5 results on '"2002)"'
Search Results
2. Creolization and the Production and Negotiation of Boundaries in Breyten Breytenbach's Recent Work
- Author
-
Hein Viljoen
- Subjects
Nine landscapes of our time bequeathed to a beloved (Nege landskappe bemaak aan 'n beminde ,1993) ,Paper flower (Papierblom ,2002) ,The wind-catcher (Die windvanger ,2007) ,Norwegian literature ,PT8301-9155 - Abstract
Much of the South African poet Breyten Breytenbach's work has been concerned with borders. In this article I examine borders and creolization in three important poems from Nine landscapes of our time bequeathed to a beloved (Nege landskappe bemaak aan 'n beminde, 1993), Paper flower (Papierblom, 2002) and The wind-catcher (Die windvanger, 2007). The link between creolization and boundaries is the poet's conception of identity and freedom. As is often the case the boundaries of the self are questioned as the poet permutates the central concepts. Crossing boundaries entails entering into dialogue not only with the self but also with the mother tongue itself and with a variety of other artists and writers. In other words, in Breytenbach's work an abrogation and appropriation of the own tradition ("erfgoed") as well as of material from others, other places and other traditions occur. In these three case studies in particular it is clear how the poet stretches and deforms boundaries as part of his poetic project to concretize a dynamic freedom.
- Published
- 2009
- Full Text
- View/download PDF
3. Divergent Accounts of Equivalent Narratives: Russian-Swedish Interdevochka Meets Swedish-Russian Lilya 4-ever
- Author
-
Lars Lyngsgaard Fjord Kristensen
- Subjects
Transnational cinema ,Labour Migration ,(Post-) Soviet female prostitution ,Russian Return Narrative ,Lilya 4-ever (Moodysson ,2002) ,Colonies and colonization. Emigration and immigration. International migration ,JV1-9480 ,Sociology (General) ,HM401-1281 - Abstract
In a region that is traditionally considered to be transnational, Nordic cinema has often posed as the prime case for a transnational cinema. The paper contests this notion of Nordic transnationality by analysing two films that depict two Russian women travelling to Sweden. Interdevochka/Intergirl (Todorovski, 1989, USSR) and Lilya-4-ever (Moodysson, 2004, Sweden) challenge the inclusiveness of the region and make explicit the fact that Russian identities are not part of the homogenous mixture of the region. Instead, Russian identities of cross-border prostitution are cinematically subjected to rejection and victimisation. This paper examines how Lilya-4-ever adheres to a European anxiety narrative by performing a Russian return narrative and how Interdevochka/Intergirl portrays ‘the fallen soviet woman’ by travelling to Sweden. These cinematic representations of the female Russian identity travelling to Sweden differ from each national context, but by probing into a comparative analysis the paper will reveal that both films need the Other to narrate these stories of transnational labour migration.
- Published
- 2007
- Full Text
- View/download PDF
4. The complexity of collaborative cyber crime investigations
- Author
-
Bednar, Peter, Katos, Vasilios, Hennell, Cheryl, Bednar, Peter, Katos, Vasilios, and Hennell, Cheryl
- Abstract
This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime. The opportunities, operational environment and modus operandi of a cyber criminal are considered, with a view to developing the skills and procedural support that investigators might usefully consider in order to respond more effectively to the investigation of cyber crimes across State boundaries.
- Published
- 2009
5. On the complexity of collaborative cyber crime investigations
- Author
-
Cheryl Hennell, Vasilios Katos, and Peter Bednar
- Subjects
Susan Brenner and Paul de Hert (eds) ,Volume 5 ,Volume 8 ,pp 151-2. 14 Warren G. Kruse II and Jay G. Heiser ,(Addison Wesley ,Interactions ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Criminology ,Criminal investigation ,Volume 1 ,p 4. 9 Noel Cox ,Byron Collie ,Information ,Systems thinking ,Message from the Guest Editor ,Journal of Artificial Intelligence Research ,Sociology ,Council of Europe ,Digital Evidence and Computer Crime ,2007) ,pp 151-2. 20 Vasilios Katos and Peter M. Bednar ,Computer Forensics and Cyber Crime ,a systemic approach to information systems definition (McGraw-Hill [Client-led Design] ,Chapter 3. 19 Judie Mulholland ,Mind-Maps and Rich Pictures for analysis of complex problem spaces’ ,pp 223-228. 21 Peter Checkland and Sue Holwell ,Volume 36 ,Phishing and Online Fraud Part II [Special Issue] ,and in the European Union ,pp 186-187 ,Recommendation of the Council concerning Guidelines for the Security of Information Systems ,Incident Response Essentials [Computer Forensics] ,5 Judie Mulholland ,‘Professionalism in digital forensics’ ,2006) ,(UN ,Journal of Digital Forensic Practice ,Paris ,OECD/GD(92) 10 ,Contextual Analysis ,Systems Thinking ,Strasbourg ,‘Cyber-crime Jurisdiction in New Zealand’ ,Complex system ,4 (2007) 45 – 50 and Stephen Mason ,(May 2008) ,Spyros Kokolakis ,Bart Preneel ,(lulu.com ,2006). 23 Frank Stowell ,IEEE Computer Society ,Appendix I for a longer international list of guidance. 17 For example see the NIST Special Publication Series ,Volume 30 ,‘Guidelines on PDA Forensics’ ,Computer and Intrusion Forensics ,Computer Standards & Interfaces ,2004 and ‘Guide to Integrating Forensic Techniques into Incident Response’ ,pp 151-2. 6 Eoghan Casey ,1994) ,Computing ,Volume 16 ,2006. 18 George Mohay ,‘Retrieval Time from Semantic Memory’ ,and D. West ,1994). 24 E. McFazdean ,Law ,(2002) ,Digital Evidence and Electronic Signature Law Review ,(Academic Press ,the rich picture: a tool for reasoning about work context’ [‘Methods & tools] ,(March/April 1998) ,‘A cyber-crime Investigation Framework’ ,csrc.nist.gov/publications/PubsSPs.html. 16 Good Practice Guide for Computer based Electronic Evidence (v4 [available on-line at http] ,1998). 22 Enid Mumford with Steve Hickey and Holly Matthies ,Journal of Verbal Learning and Verbal Behavior ,Systems Analysis ,see the United Nations Manual on the Prevention and Control of Computer-Related Crime ,2002) ,Digital forensics ,Management Decision ,(John Wiley and Sons ,1990. 12 Alastair Irons and Anastasia Konstadopoulou ,Designing Human Systems ,editor ,(Artech House ,‘Systemic combinatory use of Brainstorming ,Mixed mode Crime ,(1969) ,Analyzing Teamwork Theories and Models’ [‘The Communicative Multiagent Team Decision Problem] ,2003) ,The Mind Map Book ,Cyber crime ,in Proceedings of Second International Annual Workshop on Digital Forensics and Incident Analysis ,Guide to Intrusion Detection and Prevention Systems (IDPS) ,A Global Survey [Cybercrime Jurisdiction] ,see also Stephen Mason ,general editor ,making sense of the field (Wiley [Systems and Information Systems] ,p 312. 25 Allan M. Collins and M. Ross Quillan ,and Barry Buzan ,Stefanos Gritzalis ,and Theodore Tryfonas (ed) ,2001) and Eoghan Casey ,Discovery & Admissibility ,OECD ,240-247. 26 Tony Buzan ,‘Enhancing creative thinking within organisations’ ,Engineering ethics ,(New Jersey ,Computer Related Crime ,in Bert-Jaap Koops ,p 5. 11 For three examples of many ,(BBC ,Digital Forensic ,Handbook of Computer Crime Investigation ,(1998) ,New York ,Information Systems, Social aspects ,(T.M.C. Asser Press ,(Special Publication SP800-94 ,pp 389-423. 8 Maria Karyda and Lilian Mitrou ,Prentice Hall ,Collaborative Approaches ,p 55. 27 Andrew Monk and Steve Howard ,Complex System ,and Lynn Day ,Alison Anderson ,Issue 3 ,Disclosure [Electronic Evidence] ,ComputingMilieux_THECOMPUTINGPROFESSION ,Issue 2 ,Creative Holism for Managers [Systems Thinking] ,Issue 5 ,February 2007) ,Issue 4 ,‘Guidelines on Cell Phone Forensics’ ,pp 177- 188. 10 Marjie T. Britz ,National Institute of Standards and Technology ,Legal and Technical Issues’ [‘Internet Forensics] ,Recommendation No. R(89)9 on Computer Related Crime and Final Report of the European Committee on Crime Problems ,2004). 15 Karen Scarfone and Peter Mell ,Context analysis ,Cyber Crime Investigation ,Systems analysis ,(LexisNexis Butterworths ,Complex Problem Spaces ,Olivier de Vel and Rodney D. McKemmish ,p 2. 7 David V. Pynadath and Milind Tambe ,Chapter 3. 13 Judie Mulholland ,Proceedings of ECRM 2009 Malta ,2004) ,pp 21-30. 28 Peter Bednar - Abstract
This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime. The opportunities, operational environment and modus operandi of a cyber criminal are considered, with a view to developing the skills and procedural support that investigators might usefully consider in order to respond more effectively to the investigation of cyber crimes across State boundaries. Carrying out blackmail by using a computer, for example, is a particularly popular category of computer crime which involves the coordination of law enforcement and investigatory groups on an international level. A representative case was that involving three Russian individuals who extorted up to 4 million US dollars from United Kingdom based on-line casinos and bookmakers.1 The criminals were taken into custody in September 2004 following the successful joint efforts of the National High Tech Crime Unit in the UK, Interpol, the FBI, Russia’s Interior Ministry and the Prosecutor General’s office. The authors propose in this article that the Electronic Discovery Reference Model (EDRM), which is a useful framework for systemic thinking, can used to support the need for collaboration during the investigation process.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.