768 research outputs found

    ‘My journey through the system’: a grounded theory of service user-perceived experiences of recovery in forensic mental health services

    Get PDF
    The ‘Recovery Approach’ is widely regarded as the guiding principle for mentalhealth service delivery in the UK. Forensic services face unique challenges in applying this approach. Numerous studies have explored themes associated with recovery in these settings but it is unclear how themes relate to each other. This study set out to build a theoretical model of service user experiences of recovery in forensic mental health settings. Semi-structured interviews were conducted with 16 service users about their recovery. Grounded Theory methodology, with a constructivist epistemology, was used to analyse the data. A cyclical model was developed, with five-core recovery processes that interrelated; these were the environment, connectedness, hope for the future, who I am and empowerment. These occurred in three phases of 1) feeling safe and secure, 2) moving forward, and 3) empowerment. These processes were encompassed by two additional themes of arriving at the hospital and changes over time. This study is the first to provide a clear model of service user experiences of recovery in this setting

    A Framework for the Game-theoretic Analysis of Censorship Resistance

    Get PDF
    We present a game-theoretic analysis of optimal solutions for interactions between censors and censorship resistance systems (CRSs) by focusing on the data channel used by the CRS to smuggle clients’ data past the censors. This analysis leverages the inherent errors (false positives and negatives) made by the censor when trying to classify traffic as either non-circumvention traffic or as CRS traffic, as well as the underlying rate of CRS traffic. We identify Nash equilibrium solutions for several simple censorship scenarios and then extend those findings to more complex scenarios where we find that the deployment of a censorship apparatus does not qualitatively change the equilibrium solutions, but rather only affects the amount of traffic a CRS can support before being blocked. By leveraging these findings, we describe a general framework for exploring and identifying optimal strategies for the censorship circumventor, in order to maximize the amount of CRS traffic not blocked by the censor. We use this framework to analyze several scenarios with multiple data-channel protocols used as cover for the CRS. We show that it is possible to gain insights through this framework even without perfect knowledge of the censor’s (secret) values for the parameters in their utility function

    SoK: Making Sense of Censorship Resistance Systems

    Get PDF
    An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. Several censorship resistance systems (CRSs) have emerged to help bypass such blocks. The diversity of the censor’s attack landscape has led to an arms race, leading to a dramatic speed of evolution of CRSs. The inherent complexity of CRSs and the breadth of work in this area makes it hard to contextualize the censor’s capabilities and censorship resistance strategies. To address these challenges, we conducted a comprehensive survey of CRSs-deployed tools as well as those discussed in academic literature-to systematize censorship resistance systems by their threat model and corresponding defenses. To this end, we first sketch a comprehensive attack model to set out the censor’s capabilities, coupled with discussion on the scope of censorship, and the dynamics that influence the censor’s decision. Next, we present an evaluation framework to systematize censorship resistance systems by their security, privacy, performance and deployability properties, and show how these systems map to the attack model. We do this for each of the functional phases that we identify for censorship resistance systems: communication establishment, which involves distribution and retrieval of information necessary for a client to join the censorship resistance system; and conversation, where actual exchange of information takes place. Our evaluation leads us to identify gaps in the literature, question the assumptions at play, and explore possible mitigations

    A comparison of the effect of single and multiple cavities on base flows

    Get PDF
    The paper represents a novel approach to understand the effect of single and multiple cavities on base pressure. We considered a control plate of 1 mm thick between a square nozzle of the cross-sectional area of 100 mm 2 and square duct of the cross-sectional area of 625 mm 2 . Both single and multiple cavities results are compared for a different level of expansion. The nozzle pressure ratio taken are 1.27, 1.33, 1.53 and 1.7. The high-speed compressible subsonic nozzle is being used with internal flow apparatus to achieve flows ranging between Mach 0.6 to Mach 0.9. The comparison between single and multiple cavities are shown graphically with and without control. The multiple cavities were found to be more effective as compared to a single cavity for controlling the base pressure

    2-{(1E)-1-[(3-{(E)-[1-(2-Hy­droxy-4-meth­oxy­phen­yl)ethyl­idene]amino}-2,2-di­methyl­prop­yl)imino]­eth­yl}-5-meth­oxy­phenol

    Get PDF
    Mol­ecules of the title compound, C23H30N2O4, are located on a crystallographic mirror plane. The mol­ecule has a curved shape with the dihedral angle formed between the two benzene rings being 55.26 (5)°. Intra­molecular O—H⋯N hydrogen bonds are noted. In the crystal, supra­molecular layers are formed in the ac plane owing to the presence of C—H⋯π inter­actions

    PrivEx: Private collection of traffic statistics for anonymous communication networks

    Get PDF
    In addition to their common use for private online communication, anonymous communication networks can also be used to circumvent censorship. However, it is difficult to determine the extent to which they are actually used for this purpose without violating the privacy of the networks' users. Knowing this extent can be useful to designers and researchers who would like to improve the performance and privacy properties of the network. To address this issue, we propose a statistical data collection system, PrivEx, for collecting egress traffic statistics from anonymous communication networks in a secure and privacy-preserving manner. Our solution is based on distributed differential privacy and secure multiparty computation; it preserves the security and privacy properties of anonymous communication networks, even in the face of adversaries that can compromise data collection nodes or coerce operators to reveal cryptographic secrets and keys. Copyright is held by the owner/author(s)
    corecore