389 resultados para SEXUAL FUNCTION


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines some of the issues faced by School-Based Youth Health Nurses working in Queensland, in relation to the legal principles surrounding the provision of reproductive and sexual health advice. The paper outlines a number of specific issues faced by nurses working within this setting and considers the legal principles underpinning the issues concerning consent and confidentiality. The discussion in this paper demonstrates how the legal principles – which are often viewed as complex and uncertain by nurses working within this field – may be used as a guide to underpin good practice and compliance with the law. Although this paper is considered in the context of nurses working within Queensland, the principles and factors outlined are relevant to healthcare practitioners working within all Australian jurisdictions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2 13. In addition, we show the hashing algorithm can be distinguishable from a truly random sequence with probability close to one.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper considers constructions of institutional culture and power in the cover-up of child sexual abuse (CSA) by clergy in the Roman Catholic Church of Australia. The issue of cover-up has previously been considered in international inquiries as an institutional failing that has caused significant harm to victims of CSA by Catholic Clergy. Evidence given by select representatives of the Catholic Church in two government inquiries into institutional abuse carried out in Australia is considered here. This evidence suggests that, where cover-up has occurred, it has been reliant on the abuse of institutional power and resulted in direct emotional, psychological and spiritual harm to victims of abuse. Despite international recognition of cover-up as institutional abuse, evidence presented by Roman Catholic Representatives to the Victorian Inquiry denied there was an institutionalised cover-up. Responding to this evidence, this paper queries whether the primary foundation of cover-up conforms to the ‘bad apple theory’ in that it relates only to a few individuals, or the ‘bad barrel theory’ of institutional structure and culture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream nalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explored how the social context influences the stress-buffering effects of social support on employee adjustment. It was anticipated that the positive relationship between support from colleagues and employee adjustment would be more marked for those strongly identifying with their work team. Furthermore, as part of a three-way interactive effect, it was predicted that high identification would increase the efficacy of coworker support as a buffer of two role stressors (role overload and role ambiguity). One hundred and 55 employees recruited from first-year psychology courses enrolled at two Australian universities were surveyed. Hierarchical multiple regression analyses revealed that the negative main effect of role ambiguity on job satisfaction was significant for those employees with low levels of team identification, whereas high team identifiers were buffered from the deleterious effect of role ambiguity on job satisfaction. There also was a significant interaction between coworker support and team identification. The positive effect of coworker support on job satisfaction was significant for high team identifiers, whereas coworker support was not a source of satisfaction for those employees with low levels of team identification. A three-way interaction emerged among the focal variables in the prediction of psychological well-being, suggesting that the combined benefits of coworker support and team identification under conditions of high demand may be limited and are more likely to be observed when demands are low.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This submission makes one simple yet powerful recommendation for law reform to promote justice for survivors of child sexual abuse. It is informed by extensive analyses of the phenomenon of child sexual abuse and its psychological sequelae, legislative time limits and case law across Australia and internationally, the policy reasons underpinning statutory time limits generally, and the need for fairness, certainty and practicability in the legal system. The recommendation is that legislative reform is required in all Australian States and Territories to remove time limitations for civil claims for injuries caused by child sexual abuse.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sex, Love and Abuse intervenes in a timely way on some important issues that have become 'elephants in the room' for academic and policy considerations around sexual violence and abuse. In so doing, this book draws upon a range of literatures and novel empirical sources to encourage critical thinking about the relationship between sex, love and abuse, examining crimes including sexual assault, pornography, child sexual abuse and domestic violence. This provocative book seeks to destabilize essentialist understandings of these phenomena with a view to identifying the subtle and complex nature of relationships, which often defy easy explanation and categorisation. Focusing on theories, public discourses and moral ideals, Hayes connects romantic love, intimacy and harm in a unique philosophical analysis, exploring abuse in relationships and how such abuse is fostered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inflammation of the spinal cord after traumatic spinal cord injury leads to destruction of healthy tissue. This “secondary degeneration” is more damaging than the initial physical damage and is the major contributor to permanent loss of functions. In our previous study we showed that combined delivery of two growth factors, vascular endothelial growth factor (VEGF) and platelet-derived growth factor (PDGF), significantly reduced secondary degeneration after hemi-section injury of the spinal cord in the rat. Growth factor treatment reduced the size of the lesion cavity at 30d compared to control animals and further reduced the cavity at 90d in treated animals while in control animals the lesion cavity continued to increase in size. Growth factor treatment also reduced astrogliosis and reduced macroglia/macrophage activation around the injury site. Treatment with individual growth factors alone had similar effects to control treatments. The present study investigated whether growth factor treatment would improve locomotor behaviour after spinal contusion injury, a more relevant preclinical model of spinal cord injury. The growth factors were delivered for the first 7d to the injury site via osmotic minipump. Locomotor behaviour was monitored at 1-28d after injury using the BBB score and at 30d using automated gait analysis. Treated animals had BBB scores of 18; Control animals scored 10. Treated animals had significantly reduced lesion cavities and reduced macroglia/macrophage activation around the injury site. We conclude that growth factor treatment preserved spinal cord tissues after contusion injury, thereby allowing functional recovery. This treatment has the potential to significantly reduce the severity of human spinal cord injuries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sexual harassment remains a widespread workplace phenomenon, despite laws that proscribe it. Drawing initially on a typology from the violence prevention literature that conceptualizes prevention and response approaches according to when they occur, the paper synthesizes strategies identified in literature addressing workplace sexual harassment, as well as other workplace injustices or grievances. The paper utilizes this previous research to develop a framework of sexual harassment prevention strategies along two dimensions: functions and timing. The framework offers a research-informed set of organization-wide preventative and remedial approaches, a systemic approach to what is often seen as an individual problem, and a means to better focus interventions that are often disparate and unco-ordinated. The paper also highlights important areas for future research including a stronger focus on longer-term (tertiary) corrective actions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction and Aim: Sexual assaults commonly involve alcohol use by the perpetrator, victim, or both. Beliefs about alcohol’s effects may impact on people’s perceptions of and responses to men and women who have had such experiences while intoxicated from alcohol. This study aimed to develop an alcohol expectancy scale that captures young adults’ beliefs about alcohol’s role in sexual aggression and victimisation. Design and Methods: Based on pilot focus groups, an initial pool of 135 alcohol expectancy items was developed, checked for readability and face validity, and administered via a cross-sectional survey to 201 male and female university students (18-25 years). Items were specified in terms of three target drinkers: self, men, and women. In addition, a social desirability measure was included. Results: Principal Axis Factoring revealed a 4-factor solution for the targets men and women and a 5-factor solution for the target self with 72 items retained. Factors related to sexual coercion, sexual vulnerability, confidence, self-centredness, and negative cognitive and behavioural effects. Social desirability issues were evident for the target self, but not for the targets men and women. Discussion and Conclusions: Young adults link alcohol’s effects with sexual vulnerabilities via perceived risky cognitions and behaviours. Due to social desirability, these expectancies may be difficult to explicate for the self but may be accessible instead via other-oriented assessment. The Sexual Coercion and Vulnerability Alcohol Expectancy Scale has potential as a tool to elucidate the established tendency for observers to excuse intoxicated sexual perpetrators while blaming intoxicated victims.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article lays down the foundations of the renormalization group (RG) approach for differential equations characterized by multiple scales. The renormalization of constants through an elimination process and the subsequent derivation of the amplitude equation [Chen, Phys. Rev. E 54, 376 (1996)] are given a rigorous but not abstract mathematical form whose justification is based on the implicit function theorem. Developing the theoretical framework that underlies the RG approach leads to a systematization of the renormalization process and to the derivation of explicit closed-form expressions for the amplitude equations that can be carried out with symbolic computation for both linear and nonlinear scalar differential equations and first order systems but independently of their particular forms. Certain nonlinear singular perturbation problems are considered that illustrate the formalism and recover well-known results from the literature as special cases. © 2008 American Institute of Physics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained examples of near-collisions for the compression function, but in practice the attack could not be extended to the full function due to large memory requirements and computation time. In this paper we improve the attack and show that it is possible to find near-collisions in practice for any given value of IV. In particular, this means that the full hash function with the prespecified IV is vulnerable in practice, not just in theory. We exhibit an example near-collision for the complete hash function.