5 resultados para Foundational myth

em Digital Commons at Florida International University


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This quasi-experimental study (N = 139) measured the effect of a reader response based instructional unit of the novel Speak on adolescents' rape myth acceptance. Participants were eighth grade language arts students at a Title I middle school in a major metropolitan school district. Seven classes were randomly assigned to treatment ( n = 4) or control (n = 3) condition. Two teachers participated in the study and both taught both treatment and control classes. The study lasted a period of five weeks. Participants were pretested using the Rape Myth Acceptance Scale (Burt, 1980) and a researcher created scale, the Adolescent Date Rape Scale (ADRMS). Analysis of pretests showed the ADRMS to be a reliable and valid measure of rape myth acceptance in adolescents. Factor analysis revealed it to have two major components: "She Wanted It" and "She Lied." Pretests supported previous studies which found girls to have significantly lower initial levels of rape myth acceptance than boys (p < .001). A 2 (group) x 2 (instructor) x 2 (sex) ANCOVA using ADRMS pretest as a covariate and ADRMS posttest as a dependent variable found that treatment was effective in reducing rape myth acceptance (p < .001, η2 = .15). Boys with high rape myth acceptance as demonstrated by pretest scores of 1 standard deviation above the mean on ADRMS did not have a backlash to treatment. Extended analysis revealed that participants had significantly lower scores posttest on Factor 1, "She Wanted It" (p < .001, η2 = .27), while scores on Factor 2, "She Lied" were not significantly lower (p = .07). This may be because the content of the novel primarily deals with issues questioning whether the main characters assault was a rape rather than a false accusation. Attrition rates were low (N = 15) and attrition analysis showed that drop outs did not significantly alter the treatment or control groups. Implications for reader response instruction of young adult literature, for research on rape myth acceptance in secondary schools, and for statistical analysis of effect size using pretests as filters are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Adolescents are at the greatest risk for victimization and perpetration of sexual assault. This paper examines the current trends in literacy education which marginalize aesthetic reading experiences and using reader response theory, and argues that young adult literature may provide an opportunity to reduce rape myth acceptance in adolescents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.