 2011 to November 2012). When we examined what users were accessing, the results showed greater interest in some particular competencies such as assessing community needs and resources, developing strategic and action plans, and enhancing cultural competence. Patterns of use suggest that there may be core competencies valued by community members seeking to change conditions and outcomes that matter, which may help inform training and professional development for the millions of people worldwide working to promote health, human development, and social justice. 
- …