855 resultados para Sisters in Crime


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this chapter is to examine the effects of legal involvement of crime victims on their psychological adjustment. First, causes of possible effects are described, which may be located within the procedure or the outcome of the legal process. Then, the available evidence is reviewed, most of it suggesting that legal involvement does not strongly affect the victims' psychological adjustment, neither negatively nor positively. The chapter continues with a discussion of whether victims should be advised to report the assault to the police or not, and it describes relevant decision criteria, such as victim adjustment retributive justice, victim compensation, victim security and societal security. Finally, suggestions for future research are outlined, pointing to necessary methodological improvements in the design of future studies on legal involvement.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Attendance at trials of perpetrators could be retraumatizing for crime victims suffering from posttraumatic stress disorder. To investigate this hypothesis, two studies were conducted in which retraumatization was defined as a significant increase in posttraumatic stress reactions. A cross-sectional study of 137 victims of rape and nonsexual assault revealed that trial variables do virtually not predict posttraumatic stress reactions at a time several years after trial.Alongitudinal study of 31 victims of rape and nonsexual assault revealed intraindividual stability of posttraumatic stress reactions for the time interval from a few weeks before the trial to a few weeks after the trial; in addition, interindividual stability was high. The results of both studies do not support the retraumatization hypothesis, which should therefore be used with caution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It is conceivable that criminal proceedings cause psychological harm to the crime victims involved, that is, cause secondary victimization. To investigate this hypothesis, negative and positive effects of criminal proceedings were investigated, as perceived by 137 victims of violent crimes who were involved in trials several years previously. Trial outcome and procedure variables were measured as potential causes of secondary victimization. Results show a high proportion of victims reporting overall negative effects. Powerful predictors were outcome satisfaction and procedural justice, but not subjective punishment severity, interactional justice, and psychological stress by criminal proceedings. The practical implications of the results pertain to whether victims should be advised to report the crime to the police or not, and to appropriate prevention and intervention measures of secondary victimization by criminal proceedings.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background. Physical Activity (PA) is a central part in the fight to reduce obesity rates that are higher in Mexican Americans in the United States than any other ethnic groups. More than half of all Americans do not meet the daily PA recommendations and 48% of Mexican Americans do not exercise. The built environment is believed to affect participation in physical activity. The influence of the built environmental on physical activity levels in low-income Mexican Americans living along the Texas-Mexico border has not been investigated. ^ Purpose. The purpose of this secondary data analysis was trifold: (1) to determine the levels of self-reported PA in adults living in Brownsville, Texas; (2) to characterize the perceptions of this population regarding the built environment; and (3) to determine the association between self-reported PA and the built environment in Mexican Americans living in Brownsville, Texas. ^ Methods. 400 participants from the Tu Salud ¡Sí Cuenta! (TSSC) community-wide campaign were included in this secondary data analysis. Percentages for level of physical activity and the built environment were calculated using SPSS. Perceptions of the built environment were assessed by 14 items. Logistic regression analysis was used to assess the relationship between physical activity and built environment. All models were adjusted for age, gender, and level of education. ^ Results. The majority of men (41.97%) and women (59%), combined (56.7%)did not meet the 2008 PA Guidelines for Americans. We analyzed 14 built environment variables to characterize participants’ perceptions of the built environment. We conducted odds ratio (OR) to find if those who met PA levels associated the built environment such as neighborhood shops ([OR:1.806], CI:1.074,3.038 ]) bus stops ([OR:1.436], CI:.806,2.558) unattended stray dogs ([OR: 1.806], CI:1. 074,3.038), sidewalk access ([OR: .858],CI:.437,1.686), access to free parks ([OR:.549],CI:.335,.900) heavy traffic in neighborhood ([OR:.802], CI:.501,1.285), crime rate ([OR:.779], CI:.494,1.228) ranked the highest by mean score. The association between physical activity and the perceived built environment factors for Mexican Americans participating in the TSSCStudy were weakly associated. ^ Conclusions. This study provides evidence that PA levels are low in this Mexican American population. The built environment factors assessed in this study characterized the need for further studies of the variables that are seen as important to the Mexican American population. Lastly, the association of PA levels to the built environment was weak overall and further studies are recommended of the built environment.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study was an examination of environmental and social correlates of physical inactivity in a socio-economically disadvantaged community. This study was a secondary analysis of data collected by the Austin/Travis County Department of Health and Human Services. The study included an analysis of perceived environmental influences (e.g. access to physical support features like sidewalks and streetlights). This study also investigated several features of the social environment (e.g. perceived neighborhood crime and social influence). Participants’ beliefs and attitudes about the neighborhood were investigated. Results included estimates of the association between neighborhood factors and physical inactivity controlling for age, gender and education. This study found significant associations for social and environmental variables with physical inactivity. The goal of this work was to identify factors that contribute to inactivity and address a number of environmental and neighborhood risk factors that contribute to sedentary behaviors in a population of relative social and economic disadvantage.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Prostate cancer is the most common incident cancer and the second leading cause of death in men in the United States. Although numerous attempts have been made to identify risk factors associated with prostate cancer, the results have been inconsistent and conflicting. The only established risk factors are age and ethnicity. A positive family history of prostate cancer has also been shown to increase the risk two- to three-fold among close relatives.^ There are several similarities between breast and prostate cancer that make the relationship between the two of interest. (1) Histologically, both cancers are predominantly adenocarcinomas, (2) both organs have a sexual and/or reproductive role, (3) both cancers occur in hormone-responsive tissue, (4) therapy often consists of hormonal manipulation, (5) worldwide distribution patterns of prostate and breast cancer are positively correlated.^ A family history study was conducted to evaluate the aggregation of prostate cancer and co-aggregation of breast cancer in 149 patients referred to The University of Texas, M.D. Anderson Cancer Center with newly diagnosed prostate cancer. All patients were white, less than 75 years of age at diagnosis and permanent residents of the United States. Through a personal interview with the proband, family histories were collected on 1,128 first-degree relatives. Cancer diagnoses were verified through medical records or death certificate. Standardized incidence ratios were calculated using a computer program by Monson incorporating data from Connecticut Tumor Registry.^ In this study, familial aggregation of prostate cancer was verified only among the brothers, not among fathers. Although a statistically significant excess of breast cancer was not found, the increased point estimates in mothers, sisters and daughters are consistent with a co-aggregation hypothesis. Rather surprising was the finding of a seven-fold increased risk of prostate cancer and a three-fold increased risk of breast cancer among siblings in the presence of a maternal history of any cancer. Larger family history studies including high risk (African-Americans) and lower-risk groups (Hispanics) and incorporating molecular genetic evaluations should be conducted to determine if genetic differences play a role in the differential incidence rates across ethnic groups. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The commercial sexual exploitation of children (CSEC) has emerged as one of the world’s most heinous crimes. The problem affects millions of children worldwide and no country or community is fully immune from its effects. This paper reports first generation research of the relationship that exists between CSEC and the phenomenon of missing children living in and around the coastal regions of the state of Sao Paulo, Brazil, the country’s richest State. Data are reported from interviews and case records of 64 children and adolescents, who were receiving care through a major youth serving non-governmental organization (NGO) located in the coastal city of Sao Vicente. Also, data about missing children and adolescents were collected from Police Reports – a total of 858 Police Reports. In Brazil, prostitution is not a crime itself, however, the exploitation of prostitution is a crime. Therefore, the police have no information about children or adolescents in this situation, they only have information about the clients and exploiters. Thus, this investigation sought to accomplish two objectives: 1) to establish the relationship between missing and sexual exploited children; and 2) to sensitize police and child-serving authorities in both the governmental and nongovernmental sectors to the nature, extent, and seriousness of many unrecognized cases of CSEC and missing children that come to their attention. The observed results indicated that the missing children police report are significantly underestimated. They do not represent the number of children that run away and/or are involved in commercial sexual exploitation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since the year 2000 when the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, human trafficking has been regarded as one of the egregious violations of human rights, and global efforts have been made to eradicate it. The anti-trafficking framework has multiple dimensions, and the way the anti-trafficking framework is constructed influences its impact on the victims and non-trafficked migrants. This paper will analyze the impact of the anti-trafficking framework on the experiences of Burmese victims and non-trafficked migrants in Thailand. I will question the conventional framework of anti-trafficking, and seek to construct a framework more appropriate for addressing victims' actual needs. In conclusion, the anti-trafficking framework should serve the best interest of the victim; still, it should not be one which might adversely affect the interest of the would-be victim who is not identified as a victim according to the law.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Stream-mining approach is defined as a set of cutting-edge techniques designed to process streams of data in real time, in order to extract knowledge. In the particular case of classification, stream-mining has to adapt its behaviour to the volatile underlying data distributions, what has been called concept drift. Moreover, it is important to note that concept drift may lead to situations where predictive models become invalid and have therefore to be updated to represent the actual concepts that data poses. In this context, there is a specific type of concept drift, known as recurrent concept drift, where the concepts represented by data have already appeared in the past. In those cases the learning process could be saved or at least minimized by applying a previously trained model. This could be extremely useful in ubiquitous environments that are characterized by the existence of resource constrained devices. To deal with the aforementioned scenario, meta-models can be used in the process of enhancing the drift detection mechanisms used by data stream algorithms, by representing and predicting when the change will occur. There are some real-world situations where a concept reappears, as in the case of intrusion detection systems (IDS), where the same incidents or an adaptation of them usually reappear over time. In these environments the early prediction of drift by means of a better knowledge of past models can help to anticipate to the change, thus improving efficiency of the model regarding the training instances needed. By means of using meta-models as a recurrent drift detection mechanism, the ability to share concepts representations among different data mining processes is open. That kind of exchanges could improve the accuracy of the resultant local model as such model may benefit from patterns similar to the local concept that were observed in other scenarios, but not yet locally. This would also improve the efficiency of training instances used during the classification process, as long as the exchange of models would aid in the application of already trained recurrent models, that have been previously seen by any of the collaborative devices. Which it is to say that the scope of recurrence detection and representation is broaden. In fact the detection, representation and exchange of concept drift patterns would be extremely useful for the law enforcement activities fighting against cyber crime. Being the information exchange one of the main pillars of cooperation, national units would benefit from the experience and knowledge gained by third parties. Moreover, in the specific scope of critical infrastructures protection it is crucial to count with information exchange mechanisms, both from a strategical and technical scope. The exchange of concept drift detection schemes in cyber security environments would aid in the process of preventing, detecting and effectively responding to threads in cyber space. Furthermore, as a complement of meta-models, a mechanism to assess the similarity between classification models is also needed when dealing with recurrent concepts. In this context, when reusing a previously trained model a rough comparison between concepts is usually made, applying boolean logic. The introduction of fuzzy logic comparisons between models could lead to a better efficient reuse of previously seen concepts, by applying not just equal models, but also similar ones. This work faces the aforementioned open issues by means of: the MMPRec system, that integrates a meta-model mechanism and a fuzzy similarity function; a collaborative environment to share meta-models between different devices; a recurrent drift generator that allows to test the usefulness of recurrent drift systems, as it is the case of MMPRec. Moreover, this thesis presents an experimental validation of the proposed contributions using synthetic and real datasets.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our preliminary family studies have suggested that some female first-degree relatives of women with polycystic ovary syndrome (PCOS) have hyperandrogenemia per se. It was our hypothesis that this may be a genetic trait and thus could represent a phenotype suitable for linkage analysis. To investigate this hypothesis, we examined 115 sisters of 80 probands with PCOS from unrelated families. PCOS was diagnosed by the combination of elevated serum androgen levels and ≤6 menses per year with the exclusion of secondary causes. The sisters were compared with 70 healthy age- and weight-comparable control women with regular menses, no clinical evidence of hyperandrogenemia, and normal glucose tolerance. Twenty-two percent of the sisters fulfilled diagnostic criteria for PCOS. In addition, 24% of the sisters had hyperandrogenemia and regular menstrual cycles. Circulating testosterone (T) and nonsex hormone-binding globulin-bound testosterone (uT) levels in both of these groups of sisters were significantly increased compared with unaffected sisters and control women (P < 0.0001 for both T and uT). Probands, sisters with PCOS, and hyperandrogenemic sisters had elevated serum luteinizing hormone levels compared with control women. We conclude that there is familial aggregation of hyperandrogenemia (with or without oligomenorrhea) in PCOS kindreds. In affected sisters, only one-half have oligomenorrhea and hyperandrogenemia characteristic of PCOS, whereas the remaining one-half have hyperandrogenemia per se. This familial aggregation of hyperandrogenemia in PCOS kindreds suggests that it is a genetic trait. We propose that hyperandrogenemia be used to assign affected status in linkage studies designed to identify PCOS genes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Brood parasitism as an alternative female breeding tactic is particularly common in ducks, where hosts often receive eggs laid by parasitic females of the same species and raise their offspring. Herein, we test several aspects of a kin selection explanation for this phenomenon in goldeneye ducks (Bucephala clangula) by using techniques of egg albumen sampling and statistical bandsharing analysis based on resampling. We find that host and primary parasite are indeed often related, with mean r = 0.13, about as high as between first cousins. Relatedness to the host is higher in nests where a parasite lays several eggs than in those where she lays only one. Returning young females parasitize their birth nestmates (social mothers or sisters, which are usually also their genetic mothers and sisters) more often than expected by chance. Such adult relatives are also observed together in the field more often than expected and for longer periods than other females. Relatedness and kin discrimination, which can be achieved by recognition of birth nestmates, therefore play a role in these tactics and probably influence their success.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The genetic relationships of colony members in the ant Myrmica tahoensis were determined on the basis of highly polymorphic microsatellite DNA loci. These analyses show that colonies fall into one of two classes. In roughly half of the sampled colonies, workers and female offspring appear to be full sisters. The remaining colonies contain offspring produced by two or more queens. Colonies that produce female sexuals are always composed of highly related females, while colonies that produce males often show low levels of nestmate relatedness. These results support theoretical predictions that workers should skew sex allocation in response to relatedness asymmetries found within colonies. The existence of a relatedness threshold below which female sexuals are not produced suggests a possible mechanism for worker perception of relatedness. Two results indicate that workers use genetic cues, not queen number, in making sex-allocation decisions. (i) The number of queens in a colony was not significantly correlated with either the level of relatedness asymmetry or the sex ratio. (ii) Sex-ratio shifts consistent with a genetically based mechanism of relatedness assessment were seen in an experiment involving transfers of larvae among unrelated nests. Thus workers appear to make sex-allocation decisions on the basis of larval cues and appear to be able to adjust sex ratios long after egg laying.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite the federal government’s well known expansive reach in creating and enforcing immigration law, the states retain substantial authority to play an important role in migrants’ lives. Through their traditional powers to adopt criminal statutes and police their communities, states can indirectly — but intentionally — inject themselves into the incidents of ordinary life as a migrant. Colorado’s human smuggling statute, currently being challenged before the state supreme court, illustrates this type of state regulation of migration. This essay addresses the statute’s reach, its shaky constitutional footing, and places it in a broader context in which states criminalize immigration-related activity.