54 research outputs found

    Rape in the Nordic Countries

    Get PDF
    While the Nordic countries are listed at the top in most international rankings of gender equality and citizens’ feelings of security, studies on the prevalence of sexual victimisation present a different picture, suggesting that the very countries that have invested much in establishing gender equality actually see a high prevalence of sexual violence. This book sheds light on the phenomenon and construction of rape and other forms of sexual violence within the Nordic region, exploring the ways in which rape and sexual violence are dealt with through criminal law and considering governmental policies aimed at combatting it, with a special focus on legal regulations and developments. Thematically organised, it offers new research on perpetrators, victimhood, criminal justice and prevention. Multi-disciplinary in approach, it brings together the latest work from a range of scholars to offer insights into the situation in the five Nordic countries, asking how and why rape and other forms of sexual violence occur, whilst also addressing the timely issues of online sexual cultures, BDSM and the grey areas of sexual offences. As such, it will appeal to scholars of sociology, criminology and law with interests in gender and sexual violence

    Towards voluntariness in Swedish rape law : Hyper-medialised group rape cases and the shift in the legal discourse

    Get PDF
    On 1 July 2018, a new consent-based legislation entered in force in Sweden, making it illegal to perform sexual intercourse with a person who was not participating voluntarily. The main argument in this chapter is that in Sweden, this legal shift was the result of a discursive process that since the mid-1990s, in particular, was taking place in news reports and debate about the legal handling of a number of hyper-medialised Swedish group rape cases. Through an analysis of newspaper articles, the aim is to highlight how a gradual change towards voluntariness was reflected in, and largely pushed by, news reports and debate about these cases. The chapter describes how the terms ‘consent’ and ‘negligence’ were gradually introduced, heavily debated and slowly implemented in the legal discourse over a period of more than twenty years. Theoretically, it is shown how the legal shift from a force-based legislation to a consent based-construction was the result of an ongoing interplay between challenging articulations on the discursive field and attempts to fixate the meaning of terms on the legal discourse

    Hierarchical categorisation of tags for delicious

    Get PDF
    In the scenario of social bookmarking, a user browsing the Web bookmarks web pages and assigns free-text labels (i.e., tags) to them according to their personal preferences. In this technical report, we approach one of the practical aspects when it comes to represent users' interests from their tagging activity, namely the categorization of tags into high-level categories of interest. The reason is that the representation of user profiles on the basis of the myriad of tags available on the Web is certainly unfeasible from various practical perspectives; mainly concerning the unavailability of data to reliably, accurately measure interests across such fine-grained categorisation, and, should the data be available, its overwhelming computational intractability. Motivated by this, our study presents the results of a categorization process whereby a collection of tags posted at Delicious #http://delicious.com# are classified into 200 subcategories of interest.Preprin

    Hierarchical categorisation of web tags for Delicious

    Get PDF
    In the scenario of social bookmarking, a user browsing the Web bookmarks web pages and assigns free-text labels (i.e., tags) to them according to their personal preferences. The benefits of social tagging are clear – tags enhance Web content browsing and search. However, since these tags may be publicly available to any Internet user, a privacy attacker may collect this information and extract an accurate snapshot of users’ interests or user profiles, containing sensitive information, such as health-related information, political preferences, salary or religion. In order to hinder attackers in their efforts to profile users, this report focuses on the practical aspects of capturing user interests from their tagging activity. More accurately, we study how to categorise a collection of tags posted by users in one of the most popular bookmarking services, Delicious (http://delicious.com).Preprin

    A systems architecture-based approach to assess candidate upgrades to complex systems

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Engineering Systems Division, 2012."September 2012." Cataloged from PDF version of thesis.Includes bibliographical references (p. 163-167).The Compatibility Assessment Method (CAM), a new structured process for assessing compatibility between parent systems and child subsystems is proposed and applied to several cases where subsystems are being replaced in legacy systems. CAM is a screening process intended to be used by project managers who need to replace components of complex systems. The functional model-based process uses an extension of the Integrated Definition Modeling Language of IDEFO. The IDEFO method is used for defining compatibility measures based on each of the four constituent arrows that show inputs, controls, outputs, and mechanisms (ICOM). In this extension, the control constituents are replaced with constraints. Each of the ICOM constituents is expanded with parameters which include metrics and values. The ICOMs with their parameters and metrics are then used to characterize two or more subsystems in a matrix format. The differences between these matrices are entered into the sparse "Delta Matrix" which shows analysts the differences between the systems. These differences can be assigned to the appropriate levels of technical expertise to be analyzed and to determine feasibility of the child subsystem in the parent system. The process is compared to current practices in government unmanned aircraft system program offices to determine the usefulness of adopting this compatibility assessment process. This dissertation outlines the need for and development of the method for application by practitioners responsible for replacing subsystems on legacy systems. The development includes evaluations of the method and an experiment with cohorts of student system engineers to compare the output of the Compatibility Assessment Method to less-structured methods. This research contributes additional insight into system architecting theory and proposes a structured method for practitioners to use to improve the processes to perform part replacement in legacy systems. While others have offered methods to measure aspects of system architecture, this proposed method moves beyond the extant literature with tools for practitioners.by David Scott Andrew Long.Ph.D

    Echo: The Secrets Issue, Summer 2015

    Get PDF
    Student-produced magazine formerly published as Chicago Arts and Communication, changed to Echo magazine in 1997. Stories divided into: lies; lives, lowdown, and locales. 80 pages.https://digitalcommons.colum.edu/echo/1035/thumbnail.jp

    The Tiger Vol. 102 Issue 19 2008-10-10

    Get PDF
    https://tigerprints.clemson.edu/tiger_newspaper/2422/thumbnail.jp

    The feasibility of starting a dating company in South Africa

    Get PDF
    The purpose of the research is to determine the feasibility of starting a dating company, which focuses specifically on the South African market. Further sub problems were defined as follow: • Which South Africans would use a dating service, that is, who will be the main customers? • Is there specifically identifiable information that can help to recognise customers? Or can a profile be created for to identify customers? • How much are the customers willing to pay? • Does or can technology play a role in in courtship? The role of technology was investigated, in which it was found that globalisation affects everyone. One of the core factors that caused many other technologies to evolve from it, is the Internet. The intranet was a natural evolution from the Internet, which is normally specific to a company. A further literature survey was conducted to gain an understanding of dating companies globally and locally, to gain an understanding of the subject, which was used to create a questionnaire. The questionnaire reached a 120 participants, with 52 participants responding, which relates to a response rate of 43.3 percent. The questionnaire produces 37 variables, which were correlated, and as a result it was recommended that it is feasible to start a dating company in South Africa

    The feasibility of starting a dating company in South Africa

    Get PDF
    The purpose of the research is to determine the feasibility of starting a dating company, which focuses specifically on the South African market. Further sub problems were defined as follow: • Which South Africans would use a dating service, that is, who will be the main customers? • Is there specifically identifiable information that can help to recognise customers? Or can a profile be created for to identify customers? • How much are the customers willing to pay? • Does or can technology play a role in in courtship? The role of technology was investigated, in which it was found that globalisation affects everyone. One of the core factors that caused many other technologies to evolve from it, is the Internet. The intranet was a natural evolution from the Internet, which is normally specific to a company. A further literature survey was conducted to gain an understanding of dating companies globally and locally, to gain an understanding of the subject, which was used to create a questionnaire. The questionnaire reached a 120 participants, with 52 participants responding, which relates to a response rate of 43.3 percent. The questionnaire produces 37 variables, which were correlated, and as a result it was recommended that it is feasible to start a dating company in South Africa
    • …
    corecore