196 research outputs found

    Using Participatory Methodologies to Achieve Change in Valuing Volunteering

    Get PDF
    The global action research project Valuing Volunteering explores how and why volunteering contributes to poverty reduction and sustainable positive change, and the factors that prevent it doing so. The research modelled an approach that empowered local people to better understand the challenges they face, acquiring valuable learning for volunteering for development organisations to design initiatives better able to alleviate poverty. Volunteers were at the centre of the participatory action research processes established within each of the four Valuing Volunteering countries (Kenya, Mozambique, Nepal and the Philippines). This article explores how volunteers used participatory approaches to help communities achieve lasting social change and alleviate poverty. Examples from the four countries show the benefits of using participatory approaches, and the advantages of specific participatory tools, such as system mapping. Valuing Volunteering shows both what volunteers can achieve through using a participatory approach and participatory methods, and what can be learnt from the challenges faced

    An investigation into darknets and the content available via anonymous peer-to-peer file sharing

    Get PDF
    Media sites, both technical and non-technical, make references to Darknets as havens for clandestine file sharing. They are often given an aura of mystique; where content of any type is just a mouse click away. However, can Darknets really be easily accessed, and do they provide access to material that would otherwise be difficult to obtain? This paper investigates which Darknets are easily discovered, the technical designs and methods used to hide content on the networks, the tools needed to join, and ultimately what type and quantities of files can be found on anonymous peer-to-peer file sharing networks. This information was gathered by conducting weekly searches for specific file extensions on each Darknet over a 4 week period. It was found that connectivity to Darknets was easy to establish, and installing peer-to-peer file sharing applications was a simple process. The quantity of content found on Darknet peer-to-peer file sharing networks indicates that file sharing is rampant. Of particular concern was what appears to be a large quantity of child pornography made available

    Stroke Epidemiology and Outcome in Southern Sweden

    Get PDF
    Background: Stroke is a common cause of mortality and disability worldwide and continuously updated, thorough information of itsoccurrence and outcome is needed. In recent years, multiple advances have been made in stroke prevention and treatment that mayhave changed the epidemiology and outcome of stroke.Aims: To investigate updated population-based stroke epidemiology as well as long-term survival, recurrence and functional outcomein southern Sweden.Methods: Paper I: A population-based cohort of 413 consecutive patients with first-ever stroke in 2015-2016 was assembled usingthe prospective hospital-based stroke studies Lund Stroke Register (LSR) and Riksstroke, as well as retrospective searches ofprimary care, outpatient clinic and autopsy sources. Age- and sex-standardized incidence rates were calculated and compared with aprior study from the same study area in 2001-2002.Paper II: A subset of the population-based cohort of 400 patients (only ischemic stroke and intracerebral hemorrhage) was comparedwith LSR and Riksstroke regarding case ascertainment and which patients were not included in the hospital-based stroke studies.Paper III: The 400 individuals in the population-based cohort were followed up after 3 years regarding survival and causes of deathby using the Swedish Causes of Death Register, and stroke recurrence by using medical record review. Index and recurrent strokeswere classified by pathogenetic mechanism using the TOAST classification. Stroke survival at 3 years was compared with priorstudies in our area from 1983-1985, 1993-1995, and 2001-2002.Paper IV: The population-based cohort was followed-up in-person or via telephone at 3-4 years regarding functional outcome (mRS),dependency in activities of daily living (ADL), and health-related quality of life (HRQoL). Data were also collected on potentiallycorrelated health problems after stroke such as fatigue, cognitive impairment and depression.Results: Paper I: The total population-based age- and sex-standardized rate of stroke incidence was 165 per 100 000 person yearsin our study area, a 33% decrease compared with a population-based study in our area from 2001-2002. However, stroke incidencerates did not change for hemorrhagic stroke or among those <65 years.Paper II: LSR detected 363 (91%) of cases while Riksstroke detected 328 (82%). Patients undetected by the hospital-based studieshad high case fatality (44% vs 9%; p=0.001), and those only detected in primary care (n=11) often lived in nursing homes (57%).Those not detected by Riksstroke had less severe stroke (median NIHSS 3 vs 5; p=0.013).Paper III: In total, 265 (66%) survived 3 years after first-ever stroke. Among individuals with ischemic stroke, cardio-aortic embolismas pathogenetic mechanism was associated with the lowest 3-year survival (51/91; 56%). Cardiovascular disease was the cause ofdeath in 59% of cases (79/135). Meanwhile, 8% (32/400) had a recurrent stroke within 3 years, and the pathogenetic mechanism ofischemic stroke changed between first-ever stroke and recurrence in 16/29 (55%) cases. Three-year survival improved between the1980s and the present study (56% vs 66%; p=0.002), but survival did not change significantly between the early 2000s and thepresent study (64% vs 66%; p=0.48. Paper IV: In all, 202 individuals were clinically followed-up after a median of 3.2 years, while 47(12%) stroke survivors were lost to follow-up. Among followed-up survivors, 147 (73%) had favorable functional outcome (mRS≤2)and 134 (69%) reported good-excellent HRQoL. Age, stroke severity, professional care pre-stroke and recurrent stroke (all p<0.001)were predictors of poor functional outcome. Among follow-up variables, fatigue (p=0.001), and stroke severity (p<0.001) wereassociated with dependency in ADL, and fatigue (p<0.001) was also associated with worse HRQoL.Conclusions: Stroke incidence and survival have improved over recent decades, however some subgroups of stroke have notimproved in the same manner. Thorough population-based epidemiological studies of stroke are important to avoid and to possibleselection bias in hospital-based stroke studies. Around 3 of 10 long-term stroke survivors have poor outcome, and fatigue may be asignificant contributor to post-stroke function and health

    An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2

    Get PDF
    Wi-Fi Protected Setup (WPS) is a method of allowing a consumer to set up a secure wireless network in a user friendly way. However, in December 2011 it was discovered that a brute force attack exists that reduces the WPS key space from 108 to 104+103. This resulted in a proof of concept tool that was able to search all possible combinations of PINs within a few days.This research presents a methodology to test wireless devices to determine their susceptibility to the external registrar PIN authentication design vulnerability. A number of devices were audited, and the Linksys WRT160N v2 router was selected to be examined in detail. The results demonstrate that the router is highly susceptible to having its WPN PIN brute forced. It also details that even with WPS disabled in the router configuration, WPS was still active and the PIN was equally vulnerable

    Determining What Characteristics Constitute a Darknet

    Get PDF
    Privacy on the Internet has always been a concern, but monitoring of content by both private corporations and Government departments has pushed people to search for ways to communicate over the Internet in a more secure manner. This has given rise to the creations of Darknets, which are networks that operate “inside” the Internet, and allow anonymous participation via a de‐centralised, encrypted, peer‐to‐peer network topology. This research investigates some sources of known Internet content monitoring, and how they provided the template for the creation of a system to avoid such surveillance. It then highlights how communications on the Clearnet is fundamentally different to that of a Darknet, and examines the characteristics that determine whether or not a network could be classified as a Darknet. Selection of said characteristics is based on how the network was developed, what its intended goals were, and how it implemented technical measures to meet said goals. Five characteristics were found that could be used to determine if a network is to be be classified as a Darknet

    A Proposed Method for Examining Wireless Device Vulnerability to Brute Force Attacks via WPS External Registrar PIN Authentication Design Vulnerability

    Get PDF
    Wi-Fi Protected Setup (WPS) is a certification scheme introduced in 2007 to ensure that wireless SOHO (Small Office, Home Office) and home networks could be connected to in a trusted, yet user friendly manner. Recently, WPS was shown to have a design and implementation flaw which makes the feature highly susceptible to attack. Although open-source tools have been written and released, no formal testing methodology has been developed. This research presents a proposed method for the testing of this vulnerability in a measured and systematic way

    An Investigation into the Wi-Fi Protected Setup PIN of the Linksys WRT160N v2

    Get PDF
    Wi-Fi Protected Setup (WPS) is a method of allowing a consumer to set up a secure wireless network in a user friendly way. However, in December 2011 it was discovered that a brute force attack exists that reduces the WPS key space from 108 to 104+103. This resulted in a proof of concept tool that was able to search all possible combinations of PINs within a few days.This research presents a methodology to test wireless devices to determine their susceptibility to the external registrar PIN authentication design vulnerability. A number of devices were audited, and the Linksys WRT160N v2 router was selected to be examined in detail. The results demonstrate that the router is highly susceptible to having its WPN PIN brute forced. It also details that even with WPS disabled in the router configuration, WPS was still active and the PIN was equally vulnerable

    What's Different about How Volunteers Work? Relationship Building for Wellbeing and Change

    Get PDF
    This article looks at what happens when volunteering goes well. It provides a theoretical and empirical grounding for understanding how volunteers enable outcomes such as participation and cooperation in complex change environments. The findings point to three important qualities of volunteer relationships, which alter how people feel about themselves, others and their situation: informality, the act of doing together and networked reciprocity. When these relational styles foster three psychosocial experiences known to support human wellbeing – relatedness, competency and autonomy – they make it possible for marginalised and poor groups to participate, initiate and share ownership in the change process. When socially as well as personally rewarding, volunteer relationships can also strengthen solidarity, a knowledge of other's strengths and social commitment, strengthening the basis for social action to continue as a cooperative process with other people. Implications for how volunteering is utilised and strengthened as a strategy for community development are discussed
    corecore