293 research outputs found

    Conscious Rap Music: Movement Music Revisited A Qualitative Study of Conscious Rappers and Activism

    Get PDF
    The purpose of this study is to explore how conscious rap is used as a form of activism. Interviews of conscious rappers based in Atlanta, GA were used to understand this relationship. In order to complete this investigation, ten unsigned conscious rappers were given a series of questions to explore their involvement as activist; some of these artist were also recruited based on affiliations with political organizations based in Atlanta, GA. By gathering interviews from conscious rappers who consider their music as a form of activism, scholars of African American Studies may further understand the role of music and political activism when mobilizing the African American and minority communities

    Human rights and community work. Complementary theories and practices

    Get PDF
    Much effort has been placed on developing international understandings of human rights without the corresponding attention to responsibilities. The authors argue that a community development framework may be useful in re-conceiving human rights in a more holistic way, and that social workers and community development workers are well placed to be 'grass roots human rights workers

    Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime

    Full text link
    Cybercrime is a complex phenomenon that spans both technical and human aspects. As such, two disjoint areas have been studying the problem from separate angles: the information security community and the environmental criminology one. Despite the large body of work produced by these communities in the past years, the two research efforts have largely remained disjoint, with researchers on one side not benefitting from the advancements proposed by the other. In this paper, we argue that it would be beneficial for the information security community to look at the theories and systematic frameworks developed in environmental criminology to develop better mitigations against cybercrime. To this end, we provide an overview of the research from environmental criminology and how it has been applied to cybercrime. We then survey some of the research proposed in the information security domain, drawing explicit parallels between the proposed mitigations and environmental criminology theories, and presenting some examples of new mitigations against cybercrime. Finally, we discuss the concept of cyberplaces and propose a framework in order to define them. We discuss this as a potential research direction, taking into account both fields of research, in the hope of broadening interdisciplinary efforts in cybercrime researc

    Development and automation of a test of impulse control in zebrafish.

    Get PDF
    Deficits in impulse control (difficulties in inhibition of a pre-potent response) are fundamental to a number of psychiatric disorders, but the molecular and cellular basis is poorly understood. Zebrafish offer a very useful model for exploring these mechanisms, but there is currently a lack of validated procedures for measuring impulsivity in fish. In mammals, impulsivity can be measured by examining rates of anticipatory responding in the 5-choice serial reaction time task (5-CSRTT), a continuous performance task where the subject is reinforced upon accurate detection of a briefly presented light in one of five distinct spatial locations. This paper describes the development of a fully-integrated automated system for testing impulsivity in adult zebrafish. We outline the development of our image analysis software and its integration with National Instruments drivers and actuators to produce the system. We also describe an initial validation of the system through a one-generation screen of chemically mutagenized zebrafish, where the testing parameters were optimized

    The blue economy - cultural livelihood - ecosystem conservation triangle : the African experience

    Get PDF
    Publications costs were supported by the University of St Andrews to IO-Y and the New England Aquarium-Marine Conservation and Action Fund (MCAF) to NK.The concept of Blue Economy (BE) is recognised as central for sustainable development that incorporates socio-economic benefits and ecological conservation. However, in Africa, much of the emphasis on BE is placed on economic gains; as a result, traditional livelihoods and small-scale local operations are outcompeted by international corporations and government initiatives, with little or no regard for social inclusion and environmental sustainability. We argue that successful BE initiatives in Africa accentuate the involvement of local communities and promote sustenance of the natural ecosystem. We define success in terms of the sustainability balance among ecological, social and economic aspects. Drawing on extensive expert experiences, observational data and literature review of case studies across the African continent, we highlight two critical findings. First, large scale BE initiatives prioritise economic gains at the expense of environmental degradation and the exclusion of local communities. Second, using the full spectrum sustainability (FSS) evaluation, we show that successful BE interventions considered ecological, economic, socio-cultural and institutional objectives. Drawing on these case studies, we propose the adoption of a collaborative framework which amalgamates the top-down and bottom-up approaches to BE management. Achieving the goal of successful blue growth in Africa is now even more challenged by the implications of COVID-19 on the BE sectors. Reimagining and rebuilding a resilient BE in Africa post-coronavirus will require a strong political commitment to promoting a balance between economic, social and environmental benefits in line with the African Union's Agenda 2063 and the United Nations' Sustainable Development Goals.Publisher PDFPeer reviewe

    Crafting communities: promoting inclusion, empowerment, and learning between older women

    Get PDF
    While social policy and planning documents are replete with ominous warnings about the cost of an ageing population, this article tells a different story about the productive and self-sustaining networks that exist among older women in the community who do craftwork. From our research conducted in Victoria, Australia during 2007&ndash;2008 we discovered a resilient and committed group of older women quietly and steadily contributing to community fundraising, building social networks, and providing learning opportunities to each other in diverse ways. Through our conversations with nine craftswomen we have been able to articulate clear links between the theory and models commonly espoused in the community development literature and the life-enriching practices used in organising informal community craft group activities. From our interviews with the older women we provide evidence of sustained participation, the generation of social capital, and the fostering of life-long learning. While none of the women we spoke to were trained in community development and did not use language commonly associated with feminist ideology, the relationship between the informal group work with principles of empowerment and self-efficacy were unmistakeable. We conclude with a discussion of the implications of our findings for critical social work practice.<br /

    Technical assistance, neo-colonialism or mutual trade? The experience of an Anglo/Ukrainian/Russian social work practice learning project

    Get PDF
    Since the collapse of the Soviet Union there has been a steady stream of Western consultants ready to work in Eastern Europe and Russia and share professional and academic expertise and experience. Social work, unknown as a discrete discipline or profession in the Soviet Union, has been a growth area with funding from a variety of sources to help promote East-West partnerships.Social work theory and practice emphasises critical appraisal of policy and embraces issues of power, discrimination and oppression. Social work educators should therefore be especially alert to the complex ethical questions which these kinds of collaborations raise, and adept at finding practical solutions or workable compromises. This article explores these ethical and political issues with reference to a project to develop social work practice learning in a Russian oblast' (region). The project was an ambitious partnership of British, Ukrainian and Russian educators, involving numerous Russian social work and related agencies, and four Russian universities and colleges in one oblast'. The authors use a series of vignettes to help the reader achieve insights into these East-West transactions. The article concludes with a discussion of different interpretations of these dealings, using three prisms: technical assistance, neo-colonialism and mutual trade

    Marked for disruption: tracing the evolution of malware delivery operations targeted for takedown

    Get PDF
    The malware and botnet phenomenon is among the most significant threats to cybersecurity today. Consequently, law enforcement agencies, security companies, and researchers are constantly seeking to disrupt these malicious operations through so-called takedown counter-operations. Unfortunately, the success of these takedowns is mixed. Furthermore, very little is understood as to how botnets and malware delivery operations respond to takedown attempts. We present a comprehensive study of three malware delivery operations that were targeted for takedown in 2015–16 using global download metadata provided by Symantec. In summary, we found that: (1) Distributed delivery architectures were commonly used, indicating the need for better security hygiene and coordination by the (ab)used service providers. (2) A minority of malware binaries were responsible for the majority of download activity, suggesting that detecting these “super binaries” would yield the most benefit to the security community. (3) The malware operations exhibited displacing and defiant behaviours following their respective takedown attempts. We argue that these “predictable” behaviours could be factored into future takedown strategies. (4) The malware operations also exhibited previously undocumented behaviours, such as Dridex dropping competing brands of malware, or Dorkbot and Upatre heavily relying on upstream dropper malware. These “unpredictable” behaviours indicate the need for researchers to use better threat-monitoring techniques.Accepted manuscrip
    corecore