4 resultados para denial

em WestminsterResearch - UK


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examined the psychological impact of the online dating romance scam. Unlike other mass-marketing fraud victims, these victims experienced a ‘double hit’ of the scam: a financial loss and the loss of a relationship. For most, the loss of the relationship was more upsetting than their financial losses (many described the loss of the relationship as a ‘death’). Some described their experience as traumatic and all were affected negatively by the crime. Most victims had not found ways to cope given the lack of understanding from family and friends. Denial (e.g., not accepting the scam was real or not being able to separate the fake identity with the criminal) was identified as an ineffective means of coping, leaving the victim vulnerable to a second wave of the scam. Suggestions are made as to how to change policy with regards to law enforcement deal with this crime.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A review article of three recent books on suburbanization and suburbia in the USA: Andrew Friedman, Covert Capital: Landscapes of Denial and the Making of the US Empire in the Suburbs of Northern Virginia. Berkeley, Los Angeles: University of California Press, 2013. 416pp. £19.95 pbk. Elaine Lewinnek, The Working Man's Reward: Chicago's Early Suburbs and the Roots of American Sprawl. Oxford and New York: Oxford University Press, 2014. 239pp. 20 b&w illustrations. £30.99 hbk. Benjamin Ross, Dead End: Suburban Sprawl and the Rebirth of American Urbanism. Oxford and New York: Oxford University Press, 2014. 249pp. £20.99 hbk.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite longstanding allegations of UK involvement in prisoner abuse during counterterrorism operations as part of the US-led ‘war on terror’, a consistent narrative emanating from British government officials is that Britain neither uses, condones nor facilitates torture or other cruel, inhuman, degrading treatment and punishment. We argue that such denials are untenable. We have established beyond reasonable doubt that Britain has been deeply involved in post-9/11 prisoner abuse, and we can now provide the most detailed account to date of the depth of this involvement. We argue that it is possible to identify a peculiarly British approach to torture in the ‘war on terror’, which is particularly well-suited to sustaining a narrative of denial. To explain the nature of UK involvement, we argue that it can be best understood within the context of how law and sovereign power have come to operate during the ‘war on terror’. We turn here to the work of Judith Butler, and explore the role of Britain as a ‘petty sovereign’, operating under the state of exception established by the US Executive. UK authorities have not themselves suspended the rule of law so overtly, and indeed have repeatedly insisted on their commitment to it. They have nevertheless been able to construct a rhetorical, legal and policy ‘scaffold’ that has enabled them to demonstrate at least procedural adherence to human rights norms, while at the same time allowing UK officials to acquiesce in the arbitrary exercise of sovereignty over individuals who are denied any access to appropriate representation or redress in compliance with the rule of law.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks in such networks. The second part presents a multiplayer game that takes place between the nodes of an ad hoc network and based on fundamental principles of game theory. By combining computational problems with puzzles, improvement occurs in the efficiency and latency of the communicating nodes and resistance in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly.