Archive

Archive for the ‘crime’ Category

Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks

March 24, 2015 Comments off

Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks
Source: arXiv.org

We hear it all too often in the media: an organization is attacked, its data, often containing personally identifying information, is made public, and a hacking group emerges to claim credit. In this excerpt, we discuss how such groups operate and describe the details of a few major cyber-attacks of this sort in the wider context of how they occurred. We feel that understanding how such groups have operated in the past will give organizations ideas of how to defend against them in the future.

UK cyber security: the role of insurance

March 24, 2015 Comments off

UK cyber security: the role of insurance
Source: Cabinet Office, Department for Business, Innovation & Skills and UK Trade & Investment
From press release:

Last year 81% of large UK businesses and 60% of small companies suffered a cyber security breach. A report published on 23 March by HM Government and Marsh, one of the UK’s leading insurance brokers and risk advisors, announces new joint initiatives between government and the insurance sector to help firms get to grips with cyber risk; to establish cyber insurance as part of firms’ cyber toolkits and cement London as the global centre for cyber risk management.

The report, ‘UK cyber security: the role of insurance in managing and mitigating the risk’, has been produced in collaboration with the UK’s insurance market and a number of top UK companies. It aims to make the UK a world centre for cyber security insurance. In particular, it highlights the exposure of firms to cyber attacks among their suppliers with a key agreement that participating insurers will include the government’s Cyber Essentials certification as part of their risk assessment for small and medium businesses.

Cyber threats are estimated to cost the UK economy billions of pounds each year with the cost of cyber attacks nearly doubling between 2013 and 2014.

Forty Years of Forensic Interviewing of Children Suspected of Sexual Abuse, 1974–2014: Historical Benchmarks

March 23, 2015 Comments off

Forty Years of Forensic Interviewing of Children Suspected of Sexual Abuse, 1974–2014: Historical Benchmarks
Source: Social Sciences

This article describes the evolution of forensic interviewing as a method to determine whether or not a child has been sexually abused, focusing primarily on the United States. It notes that forensic interviewing practices are challenged to successfully identify children who have been sexually abused and successfully exclude children who have not been sexually abused. It describes models for child sexual abuse investigation, early writings and practices related to child interviews, and the development of forensic interview structures from scripted, to semi-structured, to flexible. The article discusses the controversies related appropriate questions and the use of media (e.g., anatomical dolls and drawings). It summarizes the characteristics of four important interview structures and describes their impact of the field of forensic interviewing. The article describes forensic interview training and the challenge of implementing training in forensic practice. The article concludes with a summary of progress and remaining controversies and with future challenges for the field of forensic interviewing.

Violence Against Women: Engaging Asian Men

March 23, 2015 Comments off

Engaging Asian Men
Source: Asian & Pacific Islander Institute on Domestic Violence

In their introduction to a multi-country study on men and gender violence in Asia and the Pacific, the authors write: The elimination of harmful gender norms and practices can be achieved through the engagement of men and boys. (…) Ending violence against women requires coherent policies and programmes that emphasize gender equality as non-negotiable and the transformation of social norms.

The notion of ‘engaging men and boys’ has come to mean a lot of things, from men’s role in the anti-domestic violence movement to approaches that range from bystander engagement to tertiary prevention. Because sociocultural differences influence how patriarchy is enforced, how hetero-normative masculinity is defined, and how women’s self-determination is expressed or controlled, these very contexts also influence what engaging men means.

Transitioning to Adulthood: How Do Young Adults Fare and What Characteristics are Associated With a Lower-Risk Transition

March 23, 2015 Comments off

Transitioning to Adulthood: How Do Young Adults Fare and What Characteristics are Associated With a Lower-Risk Transition (PDF)
Source: Child Trends

Youth must navigate various developmental tasks as they transition to adulthood (Arnett, 2014). During this period of “emerging adulthood,” young people explore roles and relationships before committing to the ones they will fill as adults.

This brief seeks to identify patterns and transitions during emerging adulthood to obtain a better understanding of the likelihood that young adults will experience a lower-risk transition to adulthood. We analyzed panel data from the National Longitudinal Study of Adolescent Health (Add Health, N=12,166), using person-centered analyses, to examine the odds of youth engaging in lower-risk patterns/trajectories, specifically, minimal problems with heavy alcohol use, illicit drug use, criminal behavior, and financial hardship. Lower risk transitions were defined as avoiding or overcoming problems by adulthood. We found considerable variation among young adults in reaching these milestones.

Getting to the Left of SHARP: Lessons Learned from West Point’s Efforts to Combat Sexual Harassment and Assault

March 23, 2015 Comments off

Getting to the Left of SHARP: Lessons Learned from West Point’s Efforts to Combat Sexual Harassment and Assault
Source: Strategic Studies Institute, U.S. Army War College

On July 26, 1948, President Harry Truman signed Executive Order 9981, ending the practice of segregating the military services by race. That same year, the Army allowed women to join the services on an equal basis with men. Both of these steps preceded the larger societal changes that allowed fully equal treatment of all types of American citizens in military service. Just over 2 years ago, Congress repealed the Don’t Ask, Don’t Tell policy, allowing for gays and lesbians to openly take their place in the military. Our procedures and policies for successful gender integration have grown and evolved. The authors share five principles for leaders and commanders on the prevention of sexual harassment and assault, as well as associated “Tips” for implementation: (1) Leaders identify and break chains of circumstance; (2) Education is preferable to litigation; (3) What’s electronic is public; (4) Don’t ignore pornography; and, (5) Unit climate is the commander’s responsibility. These principles and their associated tips are not panaceas, and these recommendations are submitted for discussion and feedback.

Child Maltreatment — 2015 Prevention Resource Guide: Making Meaningful Connections

March 20, 2015 Comments off

2015 Prevention Resource Guide: Making Meaningful Connections
Source: Child Welfare Information Gateway

The 2015 Prevention Resource Guide: Making Meaningful Connections was created primarily to support community-based child abuse prevention professionals who work to prevent child maltreatment and promote well-being.

+ Download PDF version.
+ Order (free) print copy.

Follow

Get every new post delivered to your Inbox.

Join 1,023 other followers