30 research outputs found

    Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors

    Get PDF
    With the rapid growth and spread of Internet-based social support systems, the impact that these systems can make to society – be it good or bad – has become more significant and can make a real difference to people’s lives. As such, various aspects of these systems need to be carefully investigated and analysed, including their security/privacy issues. In this paper, we present our work in designing and implementing various technological features that can be used to assist domestic violence survivors in obtaining help without leaving traces which might lead to further violence from their abuser. This case study serves as the core of our paper, in which we outline our approach, various de- sign considerations – including difficulties in keeping browsing history private, our currently implemented solutions (single use URL, targeted history sanitita- tion agent, and secret graphical gateway), as well as novel ideas for future work (including location-based service advertising and deployment in the wild)

    How Do Police Respond to Stalking? An Examination of the Risk Management Strategies and Tactics Used in a Specialized Anti-Stalking Law Enforcement Unit

    Get PDF
    How do police respond to and manage complaints of stalking? To answer this question, we conducted a 3-phase study. First, we reviewed the literature to identify risk management tactics used to combat stalking. Second, we asked a group of police officers to review those tactics for completeness and group them into categories reflecting more general risk management strategies. The result was 22 categories of strategies. Finally, we used qualitative methods to evaluate the files of 32 cases referred to the specialized anti-stalking unit of a metropolitan police department. We coded specific risk management tactics and strategies used by police. Results indicated that a median number of 19 specific tactics from 7 general strategies were used to manage risk. Also, the implementation of strategies and tactics reflected specific characteristics of the cases (e.g., perpetrator risk factors, victim vulnerability factors), suggesting that the risk management decisions made by police were indeed strategic in nature. Qualitative analyses indicated that some of the strategies and tactics were more effective than others. We discuss how these findings can be used to understand and use stalking risk management more generally, as well as improve research on the efficacy of risk assessment and management for stalking

    STATE AND SOCIETY AT TEOTIHUACAN, MEXICO

    No full text
    Between 100 BCE and 200 CE, the city of Teotihuacan grew rapidly, most of the Basin of Mexico population was relocated in the city, immense civic-religious structures were built, and symbolic and material evidence shows the early importance of war. Rulers were probably able and powerful. Subsequently the city did not grow, and government may have become more collective, with significant constraints on rulers\u27 powers. A state religion centered on war and fertility deities presumably served elite interests, but civic consciousness may also have been encouraged. A female goddess was important but probably not as pervasive as has been suggested. Political control probably did not extend beyond central Mexico, except perhaps for some outposts, and the scale and significance of commerce are unclear. Teotihuacan\u27s prestige, however, spread widely in Mesoamerica, manifested especially in symbols of sacred war, used for their own ends by local elites
    corecore