WorldWideScience

Sample records for attacks targeted violence

  1. Injury resulting from targeted violence: An emergency department perspective.

    Science.gov (United States)

    Sivarajasingam, Vaseekaran; Read, Simon; Svobodova, Martina; Wight, Lucy; Shepherd, Jonathan

    2018-06-01

    Hate crimes - those perpetrated because of perceived difference, including disability, race, religion, sexual orientation or transgender status - have not been studied at the point of the victim's hospital emergency department (ED) use. To investigate the frequency, levels of physical harm and circumstances of targeted violence in those seeking treatment at EDs in three UK cities. In a multimethods study, face-to-face semi-structured interviews were conducted with 124 adult ED attenders with violent injuries. Victim and perpetrator socio-demographics were recorded. Patient narratives about perceived motives and circumstances were transcribed, uploaded onto NVivo for thematic analysis. Nearly a fifth (23, 18.5%) of the injured patients considered themselves to have been attacked by others motivated by hostility or prejudice to their 'difference' (targeted violence). Thematic analyses suggested these prejudices were to appearance (7 cases), racial tension (5 cases), territorial association (3 cases) and race, religious or sexual orientation (8 cases). According to victims, alcohol intoxication was particularly relevant in targeted violence (estimated reported frequency 90% and 56% for targeted and non-targeted violence, respectively). Our findings support a broader concept of hate victimisation and suggest that emergency room violence surveys could act as a community tension sensor and early warning system in this regard. Tackling alcohol misuse seems as important in this as in other forms of violence perpetration. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  2. Racial targeting of sexual violence in Darfur.

    Science.gov (United States)

    Hagan, John; Rymond-Richmond, Wenona; Palloni, Alberto

    2009-08-01

    We used the Atrocities Documentation Survey to determine whether Sudanese government forces were involved in racially targeting sexual victimization toward ethnically African women in the Darfur region of western Sudan. The US State Department conducted the survey by interviewing a randomized multistage probability sample of 1136 Darfur refugees at 20 sites in Chad in 2004. For a subset of 932 respondents who had fled from village clusters that accounted for 15 or more respondents per cluster, we used hierarchical linear models to analyze village-level patterns of reported sexual violence. We statistically controlled for individual sexual victimization to remove bias. Respondents reported being subjected to racial epithets associated with sexual victimization significantly more often during combined attacks by Sudanese government forces and Janjaweed militia forces than during separate attacks by either force. Combined attacks by Sudanese government forces and Janjaweed militia forces led to racial epithets being used more often during sexual victimization in Darfur. Our results suggest that the Sudanese government is participating in the use of sexual assault as a racially targeted weapon against ethnically African civilians.

  3. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  4. The study on the analysis of the structure of domestic violence : the target of the violence by the females in her families

    OpenAIRE

    山西, 裕美; ヤマニシ, ヒロミ; Hiromi, YAMANISHI

    2007-01-01

    In the public mind it is husbands who use violence in the home, but in reality both husbands and wives use violence. In this study we attempt to identify the structure of domestic violence by analyzing data on family violence obtained in Miyazaki prefecture in 2003. We found that wives attacked by their husbands tend to attack someone else in their families. These women not only use violence toward their husbands but also use violence toward their children and elder family members (the less p...

  5. Workplace violence against adolescent workers in the US.

    Science.gov (United States)

    Rauscher, Kimberly J

    2008-07-01

    Workplace violence is a significant problem yet most research on this topic has focused on adults. Despite facing numerous employment conditions that raise their risk for workplace violence, adolescent workers have received inadequate attention. Survey data from 1,171 US students ages 14-17 were analyzed using descriptive statistics to investigate the incidence and perpetrators of physical attacks, verbal threats, and sexual harassment. Nearly one-third of respondents experienced some form of workplace violence: 25% verbally threatened, 10% physically attacked, and 10% sexually harassed. Significant demographic differences were found. The most common perpetrators of physical attacks and verbal threats were customers while sexual harassment most often came from co-workers. Many working adolescents, most with only a few years work experience, have already suffered workplace violence. As youth are likely to be more vulnerable to its effects, developing workplace violence prevention strategies that target adolescent workers should be made a priority. (c) 2008 Wiley-Liss, Inc.

  6. Harassment, stalking, threats and attacks targeting New Zealand politicians: A mental health issue.

    Science.gov (United States)

    Every-Palmer, Susanna; Barry-Walsh, Justin; Pathé, Michele

    2015-07-01

    Due to the nature of their work, politicians are at greater risk of stalking, harassment and attack than the general population. The small, but significantly elevated risk of violence to politicians is predominantly due not to organised terrorism or politically motivated extremists but to fixated individuals with untreated serious mental disorders, usually psychosis. Our objective was to ascertain the frequency, nature and effects of unwanted harassment of politicians in New Zealand and the possible role of mental illness in this harassment. New Zealand Members of Parliament were surveyed, with an 84% response rate (n = 102). Quantitative and qualitative data were collected on Parliamentarians' experiences of harassment and stalking. Eighty-seven percent of politicians reported unwanted harassment ranging from disturbing communications to physical violence, with most experiencing harassment in multiple modalities and on multiple occasions. Cyberstalking and other forms of online harassment were common, and politicians felt they (and their families) had become more exposed as a result of the Internet. Half of MPs had been personally approached by their harassers, 48% had been directly threatened and 15% had been attacked. Some of these incidents were serious, involving weapons such as guns, Molotov cocktails and blunt instruments. One in three politicians had been targeted at their homes. Respondents believed the majority of those responsible for the harassment exhibited signs of mental illness. The harassment of politicians in New Zealand is common and concerning. Many of those responsible were thought to be mentally ill by their victims. This harassment has significant psychosocial costs for both the victim and the perpetrator and represents an opportunity for mental health intervention. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  7. Animal violence demystified.

    Science.gov (United States)

    Natarajan, Deepa; Caramaschi, Doretta

    2010-01-01

    Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors) or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent's body and context independent attacks regardless of the environment or the sex and type of the opponent). Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. We address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely (1) Display of low levels of pre-escalatory/ritualistic behaviors. (2) Immediate and escalated offense durations with low withdrawal rates despite the opponent's submissive supine and crouching/defeat postures. (3) Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. (4) Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding. (5) Low prefrontal serotonin (5-HT) levels upon repeated aggression. (6) Low basal heart rates and hyporesponsive hypothalamus-pituitary-adrenocortical (HPA) axis were identified uniquely in the short attack latency (SAL) mice suggesting a qualitative difference between violence and

  8. Animal violence demystified

    Directory of Open Access Journals (Sweden)

    Deepa Natarajan

    2010-04-01

    Full Text Available Violence has been observed in humans and animals alike, indicating its evolutionary/ biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent’s body and context independent attacks regardless of the environment or the sex and type of the opponent. Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. To begin with, we address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely 1. Display of low levels of pre-escalatory/ritualistic behaviors. 2. Immediate and escalated offense durations with low withdrawal rates despite the opponent’s submissive supine and crouching/defeat postures. 3. Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. 4. Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding 5. Low pre-frontal serotonin (5-HT levels upon repeated aggression. 6. Low basal heart rates and hyporesponsive hypothalamus-pituitary-adrenocortical (HPA axis were identified uniquely in the short attack latency (SAL mice suggesting a qualitative

  9. Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers.

    Science.gov (United States)

    Gill, Paul; Silver, James; Horgan, John; Corner, Emily

    2017-05-01

    This paper outlines the sociodemographic, developmental, antecedent attack, attack preparation, and commission properties of 115 mass murderers between 1990 and 2014. The results indicate that mass murderer attacks are usually the culmination of a complex mix of personal, political, and social drivers that crystalize at the same time to drive the individual down the path of violent action. We specifically focus upon areas related to prior criminal engagement, leakage, and attack location familiarity. Whether the violence comes to fruition is usually a combination of the availability and vulnerability of suitable targets that suit the heady mix of personal and political grievances and the individual's capability to engage in an attack from both a psychological and technical capability standpoint. Many individual cases share a mixture of unfortunate personal life circumstances coupled with an intensification of beliefs/grievances that later developed into the idea to engage in violence. © 2016 American Academy of Forensic Sciences.

  10. Targeted Attacks Using Vulnerability CVE-2013-3897

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Durakovskiy

    2014-09-01

    Full Text Available This article provides an overview of the malicious code creation and implementation techniques that were used by cyber criminals to conduct targeted attacks on PCs of residents of the Republic of South Korea in September and October 2013.

  11. Expressions of Gender-based Violence in the Impact of Anti-personnel Mine Attacks in Colombia

    Directory of Open Access Journals (Sweden)

    Gabriel A. Ruiz Romero

    2017-02-01

    Full Text Available This text, based on fieldwork carried out between 2014 and 2015, firstly analyses the way that Gender-Based Violence (GBV in armed conflict is also expressed through forms of victimization like anti-personnel mine (APM attacks. It also studies how women who belong to associations of APM victims confront the consequences of this victimization, much of which has clear gender connotations, placing them at the highest level of vulnerability and stigmatization. The article shows that, although mines originated as an indiscriminate form of violence (given the nature of the instrument used, the violence exercised by their use contains two main components of GBV by which women are profoundly affected, in view of the patriarchal context in which such violence takes place: firstly by using the body as a space of dispute and secondly in the continuum that affects women’s lives. These two components enhance the physical and psychological consequences for the direct victims of these devices and the emotional impact for their indirect victims (victims’ relatives, and are a factor in the considerable disruption of women’s traditional roles within families, thus weakening the community’s social fabric.

  12. Perceived family social support buffers against the effects of exposure to rocket attacks on adolescent depression, aggression, and severe violence.

    Science.gov (United States)

    Shahar, Golan; Henrich, Christopher C

    2016-02-01

    The authors compared the protective effects of 3 sources of perceived social support-from family members, friends, and school personnel-on internalizing and externalizing symptoms in adolescents exposed to rocket attacks. Data were based on 362 Israeli adolescents (median age = 14), chronically exposed to rockets from the Gaza Strip, for whom robust effects of exposure on internalizing and externalizing symptoms were reported during the 2009-2010 period (Henrich & Shahar, 2013). New analyses revealed that perceived family social support assessed in 2009 buffered against the effect of exposure to rocket attacks on depression, aggression, and severe violence during 2009-2010. Findings are consistent with a human-ecological perspective exposure to political violence and encourage the employment of family-based preventive interventions in afflicted areas. (c) 2016 APA, all rights reserved).

  13. Prevention of homicidal violence in schools in Germany: the Berlin Leaking Project and the Networks Against School Shootings Project (NETWASS).

    Science.gov (United States)

    Leuschner, Vincenz; Bondü, Rebecca; Schroer-Hippel, Miriam; Panno, Jennifer; Neumetzler, Katharina; Fisch, Sarah; Scholl, Johanna; Scheithauer, Herbert

    2011-01-01

    Since 1999, Germany has experienced at least twelve serious cases of targeted school violence. This article describes two projects designed to fill the gap between universal prevention and emergency response in preventing severe forms of school violence in Germany. The Berlin Leaking Project examined the viability of preventive efforts based on early identification of leaking behavior that often precedes targeted school attacks. Leaking refers to any behavior or communication that indicates a student is preparing to carry out a violent attack. This would include explicit or implied threats of violence, apparent fascination with prior acts of violence such as Columbine, and any evidence of planning or preparation to carry out an attack. The NETWASS project will test a training program and intervention strategy based on those findings, examining the usefulness of a threat assessment approach to prevent violence by training teachers to recognize leaking behavior by students. This approach is extended by training teachers on a larger scale to identify leaking and then having a school-based team evaluate the student and initiate appropriate interventions, such as mental health services, and in some cases, law enforcement action. Copyright © 2011 Wiley Periodicals, Inc., A Wiley Company.

  14. Defending a single object against an attacker trying to detect a subset of false targets

    International Nuclear Information System (INIS)

    Peng, R.; Zhai, Q.Q.; Levitin, G.

    2016-01-01

    Deployment of false targets can be a very important and effective measure for enhancing the survivability of an object subjected to intentional attacks. Existing papers have assumed that false targets are either perfect or can be detected with a constant probability. In practice, the attacker may allocate part of its budget into intelligence actions trying to detect a subset of false targets. Analogously, the defender can allocate part of its budget into disinformation actions to prevent the false targets from being detected. In this paper, the detection probability of each false target is assumed to be a function of the intelligence and disinformation efforts allocated on the false target. The optimal resource distribution between target identification/disinformation and attack/protection efforts is studied as solutions of a non-cooperative two period min–max game between the two competitors for the case of constrained defense and attack resources. - Highlights: • A defense-attack problem is studied as a two-period min–max game. • Both intelligence contest over false targets and impact contest are considered. • Optimal defense and attack strategies are investigated with different parameters.

  15. Framing violence: the effect of survey context and question framing on reported rates of partner violence

    OpenAIRE

    Regan, Katherine V.

    2008-01-01

    In this dissertation, I investigated two explanations for the variability in levels of partner violence found by large community surveys. In Study 1, I examined the effect of how questions about partner violence are introduced (question framing: conflict, violence-in-relationships, or attacks) on reports of partner violence. Although there was not a reliable effect of question framing, the pattern of findings was consistent across 3 of 4 analyses. Counter to predictions, an attacks question f...

  16. Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization

    International Nuclear Information System (INIS)

    Hu, Xiaoxiao; Xu, Maochao; Xu, Shouhuai; Zhao, Peng

    2017-01-01

    In this paper we investigate a cybersecurity model: An attacker can launch multiple attacks against a target with a termination strategy that says that the attacker will stop after observing a number of successful attacks or when the attacker is out of attack resources. However, the attacker's observation of the attack outcomes (i.e., random variables indicating whether the target is compromised or not) has an observation error that is specified by both a false-negative and a false-positive probability. The novelty of the model we study is the accommodation of the dependence between the attack outcomes, because the dependence was assumed away in the literature. In this model, we characterize the monotonicity and bounds of the compromise probability (i.e., the probability that the target is compromised). In addition to extensively showing the impact of dependence on quantities such as compromise probability and attack cost, we give methods for finding the optimal strategy that leads to maximum compromise probability or minimum attack cost. This study highlights that the dependence between random variables cannot be assumed away, because the results will be misleading. - Highlights: • A novel cybersecurity model is proposed to accommodate the dependence among attack outcomes. • The monotonicity and bounds of the compromise probability are studied. • The dependence effect on the compromise probability and attack cost is discussed via simulation. • The optimal strategy that leads to maximum compromise probability or minimum attack cost is presented.

  17. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  18. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  19. A Chronology of Attacks on and Unlawful Interferences with, Offshore Oil and Gas Installations, 1975 – 2010

    Directory of Open Access Journals (Sweden)

    Mikhail Kashubsky

    2011-12-01

    Full Text Available Throughout its history, the oil and gas industry has been a subject of environmental protests, labour disputes, tensions with local communities, and it has also been a target of various violent activities ranging from vandalism to political violence, which have impinged on the security of oil industry workers and interfered with operational activities of oil companies on numerous occasions. Although a considerable number of attacks on oil and gas infrastructure occurred over the course of the industry’s existence, most of those attacks were directed against onshore petroleum targets. Compared to onshore petroleum infrastructure, attacks on offshore oil and gas installations are relatively rare. The following chronology provides details of attacks, unlawful interferences, and security incidents involving offshore oil and gas installations that happened between 1975 and 2010. 

  20. [Clinical forensic valuation of school violence].

    Science.gov (United States)

    Delannoy, Y; Tournel, G; Tonnel, C; Turck, D; Hedouin, V; Gosset, D

    2014-08-01

    In recent years, the National Education in France has developed tools to identify acts of violence in schools. This has allowed adjusting government policies for the care of victims. School violence can also be measured from the perspective of clinical forensic medicine, a special discipline for observing a society's violence. This study summarized and compared three similar single-center, prospective, and descriptive studies conducted in 1992, 2002, and 2012 in the Department of Forensic Medicine, University Hospital of Lille, via an evaluation form completed during consultations requested by victims in cases of school violence. The purpose was to identify the characteristics of victims, those of their perpetrators, the circumstances and reasons for school assaults, as well as their medical and administrative consequences. Each study had identified about 160 such attacks annually. The victims were younger, especially boys (the average age decreased from 14.8 to 13.6). The gender distribution showed an increase in female victims (the sex ratio decreased from 2.9/1 to 2.3/1). The location of attacks changed, with a marked increase of attacks on the way to school (from 10% to 27%). Recurrence of attacks also rose: victims with a previous history of attacks increased from 18.5% to 32.2% with a high proportion of violence resulting in a strong psychological impact, increasingly requiring psychological support (from 9 to 16%). The duration of school cases rose sharply, from 20 to 53% in 2012. The grade level of the perpetrator showed a significant increase in cases of violence at junior high school (from 40 to 67%), with a relative stability of violence in elementary and high schools. The parameters measured to characterize the aggressors remained stable: they were known to their victims in approximately 80% of cases and these attacks were for the most part related to previous disagreements. Since the 1990s, government policies for the prevention, measurement, and

  1. Fictive kinship as a means for promoting Islamist violence

    DEFF Research Database (Denmark)

    Nielbo, Kristoffer Laigaard; Nissen, Lars-Kristian; Andersen, Marc Nicklas

    as primary motivators for violence. Evolutionary psychology has questioned the claim that such a direct connection between scriptures and violence exists. Instead humans are wired with evolved moral foundations that are responsible for motivating social action. Islamist violence may be legitimized by moral......Following a series of Islamist terrorist attacks in the Western world, most recently the Île-de-France and the Copenhagen attacks in 2015, the link between Islam and violence has become a much debated subject. One position in this debate argues that Islamic scriptures in and of themselves serve...... to discourse on violence than discourse on religion...

  2. Moving Beyond Motive-based categories of Targeted Violence

    Energy Technology Data Exchange (ETDEWEB)

    Weine, Stevan [Univ. of Illinois, Chicago, IL (United States); Cohen, John [Rutgers Univ., New Brunswick, NJ (United States); Brannegan, David [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-10-01

    Today’s categories for responding to targeted violence are motive-based and tend to drive policies, practices, training, media coverage, and research. These categories are based on the assumption that there are significant differences between ideological and non-ideological actors and between domestic and international actors. We question the reliance on these categories and offer an alternative way to frame the response to multiple forms of targeted violence. We propose adopting a community-based multidisciplinary approach to assess risk and provide interventions that are focused on the pre-criminal space. We describe four capabilities that should be implemented locally by establishing and maintaining multidisciplinary response teams that combine community and law-enforcement components: (1) community members are educated, making them better able to identify and report patterns associated with elevated risk for violence; (2) community-based professionals are trained to assess the risks for violent behavior posed by individuals; (3) community-based professionals learn to implement strategies that directly intervene in causal factors for those individuals who are at elevated risk; and (4) community-based professionals learn to monitor and assess an individual’s risk for violent behaviors on an ongoing basis. Community-based multidisciplinary response teams have the potential to identify and help persons in the pre-criminal space and to reduce barriers that have traditionally impeded community/law-enforcement collaboration.

  3. Detection of attack-targeted scans from the Apache HTTP Server access logs

    Directory of Open Access Journals (Sweden)

    Merve Baş Seyyar

    2018-01-01

    Full Text Available A web application could be visited for different purposes. It is possible for a web site to be visited by a regular user as a normal (natural visit, to be viewed by crawlers, bots, spiders, etc. for indexing purposes, lastly to be exploratory scanned by malicious users prior to an attack. An attack targeted web scan can be viewed as a phase of a potential attack and can lead to more attack detection as compared to traditional detection methods. In this work, we propose a method to detect attack-oriented scans and to distinguish them from other types of visits. In this context, we use access log files of Apache (or ISS web servers and try to determine attack situations through examination of the past data. In addition to web scan detections, we insert a rule set to detect SQL Injection and XSS attacks. Our approach has been applied on sample data sets and results have been analyzed in terms of performance measures to compare our method and other commonly used detection techniques. Furthermore, various tests have been made on log samples from real systems. Lastly, several suggestions about further development have been also discussed.

  4. Witnessing Interparental Violence and Acceptance of Dating Violence as Predictors for Teen Dating Violence Victimization.

    Science.gov (United States)

    Karlsson, Marie E; Temple, Jeff R; Weston, Rebecca; Le, Vi Donna

    2016-04-01

    We examined the association between witnessing interparental violence, attitudes about dating violence, and physical and psychological teen dating violence (TDV) victimization. Participants were 918 teens with dating experience. Witnessing interparental violence and acceptance of dating violence were significant predictors of TDV victimization. Acceptance of dating violence was also a partial mediator between witnessing interparental violence and TDV victimization. Witnessing mother-to-father violence and acceptance of female-perpetrated violence were the most consistent predictors. TDV programs aiming to prevent victimization could benefit from targeting youth exposed to father-to-mother and mother-to-father violence, targeting attitudes about violence, and tailoring interventions to gender-specific risk factors. © The Author(s) 2015.

  5. Improved Deep Belief Networks (IDBN Dynamic Model-Based Detection and Mitigation for Targeted Attacks on Heavy-Duty Robots

    Directory of Open Access Journals (Sweden)

    Lianpeng Li

    2018-04-01

    Full Text Available In recent years, the robots, especially heavy-duty robots, have become the hardest-hit areas for targeted attacks. These attacks come from both the cyber-domain and the physical-domain. In order to improve the security of heavy-duty robots, this paper proposes a detection and mitigation mechanism which based on improved deep belief networks (IDBN and dynamic model. The detection mechanism consists of two parts: (1 IDBN security checks, which can detect targeted attacks from the cyber-domain; (2 Dynamic model and security detection, used to detect the targeted attacks which can possibly lead to a physical-domain damage. The mitigation mechanism was established on the base of the detection mechanism and could mitigate transient and discontinuous attacks. Moreover, a test platform was established to carry out the performance evaluation test for the proposed mechanism. The results show that, the detection accuracy for the attack of the cyber-domain of IDBN reaches 96.2%, and the detection accuracy for the attack of physical-domain control commands reaches 94%. The performance evaluation test has verified the reliability and high efficiency of the proposed detection and mitigation mechanism for heavy-duty robots.

  6. Domestic Violence and the Impact on Young Children

    Science.gov (United States)

    Zinke, Michelle; Zinke, Linda

    2008-01-01

    Domestic violence can be described as a pattern of intentional behaviors that includes a variety of tactics, such as physical and sexual violence, stalking, threats/intimidation, isolation, psychological attacks, and spiritual and economic abuse. Domestic violence can happen to anyone. It does not discriminate on the basis of economic status,…

  7. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  8. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  9. Robustness of Dengue Complex Network under Targeted versus Random Attack

    Directory of Open Access Journals (Sweden)

    Hafiz Abid Mahmood Malik

    2017-01-01

    Full Text Available Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO, 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to comprehend the dengue threat. This study is a little commitment to those endeavors. To observe the robustness of the dengue network, we uprooted the links between nodes randomly and targeted by utilizing different centrality measures. The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. Four centrality measures (Degree, Closeness, Betweenness, and Eigenvector have been ascertained to look for focal hubs. It has been observed through the results in this study that robustness of a node and links depends on topology of the network. The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. Moreover, representation of this network has been projected, and hub removal impact has been shown on the real map of Gombak (Malaysia.

  10. Characterization of Women Requesting Inter-consultations of Psychology Due to Violence

    Directory of Open Access Journals (Sweden)

    Alain Darcout Rodríguez

    2017-02-01

    Full Text Available Foundation: partner violence against women is a problem which cause chronic psychological damages in addition to physical damage, so as disability, sequelae and decreased quality of life. Objective: to characterize women requesting inter-consultation of psychology due to violence in the Riobamba province. Methods: a descriptive cross study about violence against women, during the period between April 2015 and May 2016. A total of 132 female were included. As a method of data collection it was used documentary revision. The variables analyzed were: distribution of women according to age, level of instruction, occupation, relationship with the attacker, place of origin, type of violence received, frequency and reason for the attack, measures taken and consequences of violence. The data were processed according to descriptive statistics. Results: women between 20 and 29 years old predominated (32 %, with secondary education level, housewives (43 %, living in the south of the city (41 %, violence was predominantly exercised by the spouse (49 %, of psychological type (54 % and reporting it was for the first time (48 %, associating it with alcohol consumption of the attacker (17 % and women’s insubordination (16 %, (41 % left their houses, and (83 % present as negative sequale negative emotions and problems with their children (82 %. Conclusion: women victims of violence were predominantly young, with a secondary level of instruction, living in the south zone of the Riobamba city. Violence was exercised mainly by the spouse and psychological violence predominated. They reacted living their houses and presented as main sequelae negative emotions and problems with their children.

  11. Concern about Workplace Violence and Its Risk Factors in Chinese Township Hospitals: A Cross-Sectional Study.

    Science.gov (United States)

    Xing, Kai; Zhang, Xue; Jiao, Mingli; Cui, Yu; Lu, Yan; Liu, Jinghua; Zhang, Jingjing; Zhao, Yuchong; Zhao, Yanming; Li, Ye; Liang, Libo; Kang, Zheng; Wu, Qunhong; Yin, Mei

    2016-08-10

    Workplace violence in Chinese township hospitals is a major public health problem. We identified the risk factors of healthcare workers' worry about experiencing workplace violence in 90 Chinese township hospitals and determined specific measures for differing stages of violence (based on crisis management theory). Participants were 440 general practitioners and 398 general nurses from Heilongjiang Province, China (response rate 84.6%). One hundred and six (12.6%) respondents reported being physically attacked in their workplace in the previous 12 months. Regarding psychological violence, the most common type reported was verbal abuse (46.0%). While most (85.2%) respondents had some degree of worry about suffering violence, 22.1% were worried or very worried. Ordinal regression analysis revealed that being ≤35 years of age, having a lower educational level, having less work experience, and working night shifts were all associated with worry about workplace violence. Furthermore, those without experience of such violence were more likely to worry about it. Respondents' suggested measures for controlling violence included "widening channels on medical dispute solutions," "improving doctor-patient communication," and "advocating for respect for medical workers via the media." Results suggest the target factors for reducing healthcare workers' worry by according to the type of education and training and possible measures for limiting workplace violence in township hospitals.

  12. Type of alcohol drink and exposure to violence: an emergency department study.

    Science.gov (United States)

    Chavira, Cynthia; Bazargan-Hejazi, Shahrzad; Lin, Johnny; del Pino, Homero E; Bazargan, Mohsen

    2011-08-01

    We compared the prevalence of exposure to violence across different types of alcohol consumed and the association between the type of alcohol consumed and exposure to violence. A cross-sectional analysis of data collected from a sample of 295 Emergency Department (ED) patients identified as having an alcohol problem. Outcome measure include exposure to violence, and the main study predictor was "type of alcoholic drink" including: malt liquor beer (MLB), regular beer, wine cooler, wine, fortified wine or hard liquor. Using logistic regression analysis, ED patients who drank MLB in combination with other types of alcohol increased their odds of being both threatened and physically attacked by 8.5 compared to ED patients who drank other types of alcohol. Being female increased the odds of being both threatened and physically attacked by 2.5 and using illicit drugs increased the odds by 3.8. Analysis of covariance and estimated marginal means revealed that ED patients who only drank MLB had a higher exposure to violence compared to non-MLB drinkers, and that female illicit drug users who drank MLB in combination with other types of alcohol had the highest exposure to violence. MLB was identified as a predictor of the amount of exposure to violence and in particular, that the use of malt liquor beer in combination with other types of alcohol increased the risk of being both threatened and physically attacked. Implications for ED and community interventions are suggested.

  13. Concern about Workplace Violence and Its Risk Factors in Chinese Township Hospitals: A Cross-Sectional Study

    Directory of Open Access Journals (Sweden)

    Kai Xing

    2016-08-01

    Full Text Available Workplace violence in Chinese township hospitals is a major public health problem. We identified the risk factors of healthcare workers’ worry about experiencing workplace violence in 90 Chinese township hospitals and determined specific measures for differing stages of violence (based on crisis management theory. Participants were 440 general practitioners and 398 general nurses from Heilongjiang Province, China (response rate 84.6%. One hundred and six (12.6% respondents reported being physically attacked in their workplace in the previous 12 months. Regarding psychological violence, the most common type reported was verbal abuse (46.0%. While most (85.2% respondents had some degree of worry about suffering violence, 22.1% were worried or very worried. Ordinal regression analysis revealed that being ≤35 years of age, having a lower educational level, having less work experience, and working night shifts were all associated with worry about workplace violence. Furthermore, those without experience of such violence were more likely to worry about it. Respondents’ suggested measures for controlling violence included “widening channels on medical dispute solutions,” “improving doctor-patient communication,” and “advocating for respect for medical workers via the media.” Results suggest the target factors for reducing healthcare workers’ worry by according to the type of education and training and possible measures for limiting workplace violence in township hospitals.

  14. Concern about Workplace Violence and Its Risk Factors in Chinese Township Hospitals: A Cross-Sectional Study

    Science.gov (United States)

    Xing, Kai; Zhang, Xue; Jiao, Mingli; Cui, Yu; Lu, Yan; Liu, Jinghua; Zhang, Jingjing; Zhao, Yuchong; Zhao, Yanming; Li, Ye; Liang, Libo; Kang, Zheng; Wu, Qunhong; Yin, Mei

    2016-01-01

    Workplace violence in Chinese township hospitals is a major public health problem. We identified the risk factors of healthcare workers’ worry about experiencing workplace violence in 90 Chinese township hospitals and determined specific measures for differing stages of violence (based on crisis management theory). Participants were 440 general practitioners and 398 general nurses from Heilongjiang Province, China (response rate 84.6%). One hundred and six (12.6%) respondents reported being physically attacked in their workplace in the previous 12 months. Regarding psychological violence, the most common type reported was verbal abuse (46.0%). While most (85.2%) respondents had some degree of worry about suffering violence, 22.1% were worried or very worried. Ordinal regression analysis revealed that being ≤35 years of age, having a lower educational level, having less work experience, and working night shifts were all associated with worry about workplace violence. Furthermore, those without experience of such violence were more likely to worry about it. Respondents’ suggested measures for controlling violence included “widening channels on medical dispute solutions,” “improving doctor-patient communication,” and “advocating for respect for medical workers via the media.” Results suggest the target factors for reducing healthcare workers’ worry by according to the type of education and training and possible measures for limiting workplace violence in township hospitals. PMID:27517949

  15. Frenzied Attacks: A Micro-sociological Analysis of the Emotional Dynamics of Extreme Youth Violence

    NARCIS (Netherlands)

    Weenink, D.

    2014-01-01

    Inspired by phenomenological and interactionist studies of youth violence, this article offers an empirical evaluation of Collins's micro-sociological theory of violence. The main question is whether situations of extreme violence have distinct situational dynamics. Based on analyses of 159

  16. Frenzied attacks. A micro-sociological analysis of the emotional dynamics of extreme youth violence

    NARCIS (Netherlands)

    Weenink, D.

    2014-01-01

    Inspired by phenomenological and interactionist studies of youth violence, this article offers an empirical evaluation of Collins's micro-sociological theory of violence. The main question is whether situations of extreme violence have distinct situational dynamics. Based on analyses of 159

  17. When the Cop Is the Victim: A Test of Target Congruence Theory on Intimate Partner Violence Victimization Experienced by Police Officers.

    Science.gov (United States)

    Zavala, Egbert

    2017-05-01

    This study analyzed data from the Police Stress and Domestic Violence in Police Families in Baltimore, Maryland, 1997-1999 ( N = 753) to examine propositions derived from target congruence theory in the context of intimate partner violence (IPV) victimization experienced by police officers. Specifically, this study tested the influence of target vulnerability, target gratifiability, and target antagonism on IPV victimization. Results from logistic regression models showed that all three theoretical constructs positively and significantly predicted IPV victimization. Results, as well as the study's limitations and directions for future research, are discussed.

  18. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  19. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  20. Impact modeling and prediction of attacks on cyber targets

    Science.gov (United States)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  1. Incidence, Type, Related Factors, and Effect of Workplace Violence on Mental Health Nurses: A Cross-sectional Survey.

    Science.gov (United States)

    Yang, Bing Xiang; Stone, Teresa E; Petrini, Marcia A; Morris, Diana L

    2018-02-01

    Workplace violence and its impact on mental health nurses have yet to be thoroughly explored in China. This study aims to investigate the incidence, type, related factors, and effects of workplace violence on mental health nurses as well as identifying coping strategies. A researcher - designed workplace violence questionnaire and the Maslach Burnout Inventory-General Survey were distributed to nurses at a mental health hospital in Wuhan, China. Most nurses reported a high incidence of workplace violence (94.6%) in the past year ranging from verbal aggression, sexual harassment, to physical attack. The forms of violence significantly correlated with each other (r>0.5, p=0.000). Working on the psychiatric intensive care unit for adult males and being a male nurse placed nurses at significantly higher risk for workplace violence. Providing routine treatment, caring for male patients, and working the night shift increased the risk of sexual harassment. Nurses who believed that workplace violence was preventable experienced a significantly lower incidence of violence. Burnout levels of the mental health nurses were relatively mild, but increased with age, professional title, years of employment and frequency of workplace violence. The incidence of workplace violence among mental health nurses is common, and its frequency is correlated with nurses' level of burnout. Management and clinical nurses should work together on an organization-wide strategy targeting the major identified risk areas to reduce the incidence of workplace violence and minimize its impact on nurses. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. Violence Towards Health Care Staff: Risk Factors, Aftereffects, Evaluation and Prevention

    Directory of Open Access Journals (Sweden)

    Bilge Annagur

    2010-08-01

    Full Text Available There has been an increase in violence against physicians and healthcare staff in the health-care environment in recent years. The risk of violence remains stronger in people working in health institutions than the ones working in other businesses. Results of previous studies in this issue consistently confirmed the fact that violence in health care business is quite higher in frequency than the violence reported in other business environments. However it has also been reported that only attacks resulting in serious injuries have been considered as incidents of violence and other violence attempts are inclined not to be reported to legal authorities resulting in a much lower official rates. Not only patients but also the relatives of patients have been reported to expose violence against healthcare workers. Verbal violence were found to be more common than physical violence. Violence incidents happen most commonly in the emergency room settings, and psychiatric clinic settings. Health care staff exposed to violence usually suffer from anxiety and restlessness as psychological after-effects. Health care workers are not sufficiently trained about how to cope with acute and chronic effects of violent behavior. This issue should be handled within the framework of medical faculty and related schools’ curriculum. All health care staff including physicians should get sufficient education to take immediate actions on such incidents. Unfortunately in Turkey, there is no specific legal regulation related to violence towards health employees. The verbal attacks, injuries, assault and murder of health workers are subject to general legal provisions. Both rapid changes in health care services, facilities and shortcomings in legal regulations cause gaps in violence prevention and employing safety issues in hospitals and related health care facilities. Training employees and hospital managers, and considering the creation and application of present and

  3. Prevention of Targeted School Violence by Responding to Students' Psychosocial Crises: The NETWASS Program

    Science.gov (United States)

    Leuschner, Vincenz; Fiedler, Nora; Schultze, Martin; Ahlig, Nadine; Göbel, Kristin; Sommer, Friederike; Scholl, Johanna; Cornell, Dewey; Scheithauer, Herbert

    2017-01-01

    The standardized, indicated school-based prevention program "Networks Against School Shootings" combines a threat assessment approach with a general model of prevention of emergency situations in schools through early intervention in student psychosocial crises and training teachers to recognize warning signs of targeted school violence.…

  4. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  5. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  6. Method for prejudging intention of warship to attack air target

    Directory of Open Access Journals (Sweden)

    ZHAO Handong

    2018-02-01

    Full Text Available [Objectives] This paper proposes a heterogeneous integrated learner to solve the problem of fuzzy uncertainty classification in order to judge the target intention of air attack in a short time. [Methods] First, a limit learning machine, decision tree, Skohonen neural network and LVQ neural network are selected to construct the heterogeneous integrated learner using the integrated learning strategy. Next, the training program is trained 100 times using the integrated learner to obtain the classification experiment average accuracy and calculation time. In order to improve the accuracy, integrated pruning is carried out to eliminate the "poor quality" LVQ neural network, and a more efficient heterogeneous integrated learner is reconstructed. The experimental results are extremely accurate but the calculation is time-consuming. In this paper, the Skohonen neural network sub-classifier is proposed as an "offline training and online call". [Results] Simulation experiments show that the time consumed from detecting the air targets to prejudging the intention of each incoming target is 4.972 s with an accuracy of 99.93%, which is excellent for meeting accuracy and real-time requirements. [Conclusions] This study provides a new and effective method for air defense decision-making. The method used in this paper also provides a better way of realizing the classification problem of small samples.

  7. Factors affecting ambulance utilization for asthma attack treatment: understanding where to target interventions.

    Science.gov (United States)

    Raun, L H; Ensor, K B; Campos, L A; Persse, D

    2015-05-01

    Asthma is a serious, sometimes fatal condition, in which attacks vary in severity, potentially requiring emergency medical services (EMS) ambulance treatment. A portion of asthma attacks requiring EMS ambulance treatment may be prevented with improved education and access to care. The aim of this study was to identify areas of the city with high rates of utilization of EMS ambulance for treatment, and the demographics, socio-economic status, and time of day associated with these rates, to better target future interventions to prevent emergencies and reduce cost. A cross-sectional study was conducted on individuals in Houston, TX (USA) requiring ambulance treatment for asthma attacks from 2004 to 2011. 12,155 EMS ambulance-treated asthma attack cases were linked to census tracts. High rate treatment areas were identified with geospatial mapping. Census tract demographic characteristics of these high rate areas were compared with the remainder of the city using logistic regression. The association between case level demographics and the time of day of asthma attack within the high rate area was also assessed with logistic regression. EMS ambulance-treated high rate areas were identified and found to have a utilization incidence rate over six times higher per 100,000 people than the remainder of the city. There is an increased risk of location in this high rate area with a census tract level increase of percent of population: earning less than $10,000 yearly income (RR 1.21, 1.16-1.26), which is black (RR 1.08, 1.07-1.10), which is female (RR 1.34, 1.20-1.49) and have obtained less than a high school degree (RR 1.02, 1.01-1.03). Within the high rate area, case level data indicates an increased risk of requiring an ambulance after normal doctor office hours for men compared with women (RR 1.13, 1.03-1.22), for black compared with Hispanic ethnicity (RR 1.31, 1.08-1.59), or for adults (less than 41 and greater than 60) compared with children. Interventions to prevent

  8. She's not a person...she's just a woman! Infra-humanization and intimate partner violence.

    Science.gov (United States)

    Baldry, Anna Costanza; Pacilli, Maria Giuseppina; Pagliaro, Stefano

    2015-05-01

    This article examines the association between a target's perceived humanness and individuals' willingness to provide help and support in cases of violence against women (VAW), specifically, intimate partner violence (IPV). In an experimental study, undergraduates read a fictitious article from a newspaper describing an IPV episode of a man hitting his wife and accusing her of cheating on him. According to the experimental condition, they then read that the victim either had or had not admitted the infidelity. Participants then judged the victim on an infra-humanization scale and expressed their willingness to provide help and support to the victim herself as if they were a neighbor witnessing the attack. Results showed that a victim admitting an affair with another man (admission condition) elicited lower perceived humanness and lower willingness to provide help than a victim denying such adultery (no admission condition). Moreover, targets' perceived humanness mediated the effect of contextual features on participants' willingness to provide help to the victim. Results are discussed in terms of victim blaming, and practical implications for prevention strategies are presented. © The Author(s) 2014.

  9. Neighborhood Interventions to Reduce Violence

    Science.gov (United States)

    Michelle C. Kondo; Elena Andreyeva; Eugenia C. South; John M. MacDonald; Charles C. Branas

    2018-01-01

    Violence is a widespread problem that affects the physical, mental, and social health of individuals and communities. Violence comes with an immense economic cost to its victims and society at large. Although violence interventions have traditionally targeted individuals, changes to the built environment in places where violence occurs show promise as practical,...

  10. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  11. DoS attacks targeting SIP server and improvements of robustness

    OpenAIRE

    Vozňák, Miroslav; Šafařík, Jakub

    2012-01-01

    The paper describes the vulnerability of SIP servers to DoS attacks and methods for server protection. For each attack, this paper describes their impact on a SIP server, evaluation of the threat and the way in which they are executed. Attacks are described in detail, and a security precaution is made to prevent each of them. The proposed solution of the protection is based on a specific topology of an intrusion protection systems components consisting of a combination of...

  12. Predicting inpatient violence using an extended version of the Brøset-Violence-Checklist: instrument development and clinical application

    Directory of Open Access Journals (Sweden)

    Haug Hans-Joachim

    2006-04-01

    Full Text Available Abstract Background Patient aggression is a common problem in acute psychiatric wards and calls for preventive measures. The timely use of preventive measures presupposes a preceded risk assessment. The Norwegian Brøset-Violence-Checklist (BVC is one of the few instruments suited for short-time prediction of violence of psychiatric inpatients in routine care. Aims of our study were to improve the accuracy of the short-term prediction of violence in acute inpatient settings by combining the Brøset-Violence-Checklist (BVC with an overall subjective clinical risk-assessment and to test the application of the combined measure in daily practice. Method We conducted a prospective cohort study with two samples of newly admitted psychiatric patients for instrument development (219 patients and clinical application (300 patients. Risk of physical attacks was assessed by combining the 6-item BVC and a 6-point score derived from a Visual Analog Scale. Incidents were registered with the Staff Observation of Aggression Scale-Revised SOAS-R. Test accuracy was described as the area under the receiver operating characteristic curve (AUCROC. Results The AUCROC of the new VAS-complemented BVC-version (BVC-VAS was 0.95 in and 0.89 in the derivation and validation study respectively. Conclusion The BVC-VAS is an easy to use and accurate instrument for systematic short-term prediction of violent attacks in acute psychiatric wards. The inclusion of the VAS-derived data did not change the accuracy of the original BVC.

  13. Threat Assessment and Targeted Violence at Institutions of Higher Education: Implications for Policy and Practice Including Unique Considerations for Community Colleges

    Science.gov (United States)

    Bennett, Laura; Bates, Michael

    2015-01-01

    This article provides an overview of the research on targeted violence, including campus violence, and the implications for policy and practice at institutions of higher education. Unique challenges of threat assessment in the community college setting are explored, and an overview of an effective threat assessment policy and team at William…

  14. Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281)

    OpenAIRE

    Zennou, Sarah; Debray, Saumya K.; Dullien, Thomas; Lakhothia, Arun

    2018-01-01

    This report summarizes the program and the outcomes of the Dagstuhl Seminar 17281, entitled "Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition". The seminar brought together practitioners and researchers from industry and academia to discuss the state-of-the art in the analysis of malware from both a big data perspective and a fine grained analysis. Obfuscation was also considered. The meeting created new links within this very diverse community.

  15. Epidemiological findings of major chemical attacks in the Syrian war are consistent with civilian targeting: a short report.

    Science.gov (United States)

    Rodriguez-Llanes, Jose M; Guha-Sapir, Debarati; Schlüter, Benjamin-Samuel; Hicks, Madelyn Hsiao-Rei

    2018-01-01

    Evidence of use of toxic gas chemical weapons in the Syrian war has been reported by governmental and non-governmental international organizations since the war started in March 2011. To date, the profiles of victims of the largest chemical attacks in Syria remain unknown. In this study, we used descriptive epidemiological analysis to describe demographic characteristics of victims of the largest chemical weapons attacks in the Syrian war. We analysed conflict-related, direct deaths from chemical weapons recorded in non-government-controlled areas by the Violation Documentation Center, occurring from March 18, 2011 to April 10, 2017, with complete information on the victim's date and place of death, cause and demographic group. 'Major' chemical weapons events were defined as events causing ten or more direct deaths. As of April 10, 2017, a total of 1206 direct deaths meeting inclusion criteria were recorded in the dataset from all chemical weapons attacks regardless of size. Five major chemical weapons attacks caused 1084 of these documented deaths. Civilians comprised the majority ( n  = 1058, 97.6%) of direct deaths from major chemical weapons attacks in Syria and combatants comprised a minority of 2.4% ( n  = 26). In the first three major chemical weapons attacks, which occurred in 2013, children comprised 13%-14% of direct deaths, ranging in numbers from 2 deaths among 14 to 117 deaths among 923. Children comprised higher proportions of direct deaths in later major chemical weapons attacks, forming 21% ( n  = 7) of 33 deaths in the 2016 major attack and 34.8% ( n  = 32) of 92 deaths in the 2017 major attack. Our finding of an extreme disparity in direct deaths from major chemical weapons attacks in Syria, with 97.6% of victims being civilians and only 2.4% being combatants provides evidence that major chemical weapons attacks were indiscriminate or targeted civilians directly; both violations of International Humanitarian Law (IHL). Identifying and

  16. Making sense of loss: Situating the Mumbai attacks of 26/11 in the context of altruistic suicide homicide

    Directory of Open Access Journals (Sweden)

    Tanni Chaudhuri

    2013-06-01

    Full Text Available A peculiar irony characterizes the perception of global terrorism—in the strong penchant to flavor it with ethno or religious centric biases or in the disavowal of any auxiliary circumstance leading up to the sporadic incidence of violence. This paper analyzes the Mumbai attacks of November 26th, 2009 from the context of altruistic suicide/homicide. The waging of war against anonymous targets in Mumbai was by all means impersonal. It could be connected to an aftermath of several factors: Kashmir, homegrown terrorism, backlash of sectarian groups or yet another manifestation of already hostile Indo-Pak relationships. The spectacle of terror that was life telecast by national and global media led to a sequel of reactions including a follow-up of Indo-Pak mutual accusations, evoking of national sentiments and analytical ruptures in south Asian intelligentsia in making sense of the loss. This paper situates the Mumbai attacks of 26/11 in the theoretical discourse on sociology of terrorism by (i providing a scholastic definition of terrorism and its corresponding attributes that distinguishes terrorism from other sporadic acts of violence, (ii reflects on the context of terrorism with reference to altruism as in the classical Durkhiemian tradition and (iii analytically moves beyond the classical paradigm to redefine the terror trails of 26/11 within the emerging definitions of altruistic-suicide-homicide.

  17. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  18. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    Energy Technology Data Exchange (ETDEWEB)

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo' ; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  19. Terrorism, memory and dealing with a trauma. Spontaneous memorialization of the 2016 Brussels attacks

    OpenAIRE

    Milosevic, Ana

    2017-01-01

    Whilst the interest of memory scholars in political violence and more specifically in terrorism is not novel, after the terrorist attacks in Paris (2015) and Brussels (2016) there appears to be a certain urgency to reflect upon these nascent memories in collective, European immaginarium. This article traces the development of a “bottom-up” memorialization process in the immediate aftermath of terrorist attacks in Brussels (March - July 2016) questioning how these acts of terrorisms will settl...

  20. Subjective Effect of September 11, 2001 among Pregnant Women: Is Cumulative History of Interpersonal Violence Important?

    Science.gov (United States)

    Lewis, Marilyn W.; Cavanagh, Paul K.; Ahn, Grace; Yoshioka, Marianne R.

    2008-01-01

    Prior history of trauma may sensitize individuals to subsequent trauma, including terrorist attacks. Using a convenience sample of secondary, cross-sectional data, pregnant women were grouped based on lifetime interpersonal violence history. Cumulative risk theory was used to evaluate the association of lifetime interpersonal violence history and…

  1. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  2. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    Science.gov (United States)

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  3. Patterns of sexual violence in Eastern Democratic Republic of Congo: reports from survivors presenting to Panzi Hospital in 2006

    Science.gov (United States)

    2010-01-01

    Background Despite the signing of international peace agreements, a deadly war continues in the Democratic Republic of Congo (DRC) and sexual violence is a prominent modus operandi of many military groups operating in the region. Methods Retrospective cohort study of women who presented to Panzi Hospital in 2006 requesting post-sexual violence care. Data was extracted and analyzed to describe the patterns of sexual violence. Results A total of 1,021 medical records were reviewed. A majority of attacks occurred in individual homes (56.5%), with the fields (18.4%) and the forest (14.3%) also being frequent locations of attack. In total, 58.9% of all attacks occurred at night. Of the four primary types of sexual violence, gang rape predominated (59.3%) and rape Not Otherwise Specified (NOS) was also common (21.5%). Sexual slavery was described by 4.9% of the survivors and a combination of gang rape and sexual slavery was described by 11.7%. The mean number of assailants per attack was 2.5 with a range of one to > 15. There were several demographic predictors for sexual slavery. Controlling for age, education level and occupation, a marital status of "single" increased the risk of sexual slavery (OR = 2.97, 95% CI = 1.12-7.85). Similarly, after controlling for other variables, age was a significant predictor of sexual slavery with older women being at a slightly reduced risk (OR = 0.96, 95% CI = 0.92-0.99). Women who experienced sexual slavery were 37 times more likely to have a resultant pregnancy in comparison to those who reported other types of sexual violence (OR = 37.50, 95% CI = 14.57-99.33). Conclusions Among sexual violence survivors presenting to Panzi Hospital in 2006, the majority of attacks occurred in women's own homes, often at night. This represents a pattern of violence that differs from other conflict settings and has important implications regarding protection strategies. Sexual violence in South Kivu was also marked with a predominance of gang rape

  4. Patterns of sexual violence in Eastern Democratic Republic of Congo: reports from survivors presenting to Panzi Hospital in 2006

    Directory of Open Access Journals (Sweden)

    Lipton Robert I

    2010-05-01

    Full Text Available Abstract Background Despite the signing of international peace agreements, a deadly war continues in the Democratic Republic of Congo (DRC and sexual violence is a prominent modus operandi of many military groups operating in the region. Methods Retrospective cohort study of women who presented to Panzi Hospital in 2006 requesting post-sexual violence care. Data was extracted and analyzed to describe the patterns of sexual violence. Results A total of 1,021 medical records were reviewed. A majority of attacks occurred in individual homes (56.5%, with the fields (18.4% and the forest (14.3% also being frequent locations of attack. In total, 58.9% of all attacks occurred at night. Of the four primary types of sexual violence, gang rape predominated (59.3% and rape Not Otherwise Specified (NOS was also common (21.5%. Sexual slavery was described by 4.9% of the survivors and a combination of gang rape and sexual slavery was described by 11.7%. The mean number of assailants per attack was 2.5 with a range of one to > 15. There were several demographic predictors for sexual slavery. Controlling for age, education level and occupation, a marital status of "single" increased the risk of sexual slavery (OR = 2.97, 95% CI = 1.12-7.85. Similarly, after controlling for other variables, age was a significant predictor of sexual slavery with older women being at a slightly reduced risk (OR = 0.96, 95% CI = 0.92-0.99. Women who experienced sexual slavery were 37 times more likely to have a resultant pregnancy in comparison to those who reported other types of sexual violence (OR = 37.50, 95% CI = 14.57-99.33. Conclusions Among sexual violence survivors presenting to Panzi Hospital in 2006, the majority of attacks occurred in women's own homes, often at night. This represents a pattern of violence that differs from other conflict settings and has important implications regarding protection strategies. Sexual violence in South Kivu was also marked with a

  5. Surviving wife rape: how women define and cope with the violence.

    Science.gov (United States)

    Bergen, R K

    1995-06-01

    This article investigates how women define their experiences of marital rape and cope with the violence. The study is based on in-depth interviews conducted among 35 survivors of marital rape. It found out that women's definition of sexual violence often change over the course of the relationship in a similar manner, from seeing the sexual attacks as an aberrant incident, to redefining the incident as rape, to terminating the relationship with a ¿rapist¿. This study further describes the 6 stages through which women pass in coping with the violence, which include entering a violent relationship; managing the violence; experiencing a loss of self; redefining the violence; ending the violence; and recovering from the trauma. This study, however, gives particular attention to understanding how women manage the violence and redefine their experiences as rape. It concludes by acknowledging that marital rape is a serious problem with very real consequences for the women who experience it.

  6. Gender's Role in Exposure to Interparental Violence, Acceptance of Violence, Self-Efficacy, and Physical Teen Dating Violence Among Quebec Adolescents.

    Science.gov (United States)

    Ruel, Catherine; Lavoie, Francine; Hébert, Martine; Blais, Martin

    2017-05-01

    Despite efforts to prevent physical teen dating violence, it remains a major public health issue with multiple negative consequences. This study aims to investigate gender differences in the relationships between exposure to interparental violence (mother-to-father violence, father-to-mother violence), acceptance of dating violence (perpetrated by boys, perpetrated by girls), and self-efficacy to disclose teen dating violence. Data were drawn from Waves 1 and 2 of the Quebec Youth Romantic Relationships Project, conducted with a representative sample of Quebec high school students. Analyses were conducted on a subsample of 2,564 teenagers who had been in a dating relationship in the past 6 months (63.8% girls, mean age of 15.3 years). Path analyses were conducted to investigate the links among exposure to interparental violence, acceptance of violence, self-efficacy to disclose teen dating violence (measured at Wave 1), and physical teen dating violence (measured at Wave 2). General exposure to interparental violence was linked, through acceptance of girl-perpetrated violence, to victimization among both genders and to girls' perpetration of physical teen dating violence. No significant difference was identified in the impact of the gender of the perpetrating parent when considering exposure to interparental violence. Self-efficacy to disclose personal experiences of violence was not linked to exposure to interparental violence or to experiences of physical teen dating violence. The findings support the intergenerational transmission of violence. Moreover, the findings underline the importance of targeting acceptance of violence, especially girl-perpetrated violence, in prevention programs and of intervening with children and adolescents who have witnessed interparental violence.

  7. Intimate Partner Violence and Welfare Participation: A Longitudinal Causal Analysis

    Science.gov (United States)

    Cheng, Tyrone C.

    2013-01-01

    This longitudinal study examined the temporal-ordered causal relationship between intimate partner violence (IPV), five mental disorders (depression, generalized anxiety disorder, social phobia, panic attack, posttraumatic stress disorder [PTSD]), alcohol abuse/dependence, drug abuse/ dependence, treatment seeking (from physician, counselor, and…

  8. Directionality of physical and psychological dating violence among adolescents in Recife, Brazil

    Directory of Open Access Journals (Sweden)

    Alice Kelly Barreira

    2014-03-01

    Full Text Available OBJECTIVE: The aim was to investigate the physical and psychological dating violence among adolescents with respect to the profiles of directionality - only man perpetrates, only woman perpetrates, and bidirectional, ie, both perpetrate violence. METHODS: Sample was performed by two-stage cluster selection in public and private school in the city of Recife (PE, Brazil, presenting data on 355 adolescents of both sexes between 15 and 19 years old. Psychological violence was measured in dimensions threat, verbal/emotional, and relational. Statistical analyzes incorporated the sampling weight and the complex sample design. RESULTS: Violence is bidirectional in most forms studied (83.9% and girls reported higher levels of perpetration of physical violence, and boys reported more perpetration of relational violence. CONCLUSION: It was concluded that adolescent dating violence shows a pattern where partners attack each other, both physically and psychologically. Future research should study the patterns of these acts of violence, keeping the adolescent couple as the unit of analysis and exploring the context in which such violence occurs.

  9. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  10. The role of religion in al-Qaeda’s violence

    NARCIS (Netherlands)

    Nanninga, Pieter; Lewis, James R.

    2017-01-01

    This chapter explores the role of religion in jihadist violence by applying recent insights from the field of religious studies to the case of al-Qaeda. Whereas religion is often perceived as an explanatory factor in al-Qaeda’s attacks, the chapter demonstrates that the meanings attributed to

  11. Is it wise to protect false targets?

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    The paper considers a system consisting of genuine elements and false targets that cannot be distinguished by the attacker's observation. The false targets can be destroyed with much less effort than the genuine elements. We show that even when an attacker cannot distinguish between the genuine elements and the false targets, in many cases it can enhance the attack efficiency using a double attack strategy in which it tries first to eliminate with minimal effort as many false targets as possible in the first attack and then distributes its entire remaining resource among all surviving targets in the second attack. The model for evaluating the system vulnerability in the double attack is suggested for a single genuine element, and multiple genuine elements configured in parallel or in series. This model assumes that in both attacks the attacking resource is distributed evenly among the attacked targets. The defender can optimize its limited resource distribution between deploying more false targets and protecting them better. The attacker can optimize its limited resource distribution between two attacks. The defense strategy is analyzed based on a two period minmax game. A numerical procedure is suggested that allows the defender to find the optimal resource distribution between deploying and protecting the false targets. The methodology of optimal attack and defense strategies analysis is demonstrated. It is shown that protecting the false targets may reduce the efficiency of the double attack strategy and make this strategy ineffective in situations with low contest intensity and few false targets. - Highlights: ► The efficiency of the double attack tactics against using false targets is analyzed. ► The role of the false target protection in system survivability enhancement is shown. ► The resource distribution between deploying more false targets and protecting them better is optimized. ► Both series and parallel systems are considered.

  12. The epidemiology of physical attack and rape among crack-using women.

    Science.gov (United States)

    Falck, R S; Wang, J; Carlson, R G; Siegal, H A

    2001-02-01

    This prospective study examines the epidemiology of physical attack and rape among a sample of 171 not-in-treatment, crack-cocaine using women. Since initiating crack use, 62% of the women reported suffering a physical attack. The annual rate of victimization by physical attack was 45%. Overall, more than half of the victims sought medical care subsequent to an attack. The prevalence of rape since crack use was initiated was 32%, and the annual rate was 11%. Among those women having been raped since they initiated crack use, 83% reported they were high on crack when the crime occurred as were an estimated 57% of the perpetrators. Logistic regression analyses showed that duration of crack use, arrest for prostitution, and some college education were predictors of having experienced a physical attack. Duration of crack use and a history of prostitution were predictors of suffering a rape. Drug abuse treatment programs must be sensitive to high levels of violence victimization experienced by crack-cocaine using women. Screening women for victimization, and treating the problems that emanate from it, may help make drug abuse treatment more effective.

  13. Witnessing Partner Violence: Exploring the Role of Partner Preferences on Dating Violence.

    Science.gov (United States)

    Gonzalez-Mendez, Rosaura; Yanes, José M; Ramírez-Santana, Gustavo

    2015-06-02

    Research has shown that witnessing partner violence (WPV) increases the likelihood of experiencing or perpetrating violence in later romantic relationships, but little is known about the mechanisms underlying this process. This study examines the relationships between preference for unsuitable partners and teen dating violence (TDV) among adolescents who have witnessed parental violence or not. Attachment was also considered. Participants were 356 adolescents, both witnesses and non-witnesses of partner violence. Results showed no difference in preferences (for good, risky, or loving partners) between the two groups. However, preference for unsuitable partners did significantly predict TDV perpetration and victimization, but only among witnesses. Also, loving-partner preference moderates the relationship between WPV and TDV perpetration among highly avoidant witnesses. Findings indicate a new avenue for prevention through targeting partner preferences. © The Author(s) 2015.

  14. [Burnout syndrome in medical and obstetric perception of violence].

    Science.gov (United States)

    Pintado-Cucarella, Sheila; Penagos-Corzo, Julio C; Casas-Arellano, Marco Antonio

    2015-03-01

    Obstetric violence involves a violation of reproductive rights of women during pregnancy, childbirth and postpartum. It has been associated with lack of empathy and emotional discomfort of physicians. To identify the perceptions of obstetric violence and to determine the possible relationship with burnout syndrome. We evaluated 29 physicians whose scope of work relates to obstetrics and gynecology. The evaluation instruments were: a) questionnaire on professional perception that collects demographic information, situations of perceived obstetric violence, major concerns of physicians in their professional work, and includes an scale about level of job satisfaction, b) the Maslach Burnout inventory, and c) Jefferson Scale of Physician Empathy. The most prevalent obstetric violence situations perceived were: medical malpractice and harmful practices (10/29), discrimination (10/29), rude treatment and verbal attacks (11/29). Seventeen participants reported lack of information on obstetric violence and not have tools to cope with this problem. Regarding the burnout syndrome, it was associated with several items of the scale of empathy and with the scale of job satisfaction. This study shows the importance of providing knowledge and tools to deal with obstetric violence and stress management to prevent such situations on medical practices.

  15. Education of entrepreneurs about importance of recognition and prevention of workplace violence as an important uncertainty reduction factor in the business enterprise

    OpenAIRE

    Budimir Šoško, Gabrijela

    2014-01-01

    Recent data about workplace violence are unfortunately showing an alarming increase. Workplace violence can take different forms, such as abuses related to work assignments, social isolation, verbal assault, and attacks directed to employee’s private life, insults and physical violence. In this paper focus will be placed at wider aspect of violence, encompassing all kinds of unwanted workplaces behaviour, since personal and organizational consequences of either workplace mobbing, sexual haras...

  16. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  17. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  18. SHE’S NOT A VICTIM! SHE’S MY WIFE! INTIMATE PARTNER VIOLENCE: FUELLED BY DANGEROUS PERPETRATOR ATTITUDES

    Directory of Open Access Journals (Sweden)

    Londt, Marcel

    2014-10-01

    Full Text Available This study used mixed methodology research; chose 53 male and 47 female respondents through purposive sampling, selected intervention research: design and development methodological framework to develop guidelines, used a Canadian Risk Assessment Tool to “assess risk”/“predict dangerousness”. The findings highlighted the need for “risk factor assessment”, showing specific risk factors predicted violence, with sexual violence playing a role. Perpetrators disregard their partners as victims when sexual violence was employed. Qualitative data from female respondents showed that perpetrators use physical assault and sexual violence in their attacks, and their behaviours were fuelled by attitudes that supported/condoned intimate partner violence (IPV.

  19. Is it wise to leave some false targets unprotected?

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2013-01-01

    The paper considers a system consisting of genuine elements and false targets that cannot be distinguished by the attacker's observation. The false targets can be destroyed with much less effort than the genuine elements. To enhance the attack efficiency the attacker uses a double attack strategy in which it tries first to eliminate with optimal effort as many false targets as possible in the first attack and then distributes its entire remaining resource among all surviving targets in the second attack. It is assumed that the defender can protect some of the false targets whereas the attacker attacks all targets it can observe. In both attacks the attacking resource is distributed evenly among the attacked targets. The model for evaluating the system vulnerability in the double attack is suggested for parallel and series systems. This model considers the cases of perfect and imperfect detection of the targets destroyed in the first attack. The defense strategy is analyzed based on a two period minmax game. The methodology of optimal attack and defense strategies analysis is demonstrated. In is shown that under certain conditions (high contest intensity, scarce defense resource, low FT cost, high probability of wrong identification of destroyed targets by the attacker) the defender benefits from protecting a subset of the false targets. An algorithm for determining the optimal number of false targets that should be protected is suggested

  20. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  1. Violence and suffering in television news: toward a broader conception of harmful television content for children.

    Science.gov (United States)

    Walma van der Molen, Juliette H

    2004-06-01

    Traditionally, the public and professional debate about the inappropriateness of media violence for children focuses mainly on the negative effects of violence in entertainment programming. However, since the terrorist attacks on September 11th and the recent coverage of the war in Iraq, the suitability of real-life news violence for children may be doubted more than ever. To draw attention to the potential harmful effects of violence presented in news programs, it is argued in the present article that health care professionals should advocate a broader conception of media violence than thus far has been used. On the basis of recent research, potential effects of violent news content, such as fear, aggression, and desensitization, are discussed and recommendations are provided on how to abate these outcomes.

  2. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  3. Selling Violence: Television Commercials Targeted to Children.

    Science.gov (United States)

    Palmerton, Patricia R.; Judas, Jeff

    Noting that little research has addressed the question of violence in commercials directed to children, a study examined commercials aired during the 21 top-rated children's cartoons during one broadcast week in late spring 1993. Commercials were analyzed for violent content, gender of primary actors and recipients of violent action, primary…

  4. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  5. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  6. MARITIME VIOLENCE : IMPLICATIONS TO MALAYSIA

    Directory of Open Access Journals (Sweden)

    Nurulizwan Ahmad Zubir

    2014-04-01

    Full Text Available Abstract Maritime Piracy has been a serious threat to the international community especially in the SoutheastAsia region. This threat has caused tremendous implications towards the world economy, environment,political stability of the nations involved because 45% of the shipping company passes through theSoutheast Asia. The worrying fact is that these attacks were committed by terrorists as well as traditionalmaritime pirates. This paper examines on the implications of maritime crime in Malaysia and discusseswhether the definition of piracy under the International Law could be applied to these attacks. Thispaper concludes that cooperation between the region’s states and the enhancement of a good securitysystem of one state are needed to combat maritime violence. Thus it is imperative that the internationallaw need to be changed in order to enhance the meaning of piracy and also to include sea terrorism. Key words: piracy, maritime, terrorist

  7. Discursive opportunities and the evolution of right-wing violence in Germany

    NARCIS (Netherlands)

    Koopmans, R.; Olzak, S.

    2004-01-01

    This article explores the link between violence and public discourse. It suggests that media attention to radical right violence and public reactions to violence affect the clustering of targets and the temporal and spatial distribution of violence. The notion of "discursive opportunities" is

  8. Collaborative care intervention targeting violence risk behaviors, substance use, and posttraumatic stress and depressive symptoms in injured adolescents: a randomized clinical trial.

    Science.gov (United States)

    Zatzick, Douglas; Russo, Joan; Lord, Sarah Peregrine; Varley, Christopher; Wang, Jin; Berliner, Lucy; Jurkovich, Gregory; Whiteside, Lauren K; O'Connor, Stephen; Rivara, Frederick P

    2014-06-01

    Violence and injury risk behaviors, alcohol and drug use problems, and posttraumatic stress disorder (PTSD) and depressive symptoms occur frequently among adolescents presenting to acute care medical settings after traumatic physical injury. To test the effectiveness of a stepped collaborative care intervention targeting this constellation of risk behaviors and symptoms in randomly sampled hospitalized adolescents with and without traumatic brain injury. A pragmatic randomized clinical trial was conducted at a single US level I trauma center. Participants included 120 adolescents aged 12 to 18 years randomized to intervention (n = 59) and control (n = 61) conditions. Stepped collaborative care intervention included motivational interviewing elements targeting risk behaviors and substance use as well as medication and cognitive behavioral therapy elements targeting PTSD and depressive symptoms. Adolescents were assessed at baseline before randomization and 2, 5, and 12 months after injury hospitalization. Standardized instruments were used to assess violence risk behaviors, alcohol and drug use, and PTSD and depressive symptoms. The investigation attained more than 95% adolescent follow-up at each assessment point. At baseline, approximately one-third of the participants endorsed the violence risk behavior of carrying a weapon. Regression analyses demonstrated that intervention patients experienced significant reductions in weapon carrying compared with controls during the year after injury (group × time effect, F3,344 = 3.0; P = .03). At 12 months after the injury, 4 (7.3%) intervention patients vs 13 (21.3%) control patients reported currently carrying a weapon (relative risk, 0.31; 95% CI, 0.11-0.90). The intervention was equally effective in reducing the risk of weapon carrying among injured adolescents with and without traumatic brain injury. Other treatment targets, including alcohol and drug use problems and high levels of PTSD and

  9. Forms and factors of peer violence and victimisation

    Directory of Open Access Journals (Sweden)

    Dinić Bojana

    2014-01-01

    Full Text Available The main aim of this study was to explore the latent structure of violence and victimisation based on the factor analysis of the Peer Violence and Victimisation Questionnaire (PVVQ, as well as to examine the correlates of violence and victimisation. The sample included 649 secondary school students (61.8% male from the urban area. Besides the PVVQ, the Aggressiveness questionnaire AVDH was administered. Based on parallel analysis, three factors were extracted in the violence domain, as well as in the victimisation domain of the PVVQ. The factors were interpreted as a physical, verbal and relational form of violence and victimisation, which is in line with common classifications. The correlations of those forms with the aggressiveness dimensions were positive. The relationships with gender, school grade and school achievement referred to the importance of interaction effects between the mentioned characteristics of students and the tendency towards violence or being exposed to it. The main result is that boys from lower school grades and students with lower school achievement in general, are more prone to manifesting physical violence and more often are the target of physical violence. These groups of students are the target groups for preventive programs. The resulting effects indicated the complexity of the violence phenomenon and pointed to the need to consider the wider context of student’s characteristics in the determination of violence. [Projekat Ministarstva nauke Republike Srbije, br. 179037 i br. 179053

  10. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Chu, Tsong L.

    2016-11-06

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance, in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.

  11. Vote choice and legacies of violence: evidence from the 2014 Colombian presidential elections

    Directory of Open Access Journals (Sweden)

    Michael Weintraub

    2015-05-01

    Full Text Available Elections are regularly held in countries facing ongoing civil conflicts, including in India, Iraq, Nigeria, the Philippines, and Ukraine. Citizens frequently go to the polls having endured years of violence between armed groups and governments. A growing literature questions how violence conditions voters’ support for incumbents versus challengers, and for hawks versus doves. We analyze this relationship in the context of the 2014 presidential election in Colombia, an election defined by candidates’ positions on negotiations with the country’s largest insurgent group, the FARC. Our results show an inverted-U relationship between past insurgent violence and vote share for President Juan Manuel Santos, the pro-peace candidate: he performed better in communities with moderate levels of insurgent violence and poorly in communities with both very high and very low violence. We also find that areas where the FARC originally mounted attacks 50 years ago more strongly supported Santos. The article concludes by comparing these results with past studies of violence and vote choice in Israel, Turkey, and Spain.

  12. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  13. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2014-01-01

    Full Text Available The situation has been modelled where the attacker's resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker's resource capabilities. An attacker targets one of two assets. The attacker's resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets or downward sloping (e.g. when one asset has a low value or high unit defense cost. This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker's resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker's resources. (original abstract

  14. Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack

    Directory of Open Access Journals (Sweden)

    WenJie Kang

    2018-05-01

    Full Text Available Many previous works only focused on the cascading failure of global coupling of one-to-one structures in interdependent networks, but the local coupling of dual coupling structures has rarely been studied due to its complex structure. This will result in a serious consequence that many conclusions of the one-to-one structure may be incorrect in the dual coupling network and do not apply to the smart grid. Therefore, it is very necessary to subdivide the dual coupling link into a top-down coupling link and a bottom-up coupling link in order to study their influence on network robustness by combining with different coupling modes. Additionally, the power flow of the power grid can cause the load of a failed node to be allocated to its neighboring nodes and trigger a new round of load distribution when the load of these nodes exceeds their capacity. This means that the robustness of smart grids may be affected by four factors, i.e., load redistribution, local coupling, dual coupling link and coupling mode; however, the research on the influence of those factors on the network robustness is missing. In this paper, firstly, we construct the smart grid as a two-layer network with a dual coupling link and divide the power grid and communication network into many subnets based on the geographical location of their nodes. Secondly, we define node importance ( N I as an evaluation index to access the impact of nodes on the cyber or physical network and propose three types of coupling modes based on N I of nodes in the cyber and physical subnets, i.e., Assortative Coupling in Subnets (ACIS, Disassortative Coupling in Subnets (DCIS, and Random Coupling in Subnets (RCIS. Thirdly, a cascading failure model is proposed for studying the effect of local coupling of dual coupling link in combination with ACIS, DCIS, and RCIS on the robustness of the smart grid against a targeted attack, and the survival rate of functional nodes is used to assess the robustness of

  15. Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack.

    Science.gov (United States)

    Kang, WenJie; Hu, Gang; Zhu, PeiDong; Liu, Qiang; Hang, Zhi; Liu, Xin

    2018-05-24

    Many previous works only focused on the cascading failure of global coupling of one-to-one structures in interdependent networks, but the local coupling of dual coupling structures has rarely been studied due to its complex structure. This will result in a serious consequence that many conclusions of the one-to-one structure may be incorrect in the dual coupling network and do not apply to the smart grid. Therefore, it is very necessary to subdivide the dual coupling link into a top-down coupling link and a bottom-up coupling link in order to study their influence on network robustness by combining with different coupling modes. Additionally, the power flow of the power grid can cause the load of a failed node to be allocated to its neighboring nodes and trigger a new round of load distribution when the load of these nodes exceeds their capacity. This means that the robustness of smart grids may be affected by four factors, i.e., load redistribution, local coupling, dual coupling link and coupling mode; however, the research on the influence of those factors on the network robustness is missing. In this paper, firstly, we construct the smart grid as a two-layer network with a dual coupling link and divide the power grid and communication network into many subnets based on the geographical location of their nodes. Secondly, we define node importance ( N I ) as an evaluation index to access the impact of nodes on the cyber or physical network and propose three types of coupling modes based on N I of nodes in the cyber and physical subnets, i.e., Assortative Coupling in Subnets (ACIS), Disassortative Coupling in Subnets (DCIS), and Random Coupling in Subnets (RCIS). Thirdly, a cascading failure model is proposed for studying the effect of local coupling of dual coupling link in combination with ACIS, DCIS, and RCIS on the robustness of the smart grid against a targeted attack, and the survival rate of functional nodes is used to assess the robustness of the smart grid

  16. Simulating Cyber-Attacks for Fun and Profit

    OpenAIRE

    Futoransky, Ariel; Miranda, Fernando; Orlicki, Jose; Sarraute, Carlos

    2010-01-01

    We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applications, protocols, users, etc. A novel characteristic of this tool is to simulate vulnerabilities (in...

  17. The Bang-Soak Theory of Missile Attack and Terminal Defense

    National Research Council Canada - National Science Library

    Washburn, Alan

    2005-01-01

    .... This paper generalizes to the case where the attacking arsenal is mixed, the main motivation being that a mixed attacking arsenal can contain decoys that are harmless to targets, but which can still "soak up" defenders...

  18. Workplace violence on workers caring for long-term institutionalized schizophrenic patients in Taiwan.

    Science.gov (United States)

    Chen, Wen-Ching; Wang, Jung-Der; Lew-Ting, Chih-Yin; Chiu, Hsien-Jane; Lin, Yi-Ping

    2007-07-01

    It has been noted that workplace violence most frequently occurs in psychiatric settings. The purpose of this study was to explore the workplace violence, including violence situation, victims' feeling, and the prevention strategies, on workers caring for long-term institutionalized schizophrenic patients in Taiwan. We conducted a face-to-face, in-depth, and semi-structured interview with 13 health care workers suffering from physical violence and/or sexual harassment by patients in 2002. First, the interviews were taped and/or paper-notes recorded, then transcribed, organized, and analyzed. Results found that all of the victims alleged they did not receive enough post-incident support, and more than a half of the victims could not call others for help during the violence. To avoid further attack, most victims offered prevention strategies which were considered valuable for establishing guidelines. However, some victims regarded workplace violence as inevitable and part of the job. The most common situations of workplace violence were during routine ward inspections, especially when the victims were alone. The most serious psychological harm was post-traumatic stress disorder (PTSD). In conclusion, we recommended a re-engineering of the organization to a supportive and safe working environment for prevention of workplace violence in the study hospital.

  19. Citizenship and Gender Violence on Working Women : Reflections in the Light of Spanish and Brazilian Legal System

    Directory of Open Access Journals (Sweden)

    Susana Rodríguez Escanciano

    2016-06-01

    Full Text Available It has been nearly a decade since the Fourth World Conference on Women held in Beijing in 1995, where the violence against women was recognized as being an attack on  women’s human rights. Under such perspective and following the recommendations of the community institutions and international organizations, States such as Spain and Brazil have incorporated into their systems specific laws -- Organic Law 1/2004 of 28th December, on Integral Protection Measures against Gender Violence (LPIVG, in Spain and Law 11.340/2006 (Lei Maria da Penha, in Brazil --.These two provisions have as one of its fundamental objectives, firmly attack such despicable behaviors of violence against women, articulating a set of measures to ensure a whole, full and consistent protection of battered women, making them hold a wide range of rights pertaining to prevention, education, welfare or criminal repression, and down to what is relevant, a series of labor and social security prerogatives, confirming  in the end, a dual purpose endowed strategy: on the one hand, facilitate the employment access for women victims of gender violence and, on the other, ensure the maintenance of their jobs. A comparative study of both legal systems may serve to introduce technical improvements that result in benefit of the protected group.

  20. Domestic Violence – a Current Problem of Romanian Society

    Directory of Open Access Journals (Sweden)

    Sandu Mihaela Luminița

    2014-06-01

    Full Text Available The effects of domestic violence phenomenon and its severity were recently acknowledged worldwide, most European Union countries faced with significant increase in cases of domestic violence. Due to the inefficient public social services in combating and preventing domestic violence, services like this are taken mostly by civil society. However, help victims of domestic violence, there are several protection services, and a range of social services targeting the aggressors.

  1. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  2. Effect of clustering on attack vulnerability of interdependent scale-free networks

    International Nuclear Information System (INIS)

    Li, Rui-qi; Sun, Shi-wen; Ma, Yi-lin; Wang, Li; Xia, Cheng-yi

    2015-01-01

    In order to deeply understand the complex interdependent systems, it is of great concern to take clustering coefficient, which is an important feature of many real-world systems, into account. Previous study mainly focused on the impact of clustering on interdependent networks under random attacks, while we extend the study to the case of the more realistic attacking strategy, targeted attack. A system composed of two interdependent scale-free networks with tunable clustering is provided. The effects of coupling strength and coupling preference on attack vulnerability are explored. Numerical simulation results demonstrate that interdependent links between two networks make the entire system much more fragile to attacks. Also, it is found that clustering significantly increases the vulnerability of interdependent scale-free networks. Moreover, for fully coupled network, disassortative coupling is found to be most vulnerable to random attacks, while the random and assortative coupling have little difference. Additionally, enhancing coupling strength can greatly enhance the fragility of interdependent networks against targeted attacks. These results can not only improve the deep understanding of structural complexity of complex systems, but also provide insights into the guidance of designing resilient infrastructures.

  3. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  4. In Search of Meaning: Are School Rampage Shootings Random and Senseless Violence?

    Science.gov (United States)

    Madfis, Eric

    2017-01-02

    This article discusses Joel Best's ( 1999 ) notion of random violence and applies his concepts of pointlessness, patternlessness, and deterioration to the reality about multiple-victim school shootings gleaned from empirical research about the phenomenon. Best describes how violence is rarely random, as scholarship reveals myriad observable patterns, lots of discernable motives and causes, and often far too much fear-mongering over how bad society is getting and how violent we are becoming. In contrast, it is vital that the media, scholars, and the public better understand crime patterns, criminal motivations, and the causes of fluctuating crime rates. As an effort toward such progress, this article reviews the academic literature on school rampage shootings and explores the extent to which these attacks are and are not random acts of violence.

  5. Trajectory Optimization for a Cruising Unmanned Aerial Vehicle Attacking a Target at Back Slope While Subjected to a Wind Gradient

    Directory of Open Access Journals (Sweden)

    Tieying Jiang

    2015-01-01

    Full Text Available The trajectory of a tubular launched cruising unmanned aerial vehicle is optimized using the modified direct collocation method for attacking a target at back slope under a wind gradient. A mathematical model of the cruising unmanned aerial vehicle is established based on its operational and motion features under a wind gradient to optimize the trajectory. The motion characteristics of  “altitude adjustment” and “suicide attack” are taken into full account under the combat circumstance of back slope time key targets. By introducing a discrete time function, the trajectory optimization is converted into a nonlinear programming problem and the SNPOT software is applied to solve for the optimal trajectory of the missile under different wind loads. The simulation results show that, for optimized trajectories, the average attack time decreased by up to 29.1% and the energy consumption is reduced by up to 25.9% under specified wind gradient conditions. A, ωdire, and Wmax have an influence on the flight trajectories of cruising unmanned aerial vehicle. This verifies that the application of modified direct collocation method is reasonable and feasible in an effort to achieve more efficient missile trajectories.

  6. Violence in Rural, Suburban, and Urban Schools in Pennsylvania.

    Science.gov (United States)

    Flynn, Kalen; McDonald, Catherine C; D'Alonzo, Bernadette A; Tam, Vicky; Wiebe, Douglas J

    2018-01-01

    School violence is a public health issue with direct and collateral consequences that has academic and social impacts for youth. School violence is often considered a uniquely urban problem, yet more research is needed to understand how violence in rural and suburban schools may be similar or different from urban counterparts. Using school violence data from a state with urban, suburban, and rural counties, we explored the landscape of school violence in Pennsylvania (PA) through mapping, descriptive statistics, and factor analysis. Results show school violence is not solely an urban problem. Schools in all county types and across grade levels deal with violence to varying degrees, and the majority of schools across county types experience low levels of violence. Types of violence experienced by PA schools loaded onto three factors, suggesting that targeted interventions may be better suited to addressing school violence.

  7. Cultural and peer influences on homicidal violence: a Finnish perspective.

    Science.gov (United States)

    Kiilakoski, Tomi; Oksanen, Atte

    2011-01-01

    Two case examples of school shootings in Finland illustrate the interplay between the distal, international influence of the Columbine shooting and the more immediate impact of local peer interactions involving both peer bullying at school and peer encouragement of violence through the Internet. Both cases involved emotionally troubled young men who identified with the Columbine attackers and aspired to attain notoriety through similar acts of violence. There was a sequence of missed opportunities for prevention in these shootings that occurred when the student was chronically bullied, developed serious emotional problems, became fascinated with Columbine-type events, and subsequently began to discuss interests and plans to commit a similar act. Copyright © 2011 Wiley Periodicals, Inc., A Wiley Company.

  8. Violence against female sex workers in Cameroon: accounts of violence, harm reduction, and potential solutions.

    Science.gov (United States)

    Lim, Sahnah; Peitzmeier, Sarah; Cange, Charles; Papworth, Erin; LeBreton, Matthew; Tamoufe, Ubald; Kamla, Aristide; Billong, Serge; Fokam, Pamella; Njindam, Iliassou; Decker, Michele R; Sherman, Susan G; Baral, Stefan

    2015-03-01

    Female sex workers (FSWs) in Cameroon, and West Africa generally, suffer a disproportionate burden of HIV. Although violence against FSWs has been documented extensively in other parts of the world, data on violence from West African countries are lacking. The aim of this study was to qualitatively document violence and harm reduction strategies from the perspective of FSWs in Cameroon as well as to understand how experiences of violence may increase FSWs' HIV risk. FSWs from 7 major cities in Cameroon (Douala, Yaounde, Bamenda, Bertoua, Nagoundere, Kribi, and Bafoussam) were purposively recruited. Data from 31 in-depth interviews and 7 focus groups (n = 70; with some overlapping participants from in-depth interviews) conducted with these FSWs in 6 of these 7 cities (excluding Kribi) were analyzed using a grounded theory approach. Transcripts revealed 3 primary themes related to violence: (1) sources and types of violence, including sexual, physical, and financial violence perpetrated by clients and police, (2) harm reduction strategies, including screening clients and safe work locations, receipt of payment before sexual act, and formation of an informal security network, and (3) recommendations on structural changes to reduce violence that emphasized sex work decriminalization and increased police accountability. As in other parts of the world, violence against FSWs is pervasive in Cameroon. Interventions targeting violence and HIV must address the forms of violence cited locally by FSWs and can build on FSWs' existing strengths and harm reduction strategies. Structural changes are needed to ensure access to justice for this population.

  9. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  10. Coping styles used by sexual minority men who experience intimate partner violence.

    Science.gov (United States)

    Goldberg-Looney, Lisa D; Perrin, Paul B; Snipes, Daniel J; Calton, Jenna M

    2016-12-01

    This study examined the coping styles used by sexual minority men who have experienced intimate partner violence, including sexual, emotional and physical victimisation, as well as physical injury. Although sexual minority men experience intimate partner violence at least as often as do heterosexuals, there is currently limited knowledge of intimate partner violence in this community or resources for sexual minority men who experience intimate partner violence. Cross-sectional design. Sexual minority men (N = 89) were recruited as part of a national online survey and completed questionnaires assessing lifetime experiences of intimate partner violence as well as various coping strategies. In terms of intimate partner violence, 34·8% of participants reported having been targets of sexual abuse, 38·2% targets of physical abuse, 69·7% targets of psychological abuse and 28·1% had experienced an injury as a result of intimate partner violence during their lifetime. Canonical correlation analyses found that intimate partner violence victimisation explained 32·5% of the variance in adaptive and 31·4% of the variance in maladaptive coping behaviours. In the adaptive coping canonical correlation, standardised loadings suggested that sexual minority men who experienced intimate partner violence resulting in injury were more likely to use religious coping, but less likely to use planning coping. In the maladaptive coping canonical correlation, sexual minority men who had been targets of intimate partner sexual victimisation and intimate partner violence resulting in injury tended to engage in increased behavioural disengagement coping. This study revealed several coping behaviours that are more or less likely as the severity of different forms of intimate partner violence increases. The identification of these coping styles could be applied to the development and modification of evidence-based interventions to foster effective and discourage ineffective coping styles

  11. [Violence prevention in childhood and adolescence--a brief overview].

    Science.gov (United States)

    Pawils, Silke; Metzner, Franka

    2016-01-01

    Aggressive and violent behaviour in children and adolescents can be associated with physical and psychological health effects continuing into adulthood. Early programs for violence prevention in childhood and adolescence are intended to prevent or reduce aggressive behaviour in order to decrease the risk for short- and long-term developmental impairments. In a literature review, research findings on prevalence, typical courses of development, and predictors of violent behavior in childhood are first summarized and compared with findings on the frequency, developmental course, and consequences of youth violence. International and German programs for violence prevention in children and adolescents are presented in the context of various settings (family, school, community), target groups (primary vs. secondary prevention) as well as target variables (universal vs. specific). Empirical findings on efficacy testing of violence prevention programs are described and discussed. The presented findings stress the relevance and potential of services for violence prevention for children and adolescents, but also demonstrate the challenges and gaps.

  12. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    Science.gov (United States)

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.

  13. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  14. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  15. Violence against women as an economic issue: making sense of a fragmented field

    Directory of Open Access Journals (Sweden)

    Helena Alviar García

    2016-08-01

    Full Text Available Violence against women has been a recurring theme of analysis since the 1970’s. This conceptualization has evolved over time. Initially, the efforts were directed to define, prosecute and punish the crime. Then, the problem was understood as a public health one. More recently, the economic consequences of violence and discrimination against women has become central. The article starts out by relating international discussions about the relationship between gender and development and the rising prevalence of violence against women as an economic issue. The second part draws a picture of how this debate has permeated the Colombian context. This local narrative presents an example of what this article proposes: a critical analysis of the recent trends to understand violence as an access to the market issue, as well as the observation that the problem is not one of lack of regulation, but of fragmentation and overflow of institutions and policies aimed at attacking this problem.

  16. Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

    OpenAIRE

    Heerden , Renier ,; Pieterse , Heloise; Irwin , Barry

    2012-01-01

    Part 4: Section 3: ICT for Peace and War; International audience; This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The...

  17. Preventive strike vs. false targets and protection in defense strategy

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    A defender allocates its resource between defending an object passively and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender distributes its entire resource between deploying false targets, which the attacker cannot distinguish from the genuine object, and protecting the object. If the defender strikes preventively, the attacker's vulnerability depends on its protection and on the defender's resource allocated to the strike. If the attacker survives, the object's vulnerability depends on the attacker's revenge attack resource allocated to the attacked object. The optimal defense resource distribution between striking preventively, deploying the false targets and protecting the object is analyzed. Two cases of the attacker strategy are considered: when the attacker attacks all of the targets and when it chooses a number of targets to attack. An optimization model is presented for making a decision about the efficiency of the preventive strike based on the estimated attack probability, dependent on a variety of model parameters.

  18. [Violence and discrimination in the workplace. The effects on health and setting-related approaches to prevention and rehabilitation].

    Science.gov (United States)

    Nienhaus, Albert; Drechsel-Schlund, Claudia; Schambortski, Heike; Schablon, Anja

    2016-01-01

    Violence in the workplace is a widespread problem that manifests itself in very different forms. The consequences for victims and companies are equally diverse. Sexual harassment is a special form of violence at the workplace. Violence may come from external perpetrators (attacks on cashiers) or from persons inside a company or establishment (colleagues, patients, people in care). Statutory accident insurance institutions in Germany (UV, "Unfallversicherungsträger") receive approximately 16,000 occupational injury reports per year that resulted from violence and led to extended incapacity to work. The numbers are increasing steadily. Particularly affected by violence are people working in healthcare and social welfare. Both psychological and physical violence can lead to severe disorders such as post-traumatic stress disorder (PTSD). To avoid violence, technical, organisational, and personal protective measures are needed. The training of de-escalation officers in the areas affected can be helpful. For victims of psychological and physical violence in the workplace, the UV offers special psychotherapeutic support and recommends the training of first-aiders.

  19. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  20. Workplace Violence Against Nurses: Making It Safe to Care.

    Science.gov (United States)

    Hester, Susan; Harrelson, Christina; Mongo, Tameki

    2016-08-01

    This article explores the topic of workplace violence in the health care setting. A definition of workplace violence and those who are most vulnerable is provided. National and state legislation that addresses the topic of workplace violence will be discussed. Other organizations such as the American Nurses Association and The Joint Commission and their position statements will be explored. Lastly, strategies targeting workplace violence prevention and the barriers to implementing identified strategies will be discussed. Workplace violence is a rapidly growing concern for those working in health care. This article provides recommendations for legislative and workplace actions to protect health care workers.

  1. Blind Spot? Security Narratives and Far-Right Violence in Europe

    Directory of Open Access Journals (Sweden)

    Arun Kundnani

    2012-06-01

    Full Text Available This Research Paper discusses the challenges of countering far-Right political violence in the wake of the terrorist attack carried out by Anders Behring Breivik in Norway in July 2011. With brief case studies of Britain, the Netherlands, Denmark and Belgium, it argues that classic neo-Nazi groups are being supplemented by new “counter-jihadist” far-Right movements, which use various modes of political action, including participation in elections, street-based activism and terrorist violence. Building on recent interest among scholars and practitioners in the role of narratives and performativity in counter-terrorism, this paper argues that official security discourses tend to hinder efforts to counter far-Right violence and can unwittingly provide opportunities for counter-jihadists to advance their own narratives. When leaders and officials of Western European governments narrate issues of multiculturalism and radical Islamism in ways that overlap with counter-jihadist ideology, it suggests a need for reflection on the unintended side-effects of their security discourse. The Research Paper concludes with a discussion of how governments can rework their security narratives to oppose far-Right violence.

  2. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    International Nuclear Information System (INIS)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-01-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment

  3. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  4. Prevalence and risk factors of workplace violence against health care workers in emergency department in Ismailia, Egypt.

    Science.gov (United States)

    Abdellah, Rasha Farouk; Salama, Khaled Morsy

    2017-01-01

    Emergency department is one of the high-risk areas, where violence against health care workers (HCWs) is a prevalent and serious problem. Violence has negative effects on HCWs, and therefore on the quality of care provided in emergency department. This study aimed to determine the prevalence, types, sources and risk factors of violence reported by HCWs in emergency department. A cross-sectional study was conducted using a standardized questionnaire developed by the WHO. One hundred thirty four questionnaires were included in this study (94.4% response rate). WPV was reported by 59.7% of HCWs. Verbal violence was the most reported (58.2%), compared to physical violence (15.7%). The most reported reasons for violence were waiting time and that patient and family expectations not being met. Only 29.5% of HCWs who experienced verbal violence and 23.8% of who experienced physical violence reported it to hospital authority. About 75% of HCW thought that work place violence could be prevented, and about 60% said that no action was taken against the attacker by hospital authority. Violence against HCWs in emergency department is a significant issue that cannot be ignored. There are multiple reasons. The key point in dealing with the problem is to treat its specific causes.

  5. Sexual Violence among Female Undergraduates in a Tertiary ...

    African Journals Online (AJOL)

    Depression and guilt were the major health consequences reported. Sexual violence is high at the University of Port Harcourt, which warrants targeted preventive action. Keywords: Sexual violence, epidemiology, health consequences, females, University. Nous avons menée une étude sur la prévalence, la configuration, ...

  6. Description and consequences of sexual violence in Ituri province, Democratic Republic of Congo

    Directory of Open Access Journals (Sweden)

    Duroch Françoise

    2011-04-01

    Full Text Available Abstract Background The war in eastern Democratic Republic of Congo has been the subject of numerous studies related to the problem of sexual violence. Historically, such violence is known to be part of strategic war plans to conquer and destroy communities, but it is now unfortunately prevalent in times of relative calm. Methods We describe the characteristics and consequences of sexual violence in Ituri province of Democratic Republic of Congo through the retrospective analysis of 2,565 patients who received medical care in the Médecins Sans Frontières sexual violence clinic in the capital of Ituri province, Bunia, between September 2005 and December 2006. Using a standardised questionnaire, we report patients' demographics, number and status of aggressor(s, forced detention and violent threats among other variables for all patients presenting for medical consultation after a sexually violent event during this period. Results Ninety-six percent of our cohort were female and 29.3% minors, 18-29 years was the most represented age group. Acts of sexual violence (n = 2,565 were reported to be mainly perpetrated by men with military affiliations (73%, although civilians were implicated in 21% of crimes. The attack was perpetrated by two or more persons in over 74% of cases and most commonly perpetrators were unknown armed males, (87.2%. Male victims accounted for 4% (n = 103 of our cohort. Forty-eight percent of our patients reported being attacked whilst performing daily domestic duties outside the home and 18% of victims being detained by their perpetrators, the majority of whom were held for less than 2 weeks (61.6%. Conclusions The characteristics of sexually violent acts in Ituri province during this period cannot be simply explained as a 'weapon of war' as described in the literature, meaning the use of sexual violence within a military strategy where it is employed under the orders of a commander to harm a particular community. Whilst the

  7. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  8. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  9. The Influence of Media Violence on Youth.

    Science.gov (United States)

    Anderson, Craig A; Berkowitz, Leonard; Donnerstein, Edward; Huesmann, L Rowell; Johnson, James D; Linz, Daniel; Malamuth, Neil M; Wartella, Ellen

    2003-12-01

    Research on violent television and films, video games, and music reveals unequivocal evidence that media violence increases the likelihood of aggressive and violent behavior in both immediate and long-term contexts. The effects appear larger for milder than for more severe forms of aggression, but the effects on severe forms of violence are also substantial (r = .13 to .32) when compared with effects of other violence risk factors or medical effects deemed important by the medical community (e.g., effect of aspirin on heart attacks). The research base is large; diverse in methods, samples, and media genres; and consistent in overall findings. The evidence is clearest within the most extensively researched domain, television and film violence. The growing body of video-game research yields essentially the same conclusions. Short-term exposure increases the likelihood of physically and verbally aggressive behavior, aggressive thoughts, and aggressive emotions. Recent large-scale longitudinal studies provide converging evidence linking frequent exposure to violent media in childhood with aggression later in life, including physical assaults and spouse abuse. Because extremely violent criminal behaviors (e.g., forcible rape, aggravated assault, homicide) are rare, new longitudinal studies with larger samples are needed to estimate accurately how much habitual childhood exposure to media violence increases the risk for extreme violence. Well-supported theory delineates why and when exposure to media violence increases aggression and violence. Media violence produces short-term increases by priming existing aggressive scripts and cognitions, increasing physiological arousal, and triggering an automatic tendency to imitate observed behaviors. Media violence produces long-term effects via several types of learning processes leading to the acquisition of lasting (and automatically accessible) aggressive scripts, interpretational schemas, and aggression-supporting beliefs

  10. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system.

    Science.gov (United States)

    2012-03-01

    This report presents 16 case studies of attacks planned or carried out against Israeli bus targets, along with statistical data on the number, frequency, and lethality of attacks against bus targets that have taken place in Israel since 1970 and duri...

  11. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  12. Reclaiming Gender and Power in Sexual Violence Prevention in Adolescence.

    Science.gov (United States)

    Miller, Elizabeth

    2018-03-01

    The Mentors in Violence Prevention (MVP) model seeks to address the root causes of gender violence using a bystander approach and leadership training to challenge structures of patriarchy. Emerging research on adolescent relationship abuse and sexual violence points to key modifiable targets-transforming gender norms, addressing homophobia, integrating with comprehensive sexuality education, and acknowledging the needs of youth already exposed to violence. A social justice-based bystander approach such as the MVP model should be part of a multi-level approach to sexual violence prevention that addresses gender and power, encourages healthy sexuality conversations, and provides safety and support for survivors.

  13. Implementation and Evaluation of a Youth Violence Prevention Program for Adolescents

    Science.gov (United States)

    Regan, Mary Elana

    2009-01-01

    Youth violence in the city of Philadelphia, PA, has reached epidemic proportions. The majority of homicides related to gun violence is most prevalent among African American males aged 19 to 24 years. Therefore, it is essential to implement youth violence prevention programs to a target population several years younger than this age group to…

  14. Shared Risk Factors for the Perpetration of Physical Dating Violence, Bullying, and Sexual Harassment Among Adolescents Exposed to Domestic Violence

    Science.gov (United States)

    McNaughton Reyes, H. Luz; Chen, May S.; Ennett, Susan T.; Basile, Kathleen C.; DeGue, Sarah; Vivolo-Kantor, Alana M.; Moracco, Kathryn E.; Bowling, J. Michael

    2016-01-01

    The high risk of perpetrating physical dating violence, bullying, and sexual harassment by adolescents exposed to domestic violence points to the need for programs to prevent these types of aggression among this group. This study of adolescents exposed to domestic violence examined whether these forms of aggression share risk factors that could be targeted for change in single programs designed to prevent all three types of aggression. Analyses were conducted on 399 mother victims of domestic violence and their adolescents, recruited through community advertising. The adolescents ranged in age from 12 to 16 years; 64 % were female. Generalized estimating equations was used to control for the covariation among the aggression types when testing for shared risk factors. Approximately 70 % of the adolescents reported perpetrating at least one of the three forms of aggression. In models examining one risk factor at a time, but controlling for demographics, adolescent acceptance of sexual violence, mother–adolescent discord, family conflict, low maternal monitoring, low mother–adolescent closeness, low family cohesion, depressed affect, feelings of anger, and anger reactivity were shared across all three aggression types. In multivariable models, which included all of the risk factors examined and the demographic variables, low maternal monitoring, depressed affect and anger reactivity remained significant shared risk factors. Our findings suggest that programs targeting these risk factors for change have the potential to prevent all three forms of aggression. In multivariable models, poor conflict management skills was a risk for bullying and sexual harassment, but not dating violence; acceptance of dating violence was a risk for dating violence and bullying, but not sexual harassment; and none of the examined risk factors were unique to aggression type. The study’s implications for the development of interventions and future research are discussed. PMID:26746242

  15. Shared Risk Factors for the Perpetration of Physical Dating Violence, Bullying, and Sexual Harassment Among Adolescents Exposed to Domestic Violence.

    Science.gov (United States)

    Foshee, Vangie A; McNaughton Reyes, H Luz; Chen, May S; Ennett, Susan T; Basile, Kathleen C; DeGue, Sarah; Vivolo-Kantor, Alana M; Moracco, Kathryn E; Bowling, J Michael

    2016-04-01

    The high risk of perpetrating physical dating violence, bullying, and sexual harassment by adolescents exposed to domestic violence points to the need for programs to prevent these types of aggression among this group. This study of adolescents exposed to domestic violence examined whether these forms of aggression share risk factors that could be targeted for change in single programs designed to prevent all three types of aggression. Analyses were conducted on 399 mother victims of domestic violence and their adolescents, recruited through community advertising. The adolescents ranged in age from 12 to 16 years; 64 % were female. Generalized estimating equations was used to control for the covariation among the aggression types when testing for shared risk factors. Approximately 70 % of the adolescents reported perpetrating at least one of the three forms of aggression. In models examining one risk factor at a time, but controlling for demographics, adolescent acceptance of sexual violence, mother-adolescent discord, family conflict, low maternal monitoring, low mother-adolescent closeness, low family cohesion, depressed affect, feelings of anger, and anger reactivity were shared across all three aggression types. In multivariable models, which included all of the risk factors examined and the demographic variables, low maternal monitoring, depressed affect and anger reactivity remained significant shared risk factors. Our findings suggest that programs targeting these risk factors for change have the potential to prevent all three forms of aggression. In multivariable models, poor conflict management skills was a risk for bullying and sexual harassment, but not dating violence; acceptance of dating violence was a risk for dating violence and bullying, but not sexual harassment; and none of the examined risk factors were unique to aggression type. The study's implications for the development of interventions and future research are discussed.

  16. Suicide to harass others: clues from mythology to understanding suicide bombing attacks.

    Science.gov (United States)

    Preti, Antonio

    2006-01-01

    Suicide by revenge, the Samsonic suicide, and the suicide by devotio, all described in classical mythology and also reported in the ethnographic literature, belong to the same class of suicidal behaviors as kamikaze suicide and the suicide bombing attack: suicide to harass and burden others or suicide with a hostile intent. The lack of a social dimension to share in a positive manner may lead an individual to integrate him/herself in another social structure, e.g., a military organization, which allows the individual to express his/her desires and personal identity only by destroying others and themselves. The dynamics of these forms of suicide are also likely to work in other displays of life-threatening behavior, such as family annihilation, mass murder, and spree killing. A more thorough investigation of the dynamics operating in suicide bombing attacks could, therefore, contribute to preventative strategies against violence at large.

  17. Violence in Children's Television Programming: Assessing the Risks.

    Science.gov (United States)

    Wilson, Barbara J.; Smith, Stacy L.; Potter, W. James; Kunkel, Dale; Linz, Daniel; Colvin, Carolyn M.; Donnerstein, Edward

    2002-01-01

    Investigates the nature and extent of violence contained in television programming that targets children aged 12 and younger. Notes that the violence itself is just as likely to be glamorized in children's as in nonchildren's shows, but it is even more sanitized and more likely to be trivialized. Documents five subgenres of children's programming…

  18. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  19. Associations of Teen Dating Violence Victimization With School Violence and Bullying Among US High School Students*

    Science.gov (United States)

    Vivolo-Kantor, Alana M.; Olsen, Emily O’malley; Bacon, Sarah

    2016-01-01

    BACKGROUND Teen dating violence (TDV) negatively impacts health, mental and physical well-being, and school performance. METHODS Data from a nationally representative sample of high school students participating in the Centers for Disease Control and Prevention (CDC)’s 2013 Youth Risk Behavior Survey (YRBS) are used to demonstrate associations of physical and sexual TDV with school violence-related experiences and behaviors, including bullying victimization. Bivariate and adjusted sex-stratified regressions assessed relationships between TDV and school violence-related experiences and behaviors. RESULTS Compared to students not reporting TDV, those experiencing both physical and sexual TDV were more likely to report carrying a weapon at school, missing school because they felt unsafe, being threatened or injured with a weapon on school property, having a physical fight at school, and being bullied on school property. CONCLUSIONS School-based prevention efforts should target multiple forms of violence. PMID:27374352

  20. Intolerance and Violence Against Doctors.

    Science.gov (United States)

    Singh, Meharban

    2017-10-01

    Intolerance and grouse against doctors is a global phenomenon but India seems to lead the world in violence against doctors. According to World Health Organization, about 8-38% healthcare workers suffer physical violence at some point in their careers. Many more are verbally abused or threatened. Public is almost behaving like health sector terrorists. The spate of increasing attacks on doctors by damaging their property and causing physical injury is not acceptable by any civilized society. The public is becoming increasingly intolerant to a large number of social issues because of poor governance and vote bank politics. There is a need to arrest the development of further distrust between doctors and their patients/relatives, otherwise it will compromise all achievements of medical science and adversely affect healing capabilities of doctors. Rude and aggressive behavior of the patients or their family members, and arrogant and lackadaisical approach of the doctor, adversely affects the doctor-patient relationship and the outcome of the patient. The doctors, hospital administration and government must exercise "zero tolerance" with respect to acts of violence against healthcare professionals. It is possible to reduce the incidence of intolerance against doctors but difficult to eliminate it completely. The healthcare providers should demonstrate greater compassion and empathy with improved communication skills. The hospitals must have adequate infrastructure, facilities and staff to handle emergencies without delay and with due confidence and skills. The security of healthcare providers, especially in sensitive areas, should be improved by having adequate number of security guards, frisking facilities, extensive CCTV network and availability of "Quick response team" to handle unruly mob. In case of any grievances for alleged mismanagement, the public should handle the situation in a civilized manner and seek redressal through Medical Protection Act and legal

  1. Violence

    Science.gov (United States)

    ... gov home / Home Relationships Dealing with conflict Violence Violence Violence among young people is a serious problem. ... according to a recent national survey Types of violence top Youth violence can include: Hitting, pinching, punching, ...

  2. Violence permeating daily life: a qualitative study investigating perspectives on violence among women in Karachi, Pakistan

    Directory of Open Access Journals (Sweden)

    Ali TS

    2012-11-01

    societal support of women is limited. There is an urgent need to raise the subject of violence against women and tackle this human rights problem at all levels of society by targeting the individual, family, community, and societal levels concurrently.Keywords: violence against women, domestic violence, women’s perceptions, gender inequality, empowerment, qualitative study, Pakistan

  3. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  4. The Role of Attitudes to, and the Frequency of, Domestic Violence Encounters in the Healthcare Professionals' Handling of Domestic Violence Cases.

    Science.gov (United States)

    Zorjan, Saša; Smrke, Urška; Šprah, Lilijana

    2017-09-01

    Domestic violence is recognized as a public health problem with a high prevalence in the general population. Healthcare professionals play an important role in the recognition and treatment of domestic violence. Hence, conducting research on factors that facilitate or inhibit appropriate actions by healthcare professionals is of the upmost importance. The objective of the study was to examine the relationship between healthcare professionals' attitudes toward the acceptability of domestic violence and their responses when dealing with victims of domestic violence. The sample consisted of 322 healthcare professionals (physicians, dentists, nursing staff and other healthcare workers; 85.2% female), who completed a questionnaire, assessing their attitudes towards domestic violence, experience, behaviour and perceived barriers in recognizing and treating domestic violence in the health care sector. The study was cross-sectional and used availability sampling. The results showed no significant differences in domestic violence acceptability attitudes when comparing groups of healthcare professionals who reported low or high frequency of domestic violence cases encounters. Furthermore, we found that domestic violence acceptability attitudes were negatively associated with action taking when the frequency of encounters with domestic violence cases was high and medium. However, the attitudes were not associated with action taking when the frequency of encounters with domestic violence cases was low. The results highlight the important role of attitudes in action taking of healthcare professionals when it comes to domestic violence. This indicates the need for educational interventions that specifically target healthcare professionals' attitudes towards domestic violence.

  5. Legal Issues in Cyber Targeting

    DEFF Research Database (Denmark)

    Juhlin, Jonas Alastair

    Imagine this scenario: Two states are in armed conflict with each other. In order to gain an advantage, one side launches a cyber-attack against the opponent’s computer network. The malicious malware paralyze the military computer network, as intended, but the malware spreads into the civilian...... system with physical damage to follow. This can happen and the natural question arises: What must be considered lawful targeting according to the international humanitarian law in cyber warfare? What steps must an attacker take to minimize the damage done to unlawful targets when conducting an offensive...... operation? How can the attacker separate military targets from civilian targets in cyber space? This paper addresses these questions and argues that a network (civilian or military) consist of several software components and that it is the individual components that is the target. If the components are used...

  6. Adolescent Conflict as a Developmental Process in the Prospective Pathway from Exposure to Interparental Violence to Dating Violence

    Science.gov (United States)

    Narayan, Angela J.; Englund, Michelle M.; Carlson, Elizabeth A.; Egeland, Byron

    2013-01-01

    Within a developmental psychopathology framework, the current study examined adolescent conflict (age 16) with families, best friends, and dating partners as mediators in the prospective pathway from exposure to interparental violence (EIPV) in early childhood (0–64 months) to dating violence perpetration and victimization in early adulthood (age 23). Adolescent conflict was predicted to partially mediate EIPV and dating violence with significant direct paths from EIPV to dating violence, given the extant literature on the salience of early childhood EIPV for later maladjustment. Participants (N = 182; 99 males, 83 females; 67% Caucasian, 11% African-American, 18% other, 4% unreported) were drawn from a larger prospective study of high-risk mothers (aged 12–34 years) that followed their children from birth through adulthood. EIPV and adolescent conflict were rated from interviews with mothers and participants, and dating violence (physical perpetration and victimization) was assessed with the Conflict Tactics Scale. Path analyses showed that EIPV in early childhood (a) directly predicted dating violence perpetration in early adulthood and (b) predicted conflict with best friends, which in turn predicted dating violence perpetration. Although mediation of best friend conflict was not evident, indirect effects of EIPV to dating violence were found through externalizing behaviors in adolescence and life stress in early adulthood. Findings highlight that conflict with best friends is affected by EIPV and predicts dating violence, suggesting that it may be a promising target for relationship-based interventions for youth with EIPV histories. Furthermore, deleterious early experiences and contemporaneous risk factors are salient predictors of dating violence. PMID:23979004

  7. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  8. Acceptability of dating violence and expectations of relationship harm among adolescent girls exposed to intimate partner violence.

    Science.gov (United States)

    Lee, Michelle Seulki; Begun, Stephanie; DePrince, Anne P; Chu, Ann T

    2016-07-01

    Little is known about the factors that contribute to adolescents' perceptions of the acceptability of dating violence, particularly among girls who have witnessed intimate partner violence (IPV). Drawing on relevant theory, the current study tests a path model linking frequency of witnessing IPV in childhood, sexist beliefs, and automatic relationship-to-harm associations to acceptability of dating violence. Participants were 79 female adolescents with a mean age of 16.08 years (SD = 1.52) involved in the child welfare system. Participants self-reported frequency of witnessing IPV in childhood, ambivalent sexism, and acceptability of dating violence. A lexical-decision task assessed implicit relationship-to-harm priming, which reflects the degree to which people automatically assume that relationships include harm. Consistent with hypotheses, frequency of witnessing IPV was significantly associated with strength of implicit relationship-to-harm associations. Implicit relationship-to-harm associations and hostile sexism were significantly associated with girls' attitudes that dating violence is acceptable. There was a significant indirect effect of witnessing IPV and acceptability of dating violence through relationship-to-harm associations. The current study provides information that is relevant to dating violence intervention among adolescent girls. Interventions that target girls' schema about relationships-making explicit that healthy relationships do not involve harm-and include education about sexism in society are likely to decrease dating violence risk over time. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  9. From Violence in the Home to Physical Dating Violence Victimization: The Mediating Role of Psychological Distress in a Prospective Study of Female Adolescents.

    Science.gov (United States)

    Cascardi, Michele

    2016-04-01

    Symptoms of psychological distress may be one pathway through which child maltreatment and witnessing violence in the home relate to dating violence victimization. This study examined whether psychological distress in mid-adolescence mediated the link between child maltreatment and witnessing violence in early adolescence and dating violence victimization in young adulthood. The sample included female participants (N = 532) from the National Survey of Child and Adolescent Well Being who were 18 years or older in the fifth and final wave of data collection. At the time of entry into the study, participants were 12.81 (SD = 1.23) years old. Sixteen percent of participants identified as Hispanic; 53 % identified their race as White, 33 % as Black, and 11 % as American Indian. Results showed that psychological distress may play a causal role in the relationship of violence in the home to dating violence victimization. Interventions targeting psychological distress, particularly in samples at risk for child maltreatment, may reduce the risk of dating violence victimization.

  10. Network resilience against intelligent attacks constrained by the degree-dependent node removal cost

    International Nuclear Information System (INIS)

    Annibale, A; Coolen, A C C; Bianconi, G

    2010-01-01

    We study the resilience of complex networks against attacks in which nodes are targeted intelligently, but where disabling a node has a cost to the attacker which depends on its degree. Attackers have to meet these costs with limited resources, which constrains their actions. A network's integrity is quantified in terms of the efficacy of the process that it supports. We calculate how the optimal attack strategy and the most attack-resistant network degree statistics depend on the node removal cost function and the attack resources. The resilience of networks against intelligent attacks is found to depend strongly on the node removal cost function faced by the attacker. In particular, if node removal costs increase sufficiently fast with the node degree, power law networks are found to be more resilient than Poissonian ones, even against optimized intelligent attacks. For cost functions increasing quadratically in the node degrees, intelligent attackers cannot damage the network more than random damages would.

  11. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  12. Physical Violence against General Practitioners and Nurses in Chinese Township Hospitals: A Cross-Sectional Survey.

    Directory of Open Access Journals (Sweden)

    Kai Xing

    Full Text Available The purpose of this study is to identify risk factors of physical violence in Chinese township hospitals.A cross-sectional survey was used in a sample of 442 general practitioners and 398 general nurses from 90 township hospitals located in Heilongjiang province, China (response rate = 84.8%.A total of 106 of the 840 (12.6% respondents reported being physically attacked in their workplace in the previous 12 months. Most perpetrators were the patients' relatives (62.3%, followed by the patient (22.6%; 73.6% of perpetrators were aged between 20 and 40 years. Of the physical violence incidents, about 56.6% (n = 60 resulted in a physical injury, and 45.4% of respondents took two or three days of sick leave. Reporting workplace violence in hospitals to superiors or authorities was low (9.4%. Most respondents (62.8% did not receive training on how to avoid workplace violence. Logistic regression analyses indicated that general nurses, aged 35 years or younger, and with a higher-level professional title were more likely to experience physical violence. Healthcare workers with direct physical contact (washing, turning, lifting with patients had a higher risk of physical violence compared to other health care workers. Procedures for reporting workplace violence were a protective factor for physical violence; when in place, reporting after psychological violence (verbal abuse, bullying/mobbing, harassment, and threats was more protective than waiting until an instance of physical violence (beating, kicking, slapping, stabbing, etc..Physical violence in Chinese township hospitals is an occupational hazard of rural public health concern. Policies, procedures, and intervention strategies should be undertaken to manage this issue.

  13. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    International Nuclear Information System (INIS)

    Hartman, Steven M.

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  14. Review of attacks on health care facilities in six conflicts of the past three decades.

    Science.gov (United States)

    Briody, Carolyn; Rubenstein, Leonard; Roberts, Les; Penney, Eamon; Keenan, William; Horbar, Jeffrey

    2018-01-01

    In the ongoing conflicts of Syria and Yemen, there have been widespread reports of attacks on health care facilities and personnel. Tabulated evidence does suggest hospital bombings in Syria and Yemen are far higher than reported in other conflicts but it is unclear if this is a reporting artefact. This article examines attacks on health care facilities in conflicts in six middle- to high- income countries that have occurred over the past three decades to try and determine if attacks have become more common, and to assess the different methods used to collect data on attacks. The six conflicts reviewed are Yemen (2015-Present), Syria (2011- Present), Iraq (2003-2011), Chechnya (1999-2000), Kosovo (1998-1999), and Bosnia and Herzegovina (1992-1995). We attempted to get the highest quality source(s) with summary data of the number of facilities attacked for each of the conflicts. The only conflict that did not have summary data was the conflict in Iraq. In this case, we tallied individual reported events of attacks on health care. Physicians for Human Rights (PHR) reported attacks on 315 facilities (4.38 per month) in Syria over a 7-year period, while the Monitoring Violence against Health Care (MVH) tool launched later by the World Health Organization (WHO) Turkey Health Cluster reported attacks on 135 facilities (9.64 per month) over a 14-month period. Yemen had a reported 93 attacks (4.65 per month), Iraq 12 (0.12 per month), Chechnya > 24 (2.4 per month), Kosovo > 100 (6.67 per month), and Bosnia 21 (0.41 per month). Methodologies to collect data, and definitions of both facilities and attacks varied widely across sources. The number of reported facilities attacked is by far the greatest in Syria, suggesting that this phenomenon has increased compared to earlier conflicts. However, data on attacks of facilities was incomplete for all of the conflicts examined, methodologies varied widely, and in some cases, attacks were not defined at all. A global

  15. Television Violence: Implications for Violence Prevention.

    Science.gov (United States)

    Hughes, Jan N.; Hasbrouck, Jan E.

    1996-01-01

    Reviews the scientific and public-opinion debate on the impact television violence in America has on aggression and violence. Research supports the view that television violence contributes to children's level of aggressiveness and subsequent violence and criminality. Describes attempts to improve the quality of television programming for children…

  16. Adult patients with schizophrenia using violence towards their parents: a phenomenological study of views and experiences of violence in parent-child dyads.

    Science.gov (United States)

    Hsu, Mei-Chi; Tu, Chun-Hsien

    2014-02-01

    To describe the lived experiences of aggression and violence among patients with schizophrenia and their victimized biological parent as the major caregiver being aggressed by their child (parent-adult-child dyads), and to gain an understanding of the precipitating factors influencing violence. Child-to-parent violence, particularly in the mentally ill adult child, is arguably the most stressful and under-researched issue of family violence. Violence in patients with mental illness is most frequently targeted at family members, and most often takes place at home. Both patients and their parents' experiences of violence are relatively unexplored. Qualitative study design. Data were collected using individual in-depth interviews between August 2010-August 2011 in Taiwan. Purposive sample of 14 hospitalized patients with schizophrenia who had aggression and violence in the past year directed towards their biological parent of either gender. Five main themes were identified: violence occurring beyond control in a particular situation translated into parent and patient's possible endangerment, the repetitive nature of violence, distress, ineffective communication, and management of violence and help-seeking. Repetitive violent episodes and tension made both the parent and patient feel uncontrollable. Parents had a perceived fear of adverse consequences such as being punished by receiving more retribution and they also had concerns related to their parental responsibility. Health professionals should be aware of the complexity of phenomena and the interplay of factors inducing violence. A comprehensive dyadic parent-child intervention is suggested for violence prevention. © 2013 John Wiley & Sons Ltd.

  17. Gender Differences in Emotional Risk for Self- and Other-Directed Violence among Externalizing Adults

    Science.gov (United States)

    Sadeh, Naomi; Javdani, Shabnam; Finy, M. Sima; Verona, Edelyn

    2012-01-01

    OBJECTIVE Women and men generally differ in how frequently they engage in other-and self-directed physical violence and may show distinct emotional risk factors for engagement in these high-impact behaviors. To inform this area, we investigated gender differences in the relationship of emotional tendencies (i.e., anger, hostility, and anhedonic depression) that may represent risk for other-directed (i.e., physical fighting, attacking others unprovoked) and self-directed violence (i.e., self-injury, suicide attempts). METHOD The ethnically-diverse sample consisted of 372 adults (252 men and 120 women ages 18–55) with a history of criminal convictions. Facets of emotional risk assessed with the Aggression Questionnaire (Buss & Warren, 2000) and Mood and Anxiety Symptom Questionnaire (Watson et al., 1995) were entered simultaneously as explanatory variables in regression analyses to investigate their unique contributions to other- and self-directed physical violence in men and women. RESULTS Analyses revealed anhedonic depressive tendencies negatively predicted other-directed violence and positively predicted self-directed violence in both men and women, consistent with a model of depression in which aggression is turned inwards (Henriksson et al., 1993). Gender differences, however, emerged for the differential contributions of anger and hostility to other-and self-directed violence. Specifically, trait anger (i.e., difficulty controlling one’s temper) was associated with other-directed violence selectively in men, whereas trait hostility (i.e., suspiciousness and alienation) was associated with self- and other-directed violence among women. CONCLUSIONS The divergent findings for trait anger and hostility underscore the need to examine gender-specific risk factors for physical violence to avoid excluding potentially useful clinical features of these mental health outcomes. PMID:21261437

  18. Weight Stigma Goes Viral on the Internet: Systematic Assessment of YouTube Comments Attacking Overweight Men and Women.

    Science.gov (United States)

    Jeon, Yongwoog Andrew; Hale, Brent; Knackmuhs, Eric; Mackert, Michael

    2018-03-20

    Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled "Fat Girl Tinder Date" and "Fat Guy Tinder Date." The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Our data elucidate a worrying situation of frequent disinhibited

  19. Weight Stigma Goes Viral on the Internet: Systematic Assessment of YouTube Comments Attacking Overweight Men and Women

    Science.gov (United States)

    Hale, Brent; Knackmuhs, Eric; Mackert, Michael

    2018-01-01

    Background Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. Objective This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). Methods This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled “Fat Girl Tinder Date” and “Fat Guy Tinder Date.” The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. Results First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Conclusions Our data

  20. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    International Nuclear Information System (INIS)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-01-01

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarm rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.

  1. Alcohol Consumption and Violence among Argentine Adolescents

    Directory of Open Access Journals (Sweden)

    Mariaelena Pierobon

    2013-01-01

    Full Text Available Objective: This study investigated the association between alcohol and violence among Argentine youth. Methods: Data from the 2007 Argentina Global School-based Student Health Survey (GSHS, a nationally representative survey of middle school students, were examined using age-adjusted logistic regression models. Results: Of the 1,328 participating students aged 13 to 15 years old, 51.9% reported drinking alcohol in the previous month, with higher rates among males (p = 0.04 and older students (p < 0.01. Both male and female drinkers were nearly twice as likely as non-drinkers to report being physically attacked, being in a physical fight, and having thoughts about self-directed violence. Among drinkers, those who reported poor mental health, were victims of bullying, used tobacco or drugs, or skipped school without per- mission were approximately twice as likely as other drinkers to have engaged in violent activities. Conclusion: Public health interventions targeting violence among young adolescents should be developed in combination with alcohol education programs. Resumo: Objetivo: Este estudo investigou a associação entre álcool e violência na população de jovens argentinos. Métodos: Dados da Global School-based Student Health Survey (GSHS de 2007, uma pesquisa representativa em termos nacionais com alunos do ensino médio, foram exami- nados utilizando-se modelos de regressão logística ajustados por idade. Resultados: Dos 1328 alunos participantes entre 13 e 15 anos de idade, 51,9% declararam ter consumido álcool no último mês, com taxas mais elevadas entre meninos (p = 0,04 e alunos mais velhos (p < 0,01. Homens e mulheres que bebem demonstraram estar quase duas vezes mais propensos a relatar agressão física, quando em uma briga física, e pensamentos sobre violência autoinfligida do que aqueles que não bebem. Entre as pessoas que bebem, aquelas que reportaram saúde mental precária, haviam sido vítimas de bullying

  2. Comparative Analysis of Fusion Center Outreach to Fire and EMS Agencies

    Science.gov (United States)

    2015-12-01

    Mumbai attacks. Fire and emergency management service (EMS) personnel are now trained and prepared for an ever-increasing range of threats...transit attacks in London and Madrid, as well as the hybrid targeted violence5 similar to the 2008 Mumbai attacks. Fire and EMS personnel are now...protecting patient medical records, they lack the culture and work process to handle sensitive or secure intelligence and security information. Many

  3. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  4. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  5. Adolescent perceptions of violence: formative research findings from a social marketing campaign to reduce violence among middle school youth.

    Science.gov (United States)

    Quinn, G P; Bell-Ellison, B A; Loomis, W; Tucci, M

    2007-05-01

    To identify the specific barriers and benefits of violent behaviours as noted by middle school youth and to develop a social marketing campaign that attends to the needs and wants of the target audience. A non-experimental, qualitative study design was used to assess youth perceptions of violence in a large, southeast urban school district. Using a social marketing approach, a series of in-depth interviews were conducted with middle school youths, to gain an understanding of perceived barriers and benefits of violent behaviours. Additionally, interviews assessed youth preferences for an effective spokesperson for an anti-violence campaign. Qualitative analysis of coded transcripts revealed key themes that were incorporated into a multi-media initiative. Critical themes of the research highlighted that the majority of violence occurs at school, during school hours and most of the youths believed the use of violence was necessary to defend themselves from other peers or to protect family members. Another key finding pertained to adolescent views on violent people; although the majority of respondents reported engaging in violent acts, they did not view themselves as violent. Results were used to inform the development of a social marketing campaign designed to reduce youth violence among middle school students in a large, urban central Florida school district. Findings from the formative research led to the creation and pre-testing of five potential campaign brands. The campaign slogan that tested best with the target audience emphasized the choice youth have to either engage in violent behaviour and suffer the consequences or to 'rise above' physical conflict and reap the benefits.

  6. A Framework for Violence: Clarifying the Role of Motivation in Lone-Actor Terrorism

    Science.gov (United States)

    2017-03-01

    percent), personal crises that might make a person receptive to violent thought or action (98 percent for school attackers and around 50 percent for...likely to verbalize intent to commit violence to friends/family/wider audience , have others aware of their grievance, express a desire to hurt others...Unabomber (Theodore Kaczynski) or Jared Loughner, is likely not receptive to moderate narratives that do not address the unique combination of personal

  7. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  8. Parental desensitization to violence and sex in movies.

    Science.gov (United States)

    Romer, Daniel; Jamieson, Patrick E; Bushman, Brad J; Bleakley, Amy; Wang, Anli; Langleben, Daniel; Jamieson, Kathleen Hall

    2014-11-01

    To assess desensitization in parents' repeated exposure to violence and sex in movies. A national US sample of 1000 parents living with at least 1 target child in 1 of 3 age groups (6 to 17 years old) viewed a random sequence of 3 pairs of short scenes with either violent or sexual content from popular movies that were unrestricted to youth audiences (rated PG-13 or unrated) or restricted to those under age 17 years without adult supervision (rated R). Parents indicated the minimum age they would consider appropriate to view each film. Predictors included order of presentation, parent and child characteristics, and parent movie viewing history. As exposure to successive clips progressed, parents supported younger ages of appropriate exposure, starting at age 16.9 years (95% confidence interval [CI], 16.8 to 17.0) for violence and age 17.2 years (95% CI, 17.0 to 17.4) for sex, and declining to age 13.9 years (95% CI, 13.7 to 14.1) for violence and 14.0 years (95% CI, 13.7 to 14.3) for sex. Parents also reported increasing willingness to allow their target child to view the movies as exposures progressed. Desensitization was observed across parent and child characteristics, violence toward both human and non-human victims, and movie rating. Those who frequently watched movies were more readily desensitized to violence. Parents become desensitized to both violence and sex in movies, which may contribute to the increasing acceptance of both types of content by both parents and the raters employed by the film industry. Copyright © 2014 by the American Academy of Pediatrics.

  9. Sleep Deprivation Attack Detection in Wireless Sensor Network

    Science.gov (United States)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  10. Workplace violence among female sex workers who use drugs in Vancouver, Canada: does client-targeted policing increase safety?

    Science.gov (United States)

    Prangnell, Amy; Shannon, Kate; Nosova, Ekaterina; DeBeck, Kora; Milloy, M-J; Kerr, Thomas; Hayashi, Kanna

    2018-02-01

    Workplace violence, by clients or predators, poses serious negative health consequences for sex workers. In 2013, the Vancouver (British Columbia), Canada Police Department changed their guidelines with the goal of increasing safety for sex workers by focusing law enforcement on clients and third parties, but not sex workers. We sought to examine the trends and correlates of workplace violence among female sex workers (FSW) before and after the guideline change, using data collected from prospective cohorts of persons who use illicit drugs in Vancouver, Canada. Among 259 FSW, 21.0% reported workplace violence at least once during the study period between 2008 and 2014. There was no statistically significant change in rates of workplace violence after the guideline change. In our multivariable analysis, daily heroin use was independently associated with workplace violence. The 2013 policing guideline change did not appear to have resulted in decreased reports of workplace violence. Increased access to opioid agonist therapies may reduce workplace violence among drug-using FSW.

  11. Management of violence in the workplace: a New Zealand survey.

    Science.gov (United States)

    Gale, C; Pellett, O; Coverdale, J; Paton Simpson, G

    2002-01-01

    To estimate the rate of adverse events to staff, to survey the use of various preventative measures, and to assess any association between these factors and the reported event rate. An anonymous postal nation-wide survey of violence reported to managers of psychiatric units in New Zealand. The mean rate of adverse event per 100 full time equivalent staff was 16.2 (range 0-187) for property damage, 16.3 (range 0-204) for attempted assault, 12 (range 0-194) for physical attack, 1.3 (range 0-33) for sexual harassment and 1.1 (range 0-17) for stalking. Inpatient units, the use of pocket alarms, and training in de-escalation were associated highly with an increase risk of adverse events. There is a high variation in the rate of violence. The issue of increased rate of events with certain interventions will require further research.

  12. Resilience and Vulnerability in the Midst of Sociopolitical Violence in Northern Ireland: One Family's Experience of a Paramilitary Style Assault

    Science.gov (United States)

    Coulter, Stephen; Mullin, Anne

    2012-01-01

    This article focuses on the experience of one particular family living amid the sociopolitical violence in Northern Ireland to illustrate the impact of a particular traumatic event--a paramilitary assault due to mistaken identity. These attacks are often colloquially referred to as "punishment shootings" or "beatings." The…

  13. Terminal attack trajectories of peregrine falcons are described by the proportional navigation guidance law of missiles.

    Science.gov (United States)

    Brighton, Caroline H; Thomas, Adrian L R; Taylor, Graham K

    2017-12-19

    The ability to intercept uncooperative targets is key to many diverse flight behaviors, from courtship to predation. Previous research has looked for simple geometric rules describing the attack trajectories of animals, but the underlying feedback laws have remained obscure. Here, we use GPS loggers and onboard video cameras to study peregrine falcons, Falco peregrinus , attacking stationary targets, maneuvering targets, and live prey. We show that the terminal attack trajectories of peregrines are not described by any simple geometric rule as previously claimed, and instead use system identification techniques to fit a phenomenological model of the dynamical system generating the observed trajectories. We find that these trajectories are best-and exceedingly well-modeled by the proportional navigation (PN) guidance law used by most guided missiles. Under this guidance law, turning is commanded at a rate proportional to the angular rate of the line-of-sight between the attacker and its target, with a constant of proportionality (i.e., feedback gain) called the navigation constant ( N ). Whereas most guided missiles use navigation constants falling on the interval 3 ≤ N ≤ 5, peregrine attack trajectories are best fitted by lower navigation constants (median N law could find use in small visually guided drones designed to remove other drones from protected airspace. Copyright © 2017 the Author(s). Published by PNAS.

  14. Defending majority voting systems against a strategic attacker

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Ben Haim, Hanoch

    2013-01-01

    Voting systems used in technical and tactical decision making in pattern recognition and target detection, data handling, signal processing, distributed and secure computing etc. are considered. A maxmin two period game is analyzed where the defender first protects and chooses units for participation in voting. The attacker thereafter attacks a subset of units. It is shown that when the defender protects all the voting units, the optimal number of units chosen for voting is either one or the maximal possible odd number. When the defender protects only the units chosen for voting, the optimal number of chosen units increases with the defender resource superiority (i.e., more resources than the attacker) and with probability of providing correct output by any unit. The system success probability always increases in the total number of voting units, the defender–attacker resource ratio, and the probability that each voting unit produces a correct output. The system success probability increases in the attacker–defender contest intensity if the defender achieves per-unit resource superiority, and otherwise decreases in the contest intensity. The presented model and enumerative algorithm allow obtaining optimal voting system defense strategy for any combination of parameters: total number of units, attack and defense resources, unit success probability and contest intensity.

  15. HIV and Childhood Sexual Violence: Implications for Sexual Risk Behaviors and HIV Testing in Tanzania.

    Science.gov (United States)

    Chiang, Laura F; Chen, Jieru; Gladden, Matthew R; Mercy, James A; Kwesigabo, Gideon; Mrisho, Fatma; Dahlberg, Linda L; Nyunt, Myo Zin; Brookmeyer, Kate A; Vagi, Kevin

    2015-10-01

    Prior research has established an association between sexual violence and HIV. Exposure to sexual violence during childhood can profoundly impact brain architecture and stress regulatory response. As a result, individuals who have experienced such trauma may engage in sexual risk-taking behavior and could benefit from targeted interventions. In 2009, nationally representative data were collected on violence against children in Tanzania from 13-24 year old respondents (n=3,739). Analyses show that females aged 19-24 (n=579) who experienced childhood sexual violence, were more likely to report no/infrequent condom use in the past 12 months (AOR=3.0, CI [1.5, 6.1], p=0.0017) and multiple sex partners in the past 12 months (AOR=2.3, CI [1.0, 5.1], p=0.0491), but no more likely to know where to get HIV testing or to have ever been tested. Victims of childhood sexual violence could benefit from targeted interventions to mitigate impacts of violence and prevent HIV.

  16. The Temporal Association between Substance Use and Intimate Partner Violence among Women Arrested for Domestic Violence

    Science.gov (United States)

    Stuart, Gregory L.; Moore, Todd M.; Elkins, Sara R.; O’Farrell, Timothy J.; Temple, Jeff R.; Ramsey, Susan; Shorey, Ryan C.

    2013-01-01

    Objective There is a paucity of research on the temporal association between substance use and intimate partner violence (IPV) perpetration and victimization, especially among women arrested for domestic violence. The current study examined whether the probability of IPV perpetration and victimization increases following alcohol or drug use relative to days of no use among women arrested for domestic violence. Method Women arrested for domestic violence and court referred to batterer intervention programs who met criteria for hazardous drinking participated in the current study (N=105). Women who reported drinking four or more drinks on one occasion at least once per month for the past six months were considered hazardous drinkers. Violence and substance use were assessed with the Timeline Followback Interviews for substance use and IPV. Results Women were more likely to perpetrate physical violence on a drinking day (OR=10.58; 95% CI=5.38–20.79) and on a heavy drinking day (OR=12.81; 95% CI=8.10–33.57), relative to a non-drinking day. Women were more likely to be victimized by physical violence on a drinking day (OR=5.22; 95% CI=2.79–9.77) and on a heavy drinking day (OR=6.16; 95% CI=3.25–11.68), relative to a non-drinking day. They were more likely to be victims of sexual coercion (OR=6.06; 95% CI=1.19–30.80) on a cocaine use day relative to a non-use day. Conclusions Alcohol use was temporally associated with physical violence perpetration and victimization, and cocaine use was temporally associated with sexual coercion victimization, suggesting that substance use should be targeted in batterer intervention programs for women. PMID:23647284

  17. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  18. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  19. School-based violence prevention strategy: a pilot evaluation.

    Science.gov (United States)

    Thakore, Rachel V; Apfeld, Jordan C; Johnson, Ronald K; Sathiyakumar, Vasanth; Jahangir, A Alex; Sethi, Manish K

    2015-07-01

    Violence has recently been reported among a primarily young, minority population in Nashville, Tennessee. School-based programs have been proven as effective methods of reducing violent behavior, beliefs, and actions that lead to violence among adolescents. Investigators implemented a rigorous search for an appropriate school-based violence prevention program for Metropolitan Nashville middle school students utilizing a systematic review and discussion group with victims of violence. 27 programs nation-wide were reviewed and 2 discussion groups with African American males under the age of 25 admitted to a level 1 trauma center for assault-related injuries were conducted. Our findings led to a single, evidence-based conflict resolution program. In conjunction with educators, we evaluated the program's effectiveness in a pilot study in a Nashville middle school with high rates of violence. 122 students completed the conflict resolution program and described their behavior and experiences with violence in a pre-test/post-test self-rate questionnaire. Results showed a significant decrease in violent behavior and an increase in students' competencies to deal with violence (p less than 0.05). This study shows that a reduction in violent behavior and beliefs among middle school students can be achieved through the implementation of a targeted violence intervention program. A larger-scale intervention is needed to develop more conclusive evidence of effectiveness. © 2015 KUMS, All rights reserved.

  20. An Inquiry into the Use of Illegal Electoral Practices and Effects of Political Violence

    OpenAIRE

    Roxana Gutiérrez-Romero

    2012-01-01

    This article investigates whether vote-buying and the instigation of violence in the disputed 2007 Kenyan elections were strategically motivated, and whether those affected by electoral violence changed their views towards ethno-politics and the use of violence. To answer these questions, a panel survey conducted before and after the elections is combined with external indicators of electoral violence. We find that political parties targeted vote-buying towards specific groups to weaken the s...

  1. Homicidal violence during foreign military missions - prevention and legal issues

    Directory of Open Access Journals (Sweden)

    G T Okulate

    2006-03-01

    Full Text Available Objectives. The study involved Nigerian soldiers engaged in peacekeeping missions in Liberia and Yugoslavia. Using case illustrations, the study sought to describe patterns of homicidal violence among soldiers from the same country or soldiers from allied forces, and to suggest possible reasons for the attacks. Design and setting. Nigeria was actively involved in peacekeeping missions in Liberia between 1990 and 1996. During this period, intentional homicidal attacks occurred among the Nigerian military personnel. Post- homicidal interviews conducted among the perpetrators were combined with evidence obtained at military courts to produce the case studies. Subjects. Six Nigerian military personnel who attacked other Nigerians or soldiers from allied forces, with homicidal intent. Results. Possible predisposing and precipitating factors for these attacks were highlighted. The possibility of recognising these factors before embarking on overseas missions was discussed, so that preventive measures could be instituted as far as possible. Finally, medico-legal implications of homicide in the military were discussed. Conclusions. A certain degree of pre-combat selection is essential to exclude soldiers with definite severe psychopathology. A clearly defined length of duty in the mission areas and adequate communication with home could reduce maladjustment. Health personnel deployed to mission areas should be very conversant with mental health issues so that early recognition of psychological maladjustment is possible.

  2. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

    Directory of Open Access Journals (Sweden)

    Chundong Wang

    2018-03-01

    Full Text Available With the development of the Internet-of-Things (IoT, wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI. This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI. Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

  3. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

    Science.gov (United States)

    Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-03-15

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

  4. Trivializing violence

    DEFF Research Database (Denmark)

    Henriksen, Ann-Karina Eske; Bengtsson, Tea Torbenfeldt

    2018-01-01

    This article analyzes narratives of violence based on interviews with 43 marginalized young Danish people. Their narratives reveal that violence is not only experienced as singular, dramatic encounters; violence is also trivialized in their everyday lives. By drawing on anthropological perspectives...... on everyday violence, we propose a sensitizing framework that enables the exploration of trivialized violence. This framework integrates three perspectives on the process of trivialization: the accumulation of violence; the embodiment of violence; and the temporal and spatial entanglement of violence....... This analysis shows how multiple experiences of violence—as victim, witness, or perpetrator—intersect and mutually inform each other, thereby shaping the everyday lives and dispositions of the marginalized youth. The concept of trivialized violence is a theoretical contribution to cultural and narrative...

  5. Depressive Symptoms Moderate Dating Violence Prevention Outcomes Among Adolescent Girls.

    Science.gov (United States)

    Collibee, Charlene; Rizzo, Christie J; Kemp, Kathleen; Hood, Erik; Doucette, Hannah; Gittins Stone, Daniel I; DeJesus, Brett

    2018-04-01

    Few dating violence prevention programs assess how variations in initial violence risk affects responsiveness. This study examines the efficacy of Date SMART, a dating violence and sexual risk prevention program designed to target high-risk adolescent girls, in preventing dating violence in the context of varying initial levels of depressive symptoms. A diverse sample of N = 109 female adolescents with a history of physical dating violence participated in a randomized controlled trial of the Date SMART program and a knowledge only (KO) comparison. Using baseline depression level as a primary risk factor, a series of multilevel models revealed significant main effects of baseline depression such that higher baseline depression was associated with greater physical dating violence perpetration and victimization. Results also showed a three-way interaction for assessment point, depressive symptoms, and condition for physical dating violence perpetration. Specifically, those with higher baseline depression in Date SMART showed significantly less physical dating violence perpetration at follow-ups compared with those with higher baseline depression in the KO group. This difference in violence reduction between conditions was not observed for those with lower baseline depression. Date SMART appears to effectively reduce physical dating violence perpetration in those with higher levels of initial risk. Current findings support that adolescents with different risk profiles respond differently to violence prevention programs.

  6. Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

    Directory of Open Access Journals (Sweden)

    Ming Li

    2008-01-01

    Full Text Available The aim of distributed denial-of-service (DDOS flood attacks is to overwhelm the attacked site or to make its service performance deterioration considerably by sending flood packets to the target from the machines distributed all over the world. This is a kind of local behavior of traffic at the protected site because the attacked site can be recovered to its normal service state sooner or later even though it is in reality overwhelmed during attack. From a view of mathematics, it can be taken as a kind of short-range phenomenon in computer networks. In this paper, we use the Hurst parameter (H to measure the local irregularity or self-similarity of traffic under DDOS flood attack provided that fractional Gaussian noise (fGn is used as the traffic model. As flood attack packets of DDOS make the H value of arrival traffic vary significantly away from that of traffic normally arriving at the protected site, we discuss a method to statistically detect signs of DDOS flood attacks with predetermined detection probability and false alarm probability.

  7. Men's violence against women and men are inter-related: Recommendations for simultaneous intervention

    Science.gov (United States)

    Fleming, Paul J.; Gruskin, Sofia; Rojo, Florencia; Dworkin, Shari L.

    2015-01-01

    Men are more likely than women to perpetrate nearly all types of interpersonal violence (e.g. intimate partner violence, murder, assault, rape). While public health programs target prevention efforts for each type of violence, there are rarely efforts that approach the prevention of violence holistically and attempt to tackle its common root causes. Drawing upon theories that explain the drivers of violence, we examine how gender norms, including norms and social constructions of masculinity, are at the root of most physical violence perpetration by men against women and against other men. We then argue that simply isolating each type of violence and constructing separate interventions for each type is inefficient and less effective. We call for recognition of the commonalities found across the drivers of different types of violence and make intervention recommendations with the goal of seeking more long-standing solutions to violence prevention. PMID:26482359

  8. A cycle of violence? Examining family-of-origin violence, attitudes, and intimate partner violence perpetration.

    Science.gov (United States)

    Eriksson, Li; Mazerolle, Paul

    2015-03-01

    Exposure to violence in the family-of-origin has consistently been linked to intimate partner violence (IPV) perpetration in adulthood. However, whether the transmission of violence across generations is role- and gender-specific still remains unclear. The current study examined the effects of experiencing child abuse and observing parental violence on IPV perpetration among a sample of male arrestees (N = 303). The differential effects of observing violence perpetrated by same-sex (father to mother), opposite-sex (mother to father), and both parents on subsequent IPV perpetration were examined. Logistic regression analyses showed that while observing father-only violence and bidirectional interparental violence was predictive of IPV perpetration, observing mother-only violence and direct experiences of child abuse was not. These findings suggest that the transmission of violence across generations is both role- and gender-specific and highlight the importance of examining unique dimensions of partner violence to assess influences on children. The study further examined whether attitudes justifying wife beating mediate the effect of exposure to violence and subsequent IPV perpetration. Results showed that although attitudes were predictive of perpetration, these attitudes did not mediate the relationship. © The Author(s) 2014.

  9. Terrorism in the Basque press (1990, 2000, 2008 and 2009. Analysis of newspaper editorials about ETA’s fatal attacks

    Directory of Open Access Journals (Sweden)

    José-María Caminos-Marcet, Ph.D.

    2013-01-01

    Full Text Available This article presents an analysis of the editorials published by the Basque press in 1990, 2000, 2008 and 2009, when ETA carried out fatal attacks. The objective is to examine the treatment given by the different Basque newspapers to terrorism in their most important opinion texts, which reflect their ideology. The initial hypothesis is that the editorial line used by the Basque press to address ETA’s attacks has changed remarkably during the analysed years, going from the virtual absence of editorials to the use of editorials as active instruments in the fight against violence. By 2009, the Basque press had finally defined its strategy to combat ETA’s terrorism, and this was perfectly reflected in their editorials.

  10. Defense Against Rocket Attacks in the Presence of False Cues

    National Research Council Canada - National Science Library

    Harari, Lior

    2008-01-01

    Rocket attacks on civilian and military targets, from both Hezbollah (South Lebanon) and Hamas (Gaza strip) have been causing a major operational problem for the Israeli Defense Force for over two decades...

  11. A systematic review of training interventions addressing sexual violence against marginalized at-risk groups of women.

    Science.gov (United States)

    Kouta, Christiana; Pithara, Christalla; Zobnina, Anna; Apostolidou, Zoe; Christodoulou, Josie; Papadakaki, Maria; Chliaoutakis, Joannes

    2015-12-01

    Women from marginalized groups working in occupations such as domestic work are at increased risk for sexual violence. Scarce evidence exists about training interventions targeting such groups. The article aims to identify community and workplace-based training interventions aiming to increase capacity among marginalized at-risk women to deal with sexual violence. A systematic review was applied. Inclusion criteria were English language published between 2003 and 2013; reporting on delivery and/or evaluation; focusing on any form of sexual violence; delivered to professionals, affected or at-risk women; targeting migrant, at-risk women or domestic workers. Data were extracted on the setting, content, evaluation process and target population. Four studies which focused on prevention or responding to sexual violence were included. One study provided sexual violence training to vulnerable female and one provided a HIV prevention intervention to marginalized women. Learning objectives included increasing knowledge around issues of sexual violence and/or gender and human rights, prevention and response strategies. Two studies aimed to train trainers. All studies conducted an outcome evaluation and two a process evaluation. It seems there is a gap on participatory empowerment training for marginalized women. Community train-the-trainer interventions are imperative to protect themselves and deal with the risk of sexual violence. © The Author 2015. Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  12. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  13. Challenging Behavior, Parental Conflict and Community Violence in Students with Aggressive Behavior

    Directory of Open Access Journals (Sweden)

    Angel Alberto Valdés Cuervo

    2018-02-01

    Full Text Available The effects of the presence of challenging behavior problems, parental conflict and violence in the community were determined by the probability of occurrence of bullying behaviors in elementary students. 664 students participated in the study, of whom 80 (12.04% were identified as aggressors. 80 students with no reports of attacks were later selected randomly for comparison. Using logistic regression, it was found that the variables studied manifest significant differences between the student groups with and without aggressive behavior toward peers (R2 = .39. Challenging behavior (OR = 7.83, parental conflict (OR = 3.77 and Community Violence (OR = 5.36 increase the probability of belonging to the group of aggressors. We conclude that it is necessary to analyze the bullying from an ecological framework that considers variables located in the contexts in which individuals interact.

  14. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    ...) attacks targeting its management and media access protocols Computer simulation models have proven to be effective tools in the study of cause and effect in numerous fields This thesis involved the design and implementation of a IEEE 8O2.11-based simulation model using OMNeT++, to investigate the effects of different types of DoS attacks on a IEEE 8O2.11 network, and the effectiveness of corresponding countermeasures.

  15. Domestic violence and violence against children in Ghana 2015

    OpenAIRE

    Mueller, Catherine; Tranchant, Jean-Pierre; Oosterhoff, Pauline

    2016-01-01

    This paper investigates how domestic violence relates to violence against children, including severe corporal punishment. The literature suggests a link between intimate partner violence in the household and child abuse and maltreatment. Studies are, however, limited by the use of narrowly defined measures of violence against children, data availability, and a lack of characterization of domestic violence. In this paper we use original data on domestic violence and child disciplining methods ...

  16. Acts of terrorism and mass violence targeting schools : Analysis and implications for preparedness in the USA.

    Science.gov (United States)

    Schlegelmilch, Jeff; Petkova, Elisaveta; Martinez, Stephanie; Redlener, Irwin

    2017-01-01

    To enhance the preparedness of US schools to acts of terrorism and mass violence, the landscape of threats against schools must first be understood. This includes exploring the global trends of acts of terrorism against schools, as well as looking specifically at the history of terrorism and acts of mass violence against schools domestically. This paper conducts a review of two databases in order to look at the trends in acts of terrorism and mass violence carried out against schools, and provides recommendations for domestic school preparedness based on this information.

  17. The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Fengli [Univ. of Arkansas, Fayetteville, AR (United States); Li, QInghua [Univ. of Arkansas, Fayetteville, AR (United States); Mantooth, Homer Alan [Univ. of Arkansas, Fayetteville, AR (United States); Ross, Chase [Univ. of Arkansas, Fayetteville, AR (United States); Yang, Jing [Univ. of Arkansas, Fayetteville, AR (United States); Di, Jia [Univ. of Arkansas, Fayetteville, AR (United States); Balda, Juan Carlos [Univ. of Arkansas, Fayetteville, AR (United States)

    2016-04-02

    According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.

  18. Violence against female sex workers in Karnataka state, south India: impact on health, and reductions in violence following an intervention program

    Directory of Open Access Journals (Sweden)

    Beattie Tara SH

    2010-08-01

    Full Text Available Abstract Background Violence against female sex workers (FSWs can impede HIV prevention efforts and contravenes their human rights. We developed a multi-layered violence intervention targeting policy makers, secondary stakeholders (police, lawyers, media, and primary stakeholders (FSWs, as part of wider HIV prevention programming involving >60,000 FSWs in Karnataka state. This study examined if violence against FSWs is associated with reduced condom use and increased STI/HIV risk, and if addressing violence against FSWs within a large-scale HIV prevention program can reduce levels of violence against them. Methods FSWs were randomly selected to participate in polling booth surveys (PBS 2006-2008; short behavioural questionnaires administered anonymously and integrated behavioural-biological assessments (IBBAs 2005-2009; administered face-to-face. Results 3,852 FSWs participated in the IBBAs and 7,638 FSWs participated in the PBS. Overall, 11.0% of FSWs in the IBBAs and 26.4% of FSWs in the PBS reported being beaten or raped in the past year. FSWs who reported violence in the past year were significantly less likely to report condom use with clients (zero unprotected sex acts in previous month, 55.4% vs. 75.5%, adjusted odds ratio (AOR 0.4, 95% confidence interval (CI 0.3 to 0.5, p Conclusions This program demonstrates that a structural approach to addressing violence can be effectively delivered at scale. Addressing violence against FSWs is important for the success of HIV prevention programs, and for protecting their basic human rights.

  19. Violence against women: the perspective of academic women.

    Science.gov (United States)

    Kalaca, Sibel; Dundar, Pınar

    2010-08-17

    Opinion surveys about potential causes of violence against women (VAW) are uncommon. This study explores academic women's opinions about VAW and the ways of reducing violence. Quantitative and qualitative methods were used in this descriptive study. One hundred-and-fifteen academicians participated in the study from two universities. A questionnaire was used regarding the definition and the causes of VAW, the risk groups and opinions about the solutions. Additionally, two authors interviewed 8 academicians from universities other than that of the interviewing author. Academicians discussed the problem from the perspective of "gender-based violence" rather than "family violence". The majority of the participants stated that nonworking women of low socioeconomic status are most at risk for VAW. They indicated that psychological violence is more prevalent against educated women, whilst physical violence is more likely to occur against uneducated and nonworking women. Perpetrator related factors were the most frequently stated causes of VAW. Thirty-five percent of the academicians defined themselves as at risk of some act of VAW. Recommendations for actions against violence were empowerment of women, increasing the educational levels in the society, and legal measures. Academic women introduced an ecological approach for the explanation of VAW by stressing the importance of taking into account the global context of the occurrence of VAW. Similar studies with various community members -including men- will help to define targeted interventions.

  20. Consumo de álcool e violência entre adolescentes argentinos Alcohol consumption and violence among Argentine adolescents

    Directory of Open Access Journals (Sweden)

    Mariaelena Pierobon

    2013-02-01

    Full Text Available OBJETIVO: Este estudo investigou a associação entre álcool e violência na população de jovens argentinos. MÉTODOS: Dados da Global School-based Student Health Survey (GSHS de 2007, uma pesquisa representativa em termos nacionais com alunos do ensino médio, foram examinados utilizando-se modelos de regressão logística ajustados por idade. RESULTADOS: Dos 1328 alunos participantes entre 13 e 15 anos de idade, 51,9% declararam ter consumido álcool no último mês, com taxas mais elevadas entre meninos (p = 0,04 e alunos mais velhos (p OBJECTIVE: This study investigated the association between alcohol and violence among Argentine youth. METHODS: Data from the 2007 Argentina Global School-based Student Health Survey (GSHS, a nationally representative survey of middle school students, were examined using age-adjusted logistic regression models. RESULTS: Of the 1,328 participating students aged 13 to 15 years old, 51.9% reported drinking alcohol in the previous month, with higher rates among males (p = 0.04 and older students (p < 0.01. Both male and female drinkers were nearly twice as likely as non-drinkers to report being physically attacked, being in a physical fight, and having thoughts about self-directed violence. Among drinkers, those who reported poor mental health, were victims of bullying, used tobacco or drugs, or skipped school without permission were approximately twice as likely as other drinkers to have engaged in violent activities. CONCLUSION: Public health interventions targeting violence among young adolescents should be developed in combination with alcohol education programs.

  1. Domestic violence

    Science.gov (United States)

    ... violence; Spousal abuse; Elder abuse; Child abuse; Sexual abuse - domestic violence ... 2016. National Domestic Violence Hotline website. What is domestic violence? www.thehotline.org/is-this-abuse/abuse-defined . Accessed July 10, 2016.

  2. Effects of nurse-led child- and parent-focused violence intervention on mentally ill adult patients and victimized parents: A randomized controlled trial.

    Science.gov (United States)

    Sun, Gwo-Ching; Hsu, Mei-Chi

    2016-08-01

    Child-to-parent violence is an often hidden serious problem for parental caregivers of mentally ill adult children who experience violence toward them. To date, the comprehensive dyadic parent-adult child intervention to manage child-to-parent violence is scarce. To evaluate the effect of Child- and Parent-focused Violence Program, an adjunctive intervention involved with both violent adult children with mental illness and their victimized biological parent (parent-adult child dyads) on violence management. Open-label randomized controlled trial. A psychiatric ward in a teaching hospital and two mental hospitals in Southern Taiwan. Sixty-nine patients aged ≥20 years, with thought or mood disorders, having violent behavior in the past 6 months toward their biological parent of either gender were recruited. The violent patients' victimized biological parents who had a major and ongoing role in provision of care to these patients, living together with and being assaulted by their violent children were also recruited. The parent-adult child dyads were selected. The intervention was carried out from 2011 to 2013. The parent-adult child dyads were randomly assigned to either the experimental group (36 dyads), which received Child- and Parent-focused Violence Intervention Program, or to the control group (33 dyads), which received only routine psychiatric care. The intervention included two individualized sessions for each patient and parent, separately, and 2 conjoint sessions for each parental-child dyad for a total of 6 sessions. Each session lasted for at least 60-min. Data collection was conducted at 3 different time frames: pre-treatment, post-treatment, and treatment follow-up (one month after the completion of the intervention). Occurrence of violence prior to intervention was comparable between two groups: 88.9% (n=32) parents in the experimental group versus 93.9% (n=31) in the control group experienced verbal attack, and 50% (n=18) versus 48.5% (n=16

  3. Wartime Women Rape: A Means of Moral Attack and Emasculation in Lynn Nottage’s Ruined

    Directory of Open Access Journals (Sweden)

    Elaff Ganim Salih

    2016-05-01

    Full Text Available Women rape at warfare was considered a consequence of war in the social, literary and political world for a long period of time. Some criminals of rape escaped justice and others were persecuted on the basis that they were involved in mass rape because it was a natural consequence of war. But, women are targeted with rape in time of war because they are the symbolic representation of a culture, ethnicity, and the unifying fabric of their people and nation. The objective of this paper is to show that war rape is not a result of war; instead it is a means of human destruction through moral attack and emasculation. It aims to show that women rape in warfare is neither a misogynist act nor a sexual violence but it is a pre-planned weapon used strategically and systematically to fulfill certain political and military agenda. The study focuses on the sexual abuse of women in the Democratic Republic of Congo in time of war in Lynn Nottage’s Pulitzer Prize play, Ruined (2007. The study applies Jonathan Gottschall’s Strategic Rape theory, which highlights war rape as a pre-planned military strategy. The enemy emasculates men and attacks them morally by raping their women. Consequently, men’s failure to protect their women causes them to give up resistance, leave their lands and families because of shame and humiliation. The study concludes that women rape in time of war is a tactic followed by conquerors intentionally to facilitate and guarantee the achievement of certain pre-planned goals as was the case of mass rape in the DRC.

  4. Limited attacks on the United States and the Soviet Union

    International Nuclear Information System (INIS)

    Levi, B.; Hippel, F. von.

    1987-01-01

    This report is focused on calculations carried out at Princeton University of the consequences of so-called ''limited'' nuclear attacks by the USA and the USSR on one another - primarily because such scenarios seem to be motivating the acquisition of new nuclear weapons. The conclusions were: The use of only a fraction of the destructive capacity in USA and Soviet nuclear arsenals could have catastrophic consequences to human kind. Although the primary justification of the tens of thousands of nuclear warheads in USA and Soviet arsenals is their potential use against military targets, the most commonly discussed potential large-scale military uses of these weapons - in attacks against the nuclear weapons of the other side - would result in tens of millions of civilian casualties. Certainly, if a first strike resulted in such a huge civilian toll, there could be little assurance of restraint in the response of the country that was attacked. The use of even 1% of the strategic arsenals of the USSR or the USA against the population, military industry or strategic-nuclear targets of the other nation could result in tens of millions of casualties. 17 refs, 6 figs, 5 tabs

  5. Media violence.

    Science.gov (United States)

    Cantor, J

    2000-08-01

    Research on the effects of media violence is not well understood by the general public. Despite this fact, there is an overwhelming consensus in the scientific literature about the unhealthy effects of media violence. Meta-analyses show that media-violence viewing consistently is associated with higher levels of antisocial behavior, ranging from the trivial (imitative violence directed against toys) to the serious (criminal violence), with many consequential outcomes in between (acceptance of violence as a solution to problems, increased feelings of hostility, and the apparent delivery of painful stimulation to another person). Desensitization is another well-documented effect of viewing violence, which is observable in reduced arousal and emotional disturbance while witnessing violence, the reduced tendency to intervene in a fight, and less sympathy for the victims of violence. Although there is evidence that youth who are already violent are more likely to seek out violent entertainment, there is strong evidence that the relationship between violence viewing and antisocial behavior is bidirectional. There is growing evidence that media violence also engenders intense fear in children which often lasts days, months, and even years. The media's potential role in solutions to these problems is only beginning to be explored, in investigations examining the uses and effects of movie ratings, television ratings, and the V-chip, and the effects of media literacy programs and public education efforts. Future research should explore important individual differences in responses to media violence and effective ways to intervene in the negative effects.

  6. Needs and preferences for the prevention of intimate partner violence among Hispanics: a community's perspective.

    Science.gov (United States)

    Gonzalez-Guarda, R M; Cummings, A M; Becerra, M; Fernandez, M C; Mesa, I

    2013-08-01

    Research suggest that Hispanics in the U.S. are disproportionately affected by the consequences of intimate partner violence. Nevertheless, few intimate partner violence prevention interventions have been developed to address the unique needs and preferences of this population. The Partnership for Domestic Violence Prevention is a community-based participatory research project that assessed the needs and preferences for prevention programs for Hispanics in Miami-Dade County. Nine focus groups with domestic violence service providers, victims and general community members were conducted (N = 76). Four major themes emerged from the focus groups. These included immigrants and teens as the highest priority groups to target in prevention efforts, culture as a double-edged sword, the system that helps and hurts the victim, and the need for wide-scale prevention programs that would reach Hispanics systematically. The results from this study have important implications for the development of intimate violence prevention interventions targeting Hispanics in the U.S.

  7. Violence exposure and teen dating violence among African American youth.

    Science.gov (United States)

    Black, Beverly M; Chido, Lisa M; Preble, Kathleen M; Weisz, Arlene N; Yoon, Jina S; Delaney-Black, Virginia; Kernsmith, Poco; Lewandowski, Linda

    2015-07-01

    This study examines the relationships between exposure to violence in the community, school, and family with dating violence attitudes and behaviors among 175 urban African American youth. Age, gender, state support and experiences with neglect, school violence, and community violence were the most significant predictors of acceptance of dating violence. Experiences with community violence and age were important predictors of dating violence perpetration and victimization. Findings highlight the importance of planning prevention programs that address variables affecting attitudes and behaviors of high-risk youth who have already been exposed to multiple types of violence. © The Author(s) 2014.

  8. Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

    Directory of Open Access Journals (Sweden)

    Frank Yeong-Sung Lin

    2013-01-01

    Full Text Available Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.

  9. Libya: Transition and U.S. Policy

    Science.gov (United States)

    2016-04-20

    secular authoritarians. For a description of Libya’s political evolution over time, see ‎Appendix A. Libya’s Political Landscape Some observers have...national emergency declared in Executive Order 13566 based on the president’s finding that “the ongoing violence in Libya, including attacks by armed...patrol of coastal and maritime areas, and law enforcement efforts targeting migrant transport networks. Violence and insecurity in Libya

  10. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems.

    Science.gov (United States)

    Park, Subin; Lee, Yeeun; Jang, Hyesue; Jo, Minkyung

    2017-05-19

    We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES), exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  11. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  12. Physical violence among elderly: analysis of admissions to an emergency department.

    Science.gov (United States)

    Kılıç Öztürk, Yasemin; Düzenli, Erhan; Karaali, Cem; Öztürk, Faruk

    2017-01-01

    Physical violence is defined as deliberate use of physical force likely to result in trauma, bodily injury, pain, or impairment. Present study is pioneering effort to evaluate mechanisms and sociodemographic features of physical violence targeting the elderly in Turkey and to investigate preventive measures. Database records and forensic reports were analyzed in this retrospective study of 54 elderly patients with trauma as result of physical violence who were admitted to emergency department of Şanlıurfa Training and Research Hospital between January 2012 and July 2013. Of the 54 patients evaluated, 50 (92.4%) were male. History of experiencing previous violence was described by 55.6% (n=30) of the patients. Instances of repeat violence and firearm injuries most often occurred in the home (p=0.006, p=0.007). Need for surgical treatment was also greater among cases that occurred in the home (p=0.016). Firearm injury, recurrent violence, and surgical treatment rates were higher among cases that occurred in the home. Urgent preventive measures are especially needed for the elderly who have already been victims of physical violence.

  13. An approach to Identify the Risk Induced by Cyber-Attack on the Non-safety NPP I and C System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hee Eun; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Kim, Jong Hyun [Chosun University, Gwangju (Korea, Republic of); Son, Han Sung [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    In this study, influence of the attack on the non-safety system will be investigated, because the cyber-attack on the safety system cannot be accomplished easily. To identify the risk from cyber-attack, the result of PSA will be applied. Cyber-attack may cause other risks except for the core damage. Those risks also can be identified by applying this method. This study could be reinforced in a more realistic way if the information on the maintenance is considered, because certain type of cyber-attack could be detected during the maintenance. Also, possible set of wrong actions need to be selected, based on the knowledge of I and C system and its vulnerabilities because the hacker might not attack every information. To obtain the realistic result information that can be manipulated need to be listed, because the hacker may not attack certain information, not to be detected during the maintenance. In addition, by using the result of this study, the test plan for the cyber-attack can be suggested. If the scenario is given, the criteria for the test target selection can be obtained. It includes the target component and information.

  14. An approach to Identify the Risk Induced by Cyber-Attack on the Non-safety NPP I and C System

    International Nuclear Information System (INIS)

    Kim, Hee Eun; Kang, Hyun Gook; Kim, Jong Hyun; Son, Han Sung

    2016-01-01

    In this study, influence of the attack on the non-safety system will be investigated, because the cyber-attack on the safety system cannot be accomplished easily. To identify the risk from cyber-attack, the result of PSA will be applied. Cyber-attack may cause other risks except for the core damage. Those risks also can be identified by applying this method. This study could be reinforced in a more realistic way if the information on the maintenance is considered, because certain type of cyber-attack could be detected during the maintenance. Also, possible set of wrong actions need to be selected, based on the knowledge of I and C system and its vulnerabilities because the hacker might not attack every information. To obtain the realistic result information that can be manipulated need to be listed, because the hacker may not attack certain information, not to be detected during the maintenance. In addition, by using the result of this study, the test plan for the cyber-attack can be suggested. If the scenario is given, the criteria for the test target selection can be obtained. It includes the target component and information

  15. Gender and violence: Preliminary analysis on the student cases of secondary school in the south of Guanajuato

    Directory of Open Access Journals (Sweden)

    Rocío Rosas Vargas

    2013-01-01

    Full Text Available In this paper some preliminary results are presented, obtained by the application of several surveys between secondary school students. The main objective of this research was to quantify the different kinds of violence that could suffer Young female students in this educative level, as well as the relationship among violence living at home, violence living in their colonies and violence living at the school. Violence to women, girls and young ladies is a complex phenomenon and wide spread in Mexican Society, like official statistics reveal; and a good example are warning signs elaborated by the ENDIREH (National Survey over the Dynamic of the Relationships en the Household over 50% of the marriage women have suffer at least one event of gender violence. Violence on girls and young ladies could cause scholar desertion (Ayala,Zapata and Martínez, 2009 and this situation is mortgage for the families because, like Kabeer point out, education Access has a positive effect over daughters and sons. Is well known that women suffer more violence at household, but, women could suffer violence in other kind of places, like in their hometowns and schools. In community level, 40% of the women, who responses the ENDIREH affirmed they have suffer any type of violence; of this last group, 31% has undergo sexual abuse in their community, the rest of the sample (69% has felt intimidated in community environment. In this way, we can talk about women vulnerability. In Guanajuato state, this figure is a little bit lower, due to 35% of women, in the survey, have affirmed they suffer violence in the community environment. In this sense, 13.4% of women in the ENDIREH survey mentioned they have suffered violence at the school; however, this number is lower compared to national levels of violence at the schools, where 15.7% of women affirmed they have been attacked.

  16. Workplace violence and influencing factors among medical professionals in China.

    Science.gov (United States)

    Wu, Siying; Zhu, Wei; Li, Huangyuan; Lin, Shaowei; Chai, Wenli; Wang, Xiaorong

    2012-11-01

    Workplace violence has attracted increasing public attention over the past few decades in China. This study was conducted to evaluate the frequency of workplace violence in healthcare settings by various job titles and hospital departments, and to explore the related risk factors among Chinese medical professionals. A total of 2,464 medical professionals in 12 hospitals of two provinces were surveyed by using a stratified cluster sampling method. The Chinese version of the Workplace Violence Scale was used to measure the frequencies of workplace violence, classified as physical assault, emotional abuse, threat of assault, verbal sexual harassment and sexual assault experienced by the subjects over the previous 12 months. A structured questionnaire was administered to collect information on potentially influencing factors for workplace violence. Multivariate analysis was applied to determine the risk factors for workplace violence. About 50% of study subjects reported at least one type of workplace violence. The rates of experiencing two episodes or more of physical assault, emotional abuse, threat of assault, verbal sexual harassment, and sexual assault were 11%, 26%, 12%, 3%, and 1%, respectively. Identified risk factors for workplace violence included working in the departments of psychiatry, emergency, pediatrics and surgery, male gender, divorce/widowed status, long working hours (≥10 hr/day), and night shift. The study suggested that workplace violence occurs commonly in Chinese healthcare settings. Effective intervention strategies targeting workplace violence should be formulated in terms of major risk factors. Copyright © 2012 Wiley Periodicals, Inc.

  17. An overview of juveniles and school violence.

    Science.gov (United States)

    Murakami, Saori; Rappaport, Nancy; Penn, Joseph V

    2006-09-01

    Despite the relative rarity of school shootings, targeted violence, and school-associated violent deaths, any youth who presents with words, gestures, or actions of a threatening or violent nature in a school setting should be assessed and referred for further evaluation by a mental health professional and, if clinically indicated, a forensic evaluator.The request for a juvenile risk assessment for future dangerousness requires careful delineation of role and agency; confidentiality issues; a comprehensive diagnostic evaluation of the youth; and a detailed assessment of the youth's perceived threat or problematic behavior. Various protective and risk factors and consideration of other individual, family, school/peer, and situational factors should also be explored.There is still much information that is unknown when considering school violence or targeted school violence. There is clearly a need for additional research on the identification of at-risk youths, the contributions and significance of various protective and risk factors, the impact of peer relationships, and perceived rejection, socioeconomic status, subtypes of aggression, and developmental stages. Examples of future research direction might include difference by gender, presence of affective or psychotic disorders, substance abuse, emerging characterologic disturbances, and physiologic markers, such as cortisol or serotonin. Additional research regarding best practices and the development of clinical guidelines or practice parameters is also needed.

  18. The Effects of a Violence Prevention Program on Alternative High School Students

    Science.gov (United States)

    Triplett, Carla A.

    2013-01-01

    This study addressed the effectiveness of a violence prevention program in an inner-city alternative school setting. The researcher, an administrator at the school, used a prepackaged curriculum targeting lessons on violence in an eight-week study with the entire school population. Students met bi-weekly with a team of two teachers to review and…

  19. Gender Role Attitudes and Male Adolescent Dating Violence Perpetration: Normative Beliefs as Moderators.

    Science.gov (United States)

    Reyes, H Luz McNaughton; Foshee, Vangie A; Niolon, Phyllis Holditch; Reidy, Dennis E; Hall, Jeffrey E

    2016-02-01

    Commonly used dating violence prevention programs assume that promotion of more egalitarian gender role attitudes will prevent dating violence perpetration. Empirical research examining this assumption, however, is limited and inconsistent. The current study examined the longitudinal association between gender role attitudes and physical dating violence perpetration among adolescent boys (n = 577; 14 % Black, 5 % other race/ethnicity) and examined whether injunctive (i.e., acceptance of dating violence) and descriptive (i.e., beliefs about dating violence prevalence) normative beliefs moderated the association. As expected, the findings suggest that traditional gender role attitudes at T1 were associated with increased risk for dating violence perpetration 18 months later (T2) among boys who reported high, but not low, acceptance of dating violence (injunctive normative beliefs) at T1. Descriptive norms did not moderate the effect of gender role attitudes on dating violence perpetration. The results suggest that injunctive norms and gender role attitudes work synergistically to increase risk for dating violence perpetration among boys; as such, simultaneously targeting both of these constructs may be an effective prevention approach.

  20. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  1. Violence against women: The perspective of academic women

    Directory of Open Access Journals (Sweden)

    Kalaca Sibel

    2010-08-01

    Full Text Available Abstract Background Opinion surveys about potential causes of violence against women (VAW are uncommon. This study explores academic women's opinions about VAW and the ways of reducing violence. Methods Quantitative and qualitative methods were used in this descriptive study. One hundred-and-fifteen academicians participated in the study from two universities. A questionnaire was used regarding the definition and the causes of VAW, the risk groups and opinions about the solutions. Additionally, two authors interviewed 8 academicians from universities other than that of the interviewing author. Results Academicians discussed the problem from the perspective of "gender-based violence" rather than "family violence". The majority of the participants stated that nonworking women of low socioeconomic status are most at risk for VAW. They indicated that psychological violence is more prevalent against educated women, whilst physical violence is more likely to occur against uneducated and nonworking women. Perpetrator related factors were the most frequently stated causes of VAW. Thirty-five percent of the academicians defined themselves as at risk of some act of VAW. Recommendations for actions against violence were empowerment of women, increasing the educational levels in the society, and legal measures. Conclusions Academic women introduced an ecological approach for the explanation of VAW by stressing the importance of taking into account the global context of the occurrence of VAW. Similar studies with various community members -including men- will help to define targeted interventions.

  2. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  3. Differential predictors of transient stress versus posttraumatic stress disorder: evaluating risk following targeted mass violence.

    Science.gov (United States)

    Miron, Lynsey R; Orcutt, Holly K; Kumpula, Mandy J

    2014-11-01

    Schools have become a common incident site for targeted mass violence, including mass shootings. Although exposure to mass violence can result in significant distress, most individuals are able to fully recover over time, while a minority develop more pervasive pathology, such as PTSD. The present study investigated how several pre- and posttrauma factors predict posttraumatic stress symptoms (PTSS) in both the acute and distal aftermath of a campus mass shooting using a sample with known levels of pretrauma functioning (N=573). Although the largest proportion of participants evidenced resilience following exposure to the event (46.1%), many reported high rates of PTSS shortly after the shooting (42.1%) and a smaller proportion (11.9%) met criteria for probable PTSD both in the acute and more distal aftermath of the event. While several preshooting factors predicted heightened PTSS after the shooting, prior trauma exposure was the only preshooting variable shown to significantly differentiate between those who experienced transient versus prolonged distress. Among postshooting predictors, individuals reporting greater emotion dysregulation and peritraumatic dissociative experiences were over four times more likely to have elevated PTSS 8months postshooting compared with those reporting less dysregulation and dissociative experiences. Individuals with less exposure to the shooting, fewer prior traumatic experiences, and greater satisfaction with social support were more likely to recover from acute distress. Overall, results suggest that, while pretrauma factors may differentiate between those who are resilient in the aftermath of a mass shooting and those who experience heightened distress, several event-level and posttrauma coping factors help distinguish between those who eventually recover and those whose PTSD symptoms persist over time. Copyright © 2014. Published by Elsevier Ltd.

  4. Bullying as a longitudinal predictor of adolescent dating violence.

    Science.gov (United States)

    Foshee, Vangie A; McNaughton Reyes, Heath Luz; Vivolo-Kantor, Alana M; Basile, Kathleen C; Chang, Ling-Yin; Faris, Robert; Ennett, Susan T

    2014-09-01

    One suggested approach to preventing adolescent dating violence is to prevent behavioral precursors to dating violence, such as bullying. However, no longitudinal study has examined bullying as a behavioral precursor to dating violence. In this study, longitudinal data were used to examine (1) whether direct and indirect bullying perpetration in the sixth grade predicted the onset of physical dating violence perpetration by the eighth grade and (2) whether the associations varied by sex and race/ethnicity of the adolescent. Data were collected in school from sixth graders in three primarily rural counties and then again when students were in the eighth grade. Analyses were conducted with 1,154 adolescents who had not perpetrated dating violence at the sixth-grade assessment. The sample was 47% male, 29% black, and 10% of another race/ethnicity than black or white. Direct bullying, defined as hitting, slapping, or picking on another kid in the sixth grade, predicted the onset of physical dating violence perpetration by the eighth grade, controlling for indirect bullying and potential confounders. Although indirect bullying, defined as spreading false rumors and excluding students from friendship groups, was associated with the onset of physical dating violence perpetration in bivariate analyses, it did not predict the onset of physical dating violence when controlling for direct bullying. None of the associations examined varied by sex or race/ethnicity of the adolescents. Our findings suggest that efforts targeted at preventing direct bullying may also prevent the onset of physical dating violence. Copyright © 2014 Society for Adolescent Health and Medicine. All rights reserved.

  5. Bullying as a Longitudinal Predictor of Adolescent Dating Violence

    Science.gov (United States)

    Foshee, Vangie A.; Reyes, Heath Luz McNaughton; Vivolo-Kantor, Alana M.; Basile, Kathleen C.; Chang, Ling-Yin; Faris, Robert; Ennett, Susan T.

    2015-01-01

    Purpose One suggested approach to preventing adolescent dating violence is to prevent behavioral precursors to dating violence, such as bullying. However, no longitudinal study has examined bullying as a behavioral precursor to dating violence. In this study, longitudinal data were used to examine (1) whether direct and indirect bullying perpetration in the sixth grade predicted the onset of physical dating violence perpetration by the eighth grade and (2) whether the associations varied by sex and race/ethnicity of the adolescent. Methods Data were collected in school from sixth graders in three primarily rural counties and then again when students were in the eighth grade. Analyses were conducted with 1,154 adolescents who had not perpetrated dating violence at the sixth-grade assessment. The sample was 47% male, 29% black, and 10% of another race/ethnicity than black or white. Results Direct bullying, defined as hitting, slapping, or picking on another kid in the sixth grade, predicted the onset of physical dating violence perpetration by the eighth grade, controlling for indirect bullying and potential confounders. Although indirect bullying, defined as spreading false rumors and excluding students from friendship groups, was associated with the onset of physical dating violence perpetration in bivariate analyses, it did not predict the onset of physical dating violence when controlling for direct bullying. None of the associations examined varied by sex or race/ethnicity of the adolescents. Conclusions Our findings suggest that efforts targeted at preventing direct bullying may also prevent the onset of physical dating violence. PMID:24768162

  6. Safe2Tell® : an anonymous, 24/7 reporting system for preventing school violence.

    Science.gov (United States)

    Payne, Susan R T; Elliott, Delbert S

    2011-01-01

    There is widespread agreement that many school shootings could be prevented if authorities were informed that a student was planning or preparing to carry out an attack. A universal problem is that young people are highly reluctant to report on their peers. This code of silence represents a major barrier to prevention efforts. In response to the Columbine shooting, the state of Colorado established the Safe2Tell® anonymous, 24/7 reporting system for receiving and forwarding threats of violence, bullying, and other concerns. This article describes how the program has grown to the point that it now receives more than 100 calls per month. A series of case examples illustrates its success in responding to threatening situations, including twenty-eight potential school attacks. Copyright © 2011 Wiley Periodicals, Inc., A Wiley Company.

  7. Mixed-Signal Hardware Security: Attacks and Countermeasures for ΔΣ ADC

    Directory of Open Access Journals (Sweden)

    Shayan Taheri

    2017-08-01

    Full Text Available Mixed-signal integrated circuits (ICs play an eminent and critical role in design and development of the embedded systems leveraged within smart weapons and military systems. These ICs can be a golden target for adversaries to compromise in order to function maliciously. In this work, we study the security aspects of a tunnel field effect transistor (TFET-based first-order one-bit delta-sigma ( Δ Σ analog to digital converter (ADC through proposing four attack and one defense models. The first attack manipulates the input signal to the Δ Σ modulator. The second attack manipulates the analog version of the modulator output bit and is triggered by the noise signal. The third attack manipulates the modulator output bit and has a controllable trigger mechanism. The fourth attack manipulates the analog version of the modulator output bit and is triggered by a victim capacitance within the chip. For the defense, a number of signal processing filters are used in order to purge the analog version of the modulator output bit for elimination of the malicious unwanted features, introduced by the attacks. According to the simulation results, the second threat model displays the strongest attack. Derived from the countermeasure evaluation, the best filter to confront the threat models is the robust regression using the least absolute residual computing method.

  8. Omen: identifying potential spear-phishing targets before the email is sent.

    Energy Technology Data Exchange (ETDEWEB)

    Wendt, Jeremy Daniel.

    2013-07-01

    We present the results of a two year project focused on a common social engineering attack method called "spear phishing". In a spear phishing attack, the user receives an email with information specifically focused on the user. This email contains either a malware-laced attachment or a link to download the malware that has been disguised as a useful program. Spear phishing attacks have been one of the most effective avenues for attackers to gain initial entry into a target network. This project focused on a proactive approach to spear phishing. To create an effective, user-specific spear phishing email, the attacker must research the intended recipient. We believe that much of the information used by the attacker is provided by the target organization's own external website. Thus when researching potential targets, the attacker leaves signs of his research in the webserver's logs. We created tools and visualizations to improve cybersecurity analysts' abilities to quickly understand a visitor's visit patterns and interests. Given these suspicious visitors and log-parsing tools, analysts can more quickly identify truly suspicious visitors, search for potential spear-phishing targeted users, and improve security around those users before the spear phishing email is sent.

  9. The relationship between severity of violence in the home and dating violence.

    Science.gov (United States)

    Sims, Eva Nowakowski; Dodd, Virginia J Noland; Tejeda, Manuel J

    2008-01-01

    This study used propositions from the social learning theory to explore the effects of the combined influences of child maltreatment, childhood witness to parental violence, sibling violence, and gender on dating violence perpetration using a modified version of the Conflict Tactics Scale 2 (CTS2). A weighted scoring method was utilized to determine how severity of violence in the home impacts dating violence perpetration. Bivariate correlations and linear regression models indicate significant associations between child maltreatment, sibling violence perpetration, childhood witness to parental violence, gender, and subsequent dating violence perpetration. Multiple regression analyses indicate that for men, history of severe violence victimization (i.e., child maltreatment and childhood witness to parental violence) and severe perpetration (sibling violence) significantly predict dating violence perpetration.

  10. Witnessed community and parental violence in relation to substance use and delinquency in a national sample of adolescents.

    Science.gov (United States)

    Zinzow, Heidi M; Ruggiero, Kenneth J; Hanson, Rochelle F; Smith, Daniel W; Saunders, Benjamin E; Kilpatrick, Dean G

    2009-12-01

    This study examined whether witnessed community and parental violence represented risk factors for substance use and delinquency among adolescents, beyond the contribution of direct violence and other risk factors. We also examined the role of violence characteristics. Participants were a national sample of 3,614 adolescents. Structured telephone interviews assessed demographics, trauma history, witnessed violence, delinquency, and substance use. While accounting for trauma history and other risk factors, witnessed community and parental violence were associated with delinquency. Community violence was associated with substance use. Chronic violence, knowing the perpetrator, and violence outside of school were correlated with substance use and delinquency among adolescents who witnessed community violence. These findings highlight the importance of targeting witnessed violence in prevention and intervention efforts.

  11. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  12. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems

    Directory of Open Access Journals (Sweden)

    Subin Park

    2017-05-01

    Full Text Available We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES, exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  13. Dating violence experiences of lesbian, gay, bisexual, and transgender youth.

    Science.gov (United States)

    Dank, Meredith; Lachman, Pamela; Zweig, Janine M; Yahner, Jennifer

    2014-05-01

    Media attention and the literature on lesbian, gay, and bisexual youth overwhelmingly focus on violence involving hate crimes and bullying, while ignoring the fact that vulnerable youth also may be at increased risk of violence in their dating relationships. In this study, we examine physical, psychological, sexual, and cyber dating violence experiences among lesbian, gay, and bisexual youth--as compared to those of heterosexual youth, and we explore variations in the likelihood of help-seeking behavior and the presence of particular risk factors among both types of dating violence victims. A total of 5,647 youth (51 % female, 74 % White) from 10 schools participated in a cross-sectional anonymous survey, of which 3,745 reported currently being in a dating relationship or having been in one during the prior year. Results indicated that lesbian, gay, and bisexual youth are at higher risk for all types of dating violence victimization (and nearly all types of dating violence perpetration), compared to heterosexual youth. Further, when looking at gender identity, transgender and female youth are at highest risk of most types of victimization, and are the most likely perpetrators of all forms of dating violence but sexual coercion, which begs further exploration. The findings support the development of dating violence prevention programs that specifically target the needs and vulnerabilities of lesbian, gay, and bisexual youth, in addition to those of female and transgender youth.

  14. The Fourth R: A School-Based Adolescent Dating Violence Prevention Program

    Directory of Open Access Journals (Sweden)

    David A. Wolfe

    2011-07-01

    Full Text Available This paper presents a school-based primary prevention program (The Fourth R to prevent adolescent dating violence, and related risk behaviors. The cornerstone of The Fourth R is a 21-lesson skillbased curriculum delivered by teachers who receive specialized training, that promotes healthy relationships, and targets violence, high-risk sexual behavior, and substance use among adolescents. The Fourth R was evaluated in a cluster randomized trial in 20 schools. Results indicated that teaching youth healthy relationships and skills as part of their curriculum reduced physical dating violence, and increased condom use 2.5 years later.

  15. Violence in the Street, Violence of the Street

    DEFF Research Database (Denmark)

    Heinskou, Marie Bruvik; Liebst, Lasse Suonperä

    While in his early and general theory of interaction rituals Randall Collins emphasised that social situations are both ’symbolic’ and ’material’, the latter dimension is largely absent from Collins’ theory of violence(Collins 2004; 1993: 214). Compared with criminology’s more recent situational...... studies of violence, it is noticeable that the analytical success of these studies is closely linked with understanding street violence as a spatial-situational phenomenon (Clarke 1997; Eck & Weisburd 1995; Bragand & Weisburd; 2010; Wikström et al. 2012; Sampson et al. 1997). In light of evidence...... for the spatial concentration of street violence, this paper takes its point of departure in a large study of Street Violence among youth in Copenhagen, Denmark (combining quantitative data from filed police reports (N = 501), data from CCTV (N=100) and qualitative analysis of selected cases of street violence...

  16. Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Ahmad Y. Javaid

    2015-02-01

    Full Text Available Usage of ground, air and underwater unmanned vehicles (UGV, UAV and UUV has increased exponentially in the recent past with industries producing thousands of these unmanned vehicles every year.With the ongoing discussion of integration of UAVs in the US National Airspace, the need of a cost-effective way to verify the security and resilience of a group of communicating UAVs under attack has become very important. The answer to this need is a simulation testbed which can be used to simulate the UAV Network (UAVNet. One of these attempts is - UAVSim (Unmanned Aerial Vehicle Simulation testbed developed at the University of Toledo. It has the capability of simulating large UAV networks as well as small UAV networks with large number of attack nodes. In this paper, we analyse the performance of the simulation testbed for two attacks, targeting single and multiple UAVs. Traditional and generic computing resource available in a regular computer laboratory was used. Various evaluation results have been presented and analysed which suggest the suitability of UAVSim for UAVNet attack and swarm simulation applications.

  17. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  18. Perceptions of safety and exposure to violence in public places among working age adults with disabilities or long-term health conditions in the UK: cross sectional study.

    Science.gov (United States)

    Emerson, E; Krnjacki, L; Llewellyn, G; Vaughan, C; Kavanagh, A

    2016-06-01

    To examine perceptions of safety and exposure to violence in public places among working age adults with and without disabilities in the UK and to assess the extent to which any between-group differences may be moderated by gender and socio-economic situation. Cross-sectional study. Secondary analysis of data collected in Wave 3 (2011-13) of Understanding Society. Data were extracted on a subsample of 5069 respondents aged 16 to 64 years (28% of whom had a disability/long-term health condition) who were administered a questionnaire module addressing experiences of harassment. Between-group comparisons were made on four self-reported indicators of safety. Respondents with disabilities/long-term health conditions were significantly more likely to have been attacked (adjusted OR 2.30, 95%CI 1.17-4.50, P condition are at significantly increased risk of exposure to interpersonal violence, particularly if they are living in poverty or are women. As such, there is a clear need to develop interventions that are targeted to the particular circumstances and needs of these high risk groups. Copyright © 2015 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  19. Psychological Abuse, Mental Health, and Acceptance of Dating Violence Among Adolescents.

    Science.gov (United States)

    Temple, Jeff R; Choi, Hye Jeong; Elmquist, JoAnna; Hecht, Michael; Miller-Day, Michelle; Stuart, Gregory L; Brem, Meagan; Wolford-Clevenger, Caitlin

    2016-08-01

    Existing literature indicates that acceptance of dating violence is a significant and robust risk factor for psychological dating abuse perpetration. Past work also indicates a significant relationship between psychological dating abuse perpetration and poor mental health. However, no known research has examined the relationship between acceptance of dating violence, perpetration of dating abuse, and mental health. In addition to exploring this complex relationship, the present study examines whether psychological abuse perpetration mediates the relationship between acceptance of dating violence and mental health (i.e., internalizing symptoms of depression, anxiety, and hostility). Three waves of longitudinal data were obtained from 1,042 ethnically diverse high school students in Texas. Participants completed assessments of psychological dating abuse perpetration, acceptance of dating violence, and internalizing symptoms (hostility and symptoms of anxiety and depression). As predicted, results indicated that perpetration of psychological abuse was significantly associated with acceptance of dating violence and all internalizing symptoms. Furthermore, psychological abuse mediated the relationship between acceptance of dating violence and internalizing symptoms. Findings from the present study suggest that acceptance of dating violence is an important target for the prevention of dating violence and related emotional distress. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  20. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  1. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  2. Terrorist Attacks in Mumbai, India, and Implications for U.S. Interests

    National Research Council Canada - National Science Library

    Kronstadt, K. A

    2008-01-01

    On the evening of November 26, 2008, a number of well-trained militants came ashore from the Arabian Sea on small boats and attacked numerous high-profile targets in Mumbai, India, with automatic weapons and explosives...

  3. Exploring the Interconnected Trauma of Personal, Social, and Structural Stressors: Making "Sense" of Senseless Violence.

    Science.gov (United States)

    Abo-Zena, Mona M

    2017-01-02

    Although violence is a timeless characteristic of human behavior and history, its prevalence and many forms are proliferated repeatedly through the media. In particular, "senseless" violence against both random and targeted victims puzzles and petrifies onlookers and survivors. Integrating developmental psychology with critical theory, this manuscript begins with a conceptual definition of senseless violence that is coupled with a mapping of the personal, social, and structural etiologies of such violence. This inquiry explores the origins, contexts, and varied manifestations of violence, helps redirect sense-making around such violence, and informs how to cope with and possibly reduce or mitigate it. Utilizing a person-centered perspective from multiple points of view, the analysis focuses primarily on the everyday or chronic experiences of stressors and their relation to internalized and externalized types of violence (i.e., mass shootings, interpersonal violence, self-injury). The manuscript concludes with ways to reduce violence and promote justice on personal, social, and structural levels.

  4. Previous experience of family violence and intimate partner violence in pregnancy.

    Science.gov (United States)

    Ludermir, Ana Bernarda; Araújo, Thália Velho Barreto de; Valongueiro, Sandra Alves; Muniz, Maria Luísa Corrêa; Silva, Elisabete Pereira

    2017-01-01

    To estimate differential associations between the exposure to violence in the family of origin and victimization and perpetration of intimate partner violence in pregnancy. A nested case-control study was carried out within a cohort study with 1,120 pregnant women aged 18-49 years old, who were registered in the Family Health Strategy of the city of Recife, State of Pernambuco, Brazil, between 2005 and 2006. The cases were the 233 women who reported intimate partner violence in pregnancy and the controls were the 499 women who did not report it. Partner violence in pregnancy and previous experiences of violence committed by parents or other family members were assessed with a standardized questionnaire. Multivariate logistic regression analyses were modeled to identify differential associations between the exposure to violence in the family of origin and victimization and perpetration of intimate partner violence in pregnancy. Having seen the mother suffer intimate partner violence was associated with physical violence in childhood (OR = 2.62; 95%CI 1.89-3.63) and in adolescence (OR = 1.47; 95%CI 1.01-2.13), sexual violence in childhood (OR = 3.28; 95%CI 1.68-6.38) and intimate partner violence during pregnancy (OR = 1.47; 95% CI 1.01 - 2.12). The intimate partner violence during pregnancy was frequent in women who reported more episodes of physical violence in childhood (OR = 2.08; 95%CI 1.43-3.02) and adolescence (OR = 1.63; 95%CI 1.07-2.47), who suffered sexual violence in childhood (OR = 3.92; 95%CI 1.86-8.27), and who perpetrated violence against the partner (OR = 8.67; 95%CI 4.57-16.45). Experiences of violence committed by parents or other family members emerge as strong risk factors for intimate partner violence in pregnancy. Identifying and understanding protective and risk factors for the emergence of intimate partner violence in pregnancy and its maintenance may help policymakers and health service managers to develop intervention strategies.

  5. A cross-national comparison of violence among young men in China and the UK: psychiatric and cultural explanations.

    Science.gov (United States)

    Coid, Jeremy; Hu, Junmei; Kallis, Constantinos; Ping, Yuan; Zhang, Juying; Hu, Yueying; Bui, Laura; Ullrich, Simone; Bebbington, Paul

    2017-10-01

    Public health psychiatry has a key role in violence prevention. Cross-national comparisons of violence and associated psychiatric morbidity can indicate targets for preventive interventions. Data on young adult men in households, 18-34 years, were drawn from the Second Men's Modern Lifestyles survey in Great Britain (n = 2046) and from a corresponding survey in Chengdu, China (n = 4132), using a translated questionnaire. Binary logistic regression models were carried out to estimate the cross-national differences for different types of violence and to identify explanatory variables. Chinese men were less likely to report violence in the past 5 years (AOR 0.59, 95% CI 0.48-0.72, P violence were lower among Chinese men except intimate partner violence (AOR 2.43, 95% CI 1.65-3.59, P violence persisting into adulthood, confidence in fighting ability, perception that violence is acceptable behaviour, and experience of violent victimization. More British men screened positive for antisocial personality disorder and substance misuse. Attitudes which condone violence and a serious problem of alcohol-related, male-on-male violence are key targets for preventive interventions among British men. The higher prevalence of life course-persistent antisocial behaviour among British men is of concern and requires further investigation. Higher prevalence of intimate partner violence among Chinese men reflects patriarchal approaches to conflict resolution and confirms an important public health problem in China which requires further cross-national investigation.

  6. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  7. Sexual violence towards married women in Bangladesh.

    Science.gov (United States)

    Naved, Ruchira Tabassum

    2013-05-01

    This article explored the magnitude and nature of within marriage sexual violence against women and factors associated with physically forced sex by husbands in urban and rural Bangladesh using population-based survey data from 2001 (n = 2,702). Results showed high prevalence of lifetime sexual violence: 37 % in urban and 50 % in rural areas. An overwhelming majority of the women reported being sexually abused by husbands more than once. Logistic regression analyses revealed that six out of ten independent variables included in the models were significant. The factors positively associated with physically forced sex by husbands during the last 12 months were: history of physical abuse of husband's mother by his father; level of controlling behavior by husband; and forced or coerced first sex. Women's age (20-24 compared to 15-19) and dowry demand at marriage increased the likelihood of this violence in the rural area. Urban women in the second and third income quartiles were more likely to be exposed to this violence compared to women in the first quartile. Results highlight the need for prevention programs targeting men, which would help at the same time to break the cycle of intergenerational exposure and thereby transmission of violence. Notions of gender equality; women's sexual rights; and women's right to consent and choice need to be widely promoted particularly among men.

  8. Transnational terrorism in East Africa: a qualitative and quantitative analysis of the recent rise in Kenyan violence

    OpenAIRE

    Muhwezi, Andrew M.

    2014-01-01

    Approved for public release; distribution is unlimited This thesis analyzes recent trends of transnational terrorism in East Africa. It assesses the background of domestic and international terrorist attacks in the region from 1998 to 2012. The study then quantitatively analyzes regional trends, using data drawn from the Global Terrorism Database (GTD) showing dramatic increases in levels of terrorist violence from terrorist organizations like Al-Shabaab. Based on Al-Shabaab’s propaganda, ...

  9. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  10. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  11. Dating Violence

    Science.gov (United States)

    ... for Teens / Dating Violence Bulletins for Teens: Dating Violence What is it? If you are a victim ... often. If You Are a Victim of Dating Violence, You Might… Think it's your fault. Feel angry, ...

  12. Workplace violence: the dark side of organisational life.

    Science.gov (United States)

    Speedy, Sandra

    2006-05-01

    This paper draws on a diverse range of research literature addressing workplace violence, which constitutes one component of the dark side of organisational life. This selective review of the literature has been drawn from the disciplines of nursing, management, psychology and organisational culture. The paper focuses bullying and mobbing in the workplace, addressing its types, causes, the characteristics of bullies and targets and the generalised impact of bullying and mobbing. It also examines whether there are gender issues pertinent to the health care sector. Consideration will also be given to the impact on the individual, group and organization, given the apparent epidemic proportions workplace violence has reached. Ultimately, the question will arise: how can the workplace violence be abolished, specifically within the health care sector, given that we live in a global environment characterised by international bullying (Crawford 1999)? This is a challenge because workplace violence is perpetuated within organisations, due either to cultures of acceptance, or fear of retribution should it be acknowledged and acted upon (or both).

  13. [Family violence].

    Science.gov (United States)

    Manoudi, F; Chagh, R; Es-soussi, M; Asri, F; Tazi, I

    2013-09-01

    Family violence is a serious public health problem, the scale of which is seriously increasing in Morocco. Although it has existed for a long time, we ignore the real characteristics of this plague in our country; our work consisted in an epidemiological approach of family violence in Marrakech during 2006. After elaborating a questionnaire, which allows the study of the demographic and social profile of the families, the study of violence exercised in the family and the evaluation of the depression in the women, we led an inquiry amongst 265 women. Analysis of the results obtained has allowed us to underline the following characteristics: 16.6% of the women in our sample had been physically beaten; the young age is a risk factor; the age range most affected by violence is in women between the ages of 30 and 40 and which represent 39% of the battered women; domestic violence touches all the social, economic and cultural classes: in our study, 63% of the women having undergone violence were housewives, 25% were managers and 3% senior executives; family problems were the most important cause of violence in our study, representing 32.32%. Requests for money was the cause in 11.3% of the cases, and imposed sexual relations were found in 6.8% of the cases; alcoholism is an aggravating factor of family violence; 27.3% of the spouses who assaulted their wives were drunk; 52% of the assaulted women were victims of violence in childhood and 36% had been witness to their father's violence; in 63.6% of the cases of violence, the children were witnesses, and in 25% of the cases the children were victims of violence at the same time as their mothers; 50% of the women victims of violence did not react, while 38.6% left home, and 9.1 filed for divorce. Thirty-two percent of the assaulted woman had been traumatised by the aggression; the association of depression and violence was very high, 343% of the battered women in our study suffered from severe depression. This work

  14. Examining Perpetration of Physical Violence by Women: The Influence of Childhood Adversity, Victimization, Mental Illness, Substance Abuse, and Anger.

    Science.gov (United States)

    Kubiak, Sheryl; Fedock, Gina; Kim, Woo Jong; Bybee, Deborah

    2017-02-01

    Research on women's perpetration of physical violence has focused primarily on partners, often neglecting perpetration against nonpartners. This study proposes a conceptual model with direct and indirect relationships between childhood adversity and different targets of violence (partners and nonpartners), mediated by victimization experiences (by partner and nonpartners), mental illness, substance abuse, and anger. Using survey data from a random sample of incarcerated women (N = 574), structural equation modeling resulted in significant, albeit different, indirect paths from childhood adversity, through victimization, to perpetration of violence against partners (β = .20) and nonpartners (β = .19). The results indicate that prevention of women's violence requires attention to specific forms of victimization, anger expression, and targets of her aggression.

  15. Domestic Violence

    Science.gov (United States)

    Domestic violence is a type of abuse. It usually involves a spouse or partner, but it can also ... a child, elderly relative, or other family member. Domestic violence may include Physical violence that can lead to ...

  16. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  17. Sexual Violence Prevention

    Science.gov (United States)

    ... Submit What's this? Submit Button Past Emails Sexual Violence Prevention Recommend on Facebook Tweet Share Compartir April ... stop sexual violence before it begins. Understanding Sexual Violence Sexual violence is any sexual activity where consent ...

  18. Teen Dating Violence

    Science.gov (United States)

    ... Room Social Media Publications Injury Center Teen Dating Violence Recommend on Facebook Tweet Share Compartir On This ... serious forms of violence. What is teen dating violence? Teen Dating Violence [550 KB, 2 Pages, 508] ...

  19. Previous experience of family violence and intimate partner violence in pregnancy

    Directory of Open Access Journals (Sweden)

    Ana Bernarda Ludermir

    2017-09-01

    Full Text Available ABSTRACT OBJECTIVE To estimate differential associations between the exposure to violence in the family of origin and victimization and perpetration of intimate partner violence in pregnancy. METHODS A nested case-control study was carried out within a cohort study with 1,120 pregnant women aged 18–49 years old, who were registered in the Family Health Strategy of the city of Recife, State of Pernambuco, Brazil, between 2005 and 2006. The cases were the 233 women who reported intimate partner violence in pregnancy and the controls were the 499 women who did not report it. Partner violence in pregnancy and previous experiences of violence committed by parents or other family members were assessed with a standardized questionnaire. Multivariate logistic regression analyses were modeled to identify differential associations between the exposure to violence in the family of origin and victimization and perpetration of intimate partner violence in pregnancy. RESULTS Having seen the mother suffer intimate partner violence was associated with physical violence in childhood (OR = 2.62; 95%CI 1.89–3.63 and in adolescence (OR = 1.47; 95%CI 1.01–2.13, sexual violence in childhood (OR = 3.28; 95%CI 1.68–6.38 and intimate partner violence during pregnancy (OR = 1.47; 95% CI 1.01 – 2.12. The intimate partner violence during pregnancy was frequent in women who reported more episodes of physical violence in childhood (OR = 2.08; 95%CI 1.43–3.02 and adolescence (OR = 1.63; 95%CI 1.07–2.47, who suffered sexual violence in childhood (OR = 3.92; 95%CI 1.86–8.27, and who perpetrated violence against the partner (OR = 8.67; 95%CI 4.57–16.45. CONCLUSIONS Experiences of violence committed by parents or other family members emerge as strong risk factors for intimate partner violence in pregnancy. Identifying and understanding protective and risk factors for the emergence of intimate partner violence in pregnancy and its maintenance may help

  20. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  1. SDN-based path hopping communication against eavesdropping attack

    Science.gov (United States)

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  2. Understanding sexual violence as a form of caste violence

    Directory of Open Access Journals (Sweden)

    Prachi Patil

    2016-07-01

    Full Text Available The paper attempts to understand narratives of sexual violence anchored within the dynamics of social location of caste and gender. Apparent caste-patriarchy and gender hierarchies which are at play in cases of sexual violence against lower-caste and dalit women speak about differential experiences of rape and sexual abuse that women have in India. The paper endeavours to establish that sexual violence is also a form of caste violence by rereading the unfortunate cases of Bhanwari Devi, Khairlanji, Lalasa Devi and Delta Meghwal Keywords: caste-patriarchy, Dalit women, POA Act, rape, sexual violence

  3. Workplace Violence Against Nurses: Vhembe District Hospitals, South Africa.

    Science.gov (United States)

    Mahani, Tshifularo Olga; Akinsola, Henry Abayomi; Mabunda, Jabu; Oni, Helen Tosin

    2017-02-01

    Work-related violence is a common problem worldwide. In South Africa, the Medical Research Council conducted a study on workplace violence in the health care industry and reported that most respondents had experienced it in different forms. This study aimed to identify the types and causes of workplace violence toward nurses in Thulamela hospitals, Vhembe district. The study employed a quantitative approach using a cross-sectional design. The target population was all nurses working in one regional and two district hospitals in the municipality. The sample consisted of 100 randomly selected participants from each hospital giving a total sample size of 300. Prior to the data collection, an ethical clearance and written informed consent were obtained from each participant. Data were collected using a self-administered questionnaire. Analysis was done using SPSS Version 20.0. The study revealed that 85% of the respondents (255) had experienced workplace violence in the last 12 months with a range of 95% for threats to 60% for bullying. Regarding the gender of the perpetrators, females (71%) were the main perpetrators. This study concludes that workplace violence is a major occupational health issue in the district, most especially among the psychiatric nurses.

  4. Target-oriented utility theory for modeling the deterrent effects of counterterrorism

    International Nuclear Information System (INIS)

    Bier, Vicki M.; Kosanoglu, Fuat

    2015-01-01

    Optimal resource allocation in security has been a significant challenge for critical infrastructure protection. Numerous studies use game theory as the method of choice, because of the fact that an attacker can often observe the defender’s investment in security and adapt his choice of strategies accordingly. However, most of these models do not explicitly consider deterrence, with the result that they may lead to wasted resources if less investment would be sufficient to deter an attack. In this paper, we assume that the defender is uncertain about the level of defensive investment that would deter an attack, and use the target-oriented utility to optimize the level of defensive investment, taking into account the probability of deterrence. - Highlights: • We propose a target-oriented utility model for attacker deterrence. • We model attack deterrence as a function of attacker success probability. • We compare target-oriented utility model and conventional game-theoretical model. • Results show that our model results better value of the defender’s objective function. • Results support that defending series systems is more difficult than parallel systems

  5. Community violence exposure and post-traumatic stress reactions among Gambian youth: the moderating role of positive school climate.

    Science.gov (United States)

    O'Donnell, Deborah A; Roberts, William C; Schwab-Stone, Mary E

    2011-01-01

    Community violence exposure among youth can lead to various negative outcomes, including post-traumatic stress symptoms. Research in the Western world indicates that a number of social support factors may moderate the relation between violence exposure and internalizing symptoms. Little research has been carried out in non-Western countries. This study aimed to fill this gap by exploring the relations among violence exposure, parental warmth, positive school climate, and post-traumatic stress reactions among youth in The Republic of The Gambia, Africa. A school-based survey of youth behaviors, feelings, attitudes, and perceptions was administered to 653 students at senior secondary schools in four Gambian communities. Students reported high levels of exposure to violence. Over half of students reported witnessing someone threatened with serious physical harm, beaten up or mugged, attacked or stabbed with a knife/piece of glass, or seriously wounded in an incident of violence. Nearly half of students reported being beaten up or mugged during the past year, and nearly a quarter reported being threatened with serious physical harm. There were no sex differences in levels of exposure. Traumatic stress symptoms were common, especially among females. Both violence witnessing and violent victimization significantly predicted post-traumatic stress symptoms, and positive school climate moderated the relationship. Among youth victimized by violence, positive school climate was most strongly correlated with lower levels of post-traumatic stress at low levels of exposure. Among youth who had witnessed violence, positive school climate was most strongly correlated with lower levels of post-traumatic stress at high levels of exposure. Community-based programs that bring together parents, schools, and youth may play an important role in combating the negative effects of some types of violence exposure among Gambian youth. Youth experiencing high levels of violent victimization

  6. Using social constructionist thinking in training social workers living and working under threat of political violence.

    Science.gov (United States)

    Shamai, Michal

    2003-10-01

    This article describes and analyzes an intervention program with social workers living and working in a situation of uncertainty created by political violence such as war and terrorism. The author used a social constructionist perspective as a theoretical framework, emphasizing the effect of the social and political context in constructing the experience and a recognition of the personal and professional knowledge acquired in the daily experience. The author used qualitative methods to evaluate the process and outcome. The narrative-holistic analysis focused on reconstructing meaning and adapting it to the new situation, the main thrust of the program. From the thematic analysis four main themes emerged: (1) loss as a result of political violence; (2) meaning of strength and weakness in situations of political violence; (3) preparation for terrorist attacks; and (4) definition of a safe place. The outcome evaluation describes the meaning of this kind of training program to the participants. The specific context of the training program is discussed as well as possibilities of using it in different contexts.

  7. Survival of the relocated population of the U. S. after a nuclear attack. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Haaland, C.M.; Chester, C.V.; Wigner, E.P.

    1976-06-01

    The feasibility of continued survival after a hypothetical nuclear attack is evaluated for people relocated from high-risk areas during the crisis period before the attack. The attack consists of 6559 MT, of which 5951 MT are ground bursts on military, industrial, and urban targets. Relocated people are assumed to be adequately protected from fallout radiation by shelters of various kinds. The major problems in the postattack situation will be the control of exposure to fallout radiation, and prevention of severe food shortages to several tens of millions of people.

  8. Effects of Youth´s Exposure to Community Violence: The MORE Project

    Directory of Open Access Journals (Sweden)

    Michele Cooley-Strickland

    2011-07-01

    Full Text Available Research on chronic community violence exposure focuses on ethnic minority, impoverished, and crime-ridden communities while treatment and prevention focuses on the perpetrators of the violence, not on the youth who are its direct or indirect victims. School-based treatment and preventive interventions are needed for children at elevated risk for exposure to community violence. This paper describes The Multiple Opportunities to Reach Excellence (MORE Project, a longitudinal, community epidemiological study currently being fielded to better understand the impact of children´s chronic exposure to community violence on their emotional, behavioral, substance use, and academic functioning with an overarching goal to identify malleable risk and protective factors which can be targeted in preventive and intervention programs.

  9. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  10. Childrearing Violence and Child Adjustment Following Exposure to Kenyan Post-election Violence.

    Science.gov (United States)

    Skinner, Ann T; Oburu, Paul; Lansford, Jennifer E; Bacchini, Dario

    2014-01-01

    This study examines parents' and children's exposure to short-term political violence and the relation between childrearing violence and child adjustment following widespread violence that erupted in Kisumu, Kenya after the disputed presidential election in December 2007. Mothers of 100 Luo children (mean age = 8.46 years, 61% female) reported on their own use of childrearing violence at Time 1, approximately 4 months after the disputed election, and again at Times 2 ( n = 95) and 3 ( n = 95), approximately 12 and 24 months later, respectively. At Time 2, mothers reported about post-election violence directed at them and about their children's exposure to post-election violence. Children reported about their own externalizing behaviors at Times 1, 2, and 3. Children's exposure to post-election violence was related to Time 2 externalizing behavior, and childrearing violence at Time 1 predicted child externalizing behavior at Time 2. Exposure to post-election violence was not directly related to either childrearing violence or children's externalizing behavior by Time 3, although children's externalizing at Time 2 predicted more childrearing violence at Time 3. These results support earlier work that links childrearing violence and children's exposure to political violence with increases in child externalizing behavior, but examined these links in the under-studied area of short-term political violence. Even though sudden and severe political violence may subside significantly in weeks or months, increased attention to long-term effects on parenting and child adjustment is warranted.

  11. Assessing risk from intelligent attacks: A perspective on approaches

    International Nuclear Information System (INIS)

    Guikema, Seth D.; Aven, Terje

    2010-01-01

    Assessing the uncertainties in and severity of the consequences of intelligent attacks are fundamentally different from risk assessment for accidental events and other phenomena with inherently random failures. Intelligent attacks against a system involve adaptation on the part of the adversary. The probabilities of the initiating events depend on the risk management actions taken, and they may be more difficult to assess due to high degrees of epistemic uncertainty about the motivations and future actions of adversaries. Several fundamentally different frameworks have been proposed for assessing risk from intelligent attacks. These include basing risk assessment and management on game theoretic modelling of attacker actions, using a probabilistic risk analysis (PRA) approach based on eliciting probabilities of different initiating events from appropriate experts, assessing uncertainties beyond probabilities and expected values, and ignoring the probabilities of the attacks and choosing to protect highest valued targets. In this paper we discuss and compare the fundamental assumptions that underlie each of these approaches. We then suggest a new framework that makes the fundamental assumptions underlying the approaches clear to decision makers and presents them with a suite of results from conditional risk analysis methods. Each of the conditional methods presents the risk from a specified set of fundamental assumptions, allowing the decision maker to see the impacts of these assumptions on the risk management strategies considered and to weight the different conditional results with their assessments of the relative likelihood of the different sets of assumptions.

  12. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  13. To Treat or to Prevent?: Reducing the Population Burden of Violence-related Post-traumatic Stress Disorder.

    Science.gov (United States)

    Cerdá, Magdalena; Tracy, Melissa; Keyes, Katherine M; Galea, Sandro

    2015-09-01

    Violence-related post-traumatic stress disorder (PTSD) remains a prevalent and disabling psychiatric disorder in urban areas. However, the most effective allocation of resources into prevention and treatment to reduce this problem is unknown. We contrasted the impact of two interventions on violence-related PTSD: (1) a population-level intervention intended to prevent violence (i.e., hot-spot policing), and (2) an individual-level intervention intended to shorten PTSD duration (i.e., cognitive-behavioral therapy-CBT). We used agent-based modeling to simulate violence and PTSD in New York City under four scenarios: (1) no intervention, (2) targeted policing to hot spots of violence, (3) increased access to CBT for people who suffered from violence-related PTSD, and (4) a combination of the two interventions. Combined prevention and treatment produced the largest decrease in violence-related PTSD prevalence: hot-spot policing plus a 50% increase in CBT for 5 years reduced the annual prevalence of violence-related PTSD from 3.6% (95% confidence interval = 3.5%, 3.6%) to 3.4% (3.3%, 3.5%). It would have been necessary to implement hot-spot policing or to increase CBT by 200% for 10 years for either intervention to achieve the same reduction in isolation. This study provides an empirically informed demonstration that investment in combined strategies that target social determinants of mental illness and provide evidence-based treatment to those affected by psychiatric disorders can produce larger reductions in the population burden from violence-related PTSD than either preventive or treatment interventions alone. However, neither hot-spot policing nor CBT, alone or combined, will produce large shifts in the population prevalence of violence-related PTSD.

  14. Assessment of the relation of violence and burnout among physicians working in the emergency departments in Turkey.

    Science.gov (United States)

    Erdur, Bülent; Ergin, Ahmet; Yüksel, Aykut; Türkçüer, İbrahim; Ayrık, Cüneyt; Boz, Bora

    2015-05-01

    Violence and burnout are frequently seen among medical doctors; however, the relation is not clear. This study aimed to assess the violence and its possible effects on burnout in physicians working in emergency units. This cross-sectional study targeted all physicians working in the emergency units of Pamukkale University Hospital, County and City Hospitals, 112 Emergency Services, and Private Hospitals in Denizli. Data were obtained by means of a self-administered questionnaire that consisted of questions on the demographics of the participants, Turkish version of the Maslach Burnout Inventory, and of the perpetrators of violence. What was also documented on the questionnaire was whether participants had been subjected to or had witnessed any verbal or physical violence during the previous one month of emergency physicians' certification program. A total of one hundred and seventy-four physicians were included into the study (85% of the targeted group). Many of the participants were between 24 and 59 years of age, with a mean age of 36.8±5.8 years. Married male doctors working in the City Hospital made up the majority. There were significant associations between emotional exhaustion and total violence (p=0.012) and verbal violence (p=0.016); depersonalization and total violence (p=0.021) and verbal violence (p=0.012). The results presented here indicated that there was a strong relation between burnout and violence experienced by physicians working in emergency units. Violence in the emergency department has a substantial effect on the physicians' well-being.

  15. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  16. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  17. Conceptual model of acid attacks based on survivor's experiences: Lessons from a qualitative exploration.

    Science.gov (United States)

    Sabzi Khoshnami, Mohammad; Mohammadi, Elham; Addelyan Rasi, Hamideh; Khankeh, Hamid Reza; Arshi, Maliheh

    2017-05-01

    Acid attack, a worldwide phenomenon, has been increasing in recent years. In addition to severe injuries to the face and body, such violence leads to psychological and social problems that affect the survivors' quality of life. The present study provides a more in-depth understanding of this phenomenon and explores the nature and dimensions of acid attacks based on survivors' experiences. A grounded theory study using semi-structured, recorded interviews and applying purposeful theoretical sampling was conducted with 12 acid attack survivors in Iran. Data were analysed using constant comparison in open, axial and selective coding stages. A conceptual model was developed to explain the relationships among the main categories extracted through the grounded theory study. Physical and psychological wounds emerged as a core category. Traditional context and extreme beauty value in society acted as the context of the physical and psychological wounds experienced. Living with a drug abuser with behavioural disorders and lack of problem-solving skills in interpersonal conflict were found to be causal conditions. Action strategies to deal with this experience were found to be composed of individual, interpersonal and structural levels. Education, percentage and place of burning acted as intervening conditions that influenced survivors' strategies. Finally, adverse consequences of social deprivation and feeling helpless and hindered were found to have an important impact. Acid attack lead to physical and psychological wounds in survivors. This is a multi-dimensional phenomenon involving illness, disability, and victimization, and requires a wide range of strategies at different levels. The conceptual model derived through this study can serve as a good basis for intervention programs. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.

  18. Domestic violence

    OpenAIRE

    Tačík, Michal

    2015-01-01

    Domestic violence The present thesis deals with the phenomenon of domestic violence, from the substantive, procedural and criminological aspects. The first part defines the specifics of domestic violence, its signs and forms. It shows a typology of victims and perpetrators. It analyzes in detail the basic facts of the crimes that are the most commonly perpetrated forms of domestic violence. It also describes the sanctions and some of the treatment programs that are available for perpetrators ...

  19. Using database reports to reduce workplace violence: Perceptions of hospital stakeholders.

    Science.gov (United States)

    Arnetz, Judith E; Hamblin, Lydia; Ager, Joel; Aranyos, Deanna; Essenmacher, Lynnette; Upfal, Mark J; Luborsky, Mark

    2015-01-01

    Documented incidents of violence provide the foundation for any workplace violence prevention program. However, no published research to date has examined stakeholders' preferences for workplace violence data reports in healthcare settings. If relevant data are not readily available and effectively summarized and presented, the likelihood is low that they will be utilized by stakeholders in targeted efforts to reduce violence. To discover and describe hospital system stakeholders' perceptions of database-generated workplace violence data reports. Eight hospital system stakeholders representing Human Resources, Security, Occupational Health Services, Quality and Safety, and Labor in a large, metropolitan hospital system. The hospital system utilizes a central database for reporting adverse workplace events, including incidents of violence. A focus group was conducted to identify stakeholders' preferences and specifications for standardized, computerized reports of workplace violence data to be generated by the central database. The discussion was audio-taped, transcribed verbatim, processed as text, and analyzed using stepwise content analysis. Five distinct themes emerged from participant responses: Concerns, Etiology, Customization, Use, and Outcomes. In general, stakeholders wanted data reports to provide ``the big picture,'' i.e., rates of occurrence; reasons for and details regarding incident occurrence; consequences for the individual employee and/or the workplace; and organizational efforts that were employed to deal with the incident. Exploring stakeholder views regarding workplace violence summary reports provided concrete information on the preferred content, format, and use of workplace violence data. Participants desired both epidemiological and incident-specific data in order to better understand and work to prevent the workplace violence occurring in their hospital system.

  20. Association between Domestic Violence and School Violence: a preliminary analysis

    Directory of Open Access Journals (Sweden)

    Lúcia Cavalcanti de Albuquerque Williams

    2008-07-01

    Full Text Available Usually, one investigates marital violence, children victimization, and school violence in an isolated way. The aim of this paper is to highlight the relationship between domestic violence and school violence, suggesting actions to deal with these serious issues. With this goal in mind, two studies are described in this paper. The first one evaluates if boys who behave aggressively in school, in comparison with their non-aggressive peers, have more incidence of domestic violence exposure and victimization. The second study investigates if exposure to domestic violence and child victimization are factors associated with bullying. These studies indicated that there is a relation between the violence experienced in these two contexts; however they emphasize the need for further investigations with more participant and longitudinal studies. Teacher in-service training is suggested, aimed at: identifying students living in families with a history of domestic violence; supporting teachers and principals in case of disclosures in the school setting; social skills training for students; class discussions about healthy and non-violent family relationships and, psychotherapy referral to students who are victimized.

  1. Violence in childhood, attitudes about partner violence, and partner violence perpetration among men in Vietnam

    NARCIS (Netherlands)

    Yount, K.M.; Huyen, T.P.; Tran, H.M.; Krause, K.H.; Schuler, S.R.; Hoang, T.A.; VanderEnde, K.; Kramer, M.R.

    2014-01-01

    Purpose: We assess the association of men’s exposure to violence in childhood—witnessing physical violence against one’s mother and being hit or beaten by a parent or adult relative—with their attitudes about intimate partner violence (IPV) against women. We explore whether men’s perpetration of IPV

  2. Partner violence and psychosocial distress among female sex workers in China.

    Directory of Open Access Journals (Sweden)

    Yan Hong

    Full Text Available Despite recognized vulnerability of female sex workers (FSW, most data on this population are focused on their HIV and STI prevalence; studies on their experience of partner violence and psychosocial distress are limited, especially FSW in China.A cross-sectional survey was administered among 1,022 FSW recruited from 9 different types of commercial sex venues in Southwest China. Partner violence scales were adapted from WHO's Women's Health and Domestic Violence scale and psychosocial distress was measured by five indicators, including alcohol intoxication, drug use, suicidal behavior, depression, and loneliness. Random effects modeling was used to control for cluster effects.About 58% of FSW ever experienced violence from their stable partners, and 45% suffered it from their clients. Partner violence was strongly associated with each of the five measures of psychosocial distress, even after controlling for potential confounders.This study is one of the first to examine the association between partner violence and psychosocial distress among FSW in China. The high prevalence of violence experience and distress in this population suggests urgency for intervention. The public health programs targeting FSW should go beyond the focus on HIV/STI prevention and care for the fundamental health and human rights of millions of FSW in China.

  3. Climate Change and Civil Violence

    Science.gov (United States)

    van der Vink, G.; Plancherel, Y.; Hennet, C.; Jones, K. D.; Abdullah, A.; Bradshaw, J.; Dee, S.; Deprez, A.; Pasenello, M.; Plaza-Jennings, E.; Roseman, D.; Sopher, P.; Sung, E.

    2009-05-01

    provides an opportunity for targeted proactive measures to mitigate certain classes of future civil violence events.

  4. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  5. Domestic violence

    OpenAIRE

    Kiurski Jasmina

    2003-01-01

    Since the 1960s, there has been growing awareness regarding the issue of domestic violence as a form of violence against women, which has been largely influenced by the work of feminist activist and scholars in North America and Europe (Dobash and Dobash 1992). Other terms have been used to describe the same phenomenon, including domestic abuse, spousal abuse, wife battering, marital violence, intimate partner violence. Though there is no doubt that this problem has existed for much more than...

  6. Some scale-free networks could be robust under selective node attacks

    Science.gov (United States)

    Zheng, Bojin; Huang, Dan; Li, Deyi; Chen, Guisheng; Lan, Wenfei

    2011-04-01

    It is a mainstream idea that scale-free network would be fragile under the selective attacks. Internet is a typical scale-free network in the real world, but it never collapses under the selective attacks of computer viruses and hackers. This phenomenon is different from the deduction of the idea above because this idea assumes the same cost to delete an arbitrary node. Hence this paper discusses the behaviors of the scale-free network under the selective node attack with different cost. Through the experiments on five complex networks, we show that the scale-free network is possibly robust under the selective node attacks; furthermore, the more compact the network is, and the larger the average degree is, then the more robust the network is; with the same average degrees, the more compact the network is, the more robust the network is. This result would enrich the theory of the invulnerability of the network, and can be used to build robust social, technological and biological networks, and also has the potential to find the target of drugs.

  7. Weight perceptions, misperceptions, and dating violence victimization among U.S. adolescents.

    Science.gov (United States)

    Farhat, Tilda; Haynie, Denise; Summersett-Ringgold, Faith; Brooks-Russell, Ashley; Iannotti, Ronald J

    2015-05-01

    Dating violence is a major public health issue among youth. Overweight/obese adolescents experience peer victimization and discrimination and may be at increased risk of dating violence victimization. Furthermore, given the stigma associated with overweight/obesity, perceptions and misperceptions of overweight may be more important than actual weight status for dating violence victimization. This study examines the association of three weight indices (weight status, perceived weight, and weight perception accuracy) with psychological and physical dating violence victimization. The 2010 baseline survey of the 7-year NEXT Generation Health Study used a three-stage stratified clustered sampling design to select a nationally representative sample of U.S. 10th-grade students (n = 1,983). Participants who have had a boyfriend/girlfriend reported dating violence victimization and perceived weight. Weight status was computed from measured height/weight. Weight perception accuracy (accurate/underestimate/overestimate) was calculated by comparing weight status and perceived weight. Gender-stratified regressions examined the association of weight indices and dating violence victimization. Racial/ethnic differences were also examined. The association of weight indices with dating violence victimization significantly differed by gender. Overall, among boys, no associations were observed. Among girls, weight status was not associated with dating violence victimization, nor with number of dating violence victimization acts; however, perceived weight and weight perception accuracy were significantly associated with dating violence victimization, type of victimization, and number of victimization acts. Post hoc analyses revealed significant racial/ethnic differences. White girls who perceive themselves (accurately or not) to be overweight, and Hispanic girls who are overweight, may be at increased risk of dating violence victimization. These findings suggest a targeted approach to

  8. Understanding sexual violence as a form of caste violence

    OpenAIRE

    Prachi Patil

    2016-01-01

    The paper attempts to understand narratives of sexual violence anchored within the dynamics of social location of caste and gender. Apparent caste-patriarchy and gender hierarchies which are at play in cases of sexual violence against lower-caste and dalit women speak about differential experiences of rape and sexual abuse that women have in India. The paper endeavours to establish that sexual violence is also a form of caste violence by rereading the unfortunate cases of Bhanwari Devi, Khair...

  9. FAMILY VIOLENCE – MARRIAGE VIOLENCE WITH A FATAL OUTCOME

    Directory of Open Access Journals (Sweden)

    Lidija Kostic-Banovic

    2006-04-01

    Full Text Available Family violence represents an especially dangerous social form of violence by means of which the rights of an individual – a member of a family – to live, to have psychic, physical and sexual integrity, freedom, security and human dignity, have been violated. The term marriage violence entails every form of physical, sexual, psychic and economic abuse of women by husbands or illegitimate partner. The family violence represents a widespread form of crime, and since it has become dramatic and dynamic during the recent years, the need for a direct forensic processing of the violence consequences within this specific and sensitive social group has arisen. In accordance with what has been outlined above, three cases of extreme, systematic and continuous marriage violence with fatal consequences of the abused women, whose bodies have been abducted at the Forensics Institute in Nis, have been presented in this paper.

  10. Assessing the Stability and Robustness of Semantic Web Services Recommendation Algorithms Under Profile Injection Attacks

    Directory of Open Access Journals (Sweden)

    GRANDIN, P. H.

    2014-06-01

    Full Text Available Recommendation systems based on collaborative filtering are open by nature, what makes them vulnerable to profile injection attacks that insert biased evaluations in the system database in order to manipulate recommendations. In this paper we evaluate the stability and robustness of collaborative filtering algorithms applied to semantic web services recommendation when submitted to random and segment profile injection attacks. We evaluated four algorithms: (1 IMEAN, that makes predictions using the average of the evaluations received by the target item; (2 UMEAN, that makes predictions using the average of the evaluation made by the target user; (3 an algorithm based on the k-nearest neighbor (k-NN method and (4, an algorithm based on the k-means clustering method.The experiments showed that the UMEAN algorithm is not affected by the attacks and that IMEAN is the most vulnerable of all algorithms tested. Nevertheless, both UMEAN and IMEAN have little practical application due to the low precision of their predictions. Among the algorithms with intermediate tolerance to attacks but with good prediction performance, the algorithm based on k-nn proved to be more robust and stable than the algorithm based on k-means.

  11. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  12. Mainstreaming domestic and gender-based violence into sociology and the criminology of violence.

    Science.gov (United States)

    Walby, Sylvia; Towers, Jude; Francis, Brian

    2014-12-01

    Sociological and criminological views of domestic and gender-based violence generally either dismiss it as not worthy of consideration, or focus on specific groups of offenders and victims (male youth gangs, partner violence victims). In this paper, we take a holistic approach to violence, extending the definition from that commonly in use to encompass domestic violence and sexual violence. We operationalize that definition by using data from the latest sweep of the Crime Survey for England and Wales. By so doing, we identify that violence is currently under-measured and ubiquitous; that it is gendered, and that other forms of violence (family violence, acquaintance violence against women) are equally of concern. We argue that violence studies are an important form of activity for sociologists.

  13. Mainstreaming domestic and gender-based violence into sociology and the criminology of violence

    Science.gov (United States)

    Walby, Sylvia; Towers, Jude; Francis, Brian

    2014-01-01

    Sociological and criminological views of domestic and gender-based violence generally either dismiss it as not worthy of consideration, or focus on specific groups of offenders and victims (male youth gangs, partner violence victims). In this paper, we take a holistic approach to violence, extending the definition from that commonly in use to encompass domestic violence and sexual violence. We operationalize that definition by using data from the latest sweep of the Crime Survey for England and Wales. By so doing, we identify that violence is currently under-measured and ubiquitous; that it is gendered, and that other forms of violence (family violence, acquaintance violence against women) are equally of concern. We argue that violence studies are an important form of activity for sociologists. PMID:25641992

  14. False targets vs. redundancy in homogeneous parallel systems

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2009-01-01

    System defense against natural threats and disasters that have a stochastic nature includes providing redundancy and protecting system elements. The defense against strategic intentional attacks can also include deploying false targets aimed at misleading the attacker. Distribution of the available resources among different defensive means is an important problem that arises in organizing the defense of complex civil infrastructures, industrial systems or military objects. The article considers defense resource allocation in a system exposed to external intentional attack. The expected damage caused by the attack is evaluated as system unsupplied demand. The defender distributes its limited resource between deploying redundant genuine elements and false elements, both of which are targets of attack. The attacker attacks a subset of the elements and distributes its limited resource evenly among the attacked elements. Two cases are considered: in the first one the number of attacked elements and the vulnerability of each genuine element are fixed and the defense resource distribution is determined as a solution of an optimization problem; in the second one the number of attacked elements is the attacker's free choice variable and the element's vulnerability depends on a contest determined by the defender's and attacker's resources allocated to each element. The defender's optimal resource distribution strategy is determined as a solution of a two-period minmax game. It is shown that the optimal number of genuine elements decreases monotonically with the growth of the element cost and vulnerability, whereas the optimal number of false elements demonstrates non-monotonic behavior. The contest intensity is an important factor influencing the optimal defense resource distribution. It cannot be ignored when the defense strategy is determined, and it thus also impacts the attack strategy

  15. On-Line Detection of Distributed Attacks from Space-Time Network Flow Patterns

    National Research Council Canada - National Science Library

    Baras, J. S; Cardenas, A. A; Ramezani, V

    2003-01-01

    .... The directionality of the change in a network flow is assumed to have an objective or target. The particular problem of detecting distributed denial of service attacks from distributed observations is presented as a working framework...

  16. School violence in the eyes of the beholders: an integrative aggression-victimization perspective.

    Science.gov (United States)

    Laskov-Peled, Ronit; Wolf, Yuval

    2002-10-01

    Five experiments explored, within the framework of functional measurement, the importance assigned by 3rd and 4th graders (n = 117) to expectations of potential perpetrators from their potential victims. Each participant was requested to imagine potential incidents of school violence where four familiar classmates were presented as protagonists (i.e., perpetrator and victim). An orderly manipulation of the combination of the level (high or low) of aggressiveness and susceptibility to victimization in each protagonist was made. The participants were informed whether or not the victim was about to deliver tangible rewards, display signs of suffering, or retaliate (2*2*2 = 8 conditions). For each potential incident, the participant estimated the likelihood that an attack will take place. The following order of importance was found: Reward > Retaliation > Suffering. Victim's aggressiveness was slightly effective. From an applied perspective, most notable is the tendency to lower the likelihood of violence when the educator knows about the incidents.

  17. FAMILY VIOLENCE – MARRIAGE VIOLENCE WITH A FATAL OUTCOME

    OpenAIRE

    Lidija Kostic-Banovic; Ljubisa Milosavljevic; Radovan Karadzic; Aleksandra Antovic

    2006-01-01

    Family violence represents an especially dangerous social form of violence by means of which the rights of an individual – a member of a family – to live, to have psychic, physical and sexual integrity, freedom, security and human dignity, have been violated. The term marriage violence entails every form of physical, sexual, psychic and economic abuse of women by husbands or illegitimate partner. The family violence represents a widespread form of crime, and since it has become dramatic and d...

  18. Counter-Leadership Targeting and Conflict Termination

    National Research Council Canada - National Science Library

    Taylor, Bradly

    1999-01-01

    .... Can the leader be found? And, is it legal and ethical to attack the leader? Analysis rarely has been conducted to determine whether the targeted organization is vulnerable to Counter Leadership Targeting (CLT...

  19. Moving Target Techniques: Cyber Resilience throught Randomization, Diversity, and Dynamism

    Science.gov (United States)

    2017-03-03

    attacks. Simply put, these techniques turn systems into moving targets that will be hard for cyber attackers to compromise. MT techniques leverage...been diversified, they can attack it as if it was not diversified at all. Dynamic Data: Techniques in the dynamic data domain change the format

  20. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  1. Longitudinal Mediators of Relations Between Family Violence and Adolescent Dating Aggression Perpetration

    Science.gov (United States)

    Reyes, H. Luz McNaughton; Foshee, Vangie A.; Fortson, Beverly L.; Valle, Linda A.; Breiding, Matthew J.; Merrick, Melissa T.

    2015-01-01

    Few longitudinal studies have examined the pathways through which family violence leads to dating aggression. In the current study the authors used 3 waves of data obtained from 8th- and 9th-grade adolescents (N = 1,965) to examine the hypotheses that the prospective relationship between witnessing family violence and directly experiencing violence and physical dating aggression perpetration is mediated by 3 constructs: (a) normative beliefs about dating aggression (norms), (b) anger dysregulation, and (c) depression. Results from cross-lagged regression models suggest that the relationship between having been hit by an adult and dating aggression is mediated by changes in norms and anger dysregulation, but not depression. No evidence of indirect effects from witnessing family violence to dating aggression was found through any of the proposed mediators. Taken together, the findings suggest that anger dysregulation and normative beliefs are potential targets for dating abuse prevention efforts aimed at youth who have directly experienced violence. PMID:26719602

  2. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    International Nuclear Information System (INIS)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli

    2010-01-01

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  3. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    Energy Technology Data Exchange (ETDEWEB)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli (Dept. of Diagnostic Imaging, Sheba Medical center, Tel Hashomer, Sackler School of Medicine, Tel Aviv Univ., Tel Aviv (Israel)), e-mail: iris.eshed@sheba.health.gov.il

    2010-03-15

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  4. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses

    Directory of Open Access Journals (Sweden)

    Stephen Herzog

    2011-01-01

    Full Text Available In April 2007, the Estonian Government moved a memorial commemorating the Soviet liberation of the country from the Nazis to a less prominent and visible location in Tallinn. This decision triggered rioting among Russian-speaking minorities and cyber terrorism targeting Estonia's critical economic and political infrastructure. Drawing upon the Estonian cyber attacks, this article argues that globalization and the Internet have enabled transnational groups—such as the Russian diaspora—to avenge their grievances by threatening the sovereignty of nation-states in cyberspace. Sophisticated and virtually untraceable political "hacktivists" may now possess the ability to disrupt or destroy government operations, banking transactions, city power grids, and even military weapon systems. Fortunately, western countries banded together to effectively combat the Estonian cyber attacks and minimize their effects. However, this article concludes that in the age of globalization, interdependence, and digital interconnectedness, nation-states must engage in increased cooperative cyber-defense activities to counter and prevent devastating Internet attacks and their implications.

  5. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  6. The Role of Parent Communication and Connectedness in Dating Violence Victimization among Latino Adolescents.

    Science.gov (United States)

    Kast, Nicole Rebecca; Eisenberg, Marla E; Sieving, Renee E

    2016-06-01

    Dating violence among U.S. adolescents is a substantial concern. Previous research indicates that Latino youth are at increased risk of dating violence victimization. This secondary data analysis examined the prevalence of physical and sexual dating violence victimization among subgroups of Latino adolescents and associations of parent communication, parent caring, and dating violence victimization using data from the 2010 Minnesota Student Survey (N = 4,814). Parallel analyses were conducted for Latino-only and multiple-race Latino adolescents, stratified by gender. Multivariate logistic regression models tested associations between race/ethnicity, parent communication, perceived parent caring, and adolescent dating violence experiences. Overall, 7.2% to 16.2% of Latinos reported physical or sexual dating violence. Both types of dating violence were more prevalent among multiple-race Latinos than among Latino-only adolescents, with prevalence rates highest among multiple-race Latino females (19.8% and 19.7% for physical and sexual dating violence victimization, respectively). In multivariate models, perceived parent caring was the most important protective factor against physical and sexual dating violence among males and females. High levels of mother and father communication were associated with less physical violence victimization among males and females and with less sexual violence victimization among females. Results highlight the importance of parent communication and parent caring as buffers against dating violence victimization for Latino youth. These findings indicate potential for preventive interventions with Latino adolescents targeting family connectedness to address dating violence victimization. © The Author(s) 2015.

  7. The role of neighborhood income inequality in adolescent aggression and violence.

    Science.gov (United States)

    Pabayo, Roman; Molnar, Beth E; Kawachi, Ichiro

    2014-10-01

    Being a perpetrator or victim of assaults can have detrimental effects on the development and health of adolescents. Area-level income inequality has been suggested to be associated with crime and aggressive behavior. However, most prior research on this association has been ecological. Therefore, the purpose of this investigation was to describe the association between neighborhood-level income inequality and aggression and violence outcomes. Data were collected from a sample of 1,878 adolescents living in 38 neighborhoods participating in the 2008 Boston Youth Survey. We used multilevel logistic regression models to estimate the association between neighborhood income inequality and attacking someone with a weapon, being attacked by someone with a weapon, being physically assaulted, being shown a gun by someone in the neighborhood, shot at by someone in the neighborhood, witnessing someone getting murdered in the past year, and having a close family member or friend murdered. Race and income inequality cross-level interactions were tested. Analyses were stratified by sex. Among nonblack boys, after adjusting for nativity, age, neighborhood-level income, crime, disorder, and proportion of the neighborhood that is black, income inequality was associated with an increased risk for committing acts of aggression and being a victim of violence. Among nonblack girls, those living in neighborhoods with high-income inequality were more likely to witness someone die a violent death in the previous year, in comparison to those in more equal neighborhoods. Income inequality appears to be related to aggression and victimization outcomes among nonblack adolescents living in Boston. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  8. Life Course Typology of Adults Who Experienced Sexual Violence

    Science.gov (United States)

    Draucker, Claire Burke; Martsolf, Donna S.

    2011-01-01

    Two qualitative methodologies were used to develop a life course typology of individuals who had been exposed to sexual violence. Interview narratives of 121 adult women and men who participated in qualitative study of women’s and men’s responses to sexual violence provided the data. The authors combined a narrative approach (holistic-content and holistic-form analysis) to describe the life courses of the participants and a qualitative person-oriented approach (cross-case analysis) to identify meaningful sub-groups within the total sample. The six groups are: (a) life of turmoil, (b) life of struggles, (c) diminished life, (d) taking control of life, (e), finding peace in life, and (f) getting life back to normal. This work exemplifies a promising strategy for identifying sub-groups of violence-exposed individuals within a heterogeneous sample. Such a typology could aid the development of treatment approaches that consider both the substance and the structure of an individual’s life course, rather than target one specific type of violence. PMID:19762554

  9. Violence interpersonnelle au travail : typologie des acteurs, agresseurs et cibles Interpersonal Violence in the Workplace: Typology of the Actors - Aggressors and Targets Violencia interpersonal en el trabajo : tipología de los actores, agresores y víctimas

    Directory of Open Access Journals (Sweden)

    Michel Vézina

    2011-11-01

    Full Text Available Le phénomène de violence interpersonnelle au travail a été largement étudié au cours des dix dernières années, mais rares sont les auteurs qui l’ont abordé dans une optique compréhensive, en prenant appui sur le témoignage des travailleurs. Le sens que revêt la violence pour les travailleurs demeure, lui, très peu exploré. Les auteurs présentent les résultats d’une étude compréhensive qui a permis de dégager une typologie des agresseurs et des cibles de la violence interpersonnelle et d’ouvrir la voie au développement d’un modèle compréhensif plus large ainsi qu’à une réflexion sur les interventions à développer pour agir sur ce phénomène.Interpersonal violence in the workplace is a phenomenon that has been widely studied over the last ten years. However, very few authors have examined it from a comprehensive perspective (based on the accounts of workers. Violence in terms of what it means for workers has hardly been explored. The authors present the results of a comprehensive study that has identified a typology of both the aggressors and the targets of interpersonal violence, and that has led to the development of a broader comprehensive model and the consideration of interventions that could be developed to deal with this phenomenon.El fenómeno de violencia interpersonal en el trabajo fue ampliamente estudiado en el curso de los últimos diez años, pero son raros los autores que lo abordaron dentro de una óptica comprensiva, apoyándose en el testimonio de los trabajadores. El sentido que reviste esta violencia para los trabajadores queda muy poco explorado. Los autores presentan los resultados de un estudio comprensivo que ha permitido extraer una tipología de los agresores y de las víctimas de la violencia interpersonal y abrir la vía al desarrollo de un modelo comprensivo más amplio, así como una reflexión sobre las intervenciones a desarrollar para actuar sobre este fenómeno.

  10. Multiple operating system rotation environment moving target defense

    Science.gov (United States)

    Evans, Nathaniel; Thompson, Michael

    2016-03-22

    Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.

  11. Substance use disorders and self- and other-directed violence among adults: Results from the National Survey on Drug Use And Health.

    Science.gov (United States)

    Harford, Thomas C; Yi, Hsiao-Ye; Chen, Chiung M; Grant, Bridget F

    2018-01-01

    Previous studies have identified a violence typology of self- and other-directed violence. This study examines the extent to which substance use disorders (SUDs) as defined by the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV), independent of serious psychological distress, major depressive episodes, assault arrest, and criminal justice involvement, are associated with these violence categories. Data were obtained from the National Survey on Drug Use and Health (NSDUH) pooled across survey years 2008-2015, with a combined sample of 314,881 adult respondents. According to self-report data on suicide attempt (self-directed) and attacking someone with the intent for serious injury (other-directed), violence was categorized in four categories: none, self-directed only, other-directed only, and combined self-/other-directed. Multinomial logistic regression was used to estimate the adjusted odds ratios associated with the risk factors for different forms of violence. Nicotine dependence and the number of DSM-IV SUDs criteria (except the criterion of legal problems) for alcohol, marijuana, and pain reliever use disorders are significantly associated with the self-/other-directed violence categories. Cross-sectional data do not allow assessment of directionality of important factors. The identification of the combined self- and other-directed violence among adults in the general population extends studies in the adolescent population, and significant correlation between self- and other-directed violence provides additional support for clinical studies that established this association. Findings expand the associated risk factors identified in previous studies for the adult population. Prevention and treatment programs need to address both forms of violence and suicidality. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Evaluation of the Responsible, Engaged, and Loving (REAL) Fathers Initiative on Physical Child Punishment and Intimate Partner Violence in Northern Uganda

    OpenAIRE

    Ashburn, Kim; Kerner, Brad; Ojamuge, Dickens; Lundgren, Rebecka

    2016-01-01

    Violence against women and violence against children in Uganda are recognized as significant public health concerns. Exposure to violence at home as a child can increase the likelihood of perpetrating or experiencing violence later in life. These two forms of violence share similar risk factors and often, but not always, co-occur at the household level. Parenting programs have shown promise in reducing physical child punishment. Targeting men has also been proven effective in transforming att...

  13. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  14. Hotels as a target for terrorism: a study of the Helsinki area hotels’ preparedness for an attack

    OpenAIRE

    Kovalevskiy, Andrey

    2015-01-01

    The threat of terrorism is an issue that is not to be taken lightly in the world of today. The year 2015 has sadly been marked with an unsettlingly high number of acts of terror across the globe that claimed a multitude of civilian lives. The hospitality industry and hotels in particular are especially vulnerable to a potential terrorist attack, and this fact attracted the author’s attention to the issue of the prevention of such attacks and the measures (if any) that the Helsinki hotels are ...

  15. Why does Existential Threat Promote Intergroup Violence? Examining the Role of Retributive Justice and Cost-Benefit Utility Motivations.

    Science.gov (United States)

    Hirschberger, Gilad; Pyszczynski, Tom; Ein-Dor, Tsachi

    2015-01-01

    The current research examined the role of retributive justice and cost-benefit utility motivations in the process through which mortality salience increases support for violent responses to intergroup conflict. Specifically, previous research has shown that mortality salience often encourages political violence, especially when perceptions of retributive justice are activated. The current research examined whether mortality salience directly activates a justice mindset over a cost-benefit utility mindset, and whether this justice mindset is associated with support for political violence. In Study 1 (N = 209), mortality salience was manipulated among Israeli participants who then read about a Hamas attack on Israel with either no casualties or many casualties, after which justice and utility motivations for retribution were assessed. Study 2 (N = 112), examined whether the link between death primes and support for an Israeli preemptive strike on Iran's nuclear facilities is mediated by justice or cost-benefit utility considerations. Results of both studies revealed that primes of death increased justice-related motivations, and these motives, rather than utility motives, were associated with support for violence. Findings suggest that existential concerns often fuel violent intergroup conflict because they increase desire for retributive justice, rather than increase belief that violence is an effective strategy. These findings expand our knowledge on the motivations for intergroup violence, and shed experimental light on real-life eruptions of violent conflict indicating that when existential concerns are salient, as they often are during violent conflict, the decision to engage in violence often disregards the utility of violence, and leads to the preference for violent solutions to political problems - even when these solutions make little practical sense.

  16. Violence in childhood, attitudes about partner violence, and partner violence perpetration among men in Vietnam.

    Science.gov (United States)

    Yount, Kathryn M; Pham, Huyen Tran; Minh, Tran Hung; Krause, Kathleen H; Schuler, Sidney Ruth; Anh, Hoang Tu; VanderEnde, Kristin; Kramer, Michael R

    2014-05-01

    We assess the association of men's exposure to violence in childhood-witnessing physical violence against one's mother and being hit or beaten by a parent or adult relative-with their attitudes about intimate partner violence (IPV) against women. We explore whether men's perpetration of IPV mediates this relationship and whether men's attitudes about IPV mediate any relationship of exposure to violence in childhood with perpetration of IPV. Five hundred twenty-two married men 18-51 years in Vietnam were interviewed. Multivariate regressions for ordinal and binary responses were estimated to assess these relationships. Compared with men experiencing neither form of violence in childhood, men experiencing either or both had higher adjusted odds of reporting more reasons to hit a wife (aOR, 1.43; 95% CI, 1.03-2.00 and aOR, 1.66; 95% CI, 1.05-2.64, respectively). Men's lifetime perpetration of IPV accounted fully for these associations. Compared with men experiencing neither form of violence in childhood, men experiencing either or both had higher adjusted odds of ever perpetrating IPV (aOR, 3.28; 95% CI, 2.15-4.99 and aOR, 4.56; 95% CI, 2.90-7.17, respectively). Attitudes about IPV modestly attenuated these associations. Addressing violence in childhood is needed to change men's risk of perpetrating IPV and greater subsequent justification of it. Copyright © 2014 Elsevier Inc. All rights reserved.

  17. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  18. School Violence

    Science.gov (United States)

    Schonfeld, Irvin Sam

    2006-01-01

    The purpose of this chapter is threefold. First, the chapter summarizes what is known about the prevalence of violence and weapons in U.S. schools. Second, the chapter examines theories that bear on school violence and the empirical evidence linked to those theories. Third, the chapter looks at attempts to prevent school violence and,…

  19. Private Political Violence and Boss-Rule in the Philippines

    Directory of Open Access Journals (Sweden)

    Peter Kreuzer

    2009-04-01

    Full Text Available Despite its rather strong and venerable democratic credentials the Philippines is still marred by political violence. Targeted killings and physical harassment by vigilantes, death squads, private armed groups, para-military militias, the police or members of the armed forces as well as violent competition for political jobs cost hundreds of lives every year. One central anchor point of this broad range of violent actors and forms are the locally embedded political bosses. (Defective democracy provides an ideal frame for the continuing competition between various segments of the highly fragmented elite. The paper shows how the bosses succeeded in controlling most means of political violence employed and were thereby able to advance their interests to an extraordinary extent. Upholding private control over means of violence furthered their interests as a political class even though it weakened the state

  20. The protective role of maternal racial socialization for African American adolescents exposed to community violence.

    Science.gov (United States)

    Henry, Jessica S; Lambert, Sharon F; Smith Bynum, Mia

    2015-08-01

    Urban African American youth's disproportionate exposure to community violence and increased risk for its adverse consequences have heightened interest in identifying protective factors that mitigate the effects of community violence exposure for these youth. Thus, the present study examined whether maternal racial socialization messages protect African American adolescents against the adverse effects of community violence exposure. Participants were a community sample of African American adolescents (N = 106; mean age = 15.41 years) and their female guardians. For community-violence-exposed youth, maternal racial socialization messages protected against aggressive behaviors and depressive symptoms, such that maternal messages about cultural pride attenuated the association between community violence exposure and parent-reported aggressive behaviors, and cultural appreciation of legacy messages attenuated the association between community violence exposure and adolescent-reported depressive symptoms. Findings highlight the need to integrate race-relevant factors into preventive interventions targeting African American youth at risk for or exposed to community violence, and suggest that family interventions promoting parents' efficacy to implement racial socialization practices are useful for youth exposed to violence. (c) 2015 APA, all rights reserved).

  1. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  2. The overlap between offending trajectories, criminal violence, and intimate partner violence.

    Science.gov (United States)

    Piquero, Alex R; Theobald, Delphine; Farrington, David P

    2014-03-01

    This article investigates the overlap between offending trajectories, criminal violence, and intimate partner violence (IPV) and the factors associated with these behaviors. Knowledge on these questions is relevant to theory and policy. For the former, this article considers the extent to which specific theories are needed for understanding crime, criminal violence, and/or IPV, whereas for the latter, it may suggest specific offense- and offender-based policies. We use data from the Cambridge Study in Delinquent Development that traces the offending, criminal violence, and IPV of males to age 50. Findings show that there is significant overlap between criminal violence and IPV, high-rate offending trajectories have increased odds of criminal violence and IPV, and early childhood risk factors have no additional effect on criminal violence and IPV in adulthood over and above the offending trajectories.

  3. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  4. Breaking barriers: addressing structural obstacles to social service provision for Asian survivors of domestic violence.

    Science.gov (United States)

    Lee, Mihan

    2013-11-01

    Many studies have attributed the disproportionately high rate of domestic violence in Asian communities to Asian patriarchal "cultural norms" and the psychological and behavioral traits that these norms produce in individuals. This article seeks to expand the scope of domestic violence analysis beyond these individual and cultural frameworks, arguing that Asian domestic violence is also a product of larger scale, social systems of inequality. By examining the funding criteria of the Family Violence Prevention Services Administration (FVPSA) and the Quality-Adjusted Life Year (QALY) standard used by Robin Hood, my research shows how state and private organizations systematically devalue and underfund minority-targeted programs.

  5. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  6. The gendered trouble with alcohol: young people managing alcohol related violence.

    Science.gov (United States)

    Lindsay, Jo

    2012-05-01

    Alcohol related violence is a troubling backdrop to the social lives and relationships of many young people in post-industrial societies. The development of the night-time economy where young people are encouraged to drink heavily in entertainment precincts has increased the risk of violence. This paper reports on 60 individual structured in-depth interviews about the drinking biographies of young people (aged 20-24) living in Victoria, Australia. Twenty-six males and 34 females participated in the research. The participants discussed their experiences with alcohol over their life course to date. The material on alcohol related violence is analysed in this paper. Just over half of the participants (33/60) recounted negative experiences with alcohol related violence. The findings demonstrate the continuing gendered nature of experiences of perpetration and victimization. Participants reported that aggression and violence perpetrated by some men was fuelled by alcohol consumption and required ongoing management. Experiences of violence were also spatialized. Men were more likely to report managing and avoiding violence in particular public settings whilst more women than men discussed managing violence in domestic settings. The central argument of this paper is that incidents of alcohol related violence and reactions to it are specific gender performances that occur in specific socio-cultural contexts. In contrast to research which has found some young people enjoy the adventure and excitement of alcohol related violence the mainstream participants in this study saw violence as a negative force to be managed and preferably avoided. Understanding violence as a dynamic gender performance complicates the development of policy measures designed to minimize harm but also offers a more holistic approach to developing effective policy in this domain. There is a need for greater acknowledgement that alcohol related violence in public venues and in families is primarily about

  7. Risk of violence in drug rehabilitation centers: perceptions of people who inject drugs in Tijuana, Mexico.

    Science.gov (United States)

    Harvey-Vera, Alicia Yolanda; González-Zúñiga, Patricia; Vargas-Ojeda, Adriana Carolina; Medina-Mora, Maria Elena; Magis-Rodríguez, Carlos Leonardo; Wagner, Karla; Strathdee, Steffanie Anne; Werb, Daniel

    2016-01-26

    In 2009, Mexico reformed its health law to partially decriminalize drug possession considered for personal use and to increase mandatory referrals to certified drug rehabilitation centers in lieu of incarceration. Concurrently, news media reported violent attacks perpetrated by drug cartels against Mexican drug rehabilitation centers and instances of human rights violations by staff against people who inject drugs (PWID) in treatment. In many cases, these violent situations took place at "Peer Support" (Ayuda Mutua) drug rehabilitation centers that house a large number of drug-dependent PWID. In an effort to understand barriers to treatment uptake, we examined prevalence and correlates of perceived risk of violence at drug rehabilitation centers among PWID in Tijuana, Mexico. Secondary analysis of baseline data collected between March 2011 and May 2013 of PWID recruited into a prospective cohort study in Tijuana. Interviewer-administered surveys measured perceived risk of violence at drug rehabilitation centers by asking participants to indicate their level of agreement with the statement "going to rehabilitation puts me at risk of violence". Logistic regression was used to examine factors associated with perceived risk of violence. Of 733 PWID, 34.5 % perceived risk of violence at drug rehabilitation centers. In multivariate analysis, reporting ever having used crystal methamphetamine and cocaine (separately), having a great or urgent need to get help for drug use, and ever receiving professional help for drug/alcohol use were negatively associated with perceived risk of violence at drug rehabilitation centers, while having been told by law enforcement that drug rehabilitation attendance is mandatory was positively associated with perceived risk of violence. All associations were significant at a 0.05 alpha level. The perception of violence at drug rehabilitation centers among PWID does not represent the lived experience of those PWID who attended

  8. VIOLENCE DRESSED IN HUMOR: COMEDIC VIOLENCE IN ADVERTISING

    OpenAIRE

    Camelia Gradinaru

    2016-01-01

    This paper investigates the concepts of humor and violence and their complex relationships contextualised in the advertising domain. Thus, the main theories of humor and the most important elements from media violence paradigms are critically pointed out. The effects of comedic violence in advertising may be positive (great involvement with the ad message, retention of brand information, higher pass-along probability), and also negative (offending the audience, desensitization, damaging the r...

  9. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  10. Aftermath of bustamante attack on genomic beacon service.

    Science.gov (United States)

    Aziz, Md Momin Al; Ghasemi, Reza; Waliullah, Md; Mohammed, Noman

    2017-07-26

    With the enormous need for federated eco-system for holding global genomic and clinical data, Global Alliance for Genomic and Health (GA4GH) has created an international website called beacon service which allows a researcher to find out whether a specific dataset can be utilized to his or her research beforehand. This simple webservice is quite useful as it allows queries like whether a certain position of a target chromosome has a specific nucleotide. However, the increased integration of individuals genomic data into clinical practice and research raised serious privacy concern. Though the answer of such queries are yes or no in Bacon network, it results in serious privacy implication as demonstrated in a recent work from Shringarpure and Bustamante. In their attack model, the authors demonstrated that with a limited number of queries, presence of an individual in any dataset can be determined. We propose two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service. We also elaborate the strength and weakness of the attack by explaining some of their statistical and mathematical models using real world genomic database. We extend their experimental simulations for different adversarial assumptions and parameters. We experimentally evaluated the solutions on the original attack model with different parameters for better understanding of the privacy and utility tradeoffs provided by these two methods. Also, the statistical analysis further elaborates the different aspects of the prior attack which leads to a better risk management for the participants in a beacon service. The differentially private and lightweight solutions discussed here will make the attack much difficult to succeed while maintaining the fundamental motivation of beacon database network.

  11. Adolescent dating violence: an overview of foreign studies

    Directory of Open Access Journals (Sweden)

    Lukovtseva Z.V.

    2018-03-01

    Full Text Available The article presents a methodical analysis of the current experience of preventing adolescent and youthful dating violence in Russia and other countries (USA, Great Britain, Switzerland, etc.. The most controversial issues concerning the organization and conduct of preventive programs have been singled out; in particular, the choice of the main target group is considered in the light of current ideas about the micro-mediated factors of violence at the stage of dating in adolescent youthful pairs. Four strategies that are most widely used in the designated area of preventive work are described in detail: information, behavioral (training, personality-oriented and experiential. The "philosophy" of each strategy, which determines the methodological content of the activity of the psychologist and his professional position in interaction with participants, is characterized through a «conditional message» to the group. The recommendations on the prevention of violence at the stage of dating in adolescent and youth are formulated.

  12. Reducing Urban Violence: A Contrast of Public Health and Criminal Justice Approaches.

    Science.gov (United States)

    Cerdá, Magdalena; Tracy, Melissa; Keyes, Katherine M

    2018-01-01

    Cities are investing millions in Cure Violence, a public health approach to reduce urban violence by targeting at-risk youth and redirecting conflict to nonviolent responses. The impact of such a program compared with criminal justice responses is unknown because experiments directly comparing criminal justice and public health approaches to violence prevention are infeasible with observational data. We simulated experiments to test the influence of two interventions on violence: (1) Cure Violence and (2) directed police patrol in violence hot spots. We used an agent-based model to simulate a 5% sample of the New York City (NYC) adult population, with agents placed on a grid representing the land area of NYC, with neighborhood size and population density proportional to land area and population density in each community district. Agent behaviors were governed by parameters drawn from city data sources and published estimates. Under no intervention, 3.87% (95% CI, 3.84, 3.90) of agents were victimized per year. Implementing the violence interrupter intervention for 10 years decreased victimization by 13% (to 3.35% [3.32, 3.39]). Implementing hot-spots policing and doubling the police force for 10 years reduced annual victimization by about 11% (to 3.46% [3.42, 3.49]). Increasing the police force by 40% combined with implementing the violence interrupter intervention for 10 years decreased violence by 19% (to 3.13% [3.09, 3.16]). Combined investment in a public health, community-based approach to violence prevention and a criminal justice approach focused on deterrence can achieve more to reduce population-level rates of urban violence than either can in isolation. See video abstract at, http://links.lww.com/EDE/B298.

  13. Narrative Exemplars and the Celebrity Spokesperson in Lebanese Anti-Domestic Violence Public Service Announcements.

    Science.gov (United States)

    El-Khoury, Jessica R; Shafer, Autumn

    2016-08-01

    Domestic violence is a worldwide epidemic. This study examines the effects of narrative exemplars and a celebrity spokesperson in anti-domestic violence ads on Lebanese college students' attitudes and beliefs towards domestic violence and whether these effects are impacted by personal experience. The practical significance is derived from the high prevalence of domestic violence internationally, making it important to find ways to effectively use media to address this health-related issue that has huge consequences for the individual and society. This study adds to the theoretical understanding of narrative persuasion and media effects. Results indicated that narrative exemplars in anti-domestic violence ads promoting bystander awareness and intervention were more beneficial for people without relevant experience compared to people who know someone affected by domestic violence. Anti-domestic violence ads without narrative exemplars, but that also featured an emotional self-efficacy appeal targeting bystanders, were more effective for participants who know someone who had experienced domestic violence compared to participants without relevant experience. The presence of a celebrity spokesperson elicited more positive attitudes about the ad than a noncelebrity, but failed to directly affect relevant anti-domestic violence attitudes or beliefs. These results highlight the significance of formative audience research in health communication message design.

  14. Children's Exposure to Violence: The Underlying Effect of Posttraumatic Stress Symptoms on Behavior Problems.

    Science.gov (United States)

    Yoon, Susan; Steigerwald, Stacey; Holmes, Megan R; Perzynski, Adam T

    2016-02-01

    In this study we investigated whether witnessing violence and violence victimization were associated with children's internalizing and externalizing behavior problems and examined the mediating role of posttraumatic stress (PTS) symptoms in these relationships. Secondary data analysis was conducted using 3 waves of data from the National Survey of Child and Adolescent Well-Being. Path analyses were conducted to test direct and indirect effects of violence exposure on behavior problems, using 2,064 children (ages 8-15 years) reported to Child Protective Services for maltreatment. Being a victim of violence in the home was directly associated with more internalizing (β = .06, p = .007) and externalizing behavior problems (β = .07, p = .002), whereas witnessing violence was not directly related to either internalizing (β = .04, p = .056) or externalizing behavior problems (β = .03, p = .130). PTS symptoms mediated the effects of witnessing violence and violence victimization on internalizing behavior problems (β = .02, p = .002). Our findings suggest that PTS symptoms may be a mechanism underlying the association between violence exposure and internalizing behavior problems (R(2) = .23), underscoring the potential importance of assessing PTS symptoms and providing targeted trauma-focused interventions for children exposed to violence at home. Copyright © 2016 International Society for Traumatic Stress Studies.

  15. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  16. Intimate Partner Violence Perpetration by Court-Ordered Men: Distinctions among Subtypes of Physical Violence, Sexual Violence, Psychological Abuse, and Stalking

    Science.gov (United States)

    Hall, Jeffrey E.; Walters, Mikel L.; Basile, Kathleen C.

    2012-01-01

    This study continues previous work documenting the structure of violence perpetrated by males against their female intimate partners. It assesses the construct validity of a measurement model depicting associations among eight subtypes of perpetration: moderate physical violence, severe physical violence, forced or coerced sexual violence, sexual…

  17. Proactive Routing Mutation Against Stealthy Distributed Denial of Service Attacks – Metrics, Modeling and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Qi; Al-Shaer, Ehab; Chatterjee, Samrat; Halappanavar, Mahantesh; Oehmen, Christopher S.

    2018-04-01

    The Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploit the inherent weakness of cyber infrastructure including deterministic nature of routes, skew distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and es- timate the impact of such susceptibility on enterprises. Second, we develop a proactive route mutation technique to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and qualify of service requirements. We present an integrated approach of proactive route mutation that combines both infrastructure-based mutation that is based on reconfiguration of switches and routers, and middle-box approach that uses an overlay of end-point proxies to construct a virtual network path free of critical links to reach a destination. We implemented the proactive path mutation technique on a Software Defined Network using the OpendDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.

  18. The Treatment of Images in 11-M Terrorist Attacks. Terrorism and Violence in the Press

    Directory of Open Access Journals (Sweden)

    Dra. Emma Torres Romay

    2006-01-01

    Full Text Available In this paper we want to analyze the pictures publishing in the Spanish and international newspapers before the Madrid terrorist attack, March, 11. With this research we get some ideas about freedom speech limits: the respect of the privacy and, in special, the respect of the pain. At the same time, we´ll remark the importance of the photography in the press and their communication power. For this research we used the March, 11 and 12 newspapers of most important Spanish editors and the digital edition of international press.

  19. PREDICTIONEER’S GAME: THE COLLECTIVE VIOLENCE IN ECUADOR

    Directory of Open Access Journals (Sweden)

    Michal Mochťak

    2011-12-01

    Full Text Available The paper analyses collective violence in Ecuador from the end of September 2010. The situation was characterized as a Coup d'état when violent clashes between hostile camps were identified. The president was attacked by rebellious units of state police that had protested against the planned cuts of benefits and salaries in the law enforcement sector. The society was threatened by local riots, temporary anarchy and violent clashes that led to the declaration of state of emergency by president Correa. On the basis of empirical data, the prediction model is designed according to the analytical tool “Predictioneer’s Game“ defined by Bruce Bueno de Mesquita. The prediction is aimed at the forecast of the stability of regime in the context of the events from the 30th September 2010.

  20. Crime, violence, and behavioral health: collaborative community strategies for risk mitigation.

    Science.gov (United States)

    Pinals, Debra A

    2015-06-01

    Criminal conduct is not always violent, and violence does not always lead to criminal charges. Moreover, crime and violence have multifaceted etiologies. Most violence in society is not attributable to mental illness. Where there is a small relationship between violence and mental illness, the risk of violence increases for individuals with substance use histories. Underlying trauma can also play a role. Antisocial attitudes, behaviors, and peer groups further increase the risk that individuals, including those with mental illness, will find themselves at risk of criminal recidivism. Criminal histories among public mental health populations, and mental health and substance use disorders among criminal populations are each higher than general population comparisons. Care within behavioral health settings should therefore target decreased criminal recidivism and decreased violence as part of recovery for those individuals at risk, using trauma-informed approaches and peer supports. Interventions that show promise bring criminal justice and behavioral health systems together, and include police-based diversion, specialty courts, court-based alternatives to incarceration, and coordinated re-entry programs. This article reviews these options along with specific risk management strategies, such as using risk, needs, and responsivity factors as a means of improving overall outcomes for persons with mental illness, while minimizing their risk of further criminalization and victimization.

  1. Anger Mediates the Relation between Violence Exposure and Violence Perpetration in Incarcerated Boys

    Science.gov (United States)

    Kimonis, Eva R.; Ray, James V.; Branch, Jessica R.; Cauffman, Elizabeth

    2011-01-01

    Youth who are exposed to violence are more likely to perpetrate violence. Incarcerated youth are a special population that is at a significantly greater risk for violent offending because of their relatively greater rates of violence exposure. Two important outcomes of violence exposure that may help explain its link with violence perpetration are…

  2. Patients' bill of rights and effective factors of workplace violence against female nurses on duty at Ilam teaching hospitals.

    Science.gov (United States)

    Aivazi, Ali-Ashraf; Menati, Waleyeh; Tavan, Hamed; Navkhasi, Sasan; Mehrdadi, Abuzar

    2017-01-01

    Workplace violence against female nurses is an increasing problem. In addition, recognition the rights of patients can reduce such violence against female nurses. Therefore, the aim of the current study was to investigate workplace violence against female nurses in respect with patients' bill of rights at two public hospitals of Ilam in 2012. In a descriptive cross-sectional research, workplace violence against female nurses was studied. Data were gathered employing a researcher made questionnaire filled out by 106 female nurses. The questionnaire was on workplace, physical and verbal violence of patients and their attendants, and also the patient's rights as respected by nursing staff. Permission of university ethics committee was obtained. Data analyses were done by T-test and ANOVA in SPSS software. Totally, 90.6 % and 15.1 % of the participants were subjected to verbal and physical assaults by patients, respectively during last year of the study. Further, 92.5% and 11.3% of nurses experienced verbal and physical assaults by the patients' attendants, respectively. Most of the nursing staff believed that reporting aggressive attacks to the concerned officials would not be useful. A negative significant correlation was found between the aggressions of patients with age as well as marital status of nurses, (P= 0.04). Furthermore, a significant association was seen between physical violence of patients and the nurses' recognition of the patients' bill of rights (P= 0.03). Due to high rate of violence against female nurses, some proper and effective actions such as employing a trained security force along with legal punitive charges against violators through responsible officials are highly suggested. © 2017 KUMS, All rights reserved.

  3. Patients’ bill of rights and effective factors of workplace violence against female nurses on duty at Ilam teaching hospitals

    Science.gov (United States)

    Aivazi, Ali Ashraf; Menati, Waleyeh; Tavan, Hamed; Navkhasi, Sasan; Mehrdadi, Abuzar

    2017-01-01

    Abstract: Background: Workplace violence against female nurses is an increasing problem. In addition, recognizing the rights of patients can reduce such violence against female nurses. Therefore, the aim of the current study was to investigate workplace violence against female nurses in respect of patients' bill of rights at two public hospitals in Ilam in 2012. Methods: In a descriptive cross-sectional research, workplace violence against female nurses was studied. Data were gathered employing a researcher made questionnaire filled out by 106 female nurses. The questionnaire was on workplace, physical and verbal violence of patients and their attendants, and also the patients' rights as respected by nursing staff. Permission of university ethics committee was obtained. Data analyses were done by T-test and ANOVA in SPSS software. Results: Totally, 90.6 % and 15.1 % of the participants were subjected to verbal and physical assaults by patients, respectively during last year of the study. Further, 92.5% and 11.3% of nurses experienced verbal and physical assaults by the patients' attendants, respectively. Most of the nursing staff believed that reporting aggressive attacks to the concerned officials would not be useful. A negative significant correlation was found between the aggressions of patients with age as well as marital status of nurses, (P= 0.04). Furthermore, a significant association was seen between physical violence of patients and the nurses’ recognition of the patients' bill of rights (P= 0.03). Conclusions: Due to high rate of violence against female nurses, some proper and effective actions such as employing a trained security force along with legal punitive charges against violators through responsible officials are highly suggested. PMID:28039684

  4. Patients’ bill of rights and effective factors of workplace violence against female nurses on duty at Ilam teaching hospitals

    Directory of Open Access Journals (Sweden)

    Ali-Ashraf Aivazi

    2017-01-01

    Full Text Available Background: Workplace violence against female nurses is an increasing problem. In addition, recognition the rights of patients can reduce such violence against female nurses. Therefore, the aim of the current study was to investigate workplace violence against female nurses in respect with patients' bill of rights at two public hospitals of Ilam in 2012. Methods: In a descriptive cross-sectional research, workplace violence against female nurses was studied. Data were gathered employing a researcher made questionnaire filled out by 106 female nurses. The questionnaire was on workplace, physical and verbal violence of patients and their attendants, and also the patient's rights as respected by nursing staff. Permission of university ethics committee was obtained. Data analyses were done by T-test and ANOVA in SPSS software. Results: Totally, 90.6 % and 15.1 % of the participants were subjected to verbal and physical assaults by patients, respectively during last year of the study. Further, 92.5% and 11.3% of nurses experienced verbal and physical assaults by the patients' attendants, respectively. Most of the nursing staff believed that reporting aggressive attacks to the concerned officials would not be useful. A negative significant correlation was found between the aggressions of patients with age as well as marital status of nurses, (P= 0.04. Furthermore, a significant association was seen between physical violence of patients and the nurses' recognition of the patients' bill of rights (P= 0.03. Conclusions: Due to high rate of violence against female nurses, some proper and effective actions such as employing a trained security force along with legal punitive charges against violators through responsible officials are highly suggested.

  5. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  6. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history...... of their development, how they are integrated into operational planning through strategies of deliberate targeting for modern operations. The paper will draw experience and case studies from Iraq, Syria, and Afghanistan and will offer some lessons learned as well as insight into the future of these methodologies....... Including their possible application on a national security level for managing longer strategic endeavors....

  7. Robustness against attacks of dual polarization encryption using the Stokes-Mueller formalism

    Science.gov (United States)

    Dubreuil, Matthieu; Alfalou, Ayman; Brosseau, Christian

    2012-09-01

    The security of our recently proposed dual polarization encryption scheme of images is evaluated by numerical simulations. This consists of testing the resistance of the scheme against brute force, known-plaintext, chosen-plaintext and video sequence attacks. While some attacks are ineffective (brute force, video sequence) others are effective (known-plaintext, chosen-plaintext), but only under certain assumptions. An optimization of the setup, which is based on a regular rotation of polarization optics angles (polarizers, wave plates), is proposed associating the use of a high dynamic range for the key image, or the use of a phase-only spatial light modulator in the target and in the key image channel. The possibility of the attacker decrypting an unknown image is thus strongly reduced. The precision required for optical specifications is also evaluated, in order to ensure a good decryption for an authorized user.

  8. Girls, Crime and Violence: Toward a Feminist Theory of Female Violence

    Directory of Open Access Journals (Sweden)

    Kerry Carrington

    2013-09-01

    Full Text Available Rises recorded for girls’ violence in countries like Australia, Canada, United Kingdom and United States have been hotly contested. One view is these rising rates of violence are an artefact of new forms of policy, policing, criminalisation and social control over young women. Another view is that young women may indeed have become more violent as they have increasingly participated in youth subcultural activities involving gangs and drugs, and cyber-cultural activities that incite and reward girls’ violence. Any comprehensive explanation will need to address how a complex interplay of cultural, social, behavioural, and policy responses contribute to these rises. This article argues that there is no singular cause, explanation or theory that accounts for the rises in adolescent female violence, and that many of the simple explanations circulating in popular culture are driven by an anti-feminist ideology. By concentrating on females as victims of violence and very rarely as perpetrators, feminist criminology has for the most part ducked the thorny issue of female violence, leaving a discursive space for anti-feminist sentiment to reign. The article concludes by arguing the case for developing a feminist theory of female violence.Rises recorded for girls’ violence in countries like Australia, Canada, United Kingdom and United States have been hotly contested. One view is these rising rates of violence are an artefact of new forms of policy, policing, criminalisation and social control over young women. Another view is that young women may indeed have become more violent as they have increasingly participated in youth subcultural activities involving gangs and drugs, and cyber-cultural activities that incite and reward girls’ violence. Any comprehensive explanation will need to address how a complex interplay of cultural, social, behavioural, and policy responses contribute to these rises. This article argues that there is no singular

  9. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  10. Acceptability of Family Violence: Underlying Ties Between Intimate Partner Violence and Child Abuse.

    Science.gov (United States)

    Gracia, Enrique; Rodriguez, Christina M; Martín-Fernández, Manuel; Lila, Marisol

    2017-05-01

    Intimate partner violence (IPV) and child abuse (CA) are two forms of family violence with shared qualities and risk factors, and are forms of violence that tend to overlap. Acceptability of violence in partner relationships is a known risk factor in IPV just as acceptability of parent-child aggression is a risk factor in CA. We hypothesized that these acceptability attitudes may be linked and represent the expression of a general, underlying nonspecific acceptance of violence in close family relationships. The sample involved 164 male IPV offenders participating in a batterer intervention program. Implicit measures, which assess constructs covertly to minimize response distortions, were administered to assess acceptability of partner violence against women and acceptability of parent-child aggression. To determine whether acceptability attitudes regarding both forms of violence were related to a higher order construct tapping general acceptance of family violence, Bayesian confirmatory factor analyses were conducted. Findings supported a hierarchical (bifactor) model with a general factor expressing a nonspecific acceptance of family violence, and two specific factors reflecting acceptability of violence in intimate partner and parent-child relationships, respectively. This hierarchical model supporting a general acceptance of violence in close family relationships can inform future research aiming to better understand the connections between IPV and CA.

  11. Gender Considerations in Violence.

    Science.gov (United States)

    Sorrentino, Renee; Friedman, Susan Hatters; Hall, Ryan

    2016-12-01

    The role of gender in violence is poorly understood. Research has shown that gender has an important and, at times, distinct role in the prediction of violence. However, this gender disparity diminishes in the setting of mental illness. The risk assessment of violence in women is largely based on research in violent men. There are distinct characteristics in female violence compared with male violence. Attention to these characteristics may lead to the development of gender-dependent tools that can be used to evaluate violence risk. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Understanding Teen Dating Violence

    Science.gov (United States)

    Understanding Teen Dating Violence Fact Sheet 2014 Dating violence is a type of intimate partner violence. It occurs between two people in a close relationship. The nature of dating violence can be physical, emotional, or sexual. • Physical— This ...

  13. Domestic violence against children

    OpenAIRE

    Mihić Biljana D.

    2002-01-01

    In this paper the author is analysing definitions and basic notions related to domestic violence against children, as one of the most serious forms of violence. The special chapter deals with effects of violence against children and causes of domestic violence against them. Also, the author is analysing different forms of social reaction and considering the problem of legal regulation of mandatory reporting domestic violence against children.

  14. Victim’s posture and protective clothing changes the approach in an edged-weapon attack

    OpenAIRE

    Carr, D; Mahoney, P; Godhania, K; Cowper, E; Malbon, C

    2017-01-01

    Diverse groups of people use edged-weapons (i.e. knives, spears, swords) professionally. The training received affects how the edged-weapon is used and the area of the body targeted. There is a growing body of information available on the internet which is aimed at the training individuals in offensive knife attacks. This poster aims to raise awareness of this issue and highlight how a trained individual modifies an attack sequence depending on their victim’s posture and the protective clothi...

  15. Is Women's Empowerment Associated With Help-Seeking for Spousal Violence in India?

    Science.gov (United States)

    Rowan, Kathleen; Mumford, Elizabeth; Clark, Cari Jo

    2018-05-01

    Violence against women by their husbands is a problem for women worldwide. However, the majority of women do not seek help. This article presents findings from a national survey in India on empowerment-related correlates of help-seeking behaviors for currently married women who experienced spousal violence. We examined individual-, relationship-, and state-level measures of empowerment on help-seeking from informal and formal sources. Findings indicate that help-seeking is largely not associated with typical measures of empowerment or socio-economic development, whereas state-level indicators of empowerment may influence help-seeking. Although not a target of this study, we also note that injury from violence and the severity of the violence were among the strongest factors related to seeking help. Taken together, the low prevalence of help-seeking and lack of strong individual-level correlates, apart from severe harm, suggests widespread barriers to seeking help. Interventions that affect social norms and reach women and men across social classes in society are needed in addition to any individual-level efforts to promote seeking help for spousal violence.

  16. Adult Violence with the Mother and Sibling as Predictors of Partner Violence

    Science.gov (United States)

    Hendy, Helen M.; Burns, Mary K.; Can, S. Hakan; Scherer, Cory R.

    2012-01-01

    The present study provides the first available evaluation of how violence with the mother and siblings during adulthood is associated with the occurrence of partner violence in young adults. Because a pattern of reciprocal partner violence is well documented, the authors hypothesized that reciprocal violence would also be found for adults and…

  17. Is a Health Interview Survey an appropriate tool to assess domestic violence?

    Science.gov (United States)

    Drieskens, Sabine; Demarest, Stefaan; D'Hoker, Nicola; Ortiz, Barbara; Tafforeau, Jean

    2017-10-01

    The aim of this study is to assess if a Health Interview Survey (HIS) targeting the general population is an appropriate tool to collect valid data on domestic violence. Studying item non-response on the question on domestic violence and its association with socio-demographic and health characteristics compared with victims of domestic violence can contribute to this. Cross-sectional data from the Belgian HIS 2013 were analysed. A question whether the perpetrator of a violent event was a member of the respondents' household was embedded in a general topic on violence in the self-administered questionnaire. This study is limited to people aged 15+ that at least completed the first question of this topic. Socio-demographic characteristics of item non-respondents and of victims of domestic violence were explored and the association with health status was assessed through ORs calculated via logistic regression. The year prevalence of domestic violence is 1.1%. Although the question on domestic violence yields a high level of non-response (62%), this does not hinder the further completion of the questionnaire. When compared with victims of domestic violence, those not responding on the question on the perpetrator have better (mental) health. When compared with those not being victim of domestic violence, victims report poorer physical and mental health. An HIS can be an appropriate tool to assess domestic violence in the general population and its association with health. However, a solution should be found for the high item non-response on the question on the perpetrator of the violent event. © The Author 2017. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  18. Animal violence demystified

    NARCIS (Netherlands)

    Natarajan, Deepa; Caramaschi, Doretta

    2010-01-01

    Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior

  19. Gun Violence and the Meaning of American Schools

    Science.gov (United States)

    Warnick, Bryan R.; Kim, Sang Hyun; Robinson, Shannon

    2015-01-01

    In the United States, targeted school shootings have become a distinct genre of violence. In this essay, Bryan Warnick, Sang Hyun Kim, and Shannon Robinson examine the social meanings that exist in American society that might contribute to this phenomenon, focusing on the question: "Why are schools conceptualized as appropriate places to…

  20. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  1. A systematic review of probable posttraumatic stress disorder in first responders following man-made mass violence.

    Science.gov (United States)

    Wilson, Laura C

    2015-09-30

    The current study was a systematic review examining probable posttraumatic stress disorder (PTSD) in first responders following man-made mass violence. A systematic literature search yielded 20 studies that fit the inclusion criteria. The prevalence rates of probable PTSD across all 20 studies ranged from 1.3% to 22.0%. Fifteen of the 20 articles focused on first responders following the September 11th terrorist attacks and many of the studies used the same participant recruitment pools. Overall, the results of the systematic review described here suggest that our understanding of PTSD in first responders following man-made mass violence is based on a very small set of articles that have focused on a few particular events. This paper is meant to serve as a call for additional research and to encourage more breadth in the specific incidents that are examined. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  2. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  3. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  4. Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare.

    Science.gov (United States)

    Mozaffari-Kermani, Mehran; Sur-Kolay, Susmita; Raghunathan, Anand; Jha, Niraj K

    2015-11-01

    Machine learning is being used in a wide range of application domains to discover patterns in large datasets. Increasingly, the results of machine learning drive critical decisions in applications related to healthcare and biomedicine. Such health-related applications are often sensitive, and thus, any security breach would be catastrophic. Naturally, the integrity of the results computed by machine learning is of great importance. Recent research has shown that some machine-learning algorithms can be compromised by augmenting their training datasets with malicious data, leading to a new class of attacks called poisoning attacks. Hindrance of a diagnosis may have life-threatening consequences and could cause distrust. On the other hand, not only may a false diagnosis prompt users to distrust the machine-learning algorithm and even abandon the entire system but also such a false positive classification may cause patient distress. In this paper, we present a systematic, algorithm-independent approach for mounting poisoning attacks across a wide range of machine-learning algorithms and healthcare datasets. The proposed attack procedure generates input data, which, when added to the training set, can either cause the results of machine learning to have targeted errors (e.g., increase the likelihood of classification into a specific class), or simply introduce arbitrary errors (incorrect classification). These attacks may be applied to both fixed and evolving datasets. They can be applied even when only statistics of the training dataset are available or, in some cases, even without access to the training dataset, although at a lower efficacy. We establish the effectiveness of the proposed attacks using a suite of six machine-learning algorithms and five healthcare datasets. Finally, we present countermeasures against the proposed generic attacks that are based on tracking and detecting deviations in various accuracy metrics, and benchmark their effectiveness.

  5. Dyadic violence and readiness to change among male intimate partner violence offenders.

    Science.gov (United States)

    Crane, Cory A; Schlauch, Robert C; Eckhardt, Christopher I

    2015-12-10

    Although readiness to change is associated with mandated partner violence treatment compliance and subsequent violent behaviour among male offenders (e.g. Scott and Wolfe, 2003; Eckhardt et al., 2004), our understanding of the factors associated with pretreatment change remains limited. Offender research indicates that individual and dyadic violent behaviour are highly variable and that such variability may provide insight into levels of pretreatment change (Holtzworth-Munroe and Stuart, 1994; Archer, 2002). We sought to examine the associations between indicators of change and individual as well as dyadic violence frequency in a sample of male partner violence offenders. To determine whether severity and perceived concordance in the use of violence among male offenders and their female partners influenced readiness to change at pretreatment, 82 recently adjudicated male perpetrators of intimate partner violence were recruited into the current study and administered measures of readiness to change violent behaviour (Revised Safe at Home Scale; Begun et al., 2008) as well as partner violence experiences (Revised Conflict Tactics Scale; Straus et al., 1996). Analyses revealed an interaction between offender-reported male and female violence in the prediction of pretreatment readiness to change such that greater male violence was associated with greater readiness to change among males who reported that their female partners perpetrated low, but not high, levels of violence. Consistently, greater female violence was associated with lower readiness to change only among the most violent male offenders. Results provide support for the assertion that the most violent offenders may be the most resistant to partner violence intervention efforts, particularly when they perceive themselves to be victims as well. Enhanced motivational and couples programming may facilitate treatment engagement among the high-risk group of male offenders who report concordant relationship

  6. Gaming Against Violence: A Grassroots Approach to Teen Dating Violence.

    Science.gov (United States)

    Crecente, Drew

    2014-08-01

    Teen dating violence is a pervasive problem that affects millions of adolescents worldwide. Although there have been various approaches to addressing this problem, using videogames had not been employed before 2008, when Jennifer Ann's Group, an Atlanta, GA-based nonprofit organization, created an annual competition. The Life.Love. Game Design Challenge rewards game developers for creating videogames about teen dating violence without using any violence in the games themselves. The resulting videogames have increased awareness about teen dating violence and provided educational information to assist adolescents, parents, and teachers in identifying abusive relationships.

  7. Primary Prevention of Violence: Stopping Campus Violence before It Starts. Prevention Update

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2010

    2010-01-01

    Violence is a serious problem on college campuses. The literature on primary prevention of violence does not call for the adoption of specific programs or policies but rather suggests a paradigm shift in the way practitioners approach violence. Primary prevention means asking the question, "Why is violence happening in the first place?" in order…

  8. Youth violence: An update

    Directory of Open Access Journals (Sweden)

    John Leonardo Díaz Galvis

    2004-08-01

    Full Text Available In this article we try to summarize the principal concepts around the biological and psychological contributions that explain the juvenile violence. In the genetic part we talk about adoption, twins studies and the genes that had been related with violence. In the area of neurotransmitters we selective talk about serotonine. We outline the relationship between sexual y physical abuse with violence and the link of those that consume alcohol and drugs with violence conducts. We also briefly view the roll of TV and radio with juvenile violence. Finally the article describes the different kinds of treatment of violence.

  9. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  10. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  11. Heavy alcohol use and dating violence perpetration during adolescence: family, peer and neighborhood violence as moderators.

    Science.gov (United States)

    McNaughton Reyes, Heathe Luz; Foshee, Vangie A; Bauer, Daniel J; Ennett, Susan T

    2012-08-01

    We examined the hypothesis that family, peer and neighborhood violence would moderate relations between heavy alcohol use and adolescent dating violence perpetration such that relations would be stronger for teens in violent contexts. Random coefficients growth models were used to examine the main and interaction effects of heavy alcohol use and four measures of violence (family violence, friend dating violence, friend peer violence and neighborhood violence) on levels of physical dating violence perpetration across grades 8 through 12. The effects of heavy alcohol use on dating violence tended to diminish over time and were stronger in the spring than in the fall semesters. Consistent with hypotheses, across all grades, relations between heavy alcohol use and dating violence were stronger for teens exposed to higher levels of family violence and friend dating violence. However, neither friend peer violence nor neighborhood violence moderated relations between alcohol use and dating violence. Taken together, findings suggest that as adolescents grow older, individual and contextual moderators may play an increasingly important role in explaining individual differences in relations between alcohol use and dating violence. Implications for the design and evaluation of dating abuse prevention programs are discussed.

  12. Heavy Alcohol Use and Dating Violence Perpetration During Adolescence: Family, Peer and Neighborhood Violence as Moderators

    Science.gov (United States)

    Foshee, Vangie A.; Bauer, Daniel J.; Ennett, Susan T.

    2014-01-01

    We examined the hypothesis that family, peer and neighborhood violence would moderate relations between heavy alcohol use and adolescent dating violence perpetration such that relations would be stronger for teens in violent contexts. Random coefficients growth models were used to examine the main and interaction effects of heavy alcohol use and four measures of violence (family violence, friend dating violence, friend peer violence and neighborhood violence) on levels of physical dating violence perpetration across grades 8 through 12. The effects of heavy alcohol use on dating violence tended to diminish over time and were stronger in the spring than in the fall semesters. Consistent with hypotheses, across all grades, relations between heavy alcohol use and dating violence were stronger for teens exposed to higher levels of family violence and friend dating violence. However, neither friend peer violence nor neighborhood violence moderated relations between alcohol use and dating violence. Taken together, findings suggest that as adolescents grow older, individual and contextual moderators may play an increasingly important role in explaining individual differences in relations between alcohol use and dating violence. Implications for the design and evaluation of dating abuse prevention programs are discussed. PMID:21494801

  13. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  14. Violence against women.

    Science.gov (United States)

    Shiva, M

    1999-01-01

    In India, violence against women is increasing and takes many forms while laws to protect women are ignored. Despite this fact, the new reproductive and child health program ignores sexual violence. Health personnel can respond by: 1) accepting the magnitude of the problem; 2) investigating the deaths of young women; 3) documenting findings; 4) ensuring that sexual abuse is recognized as a public health problem; 5) disseminating findings; 6) ensuring the protection of female field workers; 7) recognizing violence as an occupational health hazard; 8) facilitating the empowerment of women; 9) training women in self-defense; 10) ensuring that colleges and training institutes address violence as a women's health concern; 11) studying the psychological effects of violence; 12) collaborating with the National Commission for Women and the National Human Rights Commission; and 13) advocating for incorporation of sexual violence as a reproductive health issue in the national reproductive health program. In particular, domestic violence is a pervasive violation of women's human rights and has been resistant to social advances because of its "hidden" nature. Domestic violence exists because husbands believe they have an absolute right over the sexuality of their wives. Abusive husbands also abuse their daughters while sons learn violent behavior from their fathers. Crimes must be considered irrespective of whether they are committed outside or inside the home.

  15. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  16. Psychological Symptoms Linking Exposure to Community Violence and Academic Functioning in African American Adolescents

    Science.gov (United States)

    Busby, Danielle R.; Lambert, Sharon F.; Ialongo, Nicholas S.

    2013-01-01

    African American adolescents are exposed disproportionately to community violence, increasing their risk for emotional and behavioral symptoms that can detract from learning and undermine academic outcomes. The present study examined whether aggressive behavior and depressive and anxious symptoms mediated the association between exposure to community violence and academic functioning, and if the indirect effects of community violence on academic functioning differed for boys and girls, in a community sample of urban African American adolescents (N = 491; 46.6% female). Structural equation modeling was used to examine the indirect effect of exposure to community violence in grade 6 on grade 8 academic functioning. Results revealed that aggression in grade 7 mediated the association between grade 6 exposure to community violence and grade 8 academic functioning. There were no indirect effects through depressive and anxious symptoms, and gender did not moderate the indirect effect. Findings highlight the importance of targeting aggressive behavior for youth exposed to community violence to not only improve their behavioral adjustment but also their academic functioning. Implications for future research are discussed. PMID:23277294

  17. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  18. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  19. Parental desensitization to violence and sex in movies

    NARCIS (Netherlands)

    Romer, D.; Jamieson, P.E.; Bushman, B.J.; Bleakley, A.; Wang, A.; Langleben, D.; Jamieson, K.H.

    2014-01-01

    OBJECTIVES: To assess desensitization in parents' repeated exposure to violence and sex in movies. METHODS: A national US sample of 1000 parents living with at least 1 target child in 1 of 3 age groups (6 to 17 years old) viewed a random sequence of 3 pairs of short scenes with either violent or

  20. Polymorphic Attacks and Network Topology: Application of Concepts from Natural Systems

    Science.gov (United States)

    Rangan, Prahalad

    2010-01-01

    The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…

  1. Trauma Center Based Youth Violence Prevention Programs: An Integrative Review.

    Science.gov (United States)

    Mikhail, Judy Nanette; Nemeth, Lynne Sheri

    2016-12-01

    Youth violence recidivism remains a significant public health crisis in the United States. Violence prevention is a requirement of all trauma centers, yet little is known about the effectiveness of these programs. Therefore, this systematic review summarizes the effectiveness of trauma center-based youth violence prevention programs. A systematic review of articles from MEDLINE, CINAHL, and PsychINFO databases was performed to identify eligible control trials or observational studies. Included studies were from 1970 to 2013, describing and evaluating an intervention, were trauma center based, and targeted youth injured by violence (tertiary prevention). The social ecological model provided the guiding framework, and findings are summarized qualitatively. Ten studies met eligibility requirements. Case management and brief intervention were the primary strategies, and 90% of the studies showed some improvement in one or more outcome measures. These results held across both social ecological level and setting: both emergency department and inpatient unit settings. Brief intervention and case management are frequent and potentially effective trauma center-based violence prevention interventions. Case management initiated as an inpatient and continued beyond discharge was the most frequently used intervention and was associated with reduced rearrest or reinjury rates. Further research is needed, specifically longitudinal studies using experimental designs with high program fidelity incorporating uniform direct outcome measures. However, this review provides initial evidence that trauma centers can intervene with the highest of risk patients and break the youth violence recidivism cycle. © The Author(s) 2015.

  2. Association Between Neighborhood Violence and Biological Stress in Children.

    Science.gov (United States)

    Theall, Katherine P; Shirtcliff, Elizabeth A; Dismukes, Andrew R; Wallace, Maeve; Drury, Stacy S

    2017-01-01

    .002 [0.001]; P = .04), as did children exposed to more violent crime within 500 m of their home (β [SE] -0.032 [0.014]; P = .02). Neighborhoods are important targets for interventions to reduce the effect of exposure to violence in the lives of children. These findings provide the first evidence that objective exposures to neighborhood-level violence influence both physiological and cellular markers of stress, even in children.

  3. Patterns of women's aggression against partners and others: broadening our understanding of violence.

    Science.gov (United States)

    Rivera, Echo A; Kubiak, Sheryl P; Bybee, Deborah

    2014-12-01

    Research on women's aggression typically focuses on relational aggression. However, the study of violence must include multiple forms of violence such as aggression against partners and non-partner others, while also considering victimization experiences by partners and non-partners. The focus of this study is the multiple experiences of violence (perpetration and victimization) of women who are incarcerated. Incarcerated women are likely to experience higher rates of both than women in community settings, but most will be released in a brief period of time. Using a random sample (N = 580) we conducted cluster analyses to identify five patterns of women's aggression. Clusters varied depending on the target/s of aggression (i.e., partner and/or others), and type of aggression (i.e., physical and/or intimidation). Multinomial logistic regression was performed to determine the relationship between women's membership in a perpetration cluster and their victimization. Victimization history was related to an increased risk of perpetrating aggression, and varied depending on the target and type of aggression. Our findings provide support that research and interventions addressing women's use of aggression must also address their victimization history. Furthermore, results indicate that for some women, aggression towards partners and others is related. Future research should investigate multiple forms of aggression.

  4. Alcohol consumption and violence among Argentine adolescents.

    Science.gov (United States)

    Pierobon, Mariaelena; Barak, Mariam; Hazrati, Sahel; Jacobsen, Kathryn H

    2013-01-01

    This study investigated the association between alcohol and violence among Argentine youth. Data from the 2007 Argentina Global School-based Student Health Survey (GSHS), a nationally representative survey of middle school students, were examined using age-adjusted logistic regression models. Of the 1,328 participating students aged 13 to 15 years old, 51.9% reported drinking alcohol in the previous month, with higher rates among males (p=0.04) and older students (pbullying, used tobacco or drugs, or skipped school without permission were approximately twice as likely as other drinkers to have engaged in violent activities. Public health interventions targeting violence among young adolescents should be developed in combination with alcohol education programs. Copyright © 2013 Sociedade Brasileira de Pediatria. Published by Elsevier Editora Ltda. All rights reserved.

  5. Robustness against attacks of dual polarization encryption using the Stokes–Mueller formalism

    International Nuclear Information System (INIS)

    Dubreuil, Matthieu; Alfalou, Ayman; Brosseau, Christian

    2012-01-01

    The security of our recently proposed dual polarization encryption scheme of images is evaluated by numerical simulations. This consists of testing the resistance of the scheme against brute force, known-plaintext, chosen-plaintext and video sequence attacks. While some attacks are ineffective (brute force, video sequence) others are effective (known-plaintext, chosen-plaintext), but only under certain assumptions. An optimization of the setup, which is based on a regular rotation of polarization optics angles (polarizers, wave plates), is proposed associating the use of a high dynamic range for the key image, or the use of a phase-only spatial light modulator in the target and in the key image channel. The possibility of the attacker decrypting an unknown image is thus strongly reduced. The precision required for optical specifications is also evaluated, in order to ensure a good decryption for an authorized user. (paper)

  6. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  7. Violence toward health care workers in emergency departments in west Turkey.

    Science.gov (United States)

    Ayranci, Unal

    2005-04-01

    The aims of this study were to describe the epidemiology of violence in Turkish emergency departments (EDs), and to provide a more specific focus on violence. This study was conducted in 18 EDs in west Turkey for 3 months. Emergency staff in the EDs were asked to recall experiences of violence directed at them at work over the previous year. We then put these experiences into five categories: verbal abuse, specific threats, physical action with or without injury, sexual violence, and the last category, acts not falling in the other four categories. The data were analyzed using chi-square test and percent ratios. Of the 195 respondents answering the questions regarding violence against them, 72.3% (141/195) had experienced some form of violence. Most of the respondents stated that they had experienced verbal/emotional abuse (69.5%), followed by specific threats (53.2%), and physical action (8.5%). Groups experiencing the highest percentage of any type of violence during the previous year were as follows: 30-39-year-olds (82.1%), nurses and physicians (80.8% and 78.0%, respectively), public hospital health care staff (81.0%), staff working for 61-120 months (82.8%), those working between 8:00 a.m. and 5:00 p.m. (81.8%), and those working in low deprivation practices (79.6%). Most of the aggressors were patients' relatives (89%) as compared with patients' themselves (52%). Half of those experiencing physical action (50% [6/12]) during the course of the last year received support and inability reports due to minor injuries. There were no major injuries such as lacerations or fractures. We recommend that training to deal with violence in the workplace be specifically targeted at members of staff who are most likely to be at risk of threats of violence and actual physical aggression.

  8. Adult attention deficit hyperactivity disorder and violence in the population of England: does comorbidity matter?

    Directory of Open Access Journals (Sweden)

    Rafael A González

    Full Text Available It is unclear whether the association between Attention Deficit/Hyperactivity Disorder (ADHD and violence is explained by ADHD symptoms or co-existing psychopathology. We investigated associations of ADHD and its symptom domains of hyperactivity and inattention, among individuals reporting violence in the UK population.We report data from the Adult Psychiatric Morbidity Survey (2007, a representative sample of the household population of England. A randomly selected sample of 7,369 completed the Adult Self-Report Scale for ADHD and the self-reported violence module, including repetition, injury, minor violence, victims and location of incidents. All models were weighted to account for non-response and carefully adjusted for demography and clinical predictors of violence: antisocial personality, substance misuse and anxiety disorders.ADHD was moderately associated with violence after adjustments (OR 1.75, p = .01. Hyperactivity, but not inattention was associated with several indicators of violence in the domestic context (OR 1.16, p = .03. Mild and moderate ADHD symptoms were significantly associated with violence repetition, but not severe ADHD where the association was explained by co-existing disorders. Stratified analyses further indicated that most violence reports are associated with co-occurring psychopathology.The direct effect of ADHD on violence is only moderate at the population level, driven by hyperactivity, and involving intimate partners and close persons. Because violence associated with severe ADHD is explained by co-existing psychopathology, interventions should primarily target co-existing disorders.

  9. Know Your Rights: Domestic Violence

    Science.gov (United States)

    ... 3224 TTD You CAN do something about domestic violence Domestic violence is a pattern of many behaviors directed ... violence. Look in the Yellow Pages under “domestic violence help,” “domestic violence shelters,” “human services organizations,” or “crisis intervention” ...

  10. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  11. Assessing Injury and Violence Prevention in North Carolina's Local Health Departments.

    Science.gov (United States)

    Mouw, Mary S; Counts, Jennifer; Fordham, Corinne; Francis, Molly Merrill; Bach, Laura E; Maman, Suzanne; Proescholdbell, Scott K

    2016-01-01

    Injury and violence-related morbidity and mortality present a major public health problem in North Carolina. However, the extent to which local health departments (LHDs) engage in injury and violence prevention (IVP) has not been well described. One objective of the current study is to provide a baseline assessment of IVP in the state's LHDs, describing capacity, priorities, challenges, and the degree to which programs are data-driven and evidence-based. The study will also describe a replicable, cost-effective method for systematic assessment of regional IVP. This is an observational, cross-sectional study that was conducted through a survey of North Carolina's 85 LHDs. Representatives from 77 LHDs (91%) responded. Nearly one-third (n = 23; 30%) reported that no staff members were familiar with evidence-based interventions in IVP, and over one-third (n = 29; 38%) reported that their LHD did not train staff in IVP. Almost one-half (n = 37; 48%) had no dedicated funding for IVP. On average, respondents said that about half of their programs were evidence-based; however, there was marked variation (mean, 52%; standard deviation = 41). Many collaborated with diverse partners including law enforcement, hospitals, and community-based organizations. There was discordance between injury and violence burden and programming. Overall, 53% of issues listed as top local problems were not targeted in their LHDs' programs. Despite funding constraints, North Carolina's LHDs engaged in a broad range of IVP activities. However, programming did not uniformly address state injury and violence priorities, nor local injury and violence burden. Staff members need training in evidence-based strategies that target priority areas. Multisector partnerships were common and increased LHDs' capacity. These findings are actionable at the state and local level. ©2016 by the North Carolina Institute of Medicine and The Duke Endowment. All rights reserved.

  12. Psychosocial Adolescent Psychosocial Adjustment in Brazil – Perception of Parenting Style, Stressful Events and Violence

    Directory of Open Access Journals (Sweden)

    Silvia Pereira da Cruz Benetti

    2014-01-01

    Full Text Available The objective of this study was to investigate the association between measures of exposure to violence, stressful events, family socialization practices, and demographic characteristics in a group of adolescents from a Southern region of Brazil. Three hundred adolescents were investigated in a case-control study. The results showed that adolescents with emotional and behavioral problems had significant higher stressful events, violence exposure, and negative parental practices, compared with controls. However, exposure to violence was the most deteriorating condition associated with the adolescents’ clinical internalization and externalization behaviors. Findings suggest the benefit of targeting actions geared to strengthen the quality of family interactions as well as to implement preventive programs to reduce community violence impact and to enhance support in the community.

  13. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  14. Protecting Anti-virus Programs From Viral Attacks

    OpenAIRE

    Mishra, Umakant

    2013-01-01

    During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware. The anti-virus may follow thorough testing and auditing procedures to fix all its bugs before releasing the software in the market. Besides the anti-virus may use a...

  15. Mainstreaming domestic and gender-based violence into sociology and the criminology of violence

    OpenAIRE

    Walby, Sylvia; Towers, Jude; Francis, Brian

    2014-01-01

    Sociological and criminological views of domestic and gender-based violence generally either dismiss it as not worthy of consideration, or focus on specific groups of offenders and victims (male youth gangs, partner violence victims). In this paper, we take a holistic approach to violence, extending the definition from that commonly in use to encompass domestic violence and sexual violence. We operationalize that definition by using data from the latest sweep of the Crime Survey for England a...

  16. A joint mid-course and terminal course cooperative guidance law for multi-missile salvo attack

    Directory of Open Access Journals (Sweden)

    Jie ZENG

    2018-06-01

    Full Text Available Salvo attacking a surface target by multiple missiles is an effective tactic to enhance the lethality and penetrate the defense system. However, existing cooperative guidance laws in the mid-course or terminal course are not suitable for long- and medium-range missiles or stand-off attacking. Because the initial conditions of cooperative terminal guidance that are generally generated from the mid-course flight may not lead to a successful cooperative terminal guidance without proper mid-course flight adjustment. Meanwhile, cooperative guidance in the mid-course cannot solely guarantee the accuracy of a simultaneous arrival of multiple missiles. Therefore, a joint mid-course and terminal course cooperative guidance law is developed. By building a distinct leader-follower framework, this paper proposes an efficient coordinated Dubins path planning method to synchronize the arrival time of all engaged missiles in the mid-course flight. The planned flight can generate proper initial conditions for cooperative terminal guidance, and also benefit an earliest simultaneous arrival. In the terminal course, an existing cooperative proportional navigation guidance law guides all the engaged missiles to arrive at a target accurately and simultaneously. The integrated guidance law for an intuitive application is summarized. Simulations demonstrate that the proposed method can generate fast and accurate salvo attack. Keywords: Cooperative systems, Dubins path, Mid-course flight, Missile guidance, Salvo attack

  17. Vulnerability of industrial facilities to attacks with improvised explosive devices aimed at triggering domino scenarios

    International Nuclear Information System (INIS)

    Landucci, Gabriele; Reniers, Genserik; Cozzani, Valerio; Salzano, Ernesto

    2015-01-01

    Process- and chemical plants may constitute a critical target for a terrorist attack. In the present study, the analysis of industrial accidents induced by intentional acts of interference is carried out focusing on accident chains triggered by attacks with home-made (improvised) explosives. The effects of blast waves caused by improvised explosive devices are compared with those expected from a net equivalent charge of TNT by using a specific methodology for the assessment of stand-off distances. It is demonstrated that a home-made explosive device has a TNT efficiency comprised between 0.2 and 0.5. The model was applied to a case study, demonstrating the potentiality of improvised explosives in causing accident escalation sequences and severe effects on population and assets. The analysis of the case-study also allowed obtaining suggestions for an adequate security management. - Highlights: • Improvised explosives possibly used for terrorist attacks were described. • The TNT efficiency of ANFO and TATP was characterized. • Domino effects caused by an attack with improvised explosive were analyzed. • Domino scenarios induced by an attack were compared to conventional scenarios

  18. The Swedish School Attack in Trollhättan.

    Science.gov (United States)

    Erlandsson, Åsa; Reid Meloy, J

    2018-04-23

    This is a case report of the offender and offense characteristics of a targeted attack on a Swedish school using a sword, with a particular focus upon the offender's history, the relationship between mental disorder and ideology, and whether or not it was an act of terrorism. Findings indicate that the offender had no drug or psychiatric treatment history, but postoffense analysis suggests autism spectrum disorder, depression, and both suicidal ideation and intent. The offender planned and prepared for his attack, and the triggering event appeared to be the loss of a temporary job. He expressed chronic anger concerning immigrants to Sweden and blamed them for his failures. Comparison of the fact pattern to other cases of lone actor terrorism with the Terrorist Radicalization Assessment Protocol (TRAP-18) empirically demonstrates excellent criterion validity with other lone actor terrorists in Europe and North America-including right wing extremists-and contributes to further understanding of ideologically motivated mass murder. © 2018 American Academy of Forensic Sciences.

  19. Assessing Injury and Violence Prevention in North Carolina’s Local Health Departments

    Science.gov (United States)

    Mouw, Mary S.; Counts, Jennifer; Fordham, Corinne; Francis, Molly Merrill; Bach, Laura E.; Maman, Suzanne; Proescholdbell, Scott K.

    2016-01-01

    Context Injury and violence-related morbidity and mortality present a major public health problem in North Carolina. However, the extent to which local health departments (LHDs) engage in injury and violence prevention (IVP) is not well described. Objectives 1) Provide a baseline assessment of IVP in the state’s LHDs, describing capacity, priorities, challenges, and the degree to which programs are data-driven and evidence-based. 2) Describe a replicable, cost-effective method for systematic assessment of regional IVP. Design An observational, cross-sectional study, through a survey of NC’s 85 LHDs. Results Representatives from 77 LHDs (91%) responded. Nearly a third (n=23, 30%) reported no staff were familiar with evidence-based interventions in IVP; over a third (n=29, 38%) reported their LHD did not train staff in IVP. Almost half (n=37, 46%) had no dedicated funding. On average, respondents said about half of their programs were evidence-based; however, there was marked variation (mean 52%, SD = 41). Many collaborated with diverse partners including law enforcement, hospitals, and community-based organizations. There was discordance between injury and violence burden and programming. Overall, 53% of issues listed as top local problems were not targeted in their LHDs’ programs. Conclusions Despite funding constraints, NC’s LHDs are engaged in a broad range of IVP activities. Programming did not uniformly address state injury and violence priorities, however, nor local injury and violence burden. Staff need training in evidence-based strategies targeting priority areas. Multi-sector partnerships were common and increased LHDs’ capacity. These findings are actionable at the state and local-level. PMID:27621337

  20. Workplace violence against nursing staff in a Saudi university hospital.

    Science.gov (United States)

    Alkorashy, Hanan A Ezzat; Al Moalad, Fawziah Bakheet

    2016-06-01

    Violence against nurses is a major challenge for healthcare administrators. It is gaining more attention because it has a negative impact on nurses, the quality of health care and health organization. Common types of violence include physical harassment, sexual abuse, aggression, mobbing and bullying. Patients, their relatives and co-workers are considered the main perpetrators. To determine the prevalence rate of workplace violence against nursing professionals in a university hospital in Riyadh, Saudi Arabia, most frequent type and perpetrators as well as the contributing factors. This quantitative cross-sectional study adapted a survey questionnaire from the Massachusetts Nurses Association Survey on Workplace Violence/Abuse to collect data from a quota sample of 370 nursing personnel. Almost half of the participants had experienced violence in the professional setting during the 12 months prior to the study. The majority of subjects perceived workplace violence as verbal abuse. Nearly all nursing professionals identified patients as the leading cause. Slightly more than half mentioned understaffing, misunderstandings, long waits for service and lack of staff training and policies for preventing crisis as contributing factors. The prevalence rate is extremely high among nurses in the targeted Saudi university hospital. Saudi health as well as university hospitals' administration and policy makers should adopt and introduce a 'zero tolerance policy', set standards and develop practical measures for preventing the incidence and for controlling the prevalence of violence against nurses. Besides, healthcare organizations, particularly hospitals, can fulfil their obligations to provide both staff and patients with more secure environment. Further research on the topic is needed. © 2016 International Council of Nurses.

  1. Unreported workplace violence in nursing.

    Science.gov (United States)

    Kvas, A; Seljak, J

    2014-09-01

    Workplace violence occurs on a frequent basis in nursing. Most violent acts remain unreported. Consequently, we do not know the actual frequency of the occurrence of workplace violence. This requires research of nurses' actions following workplace violence and identification of reasons why most victims do not report violent acts in the appropriate manner. To explore violence in nursing as experienced by nurses in Slovenia. A survey was carried out with a representative sample of nurses in Slovenia. The questionnaire Workplace Violence in Nursing was submitted to 3756 nurses, with 692 completing the questionnaire. A total of 61.6% of the nurses surveyed had been exposed to violence in the past year. Most victims were exposed to psychological (60.1%) and economic violence (28.9%). Victims reported acts of violence in formal written form in a range from 6.5% (psychological violence) to 10.9% (physical violence). The largest share of victims who did not report violence and did not speak to anyone about it were victims of sexual violence (17.9%). The main reason for not reporting the violence was the belief that reporting it would not change anything, followed by the fear of losing one's job. Only a small share of the respondents reported violence in written form, the main reason being the victims' belief that reporting it would not change anything. This represents a severe criticism of the system for preventing workplace violence for it reveals the failure of response by leadership structures in healthcare organizations. Professional associations and the education system must prepare nurses for the prevention of violence and appropriate actions in the event of violent acts. Healthcare organizations must ensure the necessary conditions for enabling and encouraging appropriate actions following violent acts according to relevant protocols. © 2014 International Council of Nurses.

  2. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  3. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  4. Workplace Violence

    Science.gov (United States)

    ... to reduce workplace violence. Management Commitment: Provides the motivation and resources to deal effectively with workplace violence ... physical health of the employee. Appropriate allocation of authority and resources to responsible parties. Equal commitment to ...

  5. Violence in forensic medicine practice: a survey of legal medicine practitioners' views.

    Science.gov (United States)

    Sheikhazadi, Ardeshir; Mehrzad, Kiani; Fakhredin, Taghaddosinejad

    2009-09-01

    : To survey the extent of abuse and violence directed toward legal medicine practitioners during the course of their professional duties and to categorize the characteristics of such aggression. : Retrospective survey of the views of a large sample of Tehran's legal medicine practitioners by using a piloted anonymous questionnaire. : In all, 105 (86.1%) of the responders had experienced verbal abuse during the previous 12 months, 79 (64.7%) had experienced some sort of verbal abuse at least once a month, 39 (32%) had experienced verbal abuse every week, and 13 (10.7%) had experienced verbal abuse every day. Of the 122 legal medicine physicians, 39 (32%) were exposed to specific threats, 8 (6.6%) were exposed to physical action without injury, and 7 (5.7%) had experience serious incidents including threats with a weapon or attacks leading to physical injury over the previous year. Even assuming that all the nonresponders did not experience any violence, the aggression by patients affected 75% of legal medicine practitioners in the Tehran province. : Violence toward Tehran's legal medicine practitioners is very common and may be increasing. Some of the participating factors of aggression are potentially avoidable and practices should make strenuous attempts to identify such factors and remedy them. Staff training in interpersonal skills and recognizing anxious patients are essential. Doctors should avoid delays for patients by rearranging the booking policies, visit times, and duration. Victims of aggression must be followed up.

  6. Alternatives to Violence.

    Science.gov (United States)

    Children Today, 1994

    1994-01-01

    Notes that our capacity to diffuse conflict rests in our ability to recognize and verbalize feelings, develop empathy, and think of alternatives to violence. Explores the influence of role models and culture on violence and how the media can use violent images effectively in helping us confront a culture of violence. (HTH)

  7. Women's opinion on the justification of physical spousal violence: A quantitative approach to model the most vulnerable households in Bangladesh.

    Science.gov (United States)

    Biswas, Raaj Kishore; Rahman, Nusma; Kabir, Enamul; Raihan, Farabi

    2017-01-01

    Bangladesh is a culturally conservative nation with limited freedom for women. A number of studies have evaluated intimate partner violence (IPV) and spousal physical violence in Bangladesh; however, the views of women have been rarely discussed in a quantitative manner. Three nationwide surveys in Bangladesh (2007, 2011, and 2014) were analyzed in this study to characterize the most vulnerable households, where women themselves accepted spousal physical violence as a general norm. 31.3%, 31.9% and 28.7% women in the surveys found justification for physical violence in household in 2007, 2011 and 2014 respectively. The binary logistic model showed wealth index, education of both women and their partner, religion, geographical division, decision making freedom and marital age as significant household contributors for women's perspective in all the three years. Women in rich households and the highly educated were found to be 40% and 50% less likely to accept domestic physical violence compared to the poorest and illiterate women. Similarly, women who got married before 18 years were 20% more likely accept physical violence in the family as a norm. Apart from these particular groups (richest, highly educated and married after 18 years), other groups had around 30% acceptance rate of household violence. For any successful attempt to reduce spousal physical violence in the traditional patriarchal society of Bangladesh, interventions must target the most vulnerable households and the geographical areas where women experience spousal violence. Although this paper focuses on women's attitudes, it is important that any intervention scheme should be devised to target both men and women.

  8. Women's opinion on the justification of physical spousal violence: A quantitative approach to model the most vulnerable households in Bangladesh.

    Directory of Open Access Journals (Sweden)

    Raaj Kishore Biswas

    Full Text Available Bangladesh is a culturally conservative nation with limited freedom for women. A number of studies have evaluated intimate partner violence (IPV and spousal physical violence in Bangladesh; however, the views of women have been rarely discussed in a quantitative manner. Three nationwide surveys in Bangladesh (2007, 2011, and 2014 were analyzed in this study to characterize the most vulnerable households, where women themselves accepted spousal physical violence as a general norm. 31.3%, 31.9% and 28.7% women in the surveys found justification for physical violence in household in 2007, 2011 and 2014 respectively. The binary logistic model showed wealth index, education of both women and their partner, religion, geographical division, decision making freedom and marital age as significant household contributors for women's perspective in all the three years. Women in rich households and the highly educated were found to be 40% and 50% less likely to accept domestic physical violence compared to the poorest and illiterate women. Similarly, women who got married before 18 years were 20% more likely accept physical violence in the family as a norm. Apart from these particular groups (richest, highly educated and married after 18 years, other groups had around 30% acceptance rate of household violence. For any successful attempt to reduce spousal physical violence in the traditional patriarchal society of Bangladesh, interventions must target the most vulnerable households and the geographical areas where women experience spousal violence. Although this paper focuses on women's attitudes, it is important that any intervention scheme should be devised to target both men and women.

  9. The behavioral economics of violence.

    Science.gov (United States)

    Rachlin, Howard

    2004-12-01

    From the viewpoint of teleological behaviorism the first question to ask in attempting to understand any behavior, including violent behavior, is: What are its contingencies of reward and punishment? Or, to put the question in economic terms: What are the short-term and long-term costs and benefits that such behavior entails? Let us therefore consider the costs and benefits of youth violence. Among the short-term costs of violent behavior are the physical effort of the act, the possibility of immediate physical retaliation, immediate social disapproval, and the opportunity cost of other social acts that the violent behavior takes the place of (you can't be affectionate and violent at the same time, for instance). Among the immediate benefits of violent behavior are the intrinsic satisfaction of the violent act itself and any extrinsic benefit; if A violently appropriates B's new sneakers then obtaining the sneakers reinforces A's violence. These immediate benefits may well outweigh the costs in many contexts. Among the long-term costs of violent behavior are delayed retaliation, possible social disapproval and loss of social support, rejection from a social group, job loss, and health risks associated with a violent lifestyle. Among the long-term benefits are long-term intimidation of others (your neighbor is less likely to build a fence on your property if you have a reputation for violence), and a possibly exciting lifestyle. These long-term benefits may well be outweighed by the long-term costs. Opposition of long-term net costs to short-term net benefits, where it exists, creates a personal self-control trap: Overall satisfaction may decrease monotonically with rate of the target behavior but, regardless of its rate, the immediate satisfaction of doing it is always higher than that of not doing it. In the case of violent behavior, this trap is exacerbated by the fact that as a person's violence increases, net immediate reinforcement also increases (due to

  10. Workplace physical violence, verbal violence, and mobbing experienced by nurses at a university hospital.

    Science.gov (United States)

    Aksakal, Fatma Nur Baran; Karaşahin, Emine Füsun; Dikmen, Asiye Uğraş; Avci, Emine; Ozkan, Seçil

    2015-01-01

    The aim of this study was to determine the frequency of and risk factors for physical violence, verbal violence, and mobbing experienced by nurses in a university hospital. This was a cross-sectional study conducted at Gazi University Medical Faculty Hospital. A questionnaire form recommended by the WHO and the International Labor Organization was administered through face-to-face interviews to determine the violence experienced in the past 12 months by nurses. The prevalence of physical violence, verbal violence, and mobbing was 13.9%, 41.8%, and 17.1%, respectively. Working more than 40 h per week increased the risk of physical violence by 1.86 times. The majority of nurses who experienced verbal violence and mobbing were significantly more willing to change their work, their institution, and their profession if given the opportunity. Fewer than one-fourth of the victims indicated they reported any incident. We knew that the prevalence of physical violence, verbal violence, and mobbing were high among nurses and that incidents were underreported, and the study corroborated this information. What this study adds to the topic is that long working hours increased the prevalence of physical violence and was defined as an important contributory factor.

  11. Exposure to violence, typology, and recidivism in a probation sample of domestic violence perpetrators.

    Science.gov (United States)

    Fowler, Drew R; Cantos, Arthur L; Miller, Steven A

    2016-09-01

    The present study investigated the predictive utility of self-reported domestic violence perpetrators' exposure to violence in their family of origin and patterns related to this exposure through the use of longitudinal analyses on a sample of 228 men on probation in Lake County, Illinois. Differences in typology, recidivism, recidivism frequency, and violent behavior survival patterns in men with a history of domestic violence perpetration and with varying levels of family of origin violence exposure were examined. Findings suggest that those who witnessed interparental violence (either alone, or in combination with experiencing violence) were most likely to be classified as Generally Violent offenders (e.g., perpetrators who direct violence toward their family and others), compared to those who did not report experiencing or witnessing violence. In addition, results also indicate that men who experienced both witnessing interparental violence and receiving physical abuse in childhood were more likely to recidivate more frequently compared to those who did not report experiencing or witnessing violence. No significant findings for typology and recidivism were noted. Clinical and policy/practice implications are discussed. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Parents' Views of the Relevance of a Violence Prevention Program in High, Medium, and Low Human Development Contexts

    Science.gov (United States)

    Durrant, Joan; Plateau, Dominique Pierre; Ateah, Christine A.; Holden, George W.; Barker, Leslie A.; Stewart-Tufescu, Ashley; Jones, Alysha D.; Ly, Gia; Ahmed, Rashid

    2017-01-01

    Every day, almost one billion children around the world experience violent punishment. Eliminating all violence against children is a key target of the United Nations' 2030 Agenda for Sustainable Development. This is a monumental challenge due to the diversity of cultural, economic and social contexts in which children live. Violence-prevention…

  13. From violence to more violence in Central America

    Directory of Open Access Journals (Sweden)

    Israel Medina

    2014-11-01

    Full Text Available Many Central American migrants flee their home country as a result of violence and threats from the criminal gangs. A large number of them also encounter the same type of violence that they are fleeing when on the migratory routes through Mexico.

  14. Teen Violence

    Science.gov (United States)

    Teen violence refers to harmful behaviors that can start early and continue into young adulthood. The young person can ... victim, an offender, or a witness to the violence. Violent acts can include Bullying Fighting, including punching, ...

  15. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  16. The Relationship between Violence in the Family of Origin and Dating Violence among College Students

    Science.gov (United States)

    Gover, Angela R.; Kaukinen, Catherine; Fox, Kathleen A.

    2008-01-01

    Prior research has established that violence in dating relationships is a serious social problem among adolescents and young adults. Exposure to violence during childhood has been linked to dating violence victimization and perpetration. Also known as the intergenerational transmission of violence, the link between violence during childhood and…

  17. Violence as a Vicious Cycle

    Directory of Open Access Journals (Sweden)

    Huseyin Gulec

    2012-03-01

    Full Text Available Since the conclusion that the violence as a behavior is not (cannot be determined within an absolute genetic determinism has been reached for long years, environmental factors are increasingly examined. We witness that human behavior in society can easily convert into coping with stressful events with violence. Individual or social violence as a behavior has a similar pattern with violence committed in primitive society and by children. After a brief review of violence, its description, etiological theories and types, this article majorly focuses on children and their early and late response to violence. The purpose here is to draw attention to the individuals who were previously exposed to violence (either directly or indirectly resort to violence, perpetuating a vicious cycle.

  18. Longitudinal relationships between individual and class norms supporting dating violence and perpetration of dating violence.

    Science.gov (United States)

    Taylor, Katherine A; Sullivan, Terri N; Farrell, Albert D

    2015-03-01

    Dating violence is commonly perpetrated in adolescence, making it imperative to understand risk factors in order to inform prevention efforts. Although individual norms supporting dating violence are strongly related to its perpetration, few studies have examined their longitudinal impact. Moreover, the influence of class norms (i.e., norms for students in the same grade, cohort, and school) supporting dating violence on perpetration has rarely been studied. The current study examined longitudinal relationships between individual and class norms supporting dating violence and perpetration of physical and psychological dating violence. Participants were two cohorts of sixth graders from 37 schools who were in dating relationships at Wave 1 and 6 months later at Wave 2 (N = 2,022; 43% female; 52% African American, 21% Latino/a, 20% White, and 7% other). The analyses used a multilevel approach, with students represented at Level 1 and classes (n = 74) at Level 2. The models tested direct effects of Wave 1 individual and class norms supporting dating violence on subsequent changes in perpetration of dating violence at Wave 2 and the extent to which gender moderated these relationships. The findings indicated that greater individual norms supporting male dating violence predicted greater change in perpetration of physical and psychological dating violence and greater individual norms supporting female dating violence predicted greater change in perpetration of psychological dating violence. Greater class norms supporting male dating violence predicted greater change in perpetration of physical dating violence; whereas greater class norms supporting female dating violence predicted less change in perpetration of physical dating violence. These findings highlight the need to address norms in early adolescence.

  19. Sexual Violence

    Science.gov (United States)

    Sexual Violence Facts at a Glance 2012 Adults In a nationally representative survey of adults: 1 • Nearly 1 in ... 5.6% and 5.3%, respectively) experienced sexual violence other than rape, such as being made to ...

  20. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  1. Healthcare Workers and Workplace Violence

    Directory of Open Access Journals (Sweden)

    Tevfik Pinar

    2013-06-01

    Full Text Available Workplace violence is a threatening worldwide public health problem. Healthcare workers have under particular risk of workplace violence, and they are being exposed to violence 4-16 times more than other service workers. The frequency of violence in the health sector in the world has indicated in different range of results since there is no consistent definition of workplace violence and differences in research methodology (any type of violence: 22,0% - 60,0%; physical violence: 2,6% - 57,0%; verbal violence: 24,3% - 82,0%; sexual harassment: %1,9 - 10,5%. All healthcare workers have right to work in a safe working place. The safety of healthcare workers should deserve the same priority as patient safety. Various risk factors including social, cultural, environmental, organizational and personal elements play a role in the formation of workplace violence that is very important for our country. Considering all those factors, the workplace violence in health sector should be seriously handled and the strategies and policies must be developed for prevention. [TAF Prev Med Bull 2013; 12(3.000: 315-326

  2. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  3. Heavy Alcohol Use and Dating Violence Perpetration During Adolescence: Family, Peer and Neighborhood Violence as Moderators

    OpenAIRE

    McNaughton Reyes, Heathe Luz; Foshee, Vangie A.; Bauer, Daniel J.; Ennett, Susan T.

    2012-01-01

    We examined the hypothesis that family, peer and neighborhood violence would moderate relations between heavy alcohol use and adolescent dating violence perpetration such that relations would be stronger for teens in violent contexts. Random coefficients growth models were used to examine the main and interaction effects of heavy alcohol use and four measures of violence (family violence, friend dating violence, friend peer violence and neighborhood violence) on levels of physical dating viol...

  4. Symbolic Violence and Gendered Sexualised Violence

    DEFF Research Database (Denmark)

    Pedersen, Bodil Maria

    It has been suggested, that Bourdieu ´s concept of symbolic violence is useful in explaining gendered phenomena of late modern western societies, which can no longer simply be understood as classic patriarchies (B. Krais 1993). In these societies, and in spite of the existence of gendered...... sexualised phenomena such as rape and prostitution, it is often assumed that full equality of the sexes has been achieved. The concept of symbolic violence implies the participation of both men and women in aspects of discourses and other social practices related to gendering and thus to gendered sexualised...... violence. It deconstructs the dualisation of gender in gendered phenomena that contribute to the dualising/blaming controversies concerning responsibility and guilt common in discourses, activism and research pertaining to this field. Furthermore the use of the concept makes it possible to do so without...

  5. Injuries and violence: a global public health challenge

    Directory of Open Access Journals (Sweden)

    Muazzam Nasrullah

    2010-06-01

    Full Text Available Injuries and violence are a significant cause of mortality and physical disability. Injuries killed five million people worldwide each year [1]. The level of this dilemma, however, differs significantly by age, sex, region and economic development [2]. Globally, road traffic injury mortalities, self-inflicted injury mortality and interpersonal violence, war, drowning, and exposure to fire are the leading cause of deaths among people aged 15-44 years [3]. This special issue aims to assess the magnitude of this problem, identify risk factors and explore prevention strategies to alleviate the burden of injuries and violence. There is a dire need to increase the knowledge of the extent of problem, and associated risk factors that needs to be targeted for prevention. Erosa et al., examined reports of verbal and physical abuse from family caregivers of adults with severe physical, neurological and developmental disabilities, and found that caregivers who reported some form of abuse reported significantly greater distress and burden than caregivers who did not report any abuse. Grice et al., found that reported histories of work-related physical assault and work-related threat were associated with elevated risks of current work-related physical assault. Ahmad, systematically reviewed and summarized current scientific knowledge on the use of interactive computer-assisted screening to detect intimate partner violence (IPV.

  6. [Preventing violence in schizophrenia with cognitive remediation].

    Science.gov (United States)

    Darmedru, C; Demily, C; Franck, N

    2018-04-01

    of the violent and aggressive behaviors of these patients. Various cognitive remediation programs have shown their feasibility in people with schizophrenia and neurocognitive deficits with a history of violence as well as their effectiveness in reducing violence, mainly by reducing impulsivity. Similarly, specific programs dedicated to social cognitive training such as Social Cognition and Interaction Training (SCIT), Reasoning and Rehabilitation Mental Health Program (R&R2 MHP) and Metacognitive Training (MCT) have shown their positive impact on the control and reduction of global aggressive attitudes and on the numbers of physical and verbal aggressive incidents in schizophrenia. The improvement of social cognition would be achieved through the amendment of interpersonal relationships and social functioning. These interventions are effective at different stages of disease progression, in patients with varied profiles, on violent attitudes in general and on the number of verbal and physical attacks, whether for in-patients or out-patients. Beneficial effects can last up to 12months after termination of the study program. The interest of these interventions is preventive if the subject never entered in a violent register or curative in case of a personal history of violence. This type of care can be considered from a symptomatic point of view by limiting downstream the heavy consequences of such acts, but also etiologically by acting on one of the causes of violent behavior. Compliance with the eligibility criteria, carrying out a prior functional analysis and confirmation of the major impulsive part of the patient's violence are prerequisites for the use of these programs. Similarly, the early introduction of such therapies, their repetition over time and the integration of the patient into a comprehensive process of psychosocial rehabilitation will ensure the best chance of success. Some cognitive impairments appear to have their place in the genesis, progression

  7. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  8. Prevalence and risk of violence against people with and without disabilities: findings from an Australian population-based study.

    Science.gov (United States)

    Krnjacki, Lauren; Emerson, Eric; Llewellyn, Gwynnyth; Kavanagh, Anne M

    2016-02-01

    There are no population-based estimates of the prevalence of interpersonal violence among people with disabilities in Australia. The project aimed to: 1) estimate the prevalence of violence for men and women according to disability status; 2) compare the risk of violence among women and men with disabilities to their same-sex non-disabled counterparts and; 3) compare the risk of violence between women and men with disabilities. We analysed the 2012 Australian Bureau of Statistics Survey on Personal Safety of more than 17,000 adults and estimated the population-weighted prevalence of violence (physical, sexual and intimate partner violence and stalking/harassment) in the past 12 months and since the age of 15. Population-weighted, age-adjusted, logistic regression was used to estimate the odds of violence by disability status and gender. People with disabilities were significantly more likely to experience all types of violence, both in the past 12 months and since the age of 15. Women with disabilities were more likely to experience sexual and partner violence and men were more likely to experience physical violence. These results underscore the need to understand risk factors for violence, raise awareness about violence and to target policies and services to reduce violence against people with disabilities in Australia. © 2015 Public Health Association of Australia.

  9. Hospitals: Soft Target for Terrorism?

    Science.gov (United States)

    De Cauwer, Harald; Somville, Francis; Sabbe, Marc; Mortelmans, Luc J

    2017-02-01

    In recent years, the world has been rocked repeatedly by terrorist attacks. Arguably, the most remarkable were: the series of four coordinated suicide plane attacks on September 11, 2001 on buildings in New York, Virginia, and Pennsylvania, USA; and the recent series of two coordinated attacks in Brussels (Belgium), on March 22, 2016, involving two bombings at the departure hall of Brussels International Airport and a bombing at Maalbeek Metro Station located near the European Commission headquarters in the center of Brussels. This statement paper deals with different aspects of hospital policy and disaster response planning that interface with terrorism. Research shows that the availability of necessary equipment and facilities (eg, personal protective clothing, decontamination rooms, antidotes, and anti-viral drugs) in hospitals clearly is insufficient. Emergency teams are insufficiently prepared: adequate and repetitive training remain necessary. Unfortunately, there are many examples of health care workers and physicians or hospitals being targeted in both political or religious conflicts and wars. Many health workers were kidnapped and/or killed by insurgents of various ideology. Attacks on hospitals also could cause long-term effects: hospital units could be unavailable for a long time and replacing staff could take several months, further compounding hospital operations. Both physical and psychological (eg, posttraumatic stress disorder [PTSD]) after-effects of a terrorist attack can be detrimental to health care services. On the other hand, physicians and other hospital employees have shown to be involved in terrorism. As data show that some offenders had a previous history with the location of the terror incident, the possibility of hospitals or other health care services being targeted by insiders is discussed. The purpose of this report was to consider how past terrorist incidents can inform current hospital preparedness and disaster response planning

  10. VIOLENCE DRESSED IN HUMOR: COMEDIC VIOLENCE IN ADVERTISING

    Directory of Open Access Journals (Sweden)

    Camelia Gradinaru

    2016-01-01

    Full Text Available This paper investigates the concepts of humor and violence and their complex relationships contextualised in the advertising domain. Thus, the main theories of humor and the most important elements from media violence paradigms are critically pointed out. The effects of comedic violence in advertising may be positive (great involvement with the ad message, retention of brand information, higher pass-along probability, and also negative (offending the audience, desensitization, damaging the reputation and the brand equity. A lot of factors change the perception of comedic violent ads (gender, social norm beliefs etc., so that a multidimensional analysis of consumer perceptions is needed if we want to draw a more accurate picture of this phenomenon. The analysis of the specific ad that I developed in the second part of this paper showed clearly the interplay between perceived humor and perceived violence and also the relevance of the cultural background in its interpretation.

  11. Terrorism, civil war, one-sided violence and global burden of disease.

    Science.gov (United States)

    Kerridge, Bradley T; Khan, Maria R; Sapkota, Amir

    2012-01-01

    Armed conflict and related violence, including terrorism and one-sided violence, has profound effects on people's health and lives. The purpose of this study was to determine the relationship between deaths due to terrorism, civil war and one-sided violence from 1994-2000 and disability-adjusted life years (DALYs) occurring in 2002 attributable to all causes and specific communicable and noncommunicable diseases. Deaths resulting from terrorism, war and one-sided violence were positively associated with all cause as well as a number of communicable and noncommunicable disease-specific DALYs across the majority of sex and age subgroups of the populace, controlling for an array of economic factors empirically shown to affect public health. Overall, a 1.0% increase in deaths due to terrorism, civil war and one-sided violence from 1994-2000 was associated with a 0.16% increase in DALYs lost to all causes in 2002 in the total world population. There was little variation in the magnitude of these associations between males and females and between communicable and noncommunicable diseases. The results of the present study can begin to guide post-conflict recovery by focusing on interventions targeting both noncommunicable as well as communicable diseases, thereby highlighting the full health costs of war and ultimately providing a strong rationale for promoting peace.

  12. Short-term Lost Productivity per Victim: Intimate Partner Violence, Sexual Violence, or Stalking.

    Science.gov (United States)

    Peterson, Cora; Liu, Yang; Kresnow, Marcie-Jo; Florence, Curtis; Merrick, Melissa T; DeGue, Sarah; Lokey, Colby N

    2018-05-15

    The purpose of this study is to estimate victims' lifetime short-term lost productivity because of intimate partner violence, sexual violence, or stalking. U.S. nationally representative data from the 2012 National Intimate Partner and Sexual Violence Survey were used to estimate a regression-adjusted average per victim (female and male) and total population number of cumulative short-term lost work and school days (or lost productivity) because of victimizations over victims' lifetimes. Victims' lost productivity was valued using a U.S. daily production estimate. Analysis was conducted in 2017. Non-institutionalized adults with some lifetime exposure to intimate partner violence, sexual violence, or stalking (n=6,718 respondents; survey-weighted n=130,795,789) reported nearly 741 million lost productive days because of victimizations by an average of 2.5 perpetrators per victim. The adjusted per victim average was 4.9 (95% CI=3.9, 5.9) days, controlling for victim, perpetrator, and violence type factors. The estimated societal cost of this short-term lost productivity was $730 per victim, or $110 billion across the lifetimes of all victims (2016 USD). Factors associated with victims having a higher number of lost days included a higher number of perpetrators and being female, as well as sexual violence, physical violence, or stalking victimization by an intimate partner perpetrator, stalking victimization by an acquaintance perpetrator, and sexual violence or stalking victimization by a family member perpetrator. Short-term lost productivity represents a minimum economic valuation of the immediate negative effects of intimate partner violence, sexual violence, and stalking. Victims' lost productivity affects family members, colleagues, and employers. Published by Elsevier Inc.

  13. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  14. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  15. The Othering of Domestic Violence

    DEFF Research Database (Denmark)

    Montoya, Celeste; Agustin, Lise Rolandsen

    2013-01-01

    Violence against women is a universal problem, affecting women at all levels of society; however, differently situated women have unique experiences with violence. Theoretically, this calls for the necessity to balance universality with intersectionality. Analyzing EU policy texts, we argue...... that the recognition of different forms of violence has led to an increased tendency toward culturalization, i.e. articulating culture as the only explanation behind certain forms of violence or focusing exclusively on culturalized forms of violence. While largely ignoring the gendered nature of violence, cultural...... framings of violence also create a dichotomy between “insiders” (non-violent Europeans) and “outsiders” (violent others)....

  16. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  17. Ethnicities and violence

    DEFF Research Database (Denmark)

    Pedersen, Bodil Maria

    Ethnicities and Violence Bodil Pedersen, University of Roskilde A recent publication (Thiara, Condon and Schröttle 2011) presents and discusses questions concerning diverse forms of violence against women from ethnic minorities in Europe. The issue raises unsolved questions of how to study...... as violence and what meanings do we attribute to it? What meanings does gender and ethnicities have for diverse participants in violent relations? What are their societal consequences and how do we study these? Central is also how we conceptualise and study questions concerning violence in minorised as well...... as against ethnic communities. On one hand our research should allow for conceptualising and studying specific practices in these communities. On the other hand - risking repeating and supporting dominant discourses of gendered violence as characteristic for them – we do not intend to represent them...

  18. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  19. GENDER VIOLENCE IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Rosalva Ruiz-Ramírez

    2016-01-01

    Full Text Available School violence is multifactorial. Social and cultural, family, personal, and institutional aspects, among others, influence educational institutions, in all academic levels. Because this type of violence is increasingly common and has serious consequences, there is a need to prevent and deal with the different types of violence practiced in schools, such as bullying, mobbing, gender violence, and others. Gender violence in institutions is not produced in this scope, in the strict sense, but rather has its origin in social and cultural aspects, rooted in the patriarchal and androcentric culture. Much has been written on the different forms in which violence affects mostly women in the educational system. This essay, without being thorough, attempts to answer three basic questions on gender violence in educational institutions: Why is there gender violence in educational institutions? How is gender violence manifested in schools? And finally, what actions have been taken to mitigate aggressions against women?

  20. Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks

    Directory of Open Access Journals (Sweden)

    Murakami Takao

    2017-10-01

    Full Text Available Location privacy attacks based on a Markov chain model have been widely studied to de-anonymize or de-obfuscate mobility traces. An adversary can perform various kinds of location privacy attacks using a personalized transition matrix, which is trained for each target user. However, the amount of training data available to the adversary can be very small, since many users do not disclose much location information in their daily lives. In addition, many locations can be missing from the training traces, since many users do not disclose their locations continuously but rather sporadically. In this paper, we show that the Markov chain model can be a threat even in this realistic situation. Specifically, we focus on a training phase (i.e. mobility profile building phase and propose Expectation-Maximization Tensor Factorization (EMTF, which alternates between computing a distribution of missing locations (E-step and computing personalized transition matrices via tensor factorization (M-step. Since the time complexity of EMTF is exponential in the number of missing locations, we propose two approximate learning methods, one of which uses the Viterbi algorithm while the other uses the Forward Filtering Backward Sampling (FFBS algorithm. We apply our learning methods to a de-anonymization attack and a localization attack, and evaluate them using three real datasets. The results show that our learning methods significantly outperform a random guess, even when there is only one training trace composed of 10 locations per user, and each location is missing with probability 80% (i.e. even when users hardly disclose two temporally-continuous locations.

  1. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Violence against Amazon women.

    Science.gov (United States)

    Lima, Vera Lúcia de Azevedo; Souza, Maria de Lourdes de; Monticelli, Marisa; Oliveira, Marília de Fátima Vieira de; Souza, Carlos Benedito Marinho de; Costa, Carlos Alberto Leal da; Brüggemann, Odaléa Maria

    2009-01-01

    This quantitative and exploratory study analyzed violence against Amazon women presented in print media according to type and severity, and whether aggressors fell under the Maria da Penha law. A total of 181 issues of a regional newspaper were consulted. Based on content analysis, 164 items addressing violence against women were selected and 46 were included in the corpus of analysis. Results were gathered in three thematic groups: women killed with cruelty, sexual violence against women regardless of age, and violence against women and the limitations of the Maria da Penha law. Violence against these women varied in terms of form and severity, including up to homicide. Women are submitted to sexual violence from childhood through adulthood. The enforcement of this law shows the community it has a means to cope with this social phenomenon.

  4. Intimate partner violence against women in eastern Uganda: implications for HIV prevention

    Directory of Open Access Journals (Sweden)

    Tylleskar Thorkild

    2006-11-01

    because of fear of intimate partner violence. Conclusion Intimate partner violence is common in eastern Uganda and is related to gender inequality, multiple partners, alcohol, and poverty. Accordingly, programmes for the prevention of intimate partner violence need to target these underlying factors. The suggested link between intimate partner violence and HIV risky behaviours or prevention strategies calls for further studies to clearly establish this relationship.

  5. The concept of leakage in threat assessment.

    Science.gov (United States)

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. Copyright © 2011 John Wiley & Sons, Ltd.

  6. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  7. PrECast: An Efficient Crypto-Free Solution for Broadcast-Based Attacks in IPv4 Networks

    Directory of Open Access Journals (Sweden)

    Dalal Hanna

    2018-05-01

    Full Text Available Broadcasting is one of the essential features in the Internet Protocol Ver 4 (IPv4. Attackers often exploit this feature of the IP protocol to launch several attacks against a network or an individual host. Attackers may either be a part of a Local Area Network (LAN or outside a LAN to launch these attacks. There are numerous papers available in the literature to solve problems resulting from IP broadcasting. However, all these solutions target a specific problem that results from IP broadcasting. Furthermore, these solutions use either a computationally-intensive cryptographic scheme, the a priori relation between the host and the network or a modified protocol stack at every host. In this paper, we provide a seamless and transparent solution to eliminate IP broadcasting and thus eliminate all problems related to IP broadcasting. Our proposed solution is crypto-free and does not need any modification to the protocol stack.

  8. Urban children's perceptions of violence.

    Science.gov (United States)

    Sheehan, Karen; Kim, Lynn E; Galvin, John P

    2004-01-01

    To determine how preadolescent urban children conceptualize and experience violence in their lives. This qualitative study reports the results of focus groups designed to examine perceptions of violence among preadolescent urban children. Program directors were trained to conduct the sessions using a semistructured script. All groups were audiotaped or videotaped. The summaries were analyzed for recurring themes. A community-based visual arts program for children designed to be a secondary violence-prevention program. There were 12 focus groups of volunteer participants. Each consisted of 3 to 6 children aged 8 to 12 years, separated by sex and age. Fifty children participated: 27 boys and 23 girls. These children defined violence in a broader way than most adults would. Not only did the children identify shootings and stabbings as examples of violence, but they also considered violence to be any act that might hurt someone's feelings (such as cheating and lying) or any act accompanying violence (such as cursing and yelling). The boys and girls were very similar in their views except regarding the issue of intimate-partner violence. The girls were almost universally concerned about this issue, but the boys seemed noticeably unaware that intimate-partner violence was considered a form of violence. Most children felt safe at home, and almost no child felt safe at school. They looked to trusted adults to keep them safe. Future investigators measuring the effect of violence-prevention activities on preteen children should be aware that their definition of violence may differ from that of young children and should be cognizant of potential sex differences, especially around the topic of intimate-partner violence. Those designing violence-prevention programs for children should consider engaging adult family members as well because children usually turn to them for safety.

  9. Women’s opinion on the justification of physical spousal violence: A quantitative approach to model the most vulnerable households in Bangladesh

    Science.gov (United States)

    2017-01-01

    Bangladesh is a culturally conservative nation with limited freedom for women. A number of studies have evaluated intimate partner violence (IPV) and spousal physical violence in Bangladesh; however, the views of women have been rarely discussed in a quantitative manner. Three nationwide surveys in Bangladesh (2007, 2011, and 2014) were analyzed in this study to characterize the most vulnerable households, where women themselves accepted spousal physical violence as a general norm. 31.3%, 31.9% and 28.7% women in the surveys found justification for physical violence in household in 2007, 2011 and 2014 respectively. The binary logistic model showed wealth index, education of both women and their partner, religion, geographical division, decision making freedom and marital age as significant household contributors for women’s perspective in all the three years. Women in rich households and the highly educated were found to be 40% and 50% less likely to accept domestic physical violence compared to the poorest and illiterate women. Similarly, women who got married before 18 years were 20% more likely accept physical violence in the family as a norm. Apart from these particular groups (richest, highly educated and married after 18 years), other groups had around 30% acceptance rate of household violence. For any successful attempt to reduce spousal physical violence in the traditional patriarchal society of Bangladesh, interventions must target the most vulnerable households and the geographical areas where women experience spousal violence. Although this paper focuses on women’s attitudes, it is important that any intervention scheme should be devised to target both men and women. PMID:29161277

  10. Living in violence: Neighborhood domestic violence and small for gestational age births.

    Science.gov (United States)

    Felker-Kantor, Erica; Wallace, Maeve; Theall, Katherine

    2017-07-01

    To determine the association between neighborhood domestic violence and small-for-gestational-age (SGA) birth and to examine if there is a differential impact of neighborhood domestic violence on SGA births by race in a high crime community. This analysis includes all birth records issued in New Orleans, Louisiana from 2011 to 2012 geocoded by census tract (N=177 census tracts, N=8322 women). Hierarchical modeling and ecologic spatial analysis were used to examine the area-effect of neighborhood domestic violence on SGA births, independent of individual-level predictors and accounting for the propensity to live in high domestic violence neighborhoods. Tests for spatial autocorrelation reveled area-level clustering and overlap of SGA and domestic violent rates. Pregnant women living in high domestic violence areas were more likely to give birth to an SGA infant compared to women in low-domestic violence areas (OR=1.04, 95%CI: 1.01, 1.08), net of the effects of individual-level factors and propensity scores. Neighborhood-level attributes including rates of domestic violence may increase women's risk for SGA birth, highlighting a policy-relevant and potentially amenable exposure. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Associations Between Violence Related Behaviors and Self Perceived Health Among Trakya University Students

    Directory of Open Access Journals (Sweden)

    Halil Evren

    2011-11-01

    Full Text Available Objective: This study was carried out to determine the association between violence related behaviors and self-reported health among university students. Material and Methods: This is a cross-sectional study, which included a representative sample of all students of Trakya University. The sample of 1620 students enrolled at Trakya University was stratified according to sex and actual student number of faculties and colleges and selected by systematic sampling. In addition to descriptive statistics, Chi Square analysis and Logistic Regression analysis were used for statistical evaluation.Results: 6.3% of the respondents reported that they were exposed to violence, 33.5% of them stated they were involved in a physical fight during the past 12 months, 4.9% of them stated they did not go to school at least one day during the past 30 days because they felt unsafe and 4.4% of the students reported they had attempted suicide during the past 12 months. The analyses have shown that violence related behaviors were significantly associated with poor health after controlling the potential confounders. Conclusion: There is a need for more prospective studies for exploring the effects of violence related behaviors to health. Interventions targeting youths who engage in violence should consider that violence related behaviors may be markers for poor health.

  12. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  13. A Targeted Attack For Enhancing Resiliency of Intelligent Intrusion Detection Modules in Energy Cyber Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Youssef, Tarek [Florida Intl Univ., Miami, FL (United States); El Hariri, Mohammad [Florida Intl Univ., Miami, FL (United States); Habib, Hani [Florida Intl Univ., Miami, FL (United States); Mohammed, Osama [Florida Intl Univ., Miami, FL (United States); Harmon, E [Florida Intl Univ., Miami, FL (United States)

    2017-02-28

    Abstract— Secure high-speed communication is required to ensure proper operation of complex power grid systems and prevent malicious tampering activities. In this paper, artificial neural networks with temporal dependency are introduced for false data identification and mitigation for broadcasted IEC 61850 SMV messages. The fast responses of such intelligent modules in intrusion detection make them suitable for time- critical applications, such as protection. However, care must be taken in selecting the appropriate intelligence model and decision criteria. As such, this paper presents a customizable malware script to sniff and manipulate SMV messages and demonstrates the ability of the malware to trigger false positives in the neural network’s response. The malware developed is intended to be as a vaccine to harden the intrusion detection system against data manipulation attacks by enhancing the neural network’s ability to learn and adapt to these attacks.

  14. THE DOMESTIC VIOLENCE ON CHILDREN

    Directory of Open Access Journals (Sweden)

    SAVCA Lucia

    2017-11-01

    Full Text Available Any form of domestic violence leaves its mark on minority's personality forma¬tion and generates dysfunctions in the behavioral, cognitive and emotional sphere. The study found that in the modern family up to 30% of children suffer from physical violence and up to 45% by psychological violence. Sexual violence, unlike other forms of violence, is more difficult to discover. It has more dramatic consequences and re¬quires a longer time for psychological recovery. In this study, are described a few cases of sexual violence in the family literally

  15. Catalysts of worker-to-worker violence and incivility in hospitals.

    Science.gov (United States)

    Hamblin, Lydia E; Essenmacher, Lynnette; Upfal, Mark J; Russell, Jim; Luborsky, Mark; Ager, Joel; Arnetz, Judith E

    2015-09-01

    To identify common catalysts of worker-to-worker violence and incivility in hospital settings. Worker-to-worker violence and incivility are prevalent forms of mistreatment in healthcare workplaces. These are forms of counterproductive work behaviour that can lead to negative outcomes for employees, patients and the organisation overall. Identifying the factors that lead to co-worker mistreatment is a critical first step in the development of interventions targeting these behaviours. Retrospective descriptive study. Qualitative content analysis was conducted on the total sample (n = 141) of employee incident reports of worker-to-worker violence and incivility that were documented in 2011 at a large American hospital system. More than 50% of the incidents involved nurses, and the majority of incidents did not involve physical violence. Two primary themes emerged from the analysis: Work Behaviour and Work Organisation. Incidents in the Work Behaviour category were often sparked by unprofessional behaviour, disagreement over responsibilities for work tasks or methods of patient care, and dissatisfaction with a co-worker's performance. Incidents in the Work Organisation category involved conflicts or aggression arising from failure to following protocol, patient assignments, limited resources and high workload. Incidents of worker-to-worker violence and incivility stemmed from dissatisfaction with employee behaviour or from organisational practices or work constraints. These incident descriptions reflect worker dissatisfaction and frustration, resulting from poor communication and collaboration between employees, all of which threaten work productivity. Violence and incivility between hospital employees can contribute to turnover of top performers, hinder effective teamwork and jeopardise the quality of patient care. Identification of common catalysts for worker-to-worker violence and incivility informs the development of mistreatment prevention programmes that can be

  16. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  17. Emotion Regulation Difficulties Moderate the Association Between Heavy Episodic Drinking and Dating Violence Perpetration Among College Men

    Science.gov (United States)

    Stappenbeck, Cynthia A.; Davis, Kelly Cue; Cherf, Nicholas; Gulati, Natasha K.; Kajumulo, Kelly F.

    2017-01-01

    Because of high rates of heavy drinking and dating violence (psychological or physical aggression toward a dating partner) among college men, we examined whether emotion regulation difficulties moderated the association between heavy drinking and dating violence perpetration. One hundred and fifty-eight men were recruited from a large northwestern US university between April 2014 and August 2014. Participants completed an online survey that assessed their emotion regulation difficulties as well as their past year history of heavy episodic drinking (HED; consuming 5+ drinks in 2 hours) and dating violence perpetration. Generalized linear models revealed that the positive association between HED and dating violence perpetration was stronger for men with greater impulse control difficulties and for those who reported limited access to emotion regulation strategies. In addition to continued efforts to reduce heavy drinking among college men, interventions targeting emotion regulation difficulties should be incorporated into standard dating violence intervention and prevention efforts to further reduce the likelihood of dating violence perpetration in this population. PMID:29147076

  18. Stalking and Violence.

    Science.gov (United States)

    Ostermeyer, Britta; Friedman, Susan Hatters; Sorrentino, Renee; Booth, Brad D

    2016-12-01

    The three widely known stalker classifications assist in categorizing stalkers, which allows for better management of violence risk. Although 80% of stalking is done by men, women also engage in stalking, and their violence risk should not be underestimated. Juvenile stalkers do exist and juvenile stalking is also associated with violence. Clinicians can become a victim of stalking and may become victims of stalking by proxy, a special type of stalking behavior where the stalker involves other people or agencies to communicate with or track their victim. A careful stalking violence risk assessment is essential in the intervention and risk management process. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Violence and injury mortality in the Cape Town metropole

    African Journals Online (AJOL)

    mortality in a South African city and demonstrate the utility of secondary ... accidents (1 130 cases; 29% of all non-natural mortality), fire (295 .... Infanticide and fatal child abuse, according to police recOf'ds. Table Ill. .... 10 the USA, targets for the reduction of injury and violence mortality ... The Department of Health recently.

  20. Correlates of Peer Violence Among 13- to 15-Year-Olds in Gampaha District Schools in Sri Lanka

    Directory of Open Access Journals (Sweden)

    Monika Priyadarshani Wijeratne

    2014-09-01

    Full Text Available Violence among adolescents in schools is a relatively new research area in South Asian countries. Limited knowledge about factors associated with peer violence hinders the design of prevention programs. This study was carried out to assess correlates of peer violence among 13- to 15-year-old adolescents in Gampaha district schools in Sri Lanka. A cross-sectional study was carried out to identify “violent” and “non-violent” adolescents. Study and control populations were identified based on their participatory roles in violence, and an unmatched case–control (1 case: 1 control analysis was carried out to assess correlates of peer violence. Bronfenbrenner’s ecological model was used, and correlates were determined for both physical and relational (verbal and non-verbal violence. Correlates of both physical and relational peer violence were male sex, being 13 years of age, mental health difficulties, dating relationships, school absenteeism, witnessing physical fights among neighbors, and crime-dense residence. Factors associated with peer violence operate at several levels: individual, family/peer relationships, community, and societal. Most of these factors are modifiable and can be targeted by prevention programs.

  1. Violence as Understandable, Deserved or Unacceptable? Listening for Gender in Teenagers' Talk about Violence

    Science.gov (United States)

    Sundaram, Vanita

    2013-01-01

    Youth violence is a topic of increasing global concern. Research has primarily focused on young people's responses to existing definitions of violence in seeking to understand how best to develop violence prevention. Little work has explored how young people themselves define violence and the factors which influence their acceptance, and use, of…

  2. Violence and HIV/AIDS prevention among female out-of-school youths in southwestern Nigeria: lessons learnt from interventions targeted at hawkers and apprentices.

    Science.gov (United States)

    Fawole, O I; Ajuwon, A J; Osungbade, K O

    2004-12-01

    Between 1997 and 2003, four studies on hawkers and apprentices in motor parks and work shops in south west, Nigeria were carried out to evaluate the effectiveness of interventions aimed at preventing HIV infection and gender based violence (GBV). The studies were in 3 phases namely baseline survey, intervention and end line survey. Interventions consisting of:--development and distribution of education materials and training programmes for the police, judiciary, instructors, drivers, traders and apprentices/hawkers, including micro-credit facilities were implemented in some of the studies. The major lessons learnt were that: Young girls working in the informal sector of the Nigerian economy face dual risks of HIV infection and GBV and yet they are seldom targets of intervention; Many had been victims of GBV and did not seek redress either because they accept it is their lot, are afraid of being stigmatized or are put off the prolonged legal system; Perpetrators tend to deny their involvement in violence; Despite the challenges involved, interventions implemented among female apprentices and hawkers, especially those that involve multiple stakeholders, made a difference in protecting this group from dual risks of GBV and HIV/AIDS infection. We recommend more intervention programmes for this population, and regulation of activities in the informal sector of the Nigerian economy.

  3. Workplace violence

    NARCIS (Netherlands)

    Bossche, S. van den

    2014-01-01

    Workplace violence refers to incidents where workers are abused, threatened or assaulted, either by people from within or outside their workplace. Workplace violence may have severe negative consequences for the workers affected, their co-workers and families; as well as for organisations and the

  4. Violence and Asthma: A Review

    Directory of Open Access Journals (Sweden)

    Takeo Fujiwara

    2008-01-01

    Full Text Available Recent research shows that exposure to community violence is, directly and indirectly, associated with asthma. This article reviews the findings on the impact of violence on asthma, and the pathways for the association of violence and asthma are suggested: 1 exposure to violence is directly associated with asthma, mainly through dysregulation of sympathetic-adrenal-medullary (SAM and hypothalamic-pituitary-adrenal (HPA axis, 2 exposure to violence is associated with the change of susceptibility of outdoor air pollution on asthma, probably through the change of an immune response, and 3 behavioral change due to exposure to violence (e.g. keeping children indoors leads to more exposure to indoor pollutants. The suggested framework may be useful to develop health policy on asthma in high-violence communities.

  5. Narrative Construction of Sexual Violence and Rape Online

    Directory of Open Access Journals (Sweden)

    Victoria Nagy

    2017-05-01

    Full Text Available The increased active participation of individuals in the creation of sexual violence narratives online, as opposed to the previously passive consumption of news stories offline, could prove problematic in ensuring justice is served. Social media allows for circumvention of the criminal justice system in response to its perceived inadequacies. With the 24-hour news cycle, the ease with which media consumers can interact with the story as it breaks online, and the manner in which social media has been used by laypersons and secondary bystanders to target victims or perpetrators before a case ever makes it to court, raises questions about how narrative construction online possibly influences people’s beliefs and understandings about sexual violence and the effect this may have for the justice system.

  6. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  7. Predictors of dating violence among Chinese adolescents: the role of gender-role beliefs and justification of violence.

    Science.gov (United States)

    Shen, April Chiung-Tao; Chiu, Marcus Yu-Lung; Gao, Jianxiu

    2012-04-01

    In Chinese societies, violence among adolescent dating partners remains a largely ignored and invisible phenomenon. The goal of this study is to examine the relationships among gender-role beliefs, attitudes justifying dating violence, and the experiences of dating-violence perpetration and victimization among Chinese adolescents. This study has used self-reporting measures to collect data from a probability sample of 976 adolescents (mean age = 15.9) in three Chinese societies: Taiwan, Hong Kong, and Shanghai. Research results reveal a high prevalence of dating violence (including physical violence, sexual violence, and controlling behavior) among Chinese adolescents with dating experience: the perpetration rate is 27.3% and the victimization rate is 39%. Study results demonstrate that adolescents who endorse traditional gender-role beliefs tend to view dating violence as acceptable behavior. Boys' endorsement of traditional gender roles, boys' attitudes justifying boy-on-girl violence, and boys' attitudes against girl-on-boy violence predict boys' actual sexual-violence behavior. Moreover, boys' attitudes justifying boy-on-girl dating violence is the strongest predictor of boys' perpetration of physical and sexual dating violence. This study also shows that boys' hostility is a significant predictor of boys' controlling behavior. Programs for preventing dating violence should include components designed to challenge traditional gender-role beliefs and attitudes justifying dating violence.

  8. Predicting inpatient violence using the Broset Violence Checklist (BVC).

    Science.gov (United States)

    Almvik, R; Woods, P

    1999-01-01

    This paper reports early analysis of the Broset Violence Checklist. An instrument aiming to assist in the process of the prediction of violence from mentally ill in-patients. Early results appear promising and directions for future research using the instrument are suggested.

  9. Hiding Critical Targets in Smart Grid Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bao, Wei [Univ. of Arkansas, Fayetteville, AR (United States); Li, Qinghua

    2017-10-23

    With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromised nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.

  10. Associations of neighborhood-level workplace violence with workers' mental distress problems: a multilevel analysis of Taiwanese employees.

    Science.gov (United States)

    Pien, Li-Chung; Chen, Duan-Rung; Chen, Chiou-Jong; Liang, Kuei-Min; Cheng, Yawen

    2015-01-01

    Workplace violence is known to pose mental health risks. However, whether or not workplace violence in a surrounding area might further increase the risk of mental distress in workers has rarely been examined. The study subjects were 9,393 male and 7,716 female employees who participated in a nationwide survey in 2010. Their personal experiences of workplace violence over the past 1 year were ascertained by a standardized questionnaire. Also assessed were their psychosocial work characteristics and mental distress problems. Neighborhood-level workplace violence was computed based on aggregated data at the county level and was categorized into low-, medium-, and high-level categories. Multilevel logistic regression models were constructed to examine the associations between neighborhood-level workplace violence and individual-level mental distress problems, with adjustment of individual-level experience of workplace violence. The neighborhood-level prevalence of workplace violence ranged from 4.7 to 14.7% in men and from 6.4 to 14.8% in women across 22 counties. As compared with those who live in counties of the lowest tertile of workplace violence, female workers who lived in counties of the highest tertile of workplace violence had a 1.72-fold increased risk for mental distress problems after controlling for individual experience of workplace violence and other psychosocial work characteristics. Neighborhood-level workplace violence was associated with poor mental health in female workers. Preventative strategies targeting workplace violence should pay attention to neighborhood factors and gender-specific effects that might influence societal tolerance of abusive work practices and workers' vulnerability to mental health impacts of workplace violence.

  11. Setting Component Priorities in Protecting NPPs against Cyber-Attacks Using Reliability Analysis Techniques

    International Nuclear Information System (INIS)

    Choi, Moon Kyoung; Seong, Poong Hyun; Son, Han Seong

    2017-01-01

    The digitalization of infrastructure makes systems vulnerable to cyber threats and hybrid attacks. According to ICS-CERT report, as time goes by, the number of vulnerabilities in ICS industries increases rapidly. Digital I and C systems have been developed and installed in nuclear power plants, and due to installation of the digital I and C systems, cyber security concerns are increasing in nuclear industry. However, there are too many critical digital assets to be inspected in digitalized NPPs. In order to reduce the inefficiency of regulation in nuclear facilities, the critical components that are directly related to an accident are elicited by using the reliability analysis techniques. Target initial events are selected, and their headings are analyzed through event tree analysis about whether the headings can be affected by cyber-attacks or not. Among the headings, the headings that can be proceeded directly to the core damage by the cyber-attack when they are fail are finally selected as the target of deriving the minimum cut-sets. We analyze the fault trees and derive the minimum set-cuts. In terms of original PSA, the value of probability for the cut-sets is important but the probability is not important in terms of cyber security of NPPs. The important factors is the number of basic events consisting of the minimal cut-sets that is proportional to vulnerability.

  12. Physicians and domestic violence

    OpenAIRE

    Joslin, Jonathan

    1994-01-01

    Domestic violence, spouse abuse, and battering all refer to the victimization of a person with whom the abuser has or has had an intimate relationship. Domestic violence may take the form of physical, sexual and psychological abuse, is generally repeated, and often escalates within relationships. Most evidence indicates that domestic violence is predominantly perpetrated by men against women. Some evidence suggests that women are just as likely to use violence against male partners as men are...

  13. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  14. Estimating the Effects of September 11th and Other Forms of Violence on the Mental Health and Social Development of New York City's Youth: A Matter of Context

    Science.gov (United States)

    Aber, J. Lawrence; Gershoff, Elizabeth T.; Ware, Angelica; Kotler, Jennifer A.

    2004-01-01

    This longitudinal study examines the effects of exposure to the terrorist attack of September 11th as well as exposure to other forms of community violence on change in the mental health and social attitudes of youths in New York City. Three quarters of the youths reported some form of direct exposure to the events of September 11th, and 80%…

  15. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  16. Sensation Seeking in Street Violence

    DEFF Research Database (Denmark)

    Heinskou, Marie Bruvik; Liebst, Lasse Suonperä

    Sensation seeking leads to violence—runs an influential hypothesis in the social scientific study of violent behavior. Although studies confirm that violence is sometimes structured by sensation-seeking motives, the literature seldom comments on the limits to this explanation of violence....... The present study examines the scale of violence motivated by sensation seeking and the degree to which there are several distinct forms of sensation seeking motives operative in violence, rather than a sensation-seeking motive in the singular. The study draws on a sample of situations from Copenhagen...... involving street violence, which are coded quantitatively and qualitatively. Our analysis shows that sensation seeking only seldom seems to play a role in the structuring of street violence. Moreover, the data indicate that sensation seeking finds expression in street violence situations in two different...

  17. Testing the Cycle of Violence Hypothesis: Child Abuse and Adolescent Dating Violence as Predictors of Intimate Partner Violence in Young Adulthood

    Science.gov (United States)

    Gomez, Anu Manchikanti

    2011-01-01

    Child abuse is an important determinant of future violence perpetration and victimization. Past research examining linkages between child abuse and adult intimate partner violence (IPV) has predominantly focused on married individuals and not considered adolescent dating violence. In the present study, data from three waves of the National…

  18. Canada's family violence initiative: partnerships

    OpenAIRE

    Scott,Elaine

    1994-01-01

    Under Canada's four-year, $136 million Family Violence Initiative, the federal government is calling upon all Canadians to work in partnerships towards the elimination of family violence - child abuse, violence against women, and elder (senior) abuse. Family violence is a complex problem and requires the efforts of all Canadians to resolve it. One of the key themes of the Initiative - a multidisciplinary approach to the problem of family violence - is reflected in the selection and developmen...

  19. Family Violence.

    Science.gov (United States)

    Emery, Robert E.

    1989-01-01

    Researchers and policymakers have begun to recognize the extent and severity of family violence, particularly its effects on children. But there is much disagreement about the definition of violence, its development, the consequences for victims, and the most effective avenues for intervention. Advances recommendations for further research.…

  20. Media use and insomnia after terror attacks in France.

    Science.gov (United States)

    Goodwin, Robin; Lemola, Sakari; Ben-Ezra, Menachem

    2018-03-01

    Direct exposure to traumatic events often precipitates sleep disorders. Sleep disturbance has also been observed amongst those indirectly exposed to trauma, via mass media. However, previous work has focused on traditional media use, rather than contemporary social media. We tested associations between both traditional and social media consumption and insomnia symptoms following 2015 terror attacks in Paris France, controlling for location and post-traumatic symptomology. 1878 respondents, selected to represent the national French population, completed an internet survey a month after the Bataclan attacks (response rate 72%). Respondents indicated different media use, post-traumatic stress and insomnia. Controlling for demographics, location and PTSD, insomnia was associated with both traditional (β 0.10, P = .001) and social media use (β 0.12, P = .001). Associations between social media and insomnia were independent of traditional media use. Interventions targeted at social media may be particularly important following mass trauma. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Intimate Partner Violence. Prevention Update

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2011

    2011-01-01

    The Centers for Disease Control and Prevention (CDC) defines intimate partner violence (IPV) as violence between two people in a close relationship, including current and former spouses and dating partners. IPV occurs on a continuum from a single episode to ongoing battering and can include physical violence, sexual violence, threats, emotional…

  2. The Association of Telomere Length With Family Violence and Disruption

    Science.gov (United States)

    Mabile, Emily; Brett, Zoë H.; Esteves, Kyle; Jones, Edward; Shirtcliff, Elizabeth A.; Theall, Katherine P.

    2014-01-01

    BACKGROUND: To enhance the understanding of biological mechanisms connecting early adversity and negative health, we examine the association between family interpersonal violence and disruption and telomere length in youth. These specific exposures were selected because of their established links with negative health consequences across the life-course. METHODS: Children, age 5 to 15, were recruited from the greater New Orleans area, and exposure to family disruption and violence was assessed through caregiver report. Telomere length, from buccal cell DNA (buccal telomere length [bTL]), was determined by using monochrome multiplex quantitative real-time polymerase chain reaction. The association between bTL and adversity exposure was tested (n = 80). RESULTS: Cumulative exposure to interpersonal violence and family disruption was correlated with bTL. Controlling for other sociodemographic factors, bTL was significantly shorter in children with higher exposure to family violence and disruption. Witnessing family violence exerted a particularly potent impact. A significant gender interaction was found (β = −0.0086, SE = 0.0031, z test= −2.79, P = .0053) and analysis revealed the effect only in girls. CONCLUSIONS: bTL is a molecular biomarker of adversity and allostatic load that is detectable in childhood. The present results extend previous studies by demonstrating that telomeres are sensitive to adversity within the overarching family domain. These findings suggest that the family ecology may be an important target for interventions to reduce the biological impact of adversity in the lives of children. PMID:24936002

  3. The association of telomere length with family violence and disruption.

    Science.gov (United States)

    Drury, Stacy S; Mabile, Emily; Brett, Zoë H; Esteves, Kyle; Jones, Edward; Shirtcliff, Elizabeth A; Theall, Katherine P

    2014-07-01

    To enhance the understanding of biological mechanisms connecting early adversity and negative health, we examine the association between family interpersonal violence and disruption and telomere length in youth. These specific exposures were selected because of their established links with negative health consequences across the life-course. Children, age 5 to 15, were recruited from the greater New Orleans area, and exposure to family disruption and violence was assessed through caregiver report. Telomere length, from buccal cell DNA (buccal telomere length [bTL]), was determined by using monochrome multiplex quantitative real-time polymerase chain reaction. The association between bTL and adversity exposure was tested (n = 80). Cumulative exposure to interpersonal violence and family disruption was correlated with bTL. Controlling for other sociodemographic factors, bTL was significantly shorter in children with higher exposure to family violence and disruption. Witnessing family violence exerted a particularly potent impact. A significant gender interaction was found (β = -0.0086, SE = 0.0031, z test= -2.79, P = .0053) and analysis revealed the effect only in girls. bTL is a molecular biomarker of adversity and allostatic load that is detectable in childhood. The present results extend previous studies by demonstrating that telomeres are sensitive to adversity within the overarching family domain. These findings suggest that the family ecology may be an important target for interventions to reduce the biological impact of adversity in the lives of children. Copyright © 2014 by the American Academy of Pediatrics.

  4. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  5. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  6. The Relationship of Abortion and Violence Against Women: Violence Prevention Strategies and Research Needs.

    Science.gov (United States)

    Coyle, Catherine T; Shuping, Martha W; Speckhard, Anne; Brightup, Jennie E

    2015-01-01

    From the perspective of peace psychology, the role of abortion in acts of violence against women is explored, with a focus on violence-prevention strategies. Setting aside the political debate, this task force report takes the conflict-transformation approach of considering all perspectives that have concern for the right of women to avoid being victims of violence. The evidence that victims of Intimate Partner Violence are disproportionately represented in women presenting for abortion suggests a need for screening at clinics. Coerced abortion is a form of violence and has occurred by government policy in China and as a result of other violence against women: sex trafficking and war situations. Sex-selection abortion of female fetuses, referred to as "gendercide," has reached pandemic proportions and caused a gender imbalance in some countries. Psychology, through empirical research, can make unique contributions to understanding the relationship between abortion and violence and in developing prevention strategies.

  7. Violence on canadian television networks.

    Science.gov (United States)

    Paquette, Guy

    2004-02-01

    Over the past twenty years, the question of the effects of violence on television has figured prominently in public opinion and hundreds of studies have been devoted to this subject. Many researchers have determined that violence has a negative impact on behavior. The public, broadcasters and political figures all support the idea of reducing the total amount of violence on television - in particular in shows for children. A thousand programs aired between 1993 and 2001 on major non-specialty television networks in Canada were analyzed: TVA, TQS, as well as CTV and Global, private French and English networks, as well as the English CBC Radio and French Radio-Canada for the public networks. The methodology consists of a classic analysis of content where an act of violence constitutes a unit of analysis. The data collected revealed that the amount of violence has increased regularly since 1993 despite the stated willingness on the part of broadcasters to produce programs with less violence. The total number of violent acts, as well as the number of violent acts per hour, is increasing. Private networks deliver three times more violence than public networks. Researchers have also noted that a high proportion of violence occurs in programs airing before 21:00 hours, thereby exposing a large number of children to this violence. Psychological violence is taking on a more significant role in Canadian Television.

  8. [Domestic violence against women of a crisis intervention population - forms of violence and risk factors].

    Science.gov (United States)

    Nyberg, E; Stieglitz, R-D; Flury, M; Riecher-Rössler, A

    2013-06-01

    BACKGROUND AND HYPOTHESES: Domestic violence is common and can lead to severe physical and psychological problems. Thus, we have investigated the frequency of occurrence, forms and risk factors of domestic violence against female patients on a crisis intervention ward. 115 women were screened with the "screening spouse violence" (SPG) and the "index of spouse abuse" (ISA). The life time prevalence concerning spouse violence was 70 %. Out of 74 women who were currently living in a relationship 28 (38 % )were victims of violence in the last 12 months prior to their admission. Women who experienced violence had a significantly lower level of education. Screening for domestic violence in female patients in the field of crisis intervention and psychiatry should become a standard of "good clinical practice". © Georg Thieme Verlag KG Stuttgart · New York.

  9. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  10. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  11. Different systolic blood pressure targets for people with history of stroke or transient ischaemic attack: PAST-BP (Prevention After Stroke—Blood Pressure) randomised controlled trial

    Science.gov (United States)

    McManus, Richard J; Roalfe, Andrea; Fletcher, Kate; Taylor, Clare J; Martin, Una; Virdee, Satnam; Greenfield, Sheila; Hobbs, F D Richard

    2016-01-01

    Objective To assess whether using intensive blood pressure targets leads to lower blood pressure in a community population of people with prevalent cerebrovascular disease. Design Open label randomised controlled trial. Setting 99 general practices in England, with participants recruited in 2009-11. Participants People with a history of stroke or transient ischaemic attack whose systolic blood pressure was 125 mm Hg or above. Interventions Intensive systolic blood pressure target (different target, patients in both arms were actively managed in the same way with regular reviews by the primary care team. Main outcome measure Change in systolic blood pressure between baseline and 12 months. Results 529 patients (mean age 72) were enrolled, 266 to the intensive target arm and 263 to the standard target arm, of whom 379 were included in the primary analysis (182 (68%) intensive arm; 197 (75%) standard arm). 84 patients withdrew from the study during the follow-up period (52 intensive arm; 32 standard arm). Mean systolic blood pressure dropped by 16.1 mm Hg to 127.4 mm Hg in the intensive target arm and by 12.8 mm Hg to 129.4 mm Hg in the standard arm (difference between groups 2.9 (95% confidence interval 0.2 to 5.7) mm Hg; P=0.03). Conclusions Aiming for target below 130 mm Hg rather than 140 mm Hg for systolic blood pressure in people with cerebrovascular disease in primary care led to a small additional reduction in blood pressure. Active management of systolic blood pressure in this population using a blood pressure. Trial registration Current Controlled Trials ISRCTN29062286. PMID:26919870

  12. Review of On-Scene Management of Mass-Casualty Attacks

    Directory of Open Access Journals (Sweden)

    Annelie Holgersson

    2016-02-01

    Full Text Available Background: The scene of a mass-casualty attack (MCA entails a crime scene, a hazardous space, and a great number of people needing medical assistance. Public transportation has been the target of such attacks and involves a high probability of generating mass casualties. The review aimed to investigate challenges for on-scene responses to MCAs and suggestions made to counter these challenges, with special attention given to attacks on public transportation and associated terminals. Methods: Articles were found through PubMed and Scopus, “relevant articles” as defined by the databases, and a manual search of references. Inclusion criteria were that the article referred to attack(s and/or a public transportation-related incident and issues concerning formal on-scene response. An appraisal of the articles’ scientific quality was conducted based on an evidence hierarchy model developed for the study. Results: One hundred and five articles were reviewed. Challenges for command and coordination on scene included establishing leadership, inter-agency collaboration, multiple incident sites, and logistics. Safety issues entailed knowledge and use of personal protective equipment, risk awareness and expectations, cordons, dynamic risk assessment, defensive versus offensive approaches, and joining forces. Communication concerns were equipment shortfalls, dialoguing, and providing information. Assessment problems were scene layout and interpreting environmental indicators as well as understanding setting-driven needs for specialist skills and resources. Triage and treatment difficulties included differing triage systems, directing casualties, uncommon injuries, field hospitals, level of care, providing psychological and pediatric care. Transportation hardships included scene access, distance to hospitals, and distribution of casualties. Conclusion: Commonly encountered challenges during unintentional incidents were added to during MCAs

  13. Citoyenneté et formes de violence. La violence de genre en Amérique latine

    OpenAIRE

    Soriano, Michèle

    2015-01-01

    Dans son essai intitulé Critique de la violence, Walter Benjamin considère la violence dans ses rapports au droit. Il remarque que toute violence, en tant que moyen, « fonde le droit ou le conserve », et s’intéresse tout particulièrement à la violence létale ; il précise : « Dans l’exercice de la violence sur la vie et la mort, le droit lui-même se renforce plus que dans n’importe quelle autre de ses applications ». Le rapport que trace le philosophe entre la violence, la mort et le droit par...

  14. The impact of violence on children.

    Science.gov (United States)

    Osofsky, J D

    1999-01-01

    Existing research on the effects of children's exposure to violence covers a broad range of community, family, and media violence. This research is relevant and useful to an examination of domestic violence in two key ways. First, understanding how exposure to various types of violence affects children and what best enables them to cope can point to important considerations when trying to help children cope with exposure to domestic violence in particular. And second, many families experiencing domestic violence are exposed to other types of violence as well. Exposure to violence on multiple levels can affect the parents' behavior and can compound the effects on children. This article begins with an overview of the extent of children's exposure to various types of violence, and then examines what is known about the effects of this exposure across the developmental continuum. Key protective factors for children exposed to violence are examined. Research indicates that the most important resource protecting children from the negative effects of exposure to violence is a strong relationship with a competent, caring, positive adult, most often a parent. Yet, when parents are themselves witnesses to or victims of violence, they may have difficulty fulfilling this role. In the final section, directions for future research are discussed.

  15. Narratives of Domestic Violence

    OpenAIRE

    Hunter, Rosemary

    2006-01-01

    Second wave feminists in Australia brought the social issue of domestic violence out of the suburban shadows and into the activist and policy spotlight in the 1970s. Subsequent feminist-inspired law reforms around domestic violence included the introduction of state domestic violence order regimes in the 1980s, and amendments to the Family Law Act 1975 (Cth) in 1995 to specify family violence as one of the matters to be taken into account by the Family Court in\\ud determining the best interes...

  16. [Epidemiological, clinical and forensic physical violence against women in Tambacounda (Senegal)].

    Science.gov (United States)

    Leye, M M M; Ndiaye, P; Ndiaye, D; Seck, I; Faye, A; Tal Dia, A

    2017-06-01

    To contribute to the fight against physical violence against women, this work aimed to make a 10-year review of cases treated at the Regional Court of Tambacounda. This observational, retrospective, descriptive and analytical study was conducted from 15 October 2014 to 15 April 2015. It covered all the court records of victims of intentional injury from 2006 to 2015. The data was entered and analyzed using Epi info 3.3.2 software. In all, 113 cases were treated. The mean age was 26.5±10.08 years for victims versus 32.5±13.8 years for the aggressors. The victims were all female, and 77.9% of offenders were male. The assaults took place mostly during the day (57.5%), and especially in the homes of victims (61.0%), in the street (16.8%) in the bush (12.4%). The consultation period was less than 24hours for 54.9% of the victims. Clinical examination differentiated: fractures (15%); contusions (13.5%); penetrating wounds (10.6%); bruises (9.7%); eye injuries (7.9%); broken teeth (7.9%); diffuse pains (7.1%), 6.2% polytrauma (6.2%), and 5.3% of trauma on pregnancies. Among the violence, 33.6% were domestic; 11.5% were associated with rape (7.1%); psychological violence (3.6%); rape and death threat (1.8%). Rape was statistically more common among child victims [OR=10.7 (3.2-35.5)] and/or educated victims [OR=5.8 (1.7-19.9)] and aggression in the bush [OR=7.5 (2.2 to 14.2)]. The attackers were lonely and imprisoned in 94.7% and 73.5% of cases respectively. The sentence was firm imprisonment for 89.2% of cases. In Tambacounda, health and judicial authorities should enhance public awareness concerning the risk of violence. The extension of this type of study to the national level would have enabled better orientation of control strategies against this scourge. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  17. Sex Work and Drug Use in a Subculture of Violence

    Science.gov (United States)

    Surratt, Hilary L.; Inciardi, James A.; Kurtz, Steven P.; Kiley, Marion C.

    2004-01-01

    This article examines the subculture of violence thesis as it relates to female street sex workers in Miami. Interview and focus group methods were used to study the intersections of childhood trauma, drug use, and violent victimization among 325 women. Using targeted sampling, crack- and heroin-using sex workers were recruited through street…

  18. Hispanic women's experiences with substance abuse, intimate partner violence, and risk for HIV.

    Science.gov (United States)

    Gonzalez-Guarda, Rosa Maria; Vasquez, Elias P; Urrutia, Maria T; Villarruel, Antonia M; Peragallo, Nilda

    2011-01-01

    Hispanic females are disproportionately affected by substance abuse, intimate partner violence, and HIV. Despite these disparities, research describing the cultural and gender-specific experiences of Hispanic women with regard to these conditions is lacking. Transplantadas en otro mundo (Uprooted in another world), El criador de abuso (The breeding ground of abuse), and Rompiendo el silencio (Breaking the silence). This study supports the importance of addressing substance abuse, violence, and risk for HIV in an integrated manner and stresses the importance of addressing associated cultural factors (e.g., acculturation, machismo ) in interventions targeting Hispanics.

  19. Prevalence of Violence: Male and Female Seasonal Agricultural Workers' Approach to Violence in Turkey.

    Science.gov (United States)

    Şimşek, Zeynep; Kara, Burcu; Ersin, Fatma; Ökten, Şevket; Yıldırımkaya, Gökhan

    2016-01-01

    The objective of this study is to determine the male and female seasonal agricultural workers' perception of violence, prevalence of violence, frequency of victimization, and their related factors. Quantitative and qualitative data were used, and 89.5% of women were exposed to violence that included the restriction of their human rights. The sample consisted of 1,211 women and 1,064 men. Their marital status, duration of work, and attention to their health affected the violence exposure. Arabic people who were unmarried, had a poor educational background, and poor health perception approved of the physical violence.

  20. Metaphors about violence by preservice teachers.

    Science.gov (United States)

    Özabaci, Nilüfer; Erkan, Zülal

    2015-03-01

    Violence consists of a pattern of coercive behaviors used by a competent adult or adolescent to establish and maintain power and control over another competent adult or adolescent. These behaviors, which can occur alone or in combination, sporadically or continually, include physical violence, psychological abuse, talking, and nonconsensual sexual behavior. Research indicates that different types of violence are used as a means of enforcing discipline in the family and the school context. Children and adolescents who grow up in an environment where violence has a natural place tend to resort to violence at every stage of their lives without question. The aim of this research was therefore to preservice teachers' perception of the concept of violence through the use of metaphors. Accordingly, answers to the following questions were sought: What metaphors do the youth use to describe the concept of violence? Under which conceptual categories can these metaphors be grouped in terms of their common features? How do the conceptual categories vary in relation to the students' gender and the subjects they study at university? The study was conducted in 2009 with the help of 303 students at Mersin University and Eskişehir Osmangazi University (Faculty of Education). Incomplete statements such as "Violence is like..., because..." were used in an attempt to understand the students' perception of violence. The students were given questionnaire to complete the statements. Demographic questions were also asked on the students'age, gender and departments. The data were analyzed through qualitative analysis, and processes such as frequency distribution and quantitative correlation data were evaluated through SPSS data analysis. It emerged that the students used 74 metaphors of violence that could be divided into seven categories: (1) Violence as a way of controlling others; 2) Violence as part of social and affective life; (3) Violence as devastation; (4) Violence as learned