1,263,494 research outputs found

    Stranger Danger!

    Get PDF
    This article discusses the historical origins of the “stranger danger” myth, including the conditions that fueled the spread of panic. It explains how the myth was bolstered by increased media coverage, emotional appeals by parents, and public awareness campaigns. A number of important terms are defined and statistical information about child abductions in the United States is provided. Constructionist critiques of the “missing children” problem are explored as well as work that looks at the phenomenon through the lens of moral panic. A variety of social, legal, and ethical implications are discussed. The final sections assert the dangers of the myth, explain the difficulties involved in debunking the myth, and argue for the need to shift from fear-based responses to more rational responses that actually work to protect the most vulnerable populations of children (e.g., those who reside in abusive homes or experience harm at the hands of those known to them)

    Harmful Damage of Enhanced Danger: Economic and Legal Aspects

    Get PDF
    The article is devoted to the study of the legal nature of liability for damage caused by the source of enhanced danger. The conditions and grounds for liability for damage caused by a source of enhanced danger are considered. Determine the obligation to insure civil liability in obligations to compensate for damage caused by a source of enhanced danger. The scientific novelty is to analyze the national legislation on the legal regime of the source of high danger and to identify the elements of the danger of such sources.The article is devoted to the study of the legal nature of liability for damage caused by the source of enhanced danger. The conditions and grounds for liability for damage caused by a source of enhanced danger are considered. Determine the obligation to insure civil liability in obligations to compensate for damage caused by a source of enhanced danger. The scientific novelty is to analyze the national legislation on the legal regime of the source of high danger and to identify the elements of the danger of such sources

    Whose Rights? What Danger?

    Get PDF
    Detta examensarbete, utfört pÄ Valderas Consulting AB, Àmnar att hitta ett tillrÀckligt bra sÀtt för att migrera ett personalhanteringssystem (HR-system) till mobila enheter, genom att undersöka skillnader mellan olika metoder för kommunikation mellan mobila enheter och en MS-SQL databas frÄn ett sÀkerhets- och prestandamÀssigt perspektiv. Metoderna innebÀr att man implementerar en webbtjÀnst med hjÀlp av antingen REST eller SOAP för att utföra kommunikationen mellan mobila enheter och en MS-SQL databas. Arbetet innefattar Àven en undersökning av sÄrbarheter för mobila enheter och hur man kan lösa dem. För att kunna göra en jÀmförelse mellan metoderna, implementeras en mobilversion av HR-systemet i Android och en webbtjÀnst i ASP. NET. Resultaten frÄn utförda experimenten visar att REST har betydligt bÀttre prestanda och anvÀnder mycket mindre bandbredd Àn SOAP. Detta medför att REST Àr mer lÀmplig för mobila enheter eftersom mobilsurf ofta har begrÀnsad bandbredd. SÄrbarheten med Android-applikationer Àr att de lÀtt kan dekompileras, vilket i sin tur medför att kÀllkoden Àr lÀsbar sÄ att man kan utföra otillÄtna funktioner. Obfuskering-teknik med hjÀlp av Proguard gör att kÀllkodens lÀsbarhet och förstÄelse blir mycket svÄrare vid dekompileringsprocessen, dock Àr sparad information i form av strÀngar fortfarande lÀsbara. GÀllande sÀkerheten Àr SOAP lÀmplig för decentraliserade och distribuerade system och REST endast lÀmplig för kommunikation mellan enbart tvÄ system. Det lÀmpliga sÀttet för implementation av HR-systemets mobila version Àr att anvÀnda REST.Examination of problems and difficulties with a business-critical mobile application from a security and performance perspective. This degree project, conducted at Valderas Consulting AB, investigates an appropriate way to migrate a personnel management system to mobile devices, by examining differences between methods used for communication between mobile devices and a MS-SQL database from a security and performance perspective. A web service using either REST or SOAP was implemented in order to perform the communication between mobile devices and a MS-SQL database. The research also includes an examination of the vulnerabilities of mobile devices and how to reduce them. In order to make a comparison between the methods, a mobile version of the personnel management system in Android and a Web service in ASP. NET was implemented. Results from experiments conducted show that REST has significantly better performance and uses much less bandwidth than SOAP, which means that REST is more suitable for mobile devices because mobile surfing often has limited bandwidth. The vulnerability of Android applications is that they easily can be decompiled, which leads to readable source code so that unauthorized functions can be performed. Obfuscation technology using Proguard reduces the source code readability when the decompiling process is performed, but saved information in string form is still readable. When it regards security is SOAP suitable for decentralized and distributed systems and REST is only suitable for communication between two systems. The appropriate way for the implementation of the mobile version of the personnel management system is to use REST

    In Danger of Dilution?

    Get PDF

    Uninformed sacrifice: evidence against long-range alarm transmission in foraging ants exposed to a localized perturbation

    Full text link
    It is well stablished that danger information can be transmitted by ants through relatively small distances, provoking either a state of alarm when they move away from potentially dangerous stimulus, or charge toward it aggressively. There is almost no knowledge if danger information can be transmitted along large distances. In this paper, we perturb leaf cutting ants of the species Atta insularis while they forage in their natural evioronment at a certain point of the foraging line, so ants make a "U" turn to escape from the danger zone and go back to the nest. Our results strongly suggest that those ants do not transmit "danger information" to other nestmates marching towards the danger area. The individualistic behavior of the ants returning from the danger zone results in a depression of the foraging activity due to the systematic sacrifice of non-informed individuals.Comment: 5 pages, 2 figure

    Dance Movement Therapy (D/MT) and the Use of Music for First Grade Students with a History of Trauma at an Urban School

    Get PDF
    This paper describes a therapist intern’s work in creating a dance/movement therapy group with the use of music to help support students in an urban school. The therapist intern worked with a group of first grade students with a history of trauma who presented with behavioral issues with the classroom. The work consisted of three 30 minute sessions of dance/movement therapy group that implemented music as a tool to help support students in this setting. Based on the observations on the data collected, a theme of a sense of self began to emerge within the group. Insight on this project calls for more research on how a multi model approach can be used to better serve individual and group needs. Recommendations are made for future work in this area

    The H-2A Non-Immigrant Visa Program: Weakening Its Provisions Would Be A Step Backward for America\u27s Farmworkers

    Get PDF
    • 

    corecore