Breadcrumb
Search
"Scoping studies and baseline data collection for an evaluation of best-practice policing interventions augmented by collaboration with emergency medicine and local community agencies to reduce alcohol-related assault".
"A discussion paper prepared at the request of the Conference of Commissioners of Police of Australasia and the South West Pacific Region."
2nd edition
Produced in association with New South Wales Police Historical Society.
Impact of the ‘Yes, I Can!’ adult literacy campaign on interactions with the criminal justice system
Contents
- Acknowledgements
- Abstract
- Executive summary
- Introduction
- Technology as an enabler of fraud during pandemics
- Fraud arising from COVID-19
- Understanding pandemic-related fraud
- Conclusions for Australia: Near future fraud and fraud control trends
- References
Contents
- Acknowledgements
- Executive summary
- Introduction
- Methodology
- Results
- Characteristics of the sample
- What makes a victim of online fraud
- Life events and personal characteristics of participants
- Preventive factors used by victims and non-victims with online activities
- Victimisation and repeat victimisation
- Consequences of victimisation
- Discussion
- Policy implications
- References
Foreword | Politically exposed persons (PEPs) are individuals who are, or have been, entrusted with prominent public functions. PEPs are potential targets for bribes due to their prominent position in public life. They have a higher risk of corruption due to their access to state accounts and funds. A review of Financial Action Task Force (FATF) and FATF-style regional bodies' mutual evaluation reports reveals that a significant number of jurisdictions are found to be either non-compliant or partially-compliant with the FATF recommendation on PEPs.
Foreword | Bot programs allow attackers to remotely control vulnerable computers and form virtual networks of zombies - botnets. Botnets can be leveraged to orchestrate concerted attacks against other computing resources, for example, distributed denial of service (DDoS) attacks against targeted networks. The shift in motivation from curiosity and fame seeking to illicit financial gain has been marked by a growing sophistication in the evolution of bot malware.
Foreword | Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents.
Foreword | Public policy initiatives to manage parental child sexual offending have been hindered by the absence of risk instruments sensitive to unique factors associated with the distinctive profile of this core group of offenders. Using an Australian sample of 172 male parental offenders referred to community-based treatment designed for low-risk offenders, this study retrospectively compared risk levels and reoffence rates of offenders accepted into treatment (46%) with those who returned to court for standard criminal prosecution (54%).