Clinical and criminal profile of internet offenders with ASD

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lorraine Higham ◽  
Alessandra Girardi ◽  
Holly Victoria Edwards

Purpose Autism-specific characteristics have been associated with internet criminal activities. Internet and non-internet offenders differ on a series of demographic, psychological and offending variables. However, the clinical and criminal presentation of individuals with autism spectrum disorder (ASD) in forensic secure care settings has been underexplored. This paper aims to explore the profiles of internet offenders with ASD admitted to a secure psychiatric unit. Design/methodology/approach This study provides the results of a service evaluation of individuals with ASD. The demographic, clinical and criminal characteristics of a small sample of internet offenders with ASD admitted to secure care are described and discussed. Findings Internet offenders present in secure care with high rates of comorbid disorders, histories of violence and traumatic experiences, mood disorders and difficulties with relationships. Of the 24 internet offenders discussed, 18 of them committed an offence of a sexual nature involving children. Originality/value This paper highlights the potential risks for individuals with ASD in using the internet and the possible difficulties associated with detecting this because of rapid advancements in technology.

2018 ◽  
Vol 4 (1) ◽  
pp. 2-9 ◽  
Author(s):  
Raja A.S. Mukherjee ◽  
Minahil Nawaz ◽  
Terry Joseph

Purpose Over the last few years increasing numbers of Autism Spectrum Disorder (ASD) services have been established across the country. The different services use varying models and the level of complexity seen in each is unclear. The paper aims to discuss this issue. Design/methodology/approach In order to facilitate the development of the next phase of service provision the three geographical areas covered by SABP ASD services were compared. Modified Global Assessment of Functioning (mGAF) scores were calculated for 75 patients from each area before being compared across various domains to identify the complexities in each area covered. Findings Overall high levels of complexity were seen, with 85 per cent presenting with a serious or major functional difficulty based on, mGAF scores. Originality/value This has planning implications both for commissioners and future service development as previously not identified at a time when services are continuing to expand.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Son Nguyen ◽  
Peggy Shu-Ling Chen ◽  
Yuquan Du

PurposeAlthough being considered for adoption by stakeholders in container shipping, application of blockchain is hindered by different factors. This paper investigates the potential operational risks of blockchain-integrated container shipping systems as one of such barriers.Design/methodology/approachLiterature review is employed as the method of risk identification. Scientific articles, special institutional reports and publications of blockchain solution providers were included in an inclusive qualitative analysis. A directed acyclic graph (DAG) was constructed and analyzed based on network topological metrics.FindingsTwenty-eight potential risks and 47 connections were identified in three groups of initiative, transitional and sequel. The DAG analysis results reflect a relatively well-connected network of identified hazardous events (HEs), suggesting the pervasiveness of information risks and various multiple-event risk scenarios. The criticality of the connected systems' security and information accuracy are also indicated.Originality/valueThis paper indicates the changes of container shipping operational risk in the process of blockchain integration by using updated data. It creates awareness of the emerging risks, provides their insights and establishes the basis for further research.


2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


2016 ◽  
Vol 45 (1) ◽  
pp. 29-50 ◽  
Author(s):  
Aristides Isidoro Ferreira ◽  
Joana Diniz Esteves

Purpose – Activities such as making personal phone calls, surfing on the internet, booking personal appointments or chatting with colleagues may or may not deviate attentions from work. With this in mind, the purpose of this paper is to examine gender differences and motivations behind personal activities employees do at work, as well as individuals’ perception of the time they spend doing these activities. Design/methodology/approach – Data were obtained from 35 individuals (M age=37.06 years; SD=7.80) from a Portuguese information technology company through an ethnographic method including a five-day non-participant direct observation (n=175 observations) and a questionnaire with open-ended questions. Findings – Results revealed that during a five-working-day period of eight hours per day, individuals spent around 58 minutes doing personal activities. During this time, individuals engaged mainly in socializing through conversation, internet use, smoking and taking coffee breaks. Results revealed that employees did not perceive the time they spent on non-work realted activities accurately, as the values of these perceptions were lower than the actual time. Moreover, through HLM, the findings showed that the time spent on conversation and internet use was moderated by the relationship between gender and the leisure vs home-related motivations associated with each personal activity developed at work. Originality/value – This study contributes to the literature on human resource management because it reveals how employees often perceive the time they spend on non-work related activities performed at work inaccurately. This study highlights the importance of including individual motivations when studying gender differences and personal activities performed at work. The current research discusses implications for practitioners and outlines suggestions for future studies.


2016 ◽  
Vol 44 (4) ◽  
pp. 18-25 ◽  
Author(s):  
Saul J. Berman ◽  
Peter J. Korsten ◽  
Anthony Marshall

Purpose Digital reinvention helps organizations create unique, compelling experiences for their customers, partners, employees and other stakeholders. Design/methodology/approach Digital reinvention combines the capabilities of multiple technologies, including cloud, cognitive, mobile and the Internet of Things (IoT) to rethink customer and partner relationships from a perspective of fundamental customer need, use or aspiration. Findings The most successful digitally reinvented businesses establish a platform of engagement for their customers, with the business acting as enabler, conduit and partner Practical implications For successful digital reinvention, organizations need to pursue a new strategic focus, build new expertise and establish new ways of working. Originality/value The article offers a blueprint for digital reinvention that involves rethinking customer and partner relationships from a perspective of fundamental customer need, use or aspiration.


2019 ◽  
Vol 35 (1) ◽  
pp. 19-21

Purpose This paper reviews the latest management developments across the globe and pinpoints practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings If you search images of the word “strategy” on the internet, three of the first seven images to appear on Google (other search engines are available) include chess pieces, while two of the top ten hits involve light bulbs. Aside from the obvious conclusions that any strategic discussion should either involve chess grand masters or well-lit rooms, it is clear that most people assume winning games with lots of moves are possible is the key to a successful strategy. But is this a valid analogy, even at a high level? Originality/value The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ke Wang ◽  
Zheming Yang ◽  
Bing Liang ◽  
Wen Ji

Purpose The rapid development of 5G technology brings the expansion of the internet of things (IoT). A large number of devices in the IoT work independently, leading to difficulties in management. This study aims to optimize the member structure of the IoT so the members in it can work more efficiently. Design/methodology/approach In this paper, the authors consider from the perspective of crowd science, combining genetic algorithms and crowd intelligence together to optimize the total intelligence of the IoT. Computing, caching and communication capacity are used as the basis of the intelligence according to the related work, and the device correlation and distance factors are used to measure the improvement level of the intelligence. Finally, they use genetic algorithm to select a collaborative state for the IoT devices. Findings Experimental results demonstrate that the intelligence optimization method in this paper can improve the IoT intelligence level up to ten times than original level. Originality/value This paper is the first study that solves the problem of device collaboration in the IoT scenario based on the scientific background of crowd intelligence. The intelligence optimization method works well in the IoT scenario, and it also has potential in other scenarios of crowd network.


Info ◽  
2016 ◽  
Vol 18 (3) ◽  
pp. 42-57 ◽  
Author(s):  
Daeho Lee ◽  
Dong-Hee Shin

Purpose The purpose of this study is to categorize network neutrality according to its issues under debate and assess the state of the debate based on such organization. In addition, the study discusses the reasons that network neutrality is so difficult to solve and the future research directions that would do so. Design/methodology/approach This study presents a critical review of the current network neutrality issues and summarizes the economic background of each position in the debate. The relevant literature is organized by issue to examine the reasons that the network neutrality debate is so difficult to solve and determine the further study required to solve it. Findings An analysis of the relevant literature suggests that the proponents and opponents of network neutrality disagree on the best methods of developing the Internet. Therefore, future research and regulatory and practitioners’ applications would greatly benefit from a comprehensive review of that literature. Originality/value Network neutrality regulation is receiving increased attention because the development and significant influences of the Internet are becoming more apparent.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Anna Good ◽  
Joy MacKeith

Purpose The purpose of this article is to explain why Sweet et al.'s assertions are not well founded and raise unsubstantiated doubt over the use of the Family star Plus and the Outcomes Star suite of tools as outcomes measures. Design/methodology/approach Evidence is presented of flaws in the analysis, reporting and conclusions of an article published in this journal (Sweet et al., 2020). Findings Sweet et al. failed to mention a body of Outcomes Star validation work, including over 20 online reports and a manuscript they had seen of a now published article supporting the reliability and validity of the Family Star Plus (Good and MacKeith, 2020). There are significant issues with their methodology, presentation of results and conclusions including: reliance on statistical significance with a small sample size; use of statistics not intended for ordinal data and; and inappropriate conclusions from convergence with measures conceptually different to the Family Star Plus. Originality/value Evidence is presented that the Family Star Plus is a useful and valid outcome measure and that Sweet et al.’s conclusions can be attributed to issues with their methodology and interpretation.


Sign in / Sign up

Export Citation Format

Share Document