303 resultados para SEXUAL ACTIVITIES
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
Resumo:
This Report, prepared for Smart Service Queensland (“SSQ”), addresses legal issues, areas of risk and other factors associated with activities conducted on three popular online platforms—YouTube, MySpace and Second Life (which are referred to throughout this Report as the “Platforms”). The Platforms exemplify online participatory spaces and behaviours, including blogging and networking, multimedia sharing, and immersive virtual environments.
Resumo:
Research examining post-trauma pathology indicates negative outcomes can differ as a function of the type of trauma experienced. Such research has yet to be published when looking at positive post-trauma changes. Ninety-Four survivors of trauma, forming three groups, completed the Posttraumatic Growth Inventory (PTGI) and Impact of Events Scale-Revised (IES-R). Groups comprised survivors of i) sexual abuse ii) motor vehicle accidents iii) bereavement. Results indicted differences in growth between the groups with the bereaved reporting higher levels of growth than other survivors and sexual abuse survivors demonstrated higher levels of PTSD symptoms than the other groups. However, this did not preclude sexual abuse survivors from also reporting moderate levels of growth. Results are discussed with relation to fostering growth through clinical practice.
Resumo:
Children’s picture books dealing with the topic of child sexual abuse appeared in the 1980s with the aim of addressing the need for age-appropriate texts to teach sexual abuse prevention concepts and to provide support for young children who may be at risk of or have already experienced sexual abuse. Despite the apparent potential of children’s picture books to convey child sexual abuse prevention concepts, very few studies have addressed the topic of child sexual abuse in children’s literature. This article critically examines a selection of 15 picture books (published in the US, Canada and Australia) for children aged 3–8 years dealing with this theme. It makes use of an established set of evaluative criteria to conduct an audit of the books’ content and applies techniques of literary discourse analysis to explain how these picture books satisfy criteria for child sexual abuse prevention. The analysis is used as a way to understand the discourses available to readers, both adults and children, on the topic of child sexual abuse. Key themes in the books include children’s empowerment and agency, and the need for persistence and hope.
Resumo:
This article critically assesses the main social policy responses to preventing rape following much feminist struggle to make sexual violence a public matter of legitimate concern. It considers the preventative potential of legal measures, anti-violence campaigns waged by feminist and men's groups in the US and Australia, public education campaigns in Schools and Universities, and public awareness campaigns sponsored by the state.We argue that sexual violence is not amenable to quick fix strategies that place responsibility for prevention entirely on individual men or women. While we recognise that responsibilising victims and individualising offenders is consistent with wider global shifts in social policy calling upon individuals to manage their own risk, we argue that the increasing reliance on such neo-liberal social policy is especially problematic in preventing rape. The paper suggests ways to resist this which place greater emphasis on the promotion of sexual ethics; the eroticisation of consent; the reinvention of the norms of romance to include both these, and the complete separation of the psycho-social-symbolic connections between sex and violence, and ultimately the re-evaluation of the cultural expectations of masculinity and femininity.
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.
Resumo:
This paper details a systematic literature review identifying problems in extant research relating to teachers’ attitudes towards reporting child sexual abuse, and offers a model for new attitude scale development and testing. Scale development comprised a five-phase process grounded in contemporary attitude theories including: a) developing the initial item pool; b) conducting a panel review; c) refining the scale via an expert focus group; d) building content validity through cognitive interviews; e) assessing internal consistency via field testing. The resulting 21-item scale displayed construct validity in preliminary testing. The scale may prove useful as a research tool, given the theoretical supposition that attitudes may be changed with time, context, experience, and education. Further investigation with a larger sample is warranted.
Resumo:
This paper examines the opportunities for social activities in public outdoor spaces associated with high-density residential living. This study surveyed activities in outdoor spaces outside three high-density residential communities in Brisbane. Results indicated that activity patterns in public outdoor space outside residential communities are different to general urban public outdoor space. This broadly but not fully supports current theories concerning activities in public space. That is some environmental factors have impacts on the level of social interaction. The relationship between outdoor space and a residential building may have a significant impact on the level of social activities. As a consequence, a new classification of activities in public space is suggested. In improving the level of social contact in public outdoor space outside a residential community, the challenge is how to encourage people to leave their comfortable homes and spend a short time in these public spaces. For residential buildings and public space to be treated as an integrated whole, the outdoor open spaces close to and surrounding these buildings must have a more welcoming design.
Resumo:
Sexual harassment can be conceptualized as a series of interactions between harassers and targets that either inhibit or increase outrage by third parties. The outrage management model predicts the kinds of actions likely to be used by perpetrators to minimize outrage, predicts the consequences of failing to use these tactics—namely backfire, and recommends countertactics to increase outrage. Using this framework, our archival study examined outrage-management tactics reported as evidence in 23 judicial decisions of sexual harassment cases in Australia. The decisions contained precise, detailed information about the circumstances leading to the claim; the events which transpired in the courtroom, including direct quotations; and the judges' interpretations and findings. We found evidence that harassers minimize outrage by covering up the actions, devaluing the target, reinterpreting the events, using official channels to give an appearance of justice, and intimidating or bribing people involved. Targets can respond using countertactics of exposure, validation, reframing, mobilization of support, and resistance. Although there are limitations to using judicial decisions as a source of information, our study points to the value of studying tactics and the importance to harassers of minimizing outrage from their actions. The findings also highlight that, given the limitations of statutory and organizational protections in reducing the incidence and severity of sexual harassment in the community, individual responses may be effective as part of a multilevel response in reducing the incidence and impact of workplace sexual harassment as a gendered harm.
Resumo:
Objective: During hospitalisation older people often experience functional decline which impacts on their future independence. The objective of this study was to evaluate a multifaceted transitional care intervention including home-based exercise strategies for at-risk older people on functional status, independence in activities of daily living, and walking ability. Methods: A randomised controlled trial was undertaken in a metropolitan hospital in Australia with 128 patients (64 intervention, 64 control) aged over 65 years with an acute medical admission and at least one risk factor for hospital readmission. The intervention group received an individually tailored program for exercise and follow-up care which was commenced in hospital and included regular visits in hospital by a physiotherapist and a Registered Nurse, a home visit following discharge, and regular telephone follow-up for 24 weeks following discharge. The program was designed to improve health promoting behaviours, strength, stability, endurance and mobility. Data were collected at baseline, then 4, 12 and 24 weeks following discharge using the Index of Activities of Daily Living (ADL), Instrumental Index of Activities of Daily Living (IADL), and the Walking Impairment Questionnaire (Modified). Results: Significant improvements were found in the intervention group in IADL scores (p<.001), ADL scores (p<.001), and WIQ scale scores (p<.001) in comparison to the control group. The greatest improvements were found in the first four weeks following discharge. Conclusions: Early introduction of a transitional model of care incorporating a tailored exercise program and regular telephone follow-up for hospitalised at-risk older adults can improve independence and functional ability.
Resumo:
This study provides preliminary support for the notion that internal audit function assists in reducing external audit effort and fees. Data on internal audit characteristics and activities are obtained from survey respondents of Hong Kong companies and audit fee model data are acquired from their annual reports. The results of this study suggest that the external auditor of firms in Hong Kong rely on the internal audit function and subsequently charge a lower fee. Lower external audit fees are associated with a larger internal audit department and certain activities carried out by the internal audit. Specifically, lower external audit fees are associated with more internal audit effort spent on activities relating to financial statements, systems development and maintenance, operating efficiency and effectiveness, fraud investigations and unlimited access to internal auditors’ working papers. The results of this study suggest that the contribution of the internal audit may substitute for some substantive external auditing processes and lower monitoring costs.