Breadcrumb
Search
Contents
- Acknowledgements
- Abstract
- Executive summary
- Introduction
- Technology as an enabler of fraud during pandemics
- Fraud arising from COVID-19
- Understanding pandemic-related fraud
- Conclusions for Australia: Near future fraud and fraud control trends
- References
Contents
- Acknowledgements
- Executive summary
- Introduction
- Methodology
- Results
- Characteristics of the sample
- What makes a victim of online fraud
- Life events and personal characteristics of participants
- Preventive factors used by victims and non-victims with online activities
- Victimisation and repeat victimisation
- Consequences of victimisation
- Discussion
- Policy implications
- References
Foreword | Politically exposed persons (PEPs) are individuals who are, or have been, entrusted with prominent public functions. PEPs are potential targets for bribes due to their prominent position in public life. They have a higher risk of corruption due to their access to state accounts and funds. A review of Financial Action Task Force (FATF) and FATF-style regional bodies' mutual evaluation reports reveals that a significant number of jurisdictions are found to be either non-compliant or partially-compliant with the FATF recommendation on PEPs.
Foreword | Bot programs allow attackers to remotely control vulnerable computers and form virtual networks of zombies - botnets. Botnets can be leveraged to orchestrate concerted attacks against other computing resources, for example, distributed denial of service (DDoS) attacks against targeted networks. The shift in motivation from curiosity and fame seeking to illicit financial gain has been marked by a growing sophistication in the evolution of bot malware.
Foreword | Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents.
Foreword | Public policy initiatives to manage parental child sexual offending have been hindered by the absence of risk instruments sensitive to unique factors associated with the distinctive profile of this core group of offenders. Using an Australian sample of 172 male parental offenders referred to community-based treatment designed for low-risk offenders, this study retrospectively compared risk levels and reoffence rates of offenders accepted into treatment (46%) with those who returned to court for standard criminal prosecution (54%).
Foreword | A juvenile pre-court diversion scheme was introduced in the Northern Territory in 2000. Administered by police, it uses warnings and conferences to divert selected juveniles from the court process. This paper reports on an analysis of Northern Territory police records on 3,597 apprehended juveniles over a 5 year period. Findings showed that the great majority of juveniles (76%) did not reoffend within the first year after their initial diversion or court appearance.
Bushfire arson imposes significant environmental and economic costs on Australia, but arsonists are difficult to catch and even more difficult to convict (Muller 2008). Two studies in the United States (US) sought to determine if an increase in the level of law enforcement intensity - more police officers per head of population - would help to reduce bushfire arson. In the first study, the relationship between arson and levels of law enforcement was analysed over 12 years in 27 US states (Donoghue & Main 1985).
This paper presents an overview of some of the key emerging issues in Australian domestic and family violence (D/FV) research. In particular, the paper considers research in the context of gay, lesbian, bisexual, transgender and intersex (GLBTI) communities; among the elderly; those with disabilities and people from cultural and linguistically diverse (CALD) backgrounds; family violence and Indigenous communities; the relevance of homelessness; the impact of D/FV on children; and issues around perpetrator programs.
Foreword | Sexual offending against children is a highly emotive issue. It is nonetheless important that public policy initiatives to prevent and/or respond to child sexual abuse are based on the available evidence about child sex offenders.
Foreword | The Internet has increased the range, volume and accessibility of sexually abusive imagery, including child pornography. Child pornography depicts the sexual or sexualised physical abuse of children under 16 years of age. Australia has joined many other nations in an international effort to combat this multi-faceted global menace that combines both heavily networked and highly individualised criminal behaviour. This paper examines the typology of online child pornography offending, as well as law enforcement responses to the problem.
Proceedings of a conference held 27-29 October 1992
Contents
- Foreword
Patricia Weiser Easteal - Introductory address
Sally Brown
Part 1: Overview
- Introduction to part 1: Overview
- Without consent: the aims, the insights, the aftermath
David Goldie - Rape and 'real rape'
Joanne Spangaro - Beliefs about rape: a national survey
Dr Patricia Weiser Easteal - Patterns of rape: a preliminary Queensland perspective
Amanda Moran - Only a witness