356 resultados para Vulnerabilities
Resumo:
This practice-led research was initiated in response to a series of violent encounters that occurred between my fragile installations and viewers. The central focus of this study was to recuperate my installation practice in the wake of such events. This led to the development of a ‘responsive practice’ methodology, which reframed the installation process through an ethical lens developed from Emmanuel Levinas’ ethical phenomenology. The central propositions of this research are the reconceptualisation of ‘violent encounters’ in terms of difference whereby I accept viewers responses, even those which are violent, destructive or damaging, and secondly that the process operates as a generative excess for practice through which recuperative strategies can be found and implemented. By re-examining this process as it unfolded in the three phases of the practical component, I developed strategies whereby violated, destroyed or damaged works could be recuperated through the processes of reconfiguration, reparation and regeneration. Therefore my installations embody and articulate vulnerability but also demonstrate resilience and renewal.
Resumo:
The loosely-coupled and dynamic nature of web services architectures has many benefits, but also leads to an increased vulnerability to denial of service attacks. While many papers have surveyed and described these vulnerabilities, they are often theoretical and lack experimental data to validate them, and assume an obsolete state of web services technologies. This paper describes experiments involving several denial of service vulnerabilities in well-known web services platforms, including Java Metro, Apache Axis, and Microsoft .NET. The results both confirm and deny the presence of some of the most well-known vulnerabilities in web services technologies. Specifically, major web services platforms appear to cope well with attacks that target memory exhaustion. However, attacks targeting CPU-time exhaustion are still effective, regardless of the victim’s platform.
Resumo:
Rural-urban migration continues to grow in many developing countries including Vietnam. The experience of stress and coping associated with this process may vary for people from different circumstances. However, there has been little research on migrants to date. This study adopts a qualitative approach to research on unregistered, male, migrant freelance labourers in urban Vietnam and to explore factors contributing to stress and coping among this population. The study revealed an array of stressors related to migrants' life experiences in urban space, including physical, financial and social factors. Coping was diverse, including problem-focused coping (PFC) and emotion-focused coping (EFC), pro-social and anti-social, active and passive. Less active and anti-social coping appeared common. Together, weak social network and lack of support from formal systems placed coping and adaptation in a cyclic relationship. The results highlight a multi-disciplinary approach to help cope and adapt effectively for these men.
Resumo:
Type unions, pointer variables and function pointers are a long standing source of subtle security bugs in C program code. Their use can lead to hard-to-diagnose crashes or exploitable vulnerabilities that allow an attacker to attain privileged access over classified data. This paper describes an automatable framework for detecting such weaknesses in C programs statically, where possible, and for generating assertions that will detect them dynamically, in other cases. Exclusively based on analysis of the source code, it identifies required assertions using a type inference system supported by a custom made symbol table. In our preliminary findings, our type system was able to infer the correct type of unions in different scopes, without manual code annotations or rewriting. Whenever an evaluation is not possible or is difficult to resolve, appropriate runtime assertions are formed and inserted into the source code. The approach is demonstrated via a prototype C analysis tool.
Resumo:
Book summary: In a constantly evolving context of performance management, accountability and risk assessment, police organisations and frontline police officers are required to pay careful attention to what has come to be known as ‘at risk people’, ‘vulnerable populations’ or ‘vulnerable people’. Vulnerable people have become a key focus of policy. Concurrently, there have been stronger demands on police, and a steep increase in police powers in relation to their interaction with vulnerable people. The premise of this protectionist and interventionist agenda is threefold: to protect the rights of vulnerable individuals proactively cater for their vulnerability within the justice system; and to secure police operations and protocols within strict guidelines. This collection unpacks ‘vulnerable people policing’ in theory and practice and guides the reader through the policing process as it is experienced by police officers, victims, offenders, witnesses and justice stakeholders. Each chapter features a single step of the policing process: from police recruit education through to custody, and the final transfer of vulnerable people to courts and sentencing. This edited collection provides analytical, theoretical and empirical insights on vulnerable people policing, and reflects on critical issues in a domain that is increasingly subject to speedy conversion from policy to practice, and heightened media and political scrutiny. It breaks down policing practices, operations and procedures that have vulnerable populations as a focus, bringing together original and innovative academic research and literature, practitioner experience and discussion of policy implications (from local and international perspectives). The particular nature of this collection highlights the multi-disciplinary nature of police work, sheds light on how specific, mandatory policies guide police officers steps in their interaction with vulnerable populations, and discusses the practicalities of police decision making at key points in this process.
Resumo:
This research quantifies the lag effects and vulnerabilities of temperature effects on cardiovascular disease in Changsha—a subtropical climate zone of China. A Poisson regression model within a distributed lag nonlinear models framework was used to examine the lag effects of cold- and heat-related CVD mortality. The lag effect for heat-related CVD mortality was just 0–3 days. In contrast, we observed a statistically significant association with 10–25 lag days for cold-related CVD mortality. Low temperatures with 0–2 lag days increased the mortality risk for those ≥65 years and females. For all ages, the cumulative effects of cold-related CVD mortality was 6.6% (95% CI: 5.2%–8.2%) for 30 lag days while that of heat-related CVD mortality was 4.9% (95% CI: 2.0%–7.9%) for 3 lag days. We found that in Changsha city, the lag effect of hot temperatures is short while the lag effect of cold temperatures is long. Females and older people were more sensitive to extreme hot and cold temperatures than males and younger people.
Resumo:
Background Alcohol expectancies likely play a role in people’s perceptions of alcohol-involved sexual violence. However, no appropriate measure exists to examine this link comprehensively. Objective The aim of this research was to develop an alcohol expectancy measure which captures young adults’ beliefs about alcohol’s role in sexual aggression and victimization. Method Two cross-sectional samples of young Australian adults (18–25 years) were recruited for scale development (Phase 1) and scale validation (Phase 2). In Phase 1, participants (N = 201; 38.3% males) completed an online survey with an initial pool of alcohol expectancy items stated in terms of three targets (self, men, women) to identify the scale’s factor structure and most effective items. A revised alcohol expectancy scale was then administered online to 322 young adults (39.6% males) in Phase 2. To assess the predictive, convergent, and discriminant validity of the scale, participants also completed established measures of personality, social desirability, alcohol use, general and context-specific alcohol expectancies, and impulsiveness. Results Principal axis factoring (Phase 1) and confirmatory factor analysis (Phase 2) resulted in a target-equivalent five-factor structure for the final 66-item Drinking Expectancy Sexual Vulnerabilities Questionnaire (DESV-Q). The factors were labeled: - (1) Sexual Coercion - (2) Sexual Vulnerability - (3) Confidence - (4) Self-Centeredness - (5) Negative Cognitive and Behavioral Changes The measure demonstrated effective items, high internal consistency, and satisfactory predictive, convergent, and discriminant validity. Conclusions The DESV-Q is a purpose-specific instrument that could be used in future research to elucidate people’s attributions for alcohol-involved sexual aggression and victimization.
Resumo:
Under the regional programme Fisheries and HIV/AIDS in Africa: Investing in Sustainable Solutions, the WorldFish Center conducted this study on access to health services and vulnerabilities of female fish traders in the Kafue Flats floodplains in Zambia. This report outlines and analyses the particular vulnerabilities of female fish traders in the Kafue Flats fishery and formulates recommendations to facilitate stakeholder uptake of strategic responses to tackle the drivers of the epidemic in fishing communities and improve the livelihoods of fisher folk and fish traders in the Kafue Flats and other fisheries in Zambia. (pdf contains 55 pages)
Resumo:
The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.
Resumo:
This paper argues that biometric verification evaluations can obscure vulnerabilities that increase the chances that an attacker could be falsely accepted. This can occur because existing evaluations implicitly assume that an imposter claiming a false identity would claim a random identity rather than consciously selecting a target to impersonate. This paper shows how an attacker can select a target with a similar biometric signature in order to increase their chances of false acceptance. It demonstrates this effect using a publicly available iris recognition algorithm. The evaluation shows that the system can be vulnerable to attackers targeting subjects who are enrolled with a smaller section of iris due to occlusion. The evaluation shows how the traditional DET curve analysis conceals this vulnerability. As a result, traditional analysis underestimates the importance of an existing score normalisation method for addressing occlusion. The paper concludes by evaluating how the targeted false acceptance rate increases with the number of available targets. Consistent with a previous investigation of targeted face verification performance, the experiment shows that the false acceptance rate can be modelled using the traditional FAR measure with an additional term that is proportional to the logarithm of the number of available targets.
Resumo:
This briefing provides a brief overview of recent patterns and processes of migration to Northern Ireland and to identify the major challenges arising for society. It is based on primary research conducted by the author during 2013 that consisted mainly of focus groups and interviews with individual migrants. This briefing paper proceeds as follows: it identifies the key features of recent migration to Northern Ireland before presenting evidence from the research to show the experiences of migrants in the labour market. The key policy questions to be considered will be the role of the state and civil society for building positive inter-group relations and the opportunities that exist for migrants to achieve economic and social mobility.