154 research outputs found

    Cyberbullying in schools: A research study on school policies and procedures

    Full text link
    A mixed-methods research design first using quantitative then qualitative data was used in order to explore what cyberbullying policies are being employed by principals in the state of Nevada. Electronic surveys were given to all 118 middle school principals in Nevada. Middle school was chosen because it is the age where cyberbullying behaviors are most prevalent. Out of the 118 surveys that were deployed, 66 principals responded. A series of independent t-tests and a chi-squared analysis was conducted using the survey data. The survey concluded by asking principals if they were willing to participate in a one-on-one interview regarding the cyberbullying policies at their schools. Ten principals agreed to participate in interviews, and three were randomly chosen. Results of the quantitative portion of the study revealed that student education, parent communication, school climate, language about off-campus behaviors, a known continuum of disciplinary consequences, formal procedures for investigating incidents, consequences for wrongful accusations, procedures for reporting cyberbullying, procedures for notifying parents of victims and perpetrators, procedures for referring victims and perpetrators for counseling, procedures for providing parent education, procedures for notifying the parents of the steps being taken to ensure the safety of their children, and signs being posted throughout the school should all be a part of an effective cyberbullying program. Results of the qualitative portion of the study identified the following six major themes as being essential to an effective cyberbullying program: the importance of a reporting procedure; curriculum integration; student-centered productions through mediums such as Broadcast Journalism; a focus on prevention rather than solely on punishment; the importance of punishment as a part of an effective policy; and keeping up with changes in technology. Although the concept of cyberbullying is relatively new, at the present time, it already occurs in a different fashion than it did when it initially surfaced. With advances in technology, especially with the capabilities of Smart Phones, educators must understand all of the current trends in technology if they want to effectively face this problem

    A Hybrid Root-kit for Linux Operating System

    Get PDF
    Hacking has been around almost since the first computers were connected together. Every day many new vulnerabilities/exploits are released and many computers become compromised. This is good for an attacker because there is a constant stream of new vulnerabilities/exploits that can be leveraged to break into computers. However, with newly published exploits comes a newly released patch for those exploits (usually). This is the reason that attackers have developed „back-doors‟ commonly referred to as root-kits. A root-kit is a post-compromise tool that an attacker uses to maintain access and often collects information from users such as passwords, credit card information, social security numbers, and other sensitive information. The importance of a root-kit is that once the vulnerability which was used to exploit the system is patched, the attacker can still get back in through a „backdoor‟. The purpose of this paper was to explore the area of root-kits by taking the role of an attacker and actually developing a root-kit that targets the Linux 2.6 kernel. By doing this we were are able to gain a great amount of insight into the internal workings of the kernel as well as its shortcomings with regards to security by developing a Linux Kernel Module (LKM) key-logger. We also look into some common techniques used by root-kits for providing a backdoor to the attacker. Then we investigate some come and simple techniques that root-kits utilize for stealth (it is imperative that the users/administrators do not know the system is compromised). Finally, we look at a simple and elegant solution for infecting a compromised computer with the root-kit we developed

    Space Solar Power for Agriculture

    Get PDF
    As the global population increases, it\u27s becoming more important for nations to be able to feed themselves. Unfortunately, while some developing nations may be able to produce large amounts of fruits and vegetables, they may lack access to facilities for food preservation. This problem is at the heart of food security issues across Asia and Africa. Working in consultation with Peter Garretson, an International Affairs Fellow in India, our Ohio University student team has designed a space-based solar power solution that addresses this need, with the potential to provide many secondary benefits. While our project targets the Indian subcontinent and its government, the ideas are broadly applicable globally and can offer insights for other nations seeking to meet critical food needs. Advisors: Peter Garretson, Prof. Don Flournoy, John Bowditch Intro from Brian Woods on Vimeo

    Identifying Young Stellar Objects in the Outer Galaxy: l = 224 deg Region in Canis Major

    Get PDF
    We study a very young star-forming region in the outer Galaxy that is the most concentrated source of outflows in the Spitzer Space Telescope GLIMPSE360 survey. This region, dubbed CMa-l224, is located in the Canis Major OB1 association. CMa-l224 is relatively faint in the mid-infrared, but it shines brightly at the far-infrared wavelengths as revealed by the Herschel Space Observatory data from the Hi-GAL survey. Using the 3.6 and 4.5 μ\mum data from the Spitzer/GLIMPSE360 survey, combined with the JHKs_s 2MASS and the 70-500 μ\mum Herschel/Hi-GAL data, we develop a young stellar object (YSO) selection criteria based on color-color cuts and fitting of the YSO candidates' spectral energy distributions with YSO 2D radiative transfer models. We identify 293 YSO candidates and estimate physical parameters for 210 sources well-fit with YSO models. We select an additional 47 sources with GLIMPSE360-only photometry as `possible YSO candidates'. The vast majority of these sources are associated with high H2_2 column density regions and are good targets for follow-up studies. The distribution of YSO candidates at different evolutionary stages with respect to Herschel filaments supports the idea that stars are formed in the filaments and become more dispersed with time. Both the supernova-induced and spontaneous star formation scenarios are plausible in the environmental context of CMa-l224. However, our results indicate that a spontaneous gravitational collapse of filaments is a more likely scenario. The methods developed for CMa-l224 can be used for larger regions in the Galactic plane where the same set of photometry is available.Comment: Accepted for publication in the Astrophysical Journal Supplement Series; 54 pages including appendice

    Ballistic protective properties of material representative of English civil war buff-coats and clothing

    Get PDF
    One type of clothing system used in the English Civil War, more common amongst cavalrymen than infantrymen, was the linen shirt, wool waistcoat and buff-coat. Ballistic testing was conducted to estimate the velocity at which 50% of 12-bore lead spherical projectiles (V50) would be expected to perforate this clothing system when mounted on gelatine (a tissue simulant used in wound ballistic studies). An estimated six-shot V50 for the clothing system was calculated as 102 m/s. The distance at which the projectile would have decelerated from the muzzle of the weapon to this velocity in free flight was triple the recognised effective range of weapons of the era suggesting that the clothing system would provide limited protection for the wearer. The estimated V50 was also compared with recorded bounce-and-roll data; this suggested that the clothing system could provide some protection to the wearer from ricochets. Finally, potential wounding behind the clothing system was investigated; the results compared favourably with seventeenth century medical writings

    When “perverts” were religious: the Protestant sexualisation of asceticism in nineteenth-century Britain, India and Ireland

    Get PDF
    Anti-Catholic polemics from the mid-nineteenth century made frequent comparison between religious practices in Britain, Ireland and India. The supposed atrocities taking place at locations such as Lough Dearg in Country Donegal and at ‘Juggernaut’ (Jagganath) at Puri were denounced in terms which hinted strongly at a striking combination of extreme asceticism and perverse sexual enjoyment. In the same period the word ‘perversion’, which had hitherto referred to apostasy, started to develop connotations of sexual deviance. Protestant sexualised readings of Catholic and Hindu asceticism appear to have been an important site for the development of conceptions of deviant sexuality in general and masochism in particular

    Coverage, Adherence and Costs of Intermittent Preventive Treatment of Malaria in Children Employing Different Delivery Strategies in Jasikan, Ghana

    Get PDF
    BACKGROUND: Intermittent preventive treatment of malaria in children (IPTc) involves the administration of a course of anti-malarial drugs at specified time intervals to children at risk of malaria regardless of whether or not they are known to be infected. IPTc provides a high level of protection against uncomplicated and severe malaria, with monthly sulphadoxine-pyrimethamine plus amodiaquine (SP&AQ) and sulphadoxine-pyrimethamine plus piperaquine being the most efficacious regimens. A key challenge is the identification of a cost-effective delivery strategy. METHODS: A community randomized trial was undertaken in Jasikan district, Ghana to assess IPTc effectiveness and costs using SP&AQ delivered in three different ways. Twelve villages were randomly selected to receive IPTc from village health workers (VHWs) or facility-based nurses working at health centres' outpatient departments (OPD) or EPI outreach clinics. Children aged 3 to 59 months-old received one IPT course (three doses) in May, June, September and October. Effectiveness was measured in terms of children covered and adherent to a course and delivery costs were calculated in financial and economic terms using an ingredient approach from the provider perspective. RESULTS: The economic cost per child receiving at least the first dose of all 4 courses was US4.58whenIPTcwasdeliveredbyVHWs,US4.58 when IPTc was delivered by VHWs, US4.93 by OPD nurses and US5.65byEPInurses.Theuniteconomiccostofreceivingall3dosesofall4courseswasUS 5.65 by EPI nurses. The unit economic cost of receiving all 3 doses of all 4 courses was US7.56 and US$8.51 when IPTc was delivered by VHWs or facility-based nurses respectively. The main cost driver for the VHW delivery was supervision, reflecting resources used for travelling to more remote communities rather than more intense supervision, and for OPD and EPI delivery, it was the opportunity cost of the time spent by nurses in dispensing IPTc. CONCLUSIONS: VHWs achieve higher IPTc coverage and adherence at lower costs than facility-based nurses in Jasikan district, Ghana. TRIAL REGISTRATION: ClinicalTrials.gov NCT00119132

    p16 Mutation Spectrum in the Premalignant Condition Barrett's Esophagus

    Get PDF
    Background: Mutation, promoter hypermethylation and loss of heterozygosity involving the tumor suppressor gene p16 (CDKN2a/INK4a) have been detected in a wide variety of human cancers, but much less is known concerning the frequency and spectrum of p16 mutations in premalignant conditions. Methods and Findings: We have determined the p16 mutation spectrum for a cohort of 304 patients with Barrett’s esophagus, a premalignant condition that predisposes to the development of esophageal adenocarcinoma. Forty seven mutations were detected by sequencing of p16 exon 2 in 44 BE patients (14.5%) with a mutation spectrum consistent with that caused by oxidative damage and chronic inflammation. The percentage of patients with p16 mutations increased with increasing histologic grade. In addition, samples from 3 out of 19 patients (15.8%) who underwent esophagectomy were found to have mutations. Conclusions: The results of this study suggest the environment of the esophagus in BE patients can both generate an
    corecore