70 research outputs found

    Domestic violence and hashtag activism: The Croatian case of #SpasiMe

    Get PDF
    Domestic violence is one of the long-standing social grievances. The victims of domestic violence needed to be heard and they found their voice in the feminist social movements. The emergence of social media facilitated reaching the public and motivating them to participate in social movements in order to bring about change. The aim of this thesis is to analyse the impact hashtag activism has on society. This thesis addresses the topic of domestic violence and focuses on an example of hashtag activism in Croatia. The research was carried out from three different perspectives on the #SpasiMe initiative, whose name means save me in Croatian. A semi-structured interview with one of the founders of the #SpasiMe initiative was conducted. A media coverage analysis was performed, analysing how #SpasiMe is framed in a Croatian newspaper. The framing of the initiative in the media was compared to the frames #SpasiMe uses on its Facebook page. A document analysis was carried out on the legislative changes concerning domestic violence. The main results of this study demonstrate the social impact of the #SpasiMe initiative in the form of raising awareness of domestic violence with a more extensive media coverage of the issue. They also suggest the initiative’s participation in initiating changes in the Croatian laws on domestic violence. The case of #SpasiMe illustrates that hashtag activism can contribute to the protection of victims of domestic violence and foster changes in society.A violência doméstica é uma das injustiças sociais de longa data. As vítimas de violência doméstica precisaram de ser ouvidas e encontraram a sua voz nos movimentos sociais feministas. O surgimento das redes sociais facilitou o alcance do público e motivou-as a participar nos movimentos sociais para trazer mudanças. O objetivo desta tese é analisar o impacto que o ativismo de hashtag tem na sociedade. Esta tese aborda o tema de violência doméstica e foca-se em um exemplo de ativismo de hashtag na Croácia. A pesquisa foi realizada a partir de três eixos diferentes sobre a iniciativa #SpasiMe, cujo nome significa salve-me em croata. Antes de mais, foi realizada uma entrevista semiestruturada com uma das fundadoras da iniciativa #SpasiMe. A seguir, levou-se para frente uma análise da cobertura mediática, analisando como o #SpasiMe é enquadrado num jornal croata. O enquadramento da iniciativa nos media foi comparado ao enquadramento que o #SpasiMe utiliza na sua página própria no Facebook. Enfim foi realizada uma análise documental sobre as alterações legislativas relacionadas com a relativas à violência doméstica. Os principais resultados deste estudo mostram que a iniciativa #SpasiMe teve impacto na sensibilização para a violência doméstica com uma cobertura mediática mais ampla da questão. Sugerem também a contribuição da iniciativa na promulgação de alterações à legislação croata em matéria de violência doméstica. O caso de #SpasiMe ilustra que o ativismo de hashtag pode contribuir para a proteção das vítimas de violência doméstica e promover mudanças na sociedade

    International Law-Sovereign Immunity-State Court Authority to Determine Title to Property Under Its Jurisdiction Despite A Department of State Suggestion of Immunity

    Get PDF
    In 1952 plaintiff brought a creditor\u27s action for the appointment of a permanent receiver for the assets of the defendant located in New York. Defendant, Zivnostenska Banka, was a Czechoslovak corporation that had at one time been engaged in banking activities in New York. Plaintiff succeeded in having a receiver appointed upon proving that defendant had been nationalized, contrary to New York policy and law, by a 1950 decree of the Czechoslovak Government which had merged the defendant and its assets with the State Bank of Czechoslovakia. The instant controversy arose when the receiver attempted to set aside, as a fraud upon creditors, a transfer of funds made by the defendant to the State Bank in accordance with the 1950 nationalization decree. The State Department filed a suggestion of immunity with the lower court in which it recognized and allowed 3 that the Czechoslovak Government held title to the disputed property, apparently on the basis that the property was in the name of Czechoslovakia\u27s recognized agent, the State Bank. The lower court did not accept the State Department suggestion and gave judgment for the plaintiff. Upon appeal to the appellate division, held, affirmed, one judge dissenting. The determination of title to property in the custody of a state court is a judicial function which is not precluded by a State Department suggestion of immunity recognizing and allowing that title is in a foreign sovereign. Stephens v. Zivnostenska Banka, Nat\u27l Corp., 15 App. Div. 2d · 111, 222 N.Y.S.2d 128 (1961)

    Securities Regulation-Federal Anti-Fraud Provisions-Applicability of Insider Responsibility to Broker in Possession of Inside Corporate Information

    Get PDF
    During a period of upward movement in the price of Curtiss-Wright common stock, the corporation\u27s board of directors voted to reduce the stock dividend by forty percent, an action certain to have an immediate adverse effect upon the stock\u27s market price. Although the board immediately authorized the transmission of information concerning its action to the New York Stock Exchange, an inadvertent delay of forty-five minutes ensued. Unaware of the delay, C, a director of Curtiss-Wright and a registered representative of Cady, Roberts & Co. (registrant) , a registered broker-dealer, telephoned registrant to inform G, one of its partners, of the dividend reduction. G, knowing that this information had not yet been publicized, took advantage of his knowledge by quickly selling on the New York Stock Exchange 9,700 shares of the Curtiss-Wright stock for the discretionary accounts of his customers. Thirty minutes later the news of the dividend reduction reached the Exchange and the price of Curtiss-Wright stock immediately dropped by almost four points. The Securities and Exchange Commission instituted disciplinary proceedings against G and registrant to determine whether the sale violated the federal anti-fraud provisions: section 17 (a) of the Securities Act of 1933, section 10 (b) of the Securities Exchange Act of 1934 and rule 10b-5. Held, both G and registrant are subject to sanctions for willfully violating these provisions. Although the anti-fraud provisions have traditionally imposed a duty of disclosure upon insiders, they also are applicable to any person enjoying a special relationship whereby he has access to confidential corporate information. Cady, Roberts & Co., SEC Security Exchange Act Release No. 6668 (Nov. 8, 1961), CCH 1961 FED. SEC. L. REP. ¶ 76803

    On the Feasibility of Malware Authorship Attribution

    Full text link
    There are many occasions in which the security community is interested to discover the authorship of malware binaries, either for digital forensics analysis of malware corpora or for thwarting live threats of malware invasion. Such a discovery of authorship might be possible due to stylistic features inherent to software codes written by human programmers. Existing studies of authorship attribution of general purpose software mainly focus on source code, which is typically based on the style of programs and environment. However, those features critically depend on the availability of the program source code, which is usually not the case when dealing with malware binaries. Such program binaries often do not retain many semantic or stylistic features due to the compilation process. Therefore, authorship attribution in the domain of malware binaries based on features and styles that will survive the compilation process is challenging. This paper provides the state of the art in this literature. Further, we analyze the features involved in those techniques. By using a case study, we identify features that can survive the compilation process. Finally, we analyze existing works on binary authorship attribution and study their applicability to real malware binaries.Comment: FPS 201

    An approach for virtual appliance distribution for service deployment

    Get PDF
    Fulfilling a service request in highly dynamic service environments may require deploying a service. Therefore, the effectiveness of service deployment systems affects initial service response times. On Infrastructure as a Service (IaaS) cloud systems deployable services are encapsulated in virtual appliances. Services are deployed by instantiating virtual machines with their virtual appliances. The virtual machine instantiation process is highly dependent on the size and availability of the virtual appliance that is maintained by service developers. This article proposes an automated virtual appliance creation service that aids the service developers to create efficiently deployable virtual appliances in former systems this task was carried out manually by the developer. We present an algorithm that decomposes these appliances in order to replicate the common virtual appliance parts in IaaS systems. These parts are used to reduce the deployment time of the service by rebuilding the virtual appliance of the service on the deployment target site. With the prototype implementation of the proposed algorithms we demonstrate the decomposition and appliance rebuilding algorithms on a complex web service. © 2010 Elsevier Inc. All rights reserved

    Indexing Information for Data Forensics

    Get PDF
    We introduce novel techniques for organizing the indexing structures of how data is stored so that alterations from an original version can be detected and the changed values specifically identified. We give forensic constructions for several fundamental data structures, including arrays, linked lists, binary search trees, skip lists, and hash tables. Some of our constructions are based on a new reduced-randomness construction for nonadaptive combinatorial group testing

    The impact of surgical delay on resectability of colorectal cancer: An international prospective cohort study

    Get PDF
    AIM: The SARS-CoV-2 pandemic has provided a unique opportunity to explore the impact of surgical delays on cancer resectability. This study aimed to compare resectability for colorectal cancer patients undergoing delayed versus non-delayed surgery. METHODS: This was an international prospective cohort study of consecutive colorectal cancer patients with a decision for curative surgery (January-April 2020). Surgical delay was defined as an operation taking place more than 4 weeks after treatment decision, in a patient who did not receive neoadjuvant therapy. A subgroup analysis explored the effects of delay in elective patients only. The impact of longer delays was explored in a sensitivity analysis. The primary outcome was complete resection, defined as curative resection with an R0 margin. RESULTS: Overall, 5453 patients from 304 hospitals in 47 countries were included, of whom 6.6% (358/5453) did not receive their planned operation. Of the 4304 operated patients without neoadjuvant therapy, 40.5% (1744/4304) were delayed beyond 4 weeks. Delayed patients were more likely to be older, men, more comorbid, have higher body mass index and have rectal cancer and early stage disease. Delayed patients had higher unadjusted rates of complete resection (93.7% vs. 91.9%, P = 0.032) and lower rates of emergency surgery (4.5% vs. 22.5%, P < 0.001). After adjustment, delay was not associated with a lower rate of complete resection (OR 1.18, 95% CI 0.90-1.55, P = 0.224), which was consistent in elective patients only (OR 0.94, 95% CI 0.69-1.27, P = 0.672). Longer delays were not associated with poorer outcomes. CONCLUSION: One in 15 colorectal cancer patients did not receive their planned operation during the first wave of COVID-19. Surgical delay did not appear to compromise resectability, raising the hypothesis that any reduction in long-term survival attributable to delays is likely to be due to micro-metastatic disease
    corecore