Abstract: Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.
Abstract: Privacy of RFID systems is receiving increasing attention in the RFID community. RFID privacy is important as the RFID tags will be attached to all kinds of products and physical objects including people. The possible abuse or excessive use of RFID tracking capability by malicious users can lead to potential privacy violations. In this paper, we will discuss how the different industries use RFID and the potential privacy and security issues while RFID is implemented in these industries. Although RFID technology offers interesting services to customer and retailers, it could also endanger the privacy of end-users. Personal data can be leaked if a protection mechanism is not deployed in the RFID systems. The paper summarizes many different solutions for implementing privacy and security while deploying RFID systems.
Abstract: Many schools throughout the world are facing constant pressure to cope with the violence and drug abuse of learners who show little or no respect for acceptable and desirable social norms. These delinquent learners tend to harbour feelings of being beyond reproach because they strongly believe that it is well within their rights to engage in violent and destructive behaviour. Knives, guns, and other weapons appear to be more readily used by them on the school premises than before. It is known that learners smoke, drink alcohol, and use drugs during school hours, hence, their ability to concentrate, work, and learn, is affected. They become violent and display disruptive behaviour in their classrooms as well as on the school premises, and this atrocious behaviour makes it possible for drug dealers and gangsters to gain access onto the school premises. The primary purpose of this exploratory quantitative study was therefore to establish how tobephobia (TBP), caused by school violence and drug abuse, affects teaching and learning in schools. The findings of this study affirmed that poor discipline resulted in producing poor quality education. Most of the teachers in this study agreed that educating learners who consumed alcohol and other drugs on the school premises resulted in them suffering from TBP. These learners are frequently abusive and disrespectful, and resort to violence to seek attention. As a result, teachers feel extremely demotivated and suffer from high levels of anxiety and stress. The word TBP will surely be regarded as a blessing by many teachers throughout the world because finally, there is a word that will make people sit up and listen to their problems that cause real fear and anxiety in schools.
Abstract: Use and abuse of drugs by teens is very common and can have dangerous consequences. The drugs contribute to physical and sexual aggression such as assault or rape. Some teenagers regularly use drugs to compensate for depression, anxiety or a lack of positive social skills. Teen resort to smoking should not be minimized because it can be "gateway drugs" for other drugs (marijuana, cocaine, hallucinogens, inhalants, and heroin). The combination of teenagers' curiosity, risk taking behavior, and social pressure make it very difficult to say no. This leads most teenagers to the questions: "Will it hurt to try once?" Nowadays, technological advances are changing our lives very rapidly and adding a lot of technologies that help us to track the risk of drug abuse such as smart phones, Wireless Sensor Networks (WSNs), Internet of Things (IoT), etc. This technique may help us to early discovery of drug abuse in order to prevent an aggravation of the influence of drugs on the abuser. In this paper, we have developed a Decision Support System (DSS) for detecting the drug abuse using Artificial Neural Network (ANN); we used a Multilayer Perceptron (MLP) feed-forward neural network in developing the system. The input layer includes 50 variables while the output layer contains one neuron which indicates whether the person is a drug addict. An iterative process is used to determine the number of hidden layers and the number of neurons in each one. We used multiple experiment models that have been completed with Log-Sigmoid transfer function. Particularly, 10-fold cross validation schemes are used to access the generalization of the proposed system. The experiment results have obtained 98.42% classification accuracy for correct diagnosis in our system. The data had been taken from 184 cases in Jordan according to a set of questions compiled from Specialists, and data have been obtained through the families of drug abusers.
Abstract: Ombudsmen often face the challenge of a lack of authority to have their decisions and recommendations enforced. This lack of authority may be seen as one of the major obstacles in the way of the effectiveness of the institutions of Ombudsman and also the South African Public Protector. The paper will address the current legal position in South Africa with regard to the status of the decisions and recommendations of the South African Public Protector and the enforcement thereof. In addition, the paper will compare the South African position with the experiences of other jurisdictions, including Scandinavian countries like Sweden, Denmark and Norway, but also New Zealand and Northern Ireland, with regard to the enforcement of the decisions of Ombudsmen. Finally, the paper will make recommendations with regard to the enhancement of the power and authority of Ombudsmen in order to effectively enforce their decisions. It is submitted that the creation of the office of Ombudsman, and the Public Protector in the South African system, is an essential tool to ensure the protection of society against governmental abuse of power and it is therefore imperative to ensure that these watchdogs of democracy are not muzzled by a lack of powers of enforcement.
Abstract: Sexual violence, and particularly child sexual abuse, is a serious problem all over the world, México included. Given its importance, there are several preventive and care programs done by the government and the civil society all over the country but most of them are developed in urban areas even though these problems are especially serious in rural areas. Yucatán, a state in southern México, occupies one of the first places in child sexual abuse. Considering the above, the University Unit of Clinical Research and Victimological Attention (UNIVICT) of the Autonomous University of Yucatan, designed, implemented and is currently evaluating the program named “Sharing Mouth to Mouth: My Body, Nobody Can Touch It”, a program to prevent child sexual abuse in rural communities of Yucatán, México. Its aim was to develop skills for the detection of risk situations, providing protection strategies and mechanisms for prevention through culturally relevant psycho-educative strategies to increase personal resources in children, in collaboration with parents, teachers, police and municipal authorities. The diagnosis identified that a particularly vulnerable population were children between 4 and 10 years. The program run during 2015 in primary schools in the municipality whose inhabitants are mostly Mayan. The aim of this paper is to present its evaluation in terms of its effectiveness and efficiency. This evaluation included documental analysis of the work done in the field, psycho-educational and recreational activities with children, evaluation of knowledge by participating children and interviews with parents and teachers. The results show high efficiency in fulfilling the tasks and achieving primary objectives. The efficiency shows satisfactory results but also opportunity areas that can be resolved with minor adjustments to the program. The results also show the importance of including culturally relevant strategies and activities otherwise it minimizes possible achievements. Another highlight is the importance of participatory action research in preventive approaches to child sexual abuse since by becoming aware of the importance of the subject people participate more actively; in addition to design culturally appropriate strategies and measures so that the proposal may not be distant to the people. Discussion emphasizes the methodological implications of prevention programs (convenience of using participatory action research (PAR), importance of monitoring and mediation during implementation, developing detection skills tools in creative ways using psycho-educational interactive techniques and working assessment issued by the participants themselves). As well, it is important to consider the holistic character this type of program should have, in terms of incorporating social and culturally relevant characteristics, according to the community individuality and uniqueness, consider type of communication to be used and children’ language skills considering that there should be variations strongly linked to a specific cultural context.
Abstract: While the need for equal access to civil, political as well as economic, social and cultural rights is clear under the international law, the adoption of the Convention on the Elimination of all forms of Discrimination against women in 1979 made this even clearer. Despite this positive progress, the abuse of refugee women's rights is one of the basic underlying root causes of their marginalisation and violence in their countries of asylum. This paper presents a critical review on the development of refugee women's rights at the international levels and national levels. It provides an array of scholarly literature on this issue and examines the measures taken by the international community to curb the problem of violence against women in their various provisions through the instruments set. It is cognizant of the fact that even if conflict affects both refugee women and men, the effects on women refugees are deep-reaching, due to the cultural strongholds they face. An important aspect of this paper is that it is conceptualised against the fact that refugee women face the problem of sexual and gender based first as refugees and second as women, yet, their rights are stumbled upon. Often times they have been rendered "worthless victims" who are only in need of humanitarian assistance than active participants committed to change their plight through their participation in political, economic and social participation in their societies. Scholars have taken notice of the fact that women's rights in refugee settings have been marginalized and call for a need to incorporate their perspectives in the planning and management of refugee settings in which they live. Underpinning this discussion is feminism theory which gives a clear understanding of the root cause of refugee women's problems. Finally, this paper suggests that these policies should be translated into action at local, national international and regional levels to ensure sustainable peace.
Abstract: The aim of this study is to compare abused and normal male students in Tehran guidance schools with emphasis on the co-dependency of their mothers. The method of this study is based on survey method and comparison (Ex-Post Facto). The method of sampling is also multi-stage cluster. Accordingly, we did sampling from secondary schools of education and training in Tehran, including 12 schools with levels of first, second and third. Each of the schools represents the three – high, medium and low- economic and social conditions. In the following, three classes from every school and 20 students from each class were randomly selected. By (CTQ) abused and normal students were separated that 670 children were recognized as normal and 50 children as abused. Then, 50 children were randomly selected from normal group and compared with abused group. Using Spanned-Fischer Co-dependency Scale, we compared mothers of abused and normal students. The results showed that mothers of the abused children have higher co- dependency average comparing to the mothers of the normal children.
Abstract: The purpose of this study is to investigate the efficacy of solution-focused group therapy on improving the depressed mothers of child abuser families. This study was carried out in the form of a semi-pilot, pre-test and post-test on two groups (experimental and control). Subjects include all mothers and their children that are the members of Shush and Naser Khosro child home. Beck Depression Inventory and Child Trauma Questionnaire were used to collect data. First, child abuse questionnaire was completed by children, Then Beck Depression Inventory was completed by their mothers that 22 of them were recognized as depressed and randomly divided in two groups of experimental and control. After applying pre-test for both of these groups, the intervention of solution- focused group therapy was performed in five sessions on experimental group. Finally, post-test was applied on both groups and subsequently in a month, follow-up test was performed. T-test, multivariate variance, and repeated measurement analysis of variance were used to analyze the data. According to the findings, it can be concluded that this therapy leads to the improvement of depressed mother's mood. As a result, the intervention of solution-focused group therapy is useful in order to improve the depressing mood of mothers of child abuser families.
Abstract: In a world characterized by greed and the lust for
power and its attendant trappings, abuse of legal power is nothing
new to most of us. Legal abuses of power abound in all fields of
human endeavour. Accounts of such abuses dominate the mass media
and for the average individual, no single day goes by without his
getting to hear about at least one such occurrence. This paper briefly
looks at the meaning of legal power, what legal abuse is all about, its
causes, and some of its manifestations in the society. Its
consequences will also be discussed and some suggestions for reform
will be made. In the course of the paper, references will be made to
various jurisdictions around the world.
Abstract: The notion of power and gender domination is one of
the inseparable aspects of themes in postmodern literature. The
reason of its importance has been discussed frequently since the rise
of Michel Foucault and his insight into the circulation of power and
the transgression of forces. Language and society operate as the basic
grounds for the study, as all human beings are bound to the set of
rules and norms which shape them in the acceptable way in the
macrocosm. How different genders in different positions behave and
show reactions to the provocation of social forces and superiority of
one another is of great interest to writers and literary critics. Mamet’s
works are noticeable for their controversial but timely themes which
illustrate human conflicts with the society and greed for power. Many
critics like Christopher Bigsby and Harold Bloom have discussed
Mamet and his ideas in recent years. This paper is the study of
Oleanna, Mamet’s masterpiece about the teacher-student relationship
and the circulation of power between a man and woman. He shows
the very breakable boundaries in the domination of a gender and the
downfall of speech as the consequence of transgression and freedom.
The failure of the language the teacher uses and the abuse of his own
words by a student who seeks superiority and knowledge are the
main subjects of the discussion. Supported by the ideas of Foucault,
the language Mamet uses to present his characters becomes the
fundamental premise in this study. As a result, language becomes
both the means of achievement and downfall.
Abstract: This experimental study evaluates the effect of using
Cognitive-Behavioral Therapy (CBT) and Multidimensional Self-
Concept Model (MSCM) in a drug prevention programme to increase
resiliency and reduce aggression among at-risk youth in Malaysia. A
number of 60 (N=60) university students who were at-risk of taking
drugs were involved in this study. Participants were identified with
self-rating scales, Adolescent Resilience Attitude Scale (ARAS) and
Aggression Questionnaire. Based on the mean score of these
instruments, the participants were divided into the treatment group,
and the control group. Data were analyzed using t-test. The finding
showed that the mean score of resiliency was increased in the
treatment group compared to the control group. It also shows that the
mean score of aggression was reduced in the treatment group
compared to the control group. Drug Prevention Programme was
found to help in enhancing resiliency and reducing aggression among
participants in the treatment group compared to the controlled group.
Implications were given regarding the preventive actions on drug
abuse among youth in Malaysia.
Abstract: This is a national community based project to evaluate effectiveness of HBV vaccination program in prevention of infection. HBV markers were tested in the sera of 3600 vaccinated children. Infected children were followed up for 1 year. Prevalence of HBV infection was 0.39 % (0.28% positive for anti-HBc, 0.03% positive for HBsAg and 0.08% positive for both). One year later, 50% of positive anti-HBc children turned negative with sustained positivity for positive HBsAg cases. HBV infection was significantly higher at age above 9 years (0.6%) compared to 0.2% at age 3-9 years and 0% at younger age (P
Abstract: Severe symptoms, such as dissociation, depersonalization, self-mutilation, suicidal ideations and gestures, are the main reasons for a person to be diagnosed with Borderline Personality Disorder (BPD) and admitted to an inpatient Psychiatric Hospital. However, these symptoms are also indicators of a severe traumatic history as indicated by the extensive research on the topic. Unfortunately patients with such clinical presentation often are treated repeatedly only for their symptomatic behavior, while the main cause for their suffering, the trauma itself, is usually left unaddressed therapeutically. All of the highly structured, replicable, and manualized treatments lack the recognition of the uniqueness of the person and fail to respect his/her rights to experience and react in an idiosyncratic manner. Thus the communicative and adaptive meaning of such symptomatic behavior is missed. Only its pathological side is recognized and subjected to correction and stigmatization, and the message that the person is damaged goods that needs fixing is conveyed once again. However, this time the message would be even more convincing for the victim, because it is sent by mental health providers, who have the credibility to make such a judgment. The result is a revolving door of very expensive hospitalizations for only a temporary and patchy fix. In this way the patients, once victims of abuse and hardship are left invalidated and thus their re-victimization is perpetuated in their search for understanding and help. Keywordsborderline personality disorder (BPD), complex PTSD, integrative treatment of trauma, re-victimization of trauma victims.
Abstract: Recently, the RFID (Radio Frequency
Identification) technology attracts the world market attention as
essential technology for ubiquitous environment. The RFID
market has focused on transponders and reader development.
But that concern has shifted to RFID software like as
high-valued e-business applications, RFID middleware and
related development tools. However, due to the high sensitivity
of data and service transaction within the RFID network,
security consideration must be addressed. In order to guarantee
trusted e-business based on RFID technology, we propose a
security enhanced RFID middleware system. Our proposal is
compliant with EPCglobal ALE (Application Level Events),
which is standard interface for middleware and its clients. We
show how to provide strengthened security and trust by
protecting transported data between middleware and its client,
and stored data in middleware. Moreover, we achieve the
identification and service access control against illegal service
abuse. Our system enables secure RFID middleware service
and trusted e-business service.
Abstract: Trauma in early life is widely regarded as a cause for
adult mental health problems. This study explores the role of
secondary trauma on later functioning in a sample of 359 university
students enrolled in undergraduate psychology classes in the United
States. Participants were initially divided into four groups based on
1) having directly experienced trauma (assaultive violence), 2)
having directly experienced trauma and secondary traumatization
through the unanticipated death of a close friend or family member
or witnessing of an injury or shocking even), 3) having no
experience of direct trauma but having experienced indirect trauma
(secondary trauma), or 4) reporting no exposure. Participants
completed a battery of measures on concepts associated with
psychological functioning which included measures of
psychological well-being, problem solving, coping and resiliency.
Findings discuss differences in psychological functioning and
resilience based on participants who experienced secondary
traumatization and assaultive violence versus secondary
traumatization alone.
Abstract: Insider abuse has recently been reported as one of
the more frequently occurring security incidents, suggesting that
more security is required for detecting and preventing unauthorised
financial transactions entered by authorised users. To address the
problem, and based on the observation that all authorised interbanking
financial transactions trigger or are triggered by other
transactions in a workflow, we have developed a security solution
based on a redefined understanding of an audit workflow. One audit
workflow where there is a log file containing the complete workflow
activity of financial transactions directly related to one financial
transaction (an electronic deal recorded at an e-trading system). The
new security solution contemplates any two parties interacting on
the basis of financial transactions recorded by their users in related
but distinct automated financial systems. In the new definition interorganizational
and intra-organization interactions can be described
in one unique audit trail. This concept expands the current ideas of
audit trails by adapting them to actual e-trading workflow activity, i.e.
intra-organizational and inter-organizational activity. With the above,
a security auditing service is designed to detect integrity drifts with
and between organizations in order to detect unauthorised financial
transactions entered by authorised users.
Abstract: A simple method for the simultaneous determination
of hippuric acid and benzoic acid in urine using reversed-phase high
performance liquid chromatography was described. Chromatography
was performed on a Nova-Pak C18 (3.9 x 150 mm) column with a
mobile phase of mixed solution methanol: water: acetic acid
(20:80:0.2) and UV detection at 254 nm. The calibration curve was
linear within concentration range at 0.125 to 6.0 mg/ml of hippuric
acid and benzoic acid. The recovery, accuracy and coefficient
variance of hippuric acid were 104.54%, 0.2% and 0.2% respectively
and for benzoic acid were 98.48%, 1.25% and 0.60% respectively.
The detection limit of this method was 0.01ng/l for hippuric acid and
0.06ng/l for benzoic acid. This method has been applied to the
analysis of urine samples from the suspected of toluene abuser or
glue sniffer among secondary school students at Johor Bahru.
Abstract: According to the governmental data, the cases of oral
cancers doubled in the past 10 years. This had brought heavy burden to
the patients- family, the society, and the country. The literature
generally evidenced the betel nut contained particular chemicals that
can cause oral cancers. Research in Taiwan had also proofed that 90
percent of oral cancer patients had experience of betel nut chewing. It
is thus important to educate the betel-nut hobbyists to cease such a
hazardous behavior. A program was then organized to establish
several training classes across different areas specific to help ceasing
this particular habit. Purpose of this research was to explore the
attitude and intention toward ceasing betel-nut chewing before and
after attending the training classes. 50 samples were taken from a
ceasing class with average age at 45 years old with high school
education (54%). 74% of the respondents were male in service or
agricultural industries. Experiences in betel-nut chewing were 5-20
years with a dose of 1-20 pieces per day. The data had shown that 60%
of the respondents had cigarette smoking habit, and 30% of the
respondents were concurrently alcoholic dependent. Research results
indicated that the attitude, intentions, and the knowledge on oral
cancers were found significant different between before and after
attendance. This provided evidence for the effectiveness of the training
class. However, we do not perform follow-up after the class.
Noteworthy is the test result also shown that participants who were
drivers as occupation, or habitual smokers or alcoholic dependents
would be less willing to quit the betel-nut chewing. The test results
indicated as well that the educational levels and the type of occupation
may have significant impacts on an individual-s decisions in taking
betel-nut or substance abuse.
Abstract: Static analysis of source code is used for auditing web
applications to detect the vulnerabilities. In this paper, we propose a
new algorithm to analyze the PHP source code for detecting LFI and
RFI potential vulnerabilities. In our approach, we first define some
patterns for finding some functions which have potential to be abused
because of unhandled user inputs. More precisely, we use regular
expression as a fast and simple method to define some patterns for
detection of vulnerabilities. As inclusion functions could be also used
in a safe way, there could occur many false positives (FP). The first
cause of these FP-s could be that the function does not use a usersupplied
variable as an argument. So, we extract a list of usersupplied
variables to be used for detecting vulnerable lines of code.
On the other side, as vulnerability could spread among the variables
like by multi-level assignment, we also try to extract the hidden usersupplied
variables. We use the resulted list to decrease the false
positives of our method. Finally, as there exist some ways to prevent
the vulnerability of inclusion functions, we define also some patterns
to detect them and decrease our false positives.