196 research outputs found
Using Participatory Methodologies to Achieve Change in Valuing Volunteering
The global action research project Valuing Volunteering explores how and why volunteering contributes to poverty reduction and sustainable positive change, and the factors that prevent it doing so. The research modelled an approach that empowered local people to better understand the challenges they face, acquiring valuable learning for volunteering for development organisations to design initiatives better able to alleviate poverty. Volunteers were at the centre of the participatory action research processes established within each of the four Valuing Volunteering countries (Kenya, Mozambique, Nepal and the Philippines). This article explores how volunteers used participatory approaches to help communities achieve lasting social change and alleviate poverty. Examples from the four countries show the benefits of using participatory approaches, and the advantages of specific participatory tools, such as system mapping. Valuing Volunteering shows both what volunteers can achieve through using a participatory approach and participatory methods, and what can be learnt from the challenges faced
An investigation into darknets and the content available via anonymous peer-to-peer file sharing
Media sites, both technical and non-technical, make references to Darknets as havens for clandestine file sharing. They are often given an aura of mystique; where content of any type is just a mouse click away. However, can Darknets really be easily accessed, and do they provide access to material that would otherwise be difficult to obtain? This paper investigates which Darknets are easily discovered, the technical designs and methods used to hide content on the networks, the tools needed to join, and ultimately what type and quantities of files can be found on anonymous peer-to-peer file sharing networks. This information was gathered by conducting weekly searches for specific file extensions on each Darknet over a 4 week period. It was found that connectivity to Darknets was easy to establish, and installing peer-to-peer file sharing applications was a simple process. The quantity of content found on Darknet peer-to-peer file sharing networks indicates that file sharing is rampant. Of particular concern was what appears to be a large quantity of child pornography made available
Stroke Epidemiology and Outcome in Southern Sweden
Background: Stroke is a common cause of mortality and disability worldwide and continuously updated, thorough information of itsoccurrence and outcome is needed. In recent years, multiple advances have been made in stroke prevention and treatment that mayhave changed the epidemiology and outcome of stroke.Aims: To investigate updated population-based stroke epidemiology as well as long-term survival, recurrence and functional outcomein southern Sweden.Methods: Paper I: A population-based cohort of 413 consecutive patients with first-ever stroke in 2015-2016 was assembled usingthe prospective hospital-based stroke studies Lund Stroke Register (LSR) and Riksstroke, as well as retrospective searches ofprimary care, outpatient clinic and autopsy sources. Age- and sex-standardized incidence rates were calculated and compared with aprior study from the same study area in 2001-2002.Paper II: A subset of the population-based cohort of 400 patients (only ischemic stroke and intracerebral hemorrhage) was comparedwith LSR and Riksstroke regarding case ascertainment and which patients were not included in the hospital-based stroke studies.Paper III: The 400 individuals in the population-based cohort were followed up after 3 years regarding survival and causes of deathby using the Swedish Causes of Death Register, and stroke recurrence by using medical record review. Index and recurrent strokeswere classified by pathogenetic mechanism using the TOAST classification. Stroke survival at 3 years was compared with priorstudies in our area from 1983-1985, 1993-1995, and 2001-2002.Paper IV: The population-based cohort was followed-up in-person or via telephone at 3-4 years regarding functional outcome (mRS),dependency in activities of daily living (ADL), and health-related quality of life (HRQoL). Data were also collected on potentiallycorrelated health problems after stroke such as fatigue, cognitive impairment and depression.Results: Paper I: The total population-based age- and sex-standardized rate of stroke incidence was 165 per 100 000 person yearsin our study area, a 33% decrease compared with a population-based study in our area from 2001-2002. However, stroke incidencerates did not change for hemorrhagic stroke or among those <65 years.Paper II: LSR detected 363 (91%) of cases while Riksstroke detected 328 (82%). Patients undetected by the hospital-based studieshad high case fatality (44% vs 9%; p=0.001), and those only detected in primary care (n=11) often lived in nursing homes (57%).Those not detected by Riksstroke had less severe stroke (median NIHSS 3 vs 5; p=0.013).Paper III: In total, 265 (66%) survived 3 years after first-ever stroke. Among individuals with ischemic stroke, cardio-aortic embolismas pathogenetic mechanism was associated with the lowest 3-year survival (51/91; 56%). Cardiovascular disease was the cause ofdeath in 59% of cases (79/135). Meanwhile, 8% (32/400) had a recurrent stroke within 3 years, and the pathogenetic mechanism ofischemic stroke changed between first-ever stroke and recurrence in 16/29 (55%) cases. Three-year survival improved between the1980s and the present study (56% vs 66%; p=0.002), but survival did not change significantly between the early 2000s and thepresent study (64% vs 66%; p=0.48. Paper IV: In all, 202 individuals were clinically followed-up after a median of 3.2 years, while 47(12%) stroke survivors were lost to follow-up. Among followed-up survivors, 147 (73%) had favorable functional outcome (mRS≤2)and 134 (69%) reported good-excellent HRQoL. Age, stroke severity, professional care pre-stroke and recurrent stroke (all p<0.001)were predictors of poor functional outcome. Among follow-up variables, fatigue (p=0.001), and stroke severity (p<0.001) wereassociated with dependency in ADL, and fatigue (p<0.001) was also associated with worse HRQoL.Conclusions: Stroke incidence and survival have improved over recent decades, however some subgroups of stroke have notimproved in the same manner. Thorough population-based epidemiological studies of stroke are important to avoid and to possibleselection bias in hospital-based stroke studies. Around 3 of 10 long-term stroke survivors have poor outcome, and fatigue may be asignificant contributor to post-stroke function and health
An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2
Wi-Fi Protected Setup (WPS) is a method of allowing a consumer to set up a secure wireless network in a user friendly way. However, in December 2011 it was discovered that a brute force attack exists that reduces the WPS key space from 108 to 104+103. This resulted in a proof of concept tool that was able to search all possible combinations of PINs within a few days.This research presents a methodology to test wireless devices to determine their susceptibility to the external registrar PIN authentication design vulnerability. A number of devices were audited, and the Linksys WRT160N v2 router was selected to be examined in detail. The results demonstrate that the router is highly susceptible to having its WPN PIN brute forced. It also details that even with WPS disabled in the router configuration, WPS was still active and the PIN was equally vulnerable
Determining What Characteristics Constitute a Darknet
Privacy on the Internet has always been a concern, but monitoring of content by both private corporations and Government departments has pushed people to search for ways to communicate over the Internet in a more secure manner. This has given rise to the creations of Darknets, which are networks that operate “inside” the Internet, and allow anonymous participation via a de‐centralised, encrypted, peer‐to‐peer network topology. This research investigates some sources of known Internet content monitoring, and how they provided the template for the creation of a system to avoid such surveillance. It then highlights how communications on the Clearnet is fundamentally different to that of a Darknet, and examines the characteristics that determine whether or not a network could be classified as a Darknet. Selection of said characteristics is based on how the network was developed, what its intended goals were, and how it implemented technical measures to meet said goals. Five characteristics were found that could be used to determine if a network is to be be classified as a Darknet
A Proposed Method for Examining Wireless Device Vulnerability to Brute Force Attacks via WPS External Registrar PIN Authentication Design Vulnerability
Wi-Fi Protected Setup (WPS) is a certification scheme introduced in 2007 to ensure that wireless SOHO (Small Office, Home Office) and home networks could be connected to in a trusted, yet user friendly manner. Recently, WPS was shown to have a design and implementation flaw which makes the feature highly susceptible to attack. Although open-source tools have been written and released, no formal testing methodology has been developed. This research presents a proposed method for the testing of this vulnerability in a measured and systematic way
An Investigation into the Wi-Fi Protected Setup PIN of the Linksys WRT160N v2
Wi-Fi Protected Setup (WPS) is a method of allowing a consumer to set up a secure wireless network in a user friendly way. However, in December 2011 it was discovered that a brute force attack exists that reduces the WPS key space from 108 to 104+103. This resulted in a proof of concept tool that was able to search all possible combinations of PINs within a few days.This research presents a methodology to test wireless devices to determine their susceptibility to the external registrar PIN authentication design vulnerability. A number of devices were audited, and the Linksys WRT160N v2 router was selected to be examined in detail. The results demonstrate that the router is highly susceptible to having its WPN PIN brute forced. It also details that even with WPS disabled in the router configuration, WPS was still active and the PIN was equally vulnerable
What's Different about How Volunteers Work? Relationship Building for Wellbeing and Change
This article looks at what happens when volunteering goes well. It provides a theoretical and empirical grounding for understanding how volunteers enable outcomes such as participation and cooperation in complex change environments. The findings point to three important qualities of volunteer relationships, which alter how people feel about themselves, others and their situation: informality, the act of doing together and networked reciprocity. When these relational styles foster three psychosocial experiences known to support human wellbeing – relatedness, competency and autonomy – they make it possible for marginalised and poor groups to participate, initiate and share ownership in the change process. When socially as well as personally rewarding, volunteer relationships can also strengthen solidarity, a knowledge of other's strengths and social commitment, strengthening the basis for social action to continue as a cooperative process with other people. Implications for how volunteering is utilised and strengthened as a strategy for community development are discussed
Recommended from our members
Ties that mobilise: the relational structure and wellbeing dynamics of collective action
This thesis is about how complex change processes requiring collective action happen. Its concern is with connecting the technicalities of change (doing X to influence Y) to the human factors that move people to act. It draws learning from the efforts of a diverse group of volunteers and residents to protect a water ecosystem on a disasterstricken island in the Philippines. It analyses the relational structures and wellbeing dynamics of people’s interactions to bring new insights into the interpersonal experiences that mobilise and sustain collective endeavours.
Despite long-standing interest in the psychology of individual motivation and group dynamics, the integration of these fields to consider the role of motivation in rewarding and adaptive interpersonal interactions is a very recent focus (O’Hara & Rutsch, 2013; Weinstein, 2014). The way individuals approach one another – and the emotional effects of interpersonal interactions on motivation – is not recognised in rational and cognitive conceptualisations of collective action (Hoggett, 2000) in social-ecological systems (Head, 2016; Anderson, 2017). To address this gap, the research is concerned with the existence of social networks, their wellbeing qualities and the interplays which contextualise collective action. The core questions driving this research are:
* How are networks for collective action built and strengthened?
* Which network experiences motivate individuals while building their momentum as a collective?
* What qualities sustain a network of people?
Looking at how volunteering works, when it works, the study examines the social networks of volunteers and the patterns of wellbeing created through network interactions, tracing what possibilities relational structures and the wellbeing dynamics they amplify create for social-ecological systems change.
To accomplish an examination of ‘relationships for change’, I use a participatory methodology informed by system and complexity concepts to illuminate interrelationships between context, experiences and relationships, which helped me and co-participants to understand and build from what works. To accomplish an analysis of the data generated, I integrate two fields of research: social networks with human wellbeing to understand collective action. I also integrate research from natural resource management and volunteering to situate an examination of collective action in a real-world context. Both the data collection and sense-making processes are anchored in a belief that human development and the challenges that stand in its way – climate change, inequality and poverty – are inherently complex phenomena (Ramalingam et al., 2008; Apgar et al., 2009; Marks, 2011; Bellagio Initiative, 2012; Ramalingam, 2013) requiring that we increase our capacity to work with this complexity rather than simplify the way things are (O’Hara & Lyon, 2014)
- …