321 research outputs found

    “The Dreadful Chasm”: American Recognition and Response to the Armenian Genocide of 1915-1916 and the Holocaust

    Get PDF
    This paper won 2nd place for the 2009 Burgess Award and was written for Prof. Mark Roseman's Spring 2009 class

    Education Fraud at the Margins: Using the Federal False Claims Act to Curb Enrollment Abuses in Online, For-Profit K-12 Schools

    Get PDF
    America’s online schools have some things to account for. In recent years, an increase in the number of for-profit K–12 schools has coincided with the rise of online education. Meanwhile, funding models that award money for each additional student incentivize for-profit schools to overenroll students in online programs that were once reserved for specialized subsets of students. Although, to date, reported incidents of enrollment fraud have been rare, there are many reasons to think that the problem has gone largely undetected. As education reformers on both sides of the political spectrum continue to push privatization and charter schools, figuring out how to avoid waste and minimize fraud will only become more important. This Note argues that the federal False Claims Act (FCA) is the best short-term option for curbing this kind of enrollment-reporting abuse. By drawing an analogy to health-care fraud, this Note makes the case that prosecutors and individuals can and should use expanded theories of false claiming to hold accountable online charter schools that exaggerate their enrollment

    From Object to Subject: Young women\u27s experience of sexuality education within sex-negative taboos

    Get PDF
    Young female sexuality continues to be portrayed as problematic within cultural expectations of acceptable sexual conduct among young people (Moran, 2000; Russell, 2005; Welles, 2005). Contributing to this negativity is the marginalization of positive conceptualizations of female sexuality and the silencing of female sexual desire and pleasure within sexual education practices (Fields & Tolman, 2006; Fine, 1988; Tolman, 2002; Tolman, Hirschman, & Impett, 2005). This feminist critical ethnography utilizes the narratives of four young women participants in the From Object to Subject (O2S) curriculum--a curriculum emphasizing a sex-positive approach to sexuality education--to explore: (a) how adolescent females have been educated about sex and sexuality in the past; (b) how young women have experienced their own sexuality; and (c) the societal circumstances and messages that young women experience and have contributed to their sexual socialization. Findings revealed two major societal taboos that contribute to the marginalization of young female sexuality. The taboo of sexual awareness and the taboo of female sexuality, desire, and pleasure are described in detail. These taboos inform understanding of the realities young women experience within our nation\u27s contemporary climate of sex-negative sexual education practices and the nature of sexual socialization of young people. Implications for future research regarding young female sexuality and sexuality education policy reform are addressed

    Adolescent sexuality and positive youth development: the influence of youth extracurricular activity participation on attitudes regarding sex

    Get PDF
    This study explored relationships among individual factors, parental factors, and youth activity involvement factors and the outcome variable, attitudes regarding sex, in 304 adolescent participants. Multiple regression results suggested that parental influence contributed the most influence on adolescent attitudes regarding sex. Other significant factors included self-esteem, sexual experience, family living arrangement, and amount of time spent in non-school based extracurricular activities. Support for the idea that Positive Youth Development (PYD) research and programming should include promoting healthy sexuality is suggested. PYD theory and literature tends to focus on outcomes such as citizenship, leadership, altruism, and initiative. While these outcomes are important, it seems reasonable to address a broader array of influences as well as outcomes of adolescent development, in particular healthy sexuality, which includes sexual attitudes

    Using graphic methods to challenge cryptographic performance

    Get PDF
    Block and stream ciphers have formed the traditional basis for the standardisation of commercial ciphers in the DES, AES, RC4, and so on. More recently alternative graphic methods such as Elliptic Curve Cryptography (ECC) have been adopted for performance gains. In this research we reviewed a range of graphic and non-graphic methods and then designed our own cipher system based on several graphic methods, including Visual Cryptography (VC). We then tested our cipher against RC4 and the AES algorithms for performance and security. The results showed that a graphics based construct may deliver comparable or improved security and performance in many of the required areas. These findings offer potential alternative avenues for post-quantum cryptographic research

    Celestial sources for random number generation

    Get PDF
    In this paper, we present an alternative method of gathering seed data for random number generation (RNG) in cryptographic applications. Our proposed method utilises the inherent randomness of signal data from celestial sources in radio astronomy to provide seeds for RNG. The data sets were collected from two separate celestial sources, and run through the SHA-256 algorithm to deskew the data and produce random numbers with a uniform distribution. The resulting data sets pass all tests in the NIST Statistical Test Suite for random data, with a mean of 98.9% of the 512 total bitstreams from the two sources passing all tests in the NIST suite, as well as further testing in R. These results are on par with the control set generated using Java’s SecureRandom function. An explanation of the sources, the data processing and detailed results of each of the tests are presented

    Invasion of the Botnet Snatchers: A Case Study in Applied Malware Cyberdeception

    Get PDF
    In this paper, we provide the initial steps towards a botnet deception mechanism, which we call 2face. 2face provides deception capabilities in both directions – upward, to the command and control (CnC) server, and downward, towards the botnet nodes – to provide administrators with the tools they need to discover and eradicate an infestation within their network without alerting the botnet owner that they have been discovered. The key to 2face is a set of mechanisms for rapidly reverse engineering the protocols used within a botnet. The resulting protocol descriptions can then be used with the 2face network deception tool to generate high-quality deceptive messaging, against the attacker. As context for our work, we show how 2face can be used to help reverse engineer and then generate deceptive traffic for the Mirai protocol. We also discuss how this work could be extended to address future threats

    Shocks in supersonic sand

    Full text link
    We measure time-averaged velocity, density, and temperature fields for steady granular flow past a wedge and calculate a speed of granular pressure disturbances (sound speed) equal to 10% of the flow speed. The flow is supersonic, forming shocks nearly identical to those in a supersonic gas. Molecular dynamics simulations of Newton's laws and Monte Carlo simulations of the Boltzmann equation yield fields in quantitative agreement with experiment. A numerical solution of Navier-Stokes-like equations agrees with a molecular dynamics simulation for experimental conditions excluding wall friction.Comment: 4 pages, 5 figure
    corecore