LEADER 02054nam 2200589 450 001 9910797672803321 005 20230807193249.0 010 $a1-59332-812-5 035 $a(CKB)3710000000478568 035 $a(EBL)4395958 035 $a(SSID)ssj0001554832 035 $a(PQKBManifestationID)16181555 035 $a(PQKBTitleCode)TC0001554832 035 $a(PQKBWorkID)12836095 035 $a(PQKB)11528160 035 $a(MiAaPQ)EBC4395958 035 $a(Au-PeEL)EBL4395958 035 $a(CaPaEBR)ebr11155324 035 $a(OCoLC)922072973 035 $a(EXLCZ)993710000000478568 100 $a20150911d2015 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCampus rape victims $ehow they see the police /$fVeronyka James 210 1$aEl Paso :$cLFB Scholarly Publishing LLC,$d2015. 215 $a1 online resource (190 p.) 225 1 $aCriminal justice: recent scholarship 300 $aDescription based upon print version of record. 311 $a1-59332-803-6 320 $aIncludes bibliographical references and index. 327 $aMeasuring sexual assault -- Police relationships with the public -- Current study -- Reporting of victimization -- Discussion and policy implications. 410 0$aCriminal justice (LFB Scholarly Publishing LLC) 606 $aRape in universities and colleges$zUnited States 606 $aCampus police$zUnited States$xPublic opinion 606 $aWomen college students$xCrimes against$zUnited States 606 $aRape victims$zUnited States$xAttitudes 615 0$aRape in universities and colleges 615 0$aCampus police$xPublic opinion. 615 0$aWomen college students$xCrimes against 615 0$aRape victims$xAttitudes. 676 $a371.7/86 700 $aJames$b Veronyka$f1980-$01481591 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910797672803321 996 $aCampus rape victims$93698629 997 $aUNINA LEADER 06446nam 22008775 450 001 9910483216303321 005 20251226202731.0 010 $a3-540-87698-7 024 7 $a10.1007/978-3-540-87698-4 035 $a(CKB)1000000000490429 035 $a(SSID)ssj0000316888 035 $a(PQKBManifestationID)11258552 035 $a(PQKBTitleCode)TC0000316888 035 $a(PQKBWorkID)10286907 035 $a(PQKB)11120417 035 $a(DE-He213)978-3-540-87698-4 035 $a(MiAaPQ)EBC3063204 035 $a(MiAaPQ)EBC6511654 035 $a(Au-PeEL)EBL6511654 035 $a(OCoLC)277000986 035 $a(PPN)129063010 035 $a(EXLCZ)991000000000490429 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Safety, Reliability, and Security $e27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings /$fedited by Michael Douglas Harrison, Mark-Alexander Sujan 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XIV, 456 p.) 225 1 $aProgramming and Software Engineering,$x2945-9168 ;$v5219 300 $aIncludes index. 311 08$a3-540-87697-9 320 $aIncludes bibliographical references and index. 327 $aKeynote Papers -- Critical Information Infrastructures: Should Models Represent Structures or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk -- Panel: Complexity and Resilience -- Software Dependability -- The Effectiveness of T-Way Test Data Generation -- Towards Agile Engineering of High-Integrity Systems -- SafeSpection ? A Systematic Customization Approach for Software Hazard Identification -- Integrating Safety Analyses and Component-Based Design -- Modelling Support for Design of Safety-Critical Automotive Embedded Systems -- Resilience -- Resilience in the Aviation System -- Resilience Markers for Safer Systems and Organisations -- Modeling and Analyzing Disaster Recovery Plans as Business Processes -- Fault Tolerance -- Analysis of Nested CRC with Additional Net Data in Communication -- Symbolic Reliability Analysis of Self-healing Networked Embedded Systems -- Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers -- Security -- Secure Interaction Models for the HealthAgents System -- Security Challenges in Adaptive e-Health Processes -- An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest -- Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security Threats to Automotive CAN Networks ? Practical Examples and Selected Short-Term Countermeasures -- Safety Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information -- Applying Safety Goals to a New Intensive Care Workstation System -- Safety Assurance Strategies for Autonomous Vehicles -- Expert Assessment ofArguments: A Method and Its Experimental Evaluation -- Formal Methods -- Formal Verification by Reverse Synthesis -- Deriving Safety Software Requirements from an AltaRica System Model -- Model-Based Implementation of Real-Time Systems -- Early Prototyping of Wireless Sensor Network Algorithms in PVS -- Dependability Modelling -- Analyzing Fault Susceptibility of ABS Microcontroller -- A Formal Approach for User Interaction Reconfiguration of Safety Critical Interactive Systems -- The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects -- Security and Dependability -- A Context-Aware Mandatory Access Control Model for Multilevel Security Environments -- Formal Security Analysis of Electronic Software Distribution Systems -- The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling -- Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems. 330 $aThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, held in Newcastle upon Tyne, UK, in September 2008. The 32 revised full papers presented together with 3 keynote papers and a panel session were carefully reviewed and selected from 115 submissions. The papers are organized in topical sections on software dependability, resilience, fault tolerance, security, safety cases, formal methods, dependability modelling, as well as security and dependability. 410 0$aProgramming and Software Engineering,$x2945-9168 ;$v5219 606 $aComputer networks 606 $aSoftware engineering 606 $aCoding theory 606 $aInformation theory 606 $aData protection 606 $aComputers, Special purpose 606 $aComputer science 606 $aComputer Communication Networks 606 $aSoftware Engineering 606 $aCoding and Information Theory 606 $aData and Information Security 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Science Logic and Foundations of Programming 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData protection. 615 0$aComputers, Special purpose. 615 0$aComputer science. 615 14$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aCoding and Information Theory. 615 24$aData and Information Security. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Science Logic and Foundations of Programming. 676 $a005.1 702 $aSujan$b Mark-Alexander 702 $aHarrison$b Michael Douglas 712 12$aInternational Conference on Computer Safety, Reliability, and Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483216303321 996 $aComputer Safety, Reliability, and Security$92908259 997 $aUNINA