5,806 research outputs found

    The influence of social constructs of hegemonic masculinity and sexual behaviour on acceptability of vaginal microbicides in Zambia

    Get PDF
    Vaginal microbicides are heralded as a woman’s HIV prevention method. This ethnographic study, conducted in a trial setting in Zambia, explored how the social construction of masculinity and sexual behaviour influenced the acceptability of vaginal microbicides from the man’s perspective. The data was generated from 18 In-depth Interviews (IDIs), and 8 Focus Group Discussions (FGDs). The data was analysed thematically. The study found that hegemonic masculinity influenced the use of gel use among women in multiple ways: decision to initiate gel use, autonomous use of the gel and consistent use of the gel. Men were seen as heads of households and decision makers who approved their partners’ intentions to initiate gel use. Autonomous gel use by women was not supported because it challenged men’s position in sexual matters and at family level. The socially accepted notion that men engaged in multiple sexual relationships also influenced women’s decision to use the gel. Sustained gel use depended on the perceived effect of the gel on men’s sexual desires, sexual performance, fertility, and sexual behaviour. This study suggests that acceptability of microbicides partially lies within the realm of men, with use constrained and dictated by cultural constructs and practice of masculinity and gender

    Strengthening impact assessment: a call for integration and focus

    Get PDF
    We suggest that the impact assessment community has lost its way based on our observation that impact assessment is under attack because of a perceived lack of efficiency. Specifically, we contend that the proliferation of different impact assessment types creates separate silos of expertise and feeds arguments for not only a lack of efficiency but also a lack of effectiveness of the process through excessive specialisation and a lack of interdisciplinary practice. We propose that the solution is a return to the basics of impact assessment with a call for increased integration around the goal of sustainable development and focus through better scoping. We rehearse and rebut counter arguments covering silo-based expertise, advocacy, democracy, sustainability understanding and communication. We call on the impact assessment community to rise to the challenge of increasing integration and focus, and to engage in the debate about the means of strengthening impact assessment

    Chip and Skim: cloning EMV cards with the pre-play attack

    Get PDF
    EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered two serious problems: a widespread implementation flaw and a deeper, more difficult to fix flaw with the EMV protocol itself. The first flaw is that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this nonce. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically. Card cloning is the very type of fraud that EMV was supposed to prevent. We describe how we detected the vulnerability, a survey methodology we developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and our implementation of proof-of-concept attacks. We found flaws in widely-used ATMs from the largest manufacturers. We can now explain at least some of the increasing number of frauds in which victims are refused refunds by banks which claim that EMV cards cannot be cloned and that a customer involved in a dispute must therefore be mistaken or complicit. The second problem was exposed by the above work. Independent of the random number quality, there is a protocol failure: the actual random number generated by the terminal can simply be replaced by one the attacker used earlier when capturing an authentication code from the card. This variant of the pre-play attack may be carried out by malware in an ATM or POS terminal, or by a man-in-the-middle between the terminal and the acquirer. We explore the design and.

    Chip and Skim: cloning EMV cards with the pre-play attack

    Get PDF
    EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered two serious problems: a widespread implementation flaw and a deeper, more difficult to fix flaw with the EMV protocol itself. The first flaw is that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this nonce. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically. Card cloning is the very type of fraud that EMV was supposed to prevent. We describe how we detected the vulnerability, a survey methodology we developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and our implementation of proof-of-concept attacks. We found flaws in widely-used ATMs from the largest manufacturers. We can now explain at least some of the increasing number of frauds in which victims are refused refunds by banks which claim that EMV cards cannot be cloned and that a customer involved in a dispute must therefore be mistaken or complicit. The second problem was exposed by the above work. Independent of the random number quality, there is a protocol failure: the actual random number generated by the terminal can simply be replaced by one the attacker used earlier when capturing an authentication code from the card. This variant of the pre-play attack may be carried out by malware in an ATM or POS terminal, or by a man-in-the-middle between the terminal and the acquirer. We explore the design and.

    Primordial Gravitational Wave Detectability with Deep Small-sky Cosmic Microwave Background Experiments

    Get PDF
    We use the Bayesian estimation on direct T - Q - U cosmic microwave background (CMB) polarization maps to forecast errors on the tensor-to-scalar power ratio r, and hence on primordial gravitational waves, as a function of sky coverage f_sky. This map-based likelihood filters the information in the pixel-pixel space into the optimal combinations needed for r detection for cut skies, providing enhanced information over a first-step linear separation into a combination of E, B, and mixed modes, and ignoring the latter. With current computational power and for typical resolutions appropriate for r detection, the large matrix inversions required are accurate and fast. Our simulations explore two classes of experiments, with differing bolometric detector numbers, sensitivities, and observational strategies. One is motivated by a long duration balloon experiment like Spider, with pixel noise ∝ √f_sky for a specified observing period. This analysis also applies to ground-based array experiments. We find that, in the absence of systematic effects and foregrounds, an experiment with Spider-like noise concentrating on f_sky ~ 0.02-0.2 could place a 2σ_r ≈ 0.014 boundary (~95% confidence level), which rises to 0.02 with an ℓ-dependent foreground residual left over from an assumed efficient component separation. We contrast this with a Planck-like fixed instrumental noise as f_sky varies, which gives a Galaxy-masked (f_sky = 0.75) 2σ_r ≈ 0.015, rising to ≈0.05 with the foreground residuals. Using as the figure of merit the (marginalized) one-dimensional Shannon entropy of r, taken relative to the first 2003 WMAP CMB-only constraint, gives –2.7 bits from the 2012 WMAP9+ACT+SPT+LSS data, and forecasts of –6 bits from Spider (+ Planck); this compares with up to –11 bits for CMBPol, COrE, and PIXIE post-Planck satellites and –13 bits for a perfectly noiseless cosmic variance limited experiment. We thus confirm the wisdom of the current strategy for r detection of deeply probed patches covering the f_sky minimum-error trough with balloon and ground experiments

    A Limit on the Polarized Anisotropy of the Cosmic Microwave Background at Subdegree Angular Scales

    Full text link
    A ground-based polarimeter, PIQUE, operating at 90 GHz has set a new limit on the magnitude of any polarized anisotropy in the cosmic microwave background. The combination of the scan strategy and full width half maximum beam of 0.235 degrees gives broad window functions with average multipoles, l = 211+294-146 and l = 212+229-135 for the E- and B-mode window functions, respectively. A joint likelihood analysis yields simultaneous 95% confidence level flat band power limits of 14 and 13 microkelvin on the amplitudes of the E- and B-mode angular power spectra, respectively. Assuming no B-modes, a 95% confidence limit of 10 microkelvin is placed on the amplitude of the E-mode angular power spectrum alone.Comment: 4 pages, 3 figures, submitted to Astrophysical Journal Letter

    Observational constraints on modified gravity models and the Poincar\'e dodecahedral topology

    Full text link
    We study the constraints that spatial topology may place on the parameters of models that account for the accelerated expansion of the universe via infrared modifications to general relativity, namely the Dvali-Gabadadze-Porrati braneworld model as well as the Dvali-Turner and Cardassian models. By considering the Poincar\'e dodecahedral space as the circles-in-the-sky observable spatial topology, we examine the constraints that can be placed on the parameters of each model using type Ia supernovae data together with the baryon acoustic peak in the large scale correlation function of the Sloan Digital Sky Survey of luminous red galaxies and the Cosmic Microwave Background Radiation shift parameter data. We show that knowledge of spatial topology does provide relevant constraints, particularly on the curvature parameter, for all models.Comment: Revtex4, 10 pages, 1 table, 12 figures; version to match the one to be published in Physical Review

    Observational Constraints on Visser's Cosmological Model

    Full text link
    Theories of gravity for which gravitons can be treated as massive particles have presently been studied as realistic modifications of General Relativity, and can be tested with cosmological observations. In this work, we study the ability of a recently proposed theory with massive gravitons, the so-called Visser theory, to explain the measurements of luminosity distance from the Union2 compilation, the most recent Type-Ia Supernovae (SNe Ia) dataset, adopting the current ratio of the total density of non-relativistic matter to the critical density (Ωm\Omega_m) as a free parameter. We also combine the SNe Ia data with constraints from Baryon Acoustic Oscillations (BAO) and CMB measurements. We find that, for the allowed interval of values for Ωm\Omega_m, a model based on Visser's theory can produce an accelerated expansion period without any dark energy component, but the combined analysis (SNe Ia + BAO + CMB) shows that the model is disfavored when compared with Λ\LambdaCDM model.Comment: 6 pages, 4 figure

    Exactly solvable model of A + A \to 0 reactions on a heterogeneous catalytic chain

    Full text link
    We present an exact solution describing equilibrium properties of the catalytically-activated A + A \to 0 reaction taking place on a one-dimensional lattice, where some of the sites possess special "catalytic" properties. The A particles undergo continuous exchanges with the vapor phase; two neighboring adsorbed As react when at least one of them resides on a catalytic site (CS). We consider three situations for the CS distribution: regular, annealed random and quenched random. For all three CS distribution types, we derive exact results for the disorder-averaged pressure and present exact asymptotic expressions for the particles' mean density. The model studied here furnishes another example of a 1D Ising-type system with random multi-site interactions which admits an exact solution.Comment: 7 pages, 3 Figures, appearing in Europhysics Letter
    corecore