Unauthorised Access

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6021 Experts worldwide ranked by ideXlab platform

Jonah R. Rimer - One of the best experts on this subject based on the ideXlab platform.

  • Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders
    Crime Science, 2020
    Co-Authors: Abigail C. O’hara, Lorraine Mazerolle, Jonah R. Rimer
    Abstract:

    Objective This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in offline and online environments. We explain the crime-commission process of adult RS-IBSA and identify crime intervention points at eight crime script stages. Methods Publicly released court transcripts of adult RS-IBSA prosecution cases (n = 18) in New Zealand from 2015 to 2018 were utilised to examine the crime-commission process of adult RS-IBSA. We analysed the court transcripts thematically at offence-level prior to constructing the crime scripts. Findings The study identified four types of adult RS-IBSA acts including the non-consensual dissemination of a victim’s intimate images, violent cyber sextortion, covert intimate photography, and Unauthorised Access of a victim’s phone/media. From our analysis, we identified three script tracks and constructed three distinct crime scripts: (1) threats, sextortion and dissemination; (2) Unauthorised Access of a victim’s mobile device and dissemination; and (3) covert intimate filming. We highlight areas for potential intervention for law enforcement agencies and policy makers to increase deterrence and personal security in online and offline spaces. Conclusion Adult RS-IBSA occurs in a range of dating and domestic contexts. This study develops crime scripts for adult RS-IBSA and advances our understanding of how the Internet/smartphones/digital media translates into virtual crime scenes with opportunities for maximum harm infliction. We offer several policy implications including revising current RS-IBSA legislation and supporting law enforcement agencies with policing online and offline intimate relationship spaces through situational prevention.

  • Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders
    Crime Science, 2020
    Co-Authors: Abigail C. O’hara, Lorraine Mazerolle, Jonah R. Rimer
    Abstract:

    This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in offline and online environments. We explain the crime-commission process of adult RS-IBSA and identify crime intervention points at eight crime script stages. Publicly released court transcripts of adult RS-IBSA prosecution cases (n = 18) in New Zealand from 2015 to 2018 were utilised to examine the crime-commission process of adult RS-IBSA. We analysed the court transcripts thematically at offence-level prior to constructing the crime scripts. The study identified four types of adult RS-IBSA acts including the non-consensual dissemination of a victim’s intimate images, violent cyber sextortion, covert intimate photography, and Unauthorised Access of a victim’s phone/media. From our analysis, we identified three script tracks and constructed three distinct crime scripts: (1) threats, sextortion and dissemination; (2) Unauthorised Access of a victim’s mobile device and dissemination; and (3) covert intimate filming. We highlight areas for potential intervention for law enforcement agencies and policy makers to increase deterrence and personal security in online and offline spaces. Adult RS-IBSA occurs in a range of dating and domestic contexts. This study develops crime scripts for adult RS-IBSA and advances our understanding of how the Internet/smartphones/digital media translates into virtual crime scenes with opportunities for maximum harm infliction. We offer several policy implications including revising current RS-IBSA legislation and supporting law enforcement agencies with policing online and offline intimate relationship spaces through situational prevention.

Germano Caronni - One of the best experts on this subject based on the ideXlab platform.

  • TestCom - Firewall conformance testing
    Lecture Notes in Computer Science, 2005
    Co-Authors: Diana Senn, David Basin, Germano Caronni
    Abstract:

    Firewalls are widely used to protect networks from Unauthorised Access. To ensure that they implement an organisation’s security policy correctly, they need to be tested. We present an approach that addresses this problem. Namely, we show how an organisation’s network security policy can be formally specified in a high-level way, and how this specification can be used to automatically generate test cases to test a deployed system. In contrast to other firewall testing methodologies, such as penetration testing, our approach tests conformance to a specified policy. Our test cases are organisation-specific — i.e. they depend on the security requirements and on the network topology of an organisation — and can uncover errors both in the firewall products themselves and in their configuration.

Abigail C. O’hara - One of the best experts on this subject based on the ideXlab platform.

  • Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders
    Crime Science, 2020
    Co-Authors: Abigail C. O’hara, Lorraine Mazerolle, Jonah R. Rimer
    Abstract:

    Objective This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in offline and online environments. We explain the crime-commission process of adult RS-IBSA and identify crime intervention points at eight crime script stages. Methods Publicly released court transcripts of adult RS-IBSA prosecution cases (n = 18) in New Zealand from 2015 to 2018 were utilised to examine the crime-commission process of adult RS-IBSA. We analysed the court transcripts thematically at offence-level prior to constructing the crime scripts. Findings The study identified four types of adult RS-IBSA acts including the non-consensual dissemination of a victim’s intimate images, violent cyber sextortion, covert intimate photography, and Unauthorised Access of a victim’s phone/media. From our analysis, we identified three script tracks and constructed three distinct crime scripts: (1) threats, sextortion and dissemination; (2) Unauthorised Access of a victim’s mobile device and dissemination; and (3) covert intimate filming. We highlight areas for potential intervention for law enforcement agencies and policy makers to increase deterrence and personal security in online and offline spaces. Conclusion Adult RS-IBSA occurs in a range of dating and domestic contexts. This study develops crime scripts for adult RS-IBSA and advances our understanding of how the Internet/smartphones/digital media translates into virtual crime scenes with opportunities for maximum harm infliction. We offer several policy implications including revising current RS-IBSA legislation and supporting law enforcement agencies with policing online and offline intimate relationship spaces through situational prevention.

  • Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders
    Crime Science, 2020
    Co-Authors: Abigail C. O’hara, Lorraine Mazerolle, Jonah R. Rimer
    Abstract:

    This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in offline and online environments. We explain the crime-commission process of adult RS-IBSA and identify crime intervention points at eight crime script stages. Publicly released court transcripts of adult RS-IBSA prosecution cases (n = 18) in New Zealand from 2015 to 2018 were utilised to examine the crime-commission process of adult RS-IBSA. We analysed the court transcripts thematically at offence-level prior to constructing the crime scripts. The study identified four types of adult RS-IBSA acts including the non-consensual dissemination of a victim’s intimate images, violent cyber sextortion, covert intimate photography, and Unauthorised Access of a victim’s phone/media. From our analysis, we identified three script tracks and constructed three distinct crime scripts: (1) threats, sextortion and dissemination; (2) Unauthorised Access of a victim’s mobile device and dissemination; and (3) covert intimate filming. We highlight areas for potential intervention for law enforcement agencies and policy makers to increase deterrence and personal security in online and offline spaces. Adult RS-IBSA occurs in a range of dating and domestic contexts. This study develops crime scripts for adult RS-IBSA and advances our understanding of how the Internet/smartphones/digital media translates into virtual crime scenes with opportunities for maximum harm infliction. We offer several policy implications including revising current RS-IBSA legislation and supporting law enforcement agencies with policing online and offline intimate relationship spaces through situational prevention.

Benjamin J. Goold - One of the best experts on this subject based on the ideXlab platform.

  • Public Area Surveillance and Police Work: the impact of CCTV on police behaviour and autonomy
    Surveillance & Society, 2002
    Co-Authors: Benjamin J. Goold
    Abstract:

    Drawing on a recent study of the impact of closed circuit television (CCTV) cameras on policing practices in a large English police force, this paper considers whether the presence of surveillance cameras affects the working attitudes and behaviour of individual police officers. In particular, this paper asks whether CCTV makes the police more accountable or more cautious in the exercise of their discretion in public spaces. Although noting that in certain circumstances CCTV may inadvertently help to reduce incidences of police misconduct, this paper concludes by arguing that more needs to be done to prevent the police from interfering with the operation of CCTV and gaining Unauthorised Access to potentially incriminating video evidence.

Bala Srinivasan - One of the best experts on this subject based on the ideXlab platform.

  • AINA - An Authentication Model for Wireless Network Services
    2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
    Co-Authors: Huy Hoang Ngo, Bala Srinivasan
    Abstract:

    Authentication is an important component to protect information systems from Unauthorised Access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexility in wireless networks. In this paper, an authentication model for individual and group users in wireless network is elaborated. It provides a flexible and scalable model to suit different problem requirements of wireless network services. A realisation of the authentication model using dynamic keys and group key management is proposed and analysed to demonstrate the security and efficiency in wireless networks.