• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 2
  • 2
  • 1
  • Tagged with
  • 19
  • 10
  • 7
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Examining the association between hooking up and marital processes and quality

Johnson, Matthew David January 1900 (has links)
Doctor of Philosophy / Department of Family Studies and Human Services / Jared R. Anderson / The current study tests a theoretical model exploring the relationship between hooking up and marital quality and whether this relationship is mediated by sexual satisfaction and communication using public-use data from currently married participants in Wave IV of the National Longitudinal Study of Adolescent Health (Add Health, n = 1,729). Gender proved to significantly moderate the association between the variables in the model, but college education did not. The results indicate that hooking up has a direct negative relationship with marital quality for men that is not mediated by either sexual satisfaction or communication. The results for women revealed no direct relationship between hooking up and marital quality, but an indirect influence via communication.
2

Hooking Up on College Campuses

Weiss, Elena M 07 May 2011 (has links)
A 2001 national study of college women’s sexual attitudes and behaviors revealed that students have stopped dating and started “hooking up.” Previous studies focused on fraternities and their relation to the rape culture but neglected to connect rape culture to hook up culture. This study evaluated the culture surrounding rape by interviewing seventeen college aged men about masculinity, behavior in male homosocial groups, “hooking up” and rape. It addresses the following questions: 1-How do college men understand “hooking up” and sexual consent? 2-In what ways might men’s understanding of “hooking up” and sexual consent be related to the ongoing incidence of rape on college campuses? 3- How do men understand and adhere to rape myths? In-depth interviews with college men in this study point to their dependence on nonverbal communication when negotiating “hookups,” with implications for their understandings of consent and perpetuation of myths concerning women's sexuality.
3

The Role of Relationship Status Changes in College Students' Heavy Episodic Drinking

January 2012 (has links)
abstract: The beginning of college is a period in which increased alcohol use often coincides with greater involvement in romantic relationships. Existing literature yields inconsistent findings regarding the influence of different relationship statuses on drinking behavior, perhaps because these studies have not accounted for recent changes in the way college students engage in dating/sexual relationships. In the current college environment, many students who define themselves as non-daters are nonetheless sexually active, a phenomenon referred to as the 'hook up' culture. The present study sought to address this issue by examining the effects of both relationship status and sexual activity on heavy episodic drinking (HED) among 1,467 college students over the course of their first three semesters. Results indicated that the effects of relationship status depended on whether or not an individual was sexually active. Non-dating but sexually active students reported rates of heavy drinking comparable to students who defined themselves as casual daters, but non-dating students who were not sexually active reported drinking behavior similar to those involved in committed relationships. Further, transitions between low and high risk relationship/sexual activity statuses were associated with corresponding changes in HED. Transitioning into a high risk status was associated with greater levels of heavy episodic drinking, whereas transitioning into a low risk status was associated with decreases in this behavior. Together, results indicate that engaging in nonexclusive dating or sexual relationships may play an important role in the development of problematic patterns of alcohol use during the early college years. These findings have potentially important implications both for future research and for prevention and intervention efforts targeting high risk college drinkers. / Dissertation/Thesis / M.A. Psychology 2012
4

Localization of Spyware in Windows Environments

Bergstrand, Fredrik, Bergstrand, Johan, Gunnarsson, Håkan January 2004 (has links)
This is a thesis about different methods that can be used to detect spyware. Methods included are Layered Service Provider, Internet Protocol Helper API, TDI filtering and API hooking. Some firewall testing applications, leak tests, that use methods that can be used by real spyware program to penetrate firewalls have also been examined. The goal was to develop a Windows 2000/XP program that is able to detect as many of our examined leak tests as possible. Our program uses the methods TDI filtering and API hooking for detection of spyware because our study showed that these methods were the best. To evaluate the program it was tested against our examined leak test programs. Our program managed to detect all leak tests except one. / Fredrik Bergstrand cfb@home.se Johan Bergstrand jb78@home.se Håkan Gunnarsson hakan.gunnarsson@klostersfalad.se
5

Dating and Hooking up: An Analysis of Hooking up as a Campus Norm and the Impact on Women's Self Perception

Skrobot, Sarah L. 22 September 2010 (has links)
No description available.
6

Windows API funkcijų panaudojimas realiojo laiko nuskaitymo sistemose / Windows API functions usage in a real-time scanning systems

Čeponis, Dainius 01 July 2010 (has links)
Darbe aptariamos virusų aptikimo metodikos, jų raida. Pristatomi nauji virusų aptikimo metodai ir genetinių algoritmų pritaikymas juose. Pirmoje praktinėje dalyje atliktas Windows API funkcijų perėmimo bibliotekų palyginimas. Antroje praktinėje dalyje parašyta realiojo laiko nuskaitymo programa. Programa veikia naudodama nemokamas ClamAV virusų parašų duomenų bazes. Atliktas programos palyginimas su kitomis nemokamomis antivirusinėmis programomis. Darbą sudaro 4 dalys: įvadas, teorinis pagrindimas, sistemos realizacija, išvados ir siūlymai, literatūros sąrašas. Darbo apimtis – 47 p. teksto be priedų, 25 iliustr., 2 lent., 40 bibliografinių šaltinių. Atskirai pridedami darbo priedai. / There described virus scanning techniques in the work, they historical appearance. New scanning techniques presented, including genetic algorithms usage. In first practical part presented Windows API hooking libraries, they tests. There created real-time system scanning program in second practical part. ClamAV free databases are used for files checking. Program tested with others free antivirus solutions. Structure: introduction, analytical part, system implementation, conclusions and suggestions, references. Thesis consist of: 47p. text without appendixes, 25 pictures, 2 tables, 40 bibliographical entries. Appendixes included.
7

FEAR AND LOATHING IN THE HOOKUP CULTURE: A STUDY OF FEMALE ENGAGEMENT IN NON-RELATIONAL SEX ON A UNIVERSITY CAMPUS

Gordon, Shanlea 01 August 2013 (has links)
Recent empirical evidence suggests that we have entered a new period of courtship known as the hookup era. Contemporary research which explores hooking up has confirmed the prevalence of this dating script, particularly within post-secondary institutions. The relevant literature has focused on a variety of important issues including the conceptual meaning of hooking up and the identification of potential correlates and consequences of these behaviours. Despite this increase in scholarly interest, several problems remain unaddressed. Principal among these is the way(s) in which young women mediate the self-perceived risks involved in the sexual exchange known as the hookup, so as to facilitate their participation in this culture. The current paper examines the controversy that is female hookup participation by investigating the risks – and subsequent negotiation of these risks – which women face in the hookup culture. Specifically, this paper makes use of detailed qualitative data gathered from a sample of female undergraduate students at a medium-sized Canadian university, in order to uncover the social processes by which female proponents of the hookup culture account for their actions to themselves and to others, in this the seemingly risky courtship script. / Thesis (Master, Sociology) -- Queen's University, 2013-07-31 19:46:46.027
8

Improving DLP system security / Förbättring av säkerheten av DLP system

Ghorbanian, Sara, Fryklund, Glenn January 2014 (has links)
Context. Data leakage prevention (DLP), a system designed to prevent leakage and loss of secret sensitive data and at the same time not affect employees workflow. The aim is to have a system covering every possible leakage point that exist. Even if these are covered, there are ways of hiding information such as obfuscating a zip archive within an image file, detecting this hidden information and preventing it from leaking is a difficult task. Companies pay a great deal for these solutions and yet, as we uncover, the information is not safe. Objectives. In this thesis we evaluate four different existing types of DLP systems out on the market today, disclosing their weaknesses and found ways of improving their security. Methods. The four DLP systems tested in this study cover agentless, agent based, hybrids and regular expression DLP tools. The test cases simulate potential leakage points via every day used file transfer applications and media such as USB, Skype, email, etc. Results. We present a hypothetical solution in order to amend these weaknesses and to improve the efficiency of DLP systems today. In addition to these evaluations and experiments, a complementing proof of concept solution has been developed that can be integrated with other DLP solutions. Conclusions. We conclude that the exisiting DLP systems are still in need of improvement, none of the tested DLP solutions fully covered the possible leakage points that could exist in the corporate world. There is a need for continued evaluation of DLP systems, aspects and leakage points not covered in this thesis as well as a follow up on our suggested solution.
9

HOOKING UP VS. PORNOGRAPHY: A VIGNETTE APPROACH ABOUT ACCEPTABILITY

Coffman, Kendall 01 January 2017 (has links)
The purpose of this study was to examine how the intersection of gender scripts, gender identity, and sexual orientation impact perceived narratives and power hierarchies in sexual relationships. To drive participants to verbalize their underlying views about sexual scripts, two highly sexualized and controversial sexual cultures will be examined: casual sex and pornography. Feminist academics and advocates have long argued for a restructuring of sexual politics by implementing feminist principles into personal relations and public life (Connell, 1997). Therefore, competing feminist ideologies will also be assessed to gauge the campus’s feminist climate regarding self-identified feminists’ views on the exploitation and/or the empowerment of women within pornography. Findings from this study indicated that respondents view women’s participation in hookups or pornographic situations similar to how they viewed men’s participation. However, internalized homophobic messages were discovered, particularly from male respondents. The findings also suggest that feminists in this sample were generally accepting of pornography, but that feminism did not play a key role in shaping respondents beliefs.
10

Klasifikace rootkitů a jimi používaných technik / Rootkits Classification

Plocek, Radovan January 2014 (has links)
This paper describes information about current most widespread methods, which are used by rootkits. It contains basic information connected with development of rootkits, such as process registers, memory protection and native API of Windows operation system. The primary objective of this paper is to provide overview of techniques, such as hooking, code patching and direct kernel object modification, which are used by rootkits and present methods to detect them. These methods will be then implemented by detection and removal tools of rootkits based on these techniques.

Page generated in 0.058 seconds