5,944 research outputs found

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    An examination of the verbal behaviour of intergroup discrimination

    Get PDF
    This thesis examined relationships between psychological flexibility, psychological inflexibility, prejudicial attitudes, and dehumanization across three cross-sectional studies with an additional proposed experimental study. Psychological flexibility refers to mindful attention to the present moment, willing acceptance of private experiences, and engaging in behaviours congruent with one’s freely chosen values. Inflexibility, on the other hand, indicates a tendency to suppress unwanted thoughts and emotions, entanglement with one’s thoughts, and rigid behavioural patterns. Study 1 found limited correlations between inflexibility and sexism, racism, homonegativity, and dehumanization. Study 2 demonstrated more consistent positive associations between inflexibility and prejudice. And Study 3 controlled for right-wing authoritarianism and social dominance orientation, finding inflexibility predicted hostile sexism and racism beyond these factors. While showing some relationships, particularly with sexism and racism, psychological inflexibility did not consistently correlate with varied prejudices across studies. The proposed randomized controlled trial aims to evaluate an Acceptance and Commitment Therapy intervention to reduce sexism through enhanced psychological flexibility. Overall, findings provide mixed support for the utility of flexibility-based skills in addressing complex societal prejudices. Research should continue examining flexibility integrated with socio-cultural approaches to promote equity

    Non-Market Food Practices Do Things Markets Cannot: Why Vermonters Produce and Distribute Food That\u27s Not For Sale

    Get PDF
    Researchers tend to portray food self-provisioning in high-income societies as a coping mechanism for the poor or a hobby for the well-off. They describe food charity as a regrettable band-aid. Vegetable gardens and neighborly sharing are considered remnants of precapitalist tradition. These are non-market food practices: producing food that is not for sale and distributing food in ways other than selling it. Recent scholarship challenges those standard understandings by showing (i) that non-market food practices remain prevalent in high-income countries, (ii) that people in diverse social groups engage in these practices, and (iii) that they articulate diverse reasons for doing so. In this dissertation, I investigate the persistent pervasiveness of non-market food practices in Vermont. To go beyond explanations that rely on individual motivation, I examine the roles these practices play in society. First, I investigate the prevalence of non-market food practices. Several surveys with large, representative samples reveal that more than half of Vermont households grow, hunt, fish, or gather some of their own food. Respondents estimate that they acquire 14% of the food they consume through non-market means, on average. For reference, commercial local food makes up about the same portion of total consumption. Then, drawing on the words of 94 non-market food practitioners I interviewed, I demonstrate that these practices serve functions that markets cannot. Interviewees attested that non-market distribution is special because it feeds the hungry, strengthens relationships, builds resilience, puts edible-but-unsellable food to use, and aligns with a desired future in which food is not for sale. Hunters, fishers, foragers, scavengers, and homesteaders said that these activities contribute to their long-run food security as a skills-based safety net. Self-provisioning allows them to eat from the landscape despite disruptions to their ability to access market food such as job loss, supply chain problems, or a global pandemic. Additional evidence from vegetable growers suggests that non-market settings liberate production from financial discipline, making space for work that is meaningful, playful, educational, and therapeutic. Non-market food practices mend holes in the social fabric torn by the commodification of everyday life. Finally, I synthesize scholarly critiques of markets as institutions for organizing the production and distribution of food. Markets send food toward money rather than hunger. Producing for market compels farmers to prioritize financial viability over other values such as stewardship. Historically, people rarely if ever sell each other food until external authorities coerce them to do so through taxation, indebtedness, cutting off access to the means of subsistence, or extinguishing non-market institutions. Today, more humans than ever suffer from chronic undernourishment even as the scale of commercial agriculture pushes environmental pressures past critical thresholds of planetary sustainability. This research substantiates that alternatives to markets exist and have the potential to address their shortcomings

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp

    The role of heterosocial perception in men's likelihood to sexually harass

    Get PDF
    Sexual harassment against women represents sexually aggressive and coercive behaviour that violates women’s dignity and creates an offensive environment, which threatens women’s well-being and ability to prosper in day to day life (Pina, Gannon & Saunders, 2009). Understanding the perceptual characteristics of men with inclinations to sexually harass, through how they perceive women is important in delineating the reasons why some men may engage in the sexual harassment of women. Heterosocial perception is a concept of how an individual perceives another person interacting with the opposite sex. It is typically measured using the Test of Reading Affective Cues (TRAC), a tool encompassing an array of video clips showing a woman interacting with a man, whereby the woman displays a range of affective cues. The perceiver is assessed on their perceptual accuracy when judging the affective cues. Perceptual accuracies of male rapists and male child molesters have been well researched (Lipton, McDonel & McFall, 1987; Stahl & Sacco, 1995), yet male sexual harassment as a singular category has been neglected. The current thesis explores the potential heterosocial perception characteristics of a distinct group of men who are relatively high in the likelihood to engage in sexual harassment of women from scores on Pryor’s (1987) Likelihood to Sexually Harass (LSH) scale focusing on their differences in performance on the TRAC in comparison to those men who are lower in the likelihood to engage in sexual harassment of women. Five empirical studies are reported in this thesis. Study 1 presents a modernized version of the TRAC and incorporates an analysis to develop it as a research tool, enabling judgements on five affective cues displayed by a woman; friendly, romantic, neutral, bored and rejecting. The tool provides this range of affective cues that were used in later studies to measure differences in heterosocial perception. Study 2 addressed theoretical explanations taken from previous perception research with sexually aggressive men (Malamuth & Brown, xiv 1994) to explain differences in heterosocial perception for men high in LSH. Explanations are given for potential biases evidenced by men high in LSH focusing on Error Management Theory (Haselton & Buss, 2000) arguing that an overperception bias will increase the frequency of falsely inferring a woman’s sexual intent towards sexual pursuit, but considerably reduce the costs of losing a sexual opportunity by falsely inferring that a woman lacked sexual intent. Altogether, study 2 provided support for the misidentification of negative affective cues (negativeness blindness), the overperception of negative affective cues and the romantic overperception bias of friendly affective cues in the perception of men high in LSH. Study 3 tested the established theoretical link that internal concepts of social power have within men who report sexual aggression and sexual coercion and the subsequent impact on perception. Unexpectedly, power did not exacerbate perceptual inaccuracy for negative affective cues and the romantic overperception bias of friendly affective cues. In study 4, objectification was assessed in its relationship to perception in high LSH men. Instrumental and both specific and general sexual objectification were significantly higher for men high in LSH. Specific sexual objectification was found to negatively mediate romantic categorizations of romantic affective cues, but general sexual objectification was found to positively mediate romantic categorizations of friendly affective cues for men high in LSH. Results also showed that men high in LSH showed poorest perceptual accuracy on bored and rejecting affective cues, and evidenced a greater romantic judgement of friendly affective cues overperception bias. In study 5, the impact of different mental states on perception was assessed, via the use of a cooling system to facilitate self-regulation. A cooling system is a psychological framework proposed for understanding self-control (Metcalfe & Mischel, 1999), and in this study it incorporated techniques of distraction, distancing and empathy enhancement. Results showed that the cooling system was not beneficial in making high LSH xv men’s perceptual judgements more accurate and in making their judgements accurate to the level of low and medium LSH men for negative affective cues. However, cooling did improve perceptual accuracy of friendly affective cues removing the overperception bias to romantic judgements in comparison to the neutral condition. The cooling system was not found to reduce instrumental and sexual objectification for high LSH men. There were differences found on empathy between men high and low and medium on LSH. Differences were found such that men high in LSH showed more state empathy, but less trait empathy than men low and medium in LSH

    Natural and Technological Hazards in Urban Areas

    Get PDF
    Natural hazard events and technological accidents are separate causes of environmental impacts. Natural hazards are physical phenomena active in geological times, whereas technological hazards result from actions or facilities created by humans. In our time, combined natural and man-made hazards have been induced. Overpopulation and urban development in areas prone to natural hazards increase the impact of natural disasters worldwide. Additionally, urban areas are frequently characterized by intense industrial activity and rapid, poorly planned growth that threatens the environment and degrades the quality of life. Therefore, proper urban planning is crucial to minimize fatalities and reduce the environmental and economic impacts that accompany both natural and technological hazardous events

    3D Innovations in Personalized Surgery

    Get PDF
    Current practice involves the use of 3D surgical planning and patient-specific solutions in multiple surgical areas of expertise. Patient-specific solutions have been endorsed for several years in numerous publications due to their associated benefits around accuracy, safety, and predictability of surgical outcome. The basis of 3D surgical planning is the use of high-quality medical images (e.g., CT, MRI, or PET-scans). The translation from 3D digital planning toward surgical applications was developed hand in hand with a rise in 3D printing applications of multiple biocompatible materials. These technical aspects of medical care require engineers’ or technical physicians’ expertise for optimal safe and effective implementation in daily clinical routines.The aim and scope of this Special Issue is high-tech solutions in personalized surgery, based on 3D technology and, more specifically, bone-related surgery. Full-papers or highly innovative technical notes or (systematic) reviews that relate to innovative personalized surgery are invited. This can include optimization of imaging for 3D VSP, optimization of 3D VSP workflow and its translation toward the surgical procedure, or optimization of personalized implants or devices in relation to bone surgery

    UMSL Bulletin 2022-2023

    Get PDF
    The 2022-2023 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1087/thumbnail.jp
    • …
    corecore