Archive

Archive for the ‘crime’ Category

Efficacy of a Sexual Assault Resistance Program for University Women

June 11, 2015 Comments off

Efficacy of a Sexual Assault Resistance Program for University Women
Source: New England Journal of Medicine

In this randomized, controlled trial, the risk of completed rape (the primary outcome) was significantly lower over a period of 1 year among first-year university women who participated in a sexual assault resistance program than among those who were provided access to brochures on sexual assault. These results contrast with previous reports of the limited effectiveness of other interventions for women.17-21 An early version of one program reduced the risk of completed rape after 9 weeks of follow-up only among women with no history of victimization.17 In three of four subsequent studies assessing modified programs, there was no significant reduction in the risk of completed rape; in the fourth, the risk of completed rape was reduced but not beyond 2 months after the intervention.18-21 The primary differences between the previous interventions and our resistance program are that ours had more hours of programming, a greater number of interactive and practice exercises, less focus on “assertive communication” and more on escalation of resistance in response to a perpetrator’s perseverance, and the addition of positive sexuality content (Unit 4).22 Further research is warranted to identify the elements that are critical for efficacy so that a shorter version of the resistance program can be developed that will encourage wider implementation.

See also: A Comprehensive Approach to Sexual Violence Prevention (editorial)

Cyber In-Security II: Closing the Federal Talent Gap

June 8, 2015 Comments off

Cyber In-Security II: Closing the Federal Talent Gap
Source: Partnership for Public Service

Cybersecurity is one of the biggest challenges facing today’s technologically dependent society. Yet, there is a nationwide shortage of highly-qualified cybersecurity specialists, with the federal government falling behind in the race for these experts. The cyber talent crisis has persisted long enough. Our nation is at risk as the number and sophistication of cyber-attacks continue to grow.

Please join the Partnership for Public Service and Booz Allen Hamilton on Tuesday, April 14 for an interactive dialogue with cybersecurity experts from the public and private sectors as we outline the challenges faced by the federal government in building a first-class cybersecurity workforce and offer recommendations for a creating a government-wide strategy for retaining and recruiting top cyber talent. During the discussion, we will also share findings and lessons learned from our new report, “Cyber In-Security II: Closing the Federal Talent Gap.”

CRS — Federal Involvement in Sex Offender Registration and Notification: Overview and Issues for Congress, In Brief (March 25, 2015)

June 1, 2015 Comments off

Federal Involvement in Sex Offender Registration and Notification: Overview and Issues for Congress, In Brief (PDF)
Source: Congressional Research Service (via Federation of American Scientists)

The federal government plays a role in the management of sex offenders. In a law enforcement capacity, it enforces federal laws involving sexual abuse, online predatory offenses, or other related federal crimes. In addition, Congress has enacted legislation that encourages the development of state sex offender registries, urges states to punish recalcitrant sex offenders, induces state and local law enforcement to make certain information on sex offenders public, and taken other steps involving the registration of sex offenders and notification of the community. Federal legislation affecting sex offender policy has largely centered on sex offender registration and notification, and therefore they are the focus of this report.

Estimating the Effect of Intimate Partner Violence on Women’s Use of Contraception: A Systematic Review and Meta-Analysis

May 26, 2015 Comments off

Estimating the Effect of Intimate Partner Violence on Women’s Use of Contraception: A Systematic Review and Meta-Analysis
Source: PLoS ONE

Background
Intimate partner violence (IPV) is an important global public health problem. While there is a growing literature on the association between IPV and women’s reproductive health (RH) outcomes, most studies are cross-sectional—which weakens inference about the causal effect of IPV on women’s RH. This systematic review synthesizes existing evidence from the strongest study designs to estimate the impact of IPV on women’s use of contraception.

Methods
We searched 11 electronic databases from January of 1980 to 3 December 2013 and reviewed reference lists from systematic reviews for studies examining IPV and contraceptive use. To be able to infer causality, we limited our review to studies that had longitudinal measures of either IPV or women’s use of contraception.

Results
Of the 1,574 articles identified by the search, we included 179 articles in the full text review and extracted data from 12 studies that met our inclusion criteria. We limited the meta-analysis to seven studies that could be classified as subject to low or moderate levels of bias. Women’s experience of IPV was associated with a significant reduction in the odds of using contraception (n = 14,866; OR: 0.47; 95% CI: 0.25, 0.85; I2 = 92%; 95% CII2: 87%, 96%). Restricting to studies that measured the effect of IPV on women’s use of partner dependent contraceptive methods was associated with a reduction in the heterogeneity of the overall estimate. In the three studies that examined women’s likelihood of using male condoms with their partners, experience of IPV was associated with a significant decrease in condom use (OR: 0.48; 95% CIOR: 0.32, 0.72; I2 = 51%; 95% CII2: 0%, 86%).

Conclusions
IPV is associated with a reduction in women’s use of contraception; women who experience IPV are less likely to report using condoms with their male partners. Family planning and HIV prevention programs should consider women’s experiences of IPV.

Canada’s Anti–Money Laundering and Anti–Terrorist Financing Regime: The Legal Profession’s Obligations

May 25, 2015 Comments off

Canada’s Anti–Money Laundering and Anti–Terrorist Financing Regime: The Legal Profession’s Obligations
Source: Library of Parliament

On 13 February 2015, the Supreme Court of Canada ruled that certain provisions of the Proceeds of Crime (Money Laundering) and Terrorist Financing Act that impose obligations on lawyers violate the Canadian Charter of Rights and Freedoms.

The decision, in Canada (Attorney General) v. Federation of Law Societies of Canada, confirmed that legislation cannot enforce obligations on lawyers that would undermine solicitor–client privilege.

In exempting lawyers from the Act, Canada – like the United States and Australia – is among the few Financial Action Task Force members that do not impose obligations on lawyers as part of their anti–money laundering and anti–terrorist financing regime.

According to the Task Force, criminals may use lawyers to facilitate illegal financial transactions, particularly when they are acting as financial intermediaries.

Criminal attacks are now leading cause of healthcare breaches

May 20, 2015 Comments off

Criminal attacks are now leading cause of healthcare breaches
Source: Ponemon Institute

The Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data by the Ponemon Institute, sponsored by ID Experts, reveals a shift in the root cause of data breaches from accidental to intentional. Criminal attacks are up 125% compared to five years ago replacing lost laptops as the leading threat. The study also found most organizations are unprepared to address new threats and lack adequate resources to protect patient data

free registration required2

2015 Global Cyber Impact Report

May 15, 2015 Comments off

2015 Global Cyber Impact Report
Source: Aon and Ponemon Institute

Ponemon Institute global study, sponsored by Aon, identifies the relative financial statement impact of cyber incidents compared to tangible asset vulnerabilities.

Key findings:

  • Information technology assets are 39 percent more exposed than property assets on a relative value to insurance protection basis
  • Proliferation of mobile devices and Internet of Things to send cyberrisk skyrocketing over next five years
  • The report’s findings act as a roadmap for risk managers and finance, helping them take a broader look at their organization’s overall risk profile

free registration required2

Follow

Get every new post delivered to your Inbox.

Join 1,050 other followers