Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
88,356 result(s) for "Exploitation"
Sort by:
Exploiting East Asian cinemas : translation, circulation, consumption
\"From the 1970s onward, \"exploitation cinema\" as a concept has circulated inside and outside of East Asian nations and cultures in terms of aesthetics and marketing. However, crucial questions about how global networks of production and circulation alter the identity of an East Asian film as \"mainstream\" or as \"exploitation\" have yet to be addressed in a comprehensive way. Exploiting East Asian Cinemas serves as the first authoritative guide to the various ways in which contemporary cinema from and about East Asia has trafficked across the somewhat-elusive line between mainstream and exploitation. Focusing on networks of circulation, distribution, and reception, this collection treats the exploitation cinemas of East Asia as mobile texts produced, consumed, and in many ways re-appropriated across national (and hemispheric) boundaries. As the processes of globalization have decoupled products from their nations of origin, transnational taste cultures have declared certain works as \"art\" or \"trash,\" regardless of how those works are received within their native locales. By charting the routes of circulation of notable films from Japan, China, and South Korea, this anthology contributes to transnationally-accepted formulations of what constitutes 'East Asian exploitation cinema'\"-- Provided by publisher.
Patterns of exploitation : understanding migrant worker rights in advanced democracies
\"With an estimated 164 million workers globally, migrant workers are an essential component of contemporary workplaces. Despite their number and indispensability in the global economy, these workers suffer workplace violations that range from underpayment of wages, to unsafe work conditions through to sexual assault and even industrial manslaughter. Patterns of Exploitation documents the bases for exploitation. It does this through a comparison of labor laws and practices in six labor law jurisdictions and four countries, over a twenty-year period: Australia, Canada (Ontario, British Columbia and Alberta), the United Kingdom (England) and the United States (California). Starting with a startling new database (the Migrant Worker Rights Database) of 907 court cases involving 1,912 migrants, this unprecedented study offers in-depth analysis of seven court cases to document individual migrant experiences. It draws upon 53 interviews with leading counsel (and other actors) on both sides of litigation to provide an assessment of the patterns of exploitation that emerge. The central factors informing these narratives are ethnicity, gender, occupational sector, visa status, trade union membership and enforcement policy. Yet, the key factor that explains variation across cases is the industrial relations systems of these four countries. This central finding emphasizes ongoing institutional resilience in labor market regulation, even within most-similar liberal market economies that these cases represent\"-- Provided by publisher.
Exploitation in a disruptive and unjust gig-economy
The purpose of this report is an appraisal of the gig economy; educating and informing an academic audience of the faults that exist and how these faults lead to exploitation and unjustness in the gig economy. During the writing process, I researched the academic articles and books related to the gig economy and exploitation, enabling myself to form a solid foundation from which to conduct further research. In addition, work was conducted to synthesize the journal articles, online resources and books. The scope of this report examines the corpus of the text relating to the gig economy and exploitation and I emphasize some of the ways the writers manage to display the exploitation and the unjustness in the gig economy.
The institute : a novel
\"In the middle of the night, in a house on a quiet street in suburban Minneapolis, intruders silently murder Luke Ellis's parents and load him into a black SUV. The operation takes less than two minutes. Luke will wake up at The Institute, in a room that looks just like his own, except there's no window. And outside his door are other doors, behind which are other kids with special talents--telekinesis and telepathy--who got to this place the same way Luke did ... In this most sinister of institutions, the director, Mrs. Sigsby, and her staff are ruthlessly dedicated to extracting from these children the force of their extranormal gifts. There are no scruples here. If you go along, you get tokens for the vending machines. If you don't, punishment is brutal. As each new victim disappears to Back Half, Luke becomes more and more desperate to get out and get help. But no one has ever escaped from the Institute.\"-- Provided by publisher.
Foreign Authors’ Enforcement of U.S. Reversion Rights
Thank you to all of the participants, and especially the first two panelists, for setting one part of the scene. I am going to talk about the United States’ termination right and some Berne and private international law consequences or implications of the termination right.First, however, I’d like to advert to the two goals Rebecca Giblin referenced in her talk. One is remuneration, the other is dissemination. Author-protective laws in other countries also address dissemination. As Séverine Dusollier mentioned, a number of national laws include an obligation to exploit the work: if the publisher does not exploit the work, the rights revert to the author. In the United States, the contractual out-of-print clause serves that purpose, but the out-of-print clause is a matter of private ordering. It has to be activated by the author and publishers lately have contended that as a result of print-on-demand, the work never goes out of print. If the book is available in the catalog, and somebody at some point wants a copy, then the publisher can provide that copy. Out of print clauses in the digital environment therefore, some publishers would argue, make no sense. Mary Rasenberger accordingly mentioned some of the attempts of the Author’s Guild to push back against the disappearance of the out-of-print clause.The rest of my remarks will concern remuneration, rather than dissemination. As both Martin Senftleben and Séverine Dusollier pointed out, there exists a disparity in bargaining power: authors generally are the weaker party. Two broad techniques seek to remedy this problem. Previous speakers have addressed one of them, intervention by national laws with respect to the amount that the author gets paid, and with respect to the scope of the grant. Thus, in some countries, as Séverine Dusollier mentioned, the law prohibits the author’s grant of modes of exploitation unknown at the time of the contract. These laws effectively reserve new technology rights to the author. Other national laws require additional remuneration for new modes of exploitation, or for “bestsellers” whose authors’ remuneration becomes excessively disproportionate to the grantees’.
Identity capitalists : the powerful insiders who exploit diversity to maintain inequality
\"When accused of racism, why do people so often reference their non-white friends? Why do large companies prominently display photos of women and non-white people on their websites? Why do straight white male politicians go out of their way to draw attention to their diverse supporters? This is the first book to comprehensively examine how \"identity capitalists\", or members of powerful in-groups or institutions, derive social and economic value from out-group or minority identities. Nancy Leong argues that members of ingroups-a category that varies depending on the situation, but who are most often white, male, straight, wealthy, or all of the above-are often \"identity capitalists.\" They derive social and economic value from the identities of outgroup members such as non-white people, women, LGBTQ people, and the poor. Identity Capitalists develops a framework for understanding identity capitalism and demonstrates that the process of deriving value from identity is common and pervasive, with roots in the American social and legal preoccupation with diversity. Drawing timely examples from pop culture, politics, and the law, Leong shows how identity capitalism occurs nearly everywhere, from schools to workplaces to entertainment. Identity capitalism often creates a dilemma for members of outgroups: do they reluctantly tolerate the way the ingroup is using their identity, or do they protest the use of their identity and risk negative repercussions from the ingroup? Leong argues that identity capitalism is overall a negative phenomenon that leads to cynicism about identity and exploitation of identity outgroups. She also considers how identity capitalism intersects with the legal system, offering examples from antidiscrimination law and beyond. The book concludes by considering both the promise and limitations of legal reform for mitigating the harms of identity capitalism, and encourages people to turn the lens of identity capitalism on their own lives\"-- Provided by publisher.
On the Development of Next Generation Memory Exploits
Memory vulnerabilities can be dangerous. To counter their effects, software and hardware support is being developed for Control-Flow Integrity (CFI): a technique to stop classical exploits from working. Unfortunately, there remains an underexplored residual attack surface. We refer to exploits targeting this attack surface as Next Generation Memory Exploits (NGMEs). This dissertation focuses on attacks and defences of NGMEs through an exploitation model of three phases: vulnerability, control and payload. We discuss vulnerabilities as a whole and propose new, measurable properties for vulnerabilities. These properties form the foundation of a vulnerability taxonomy called GEN, as it GENerically describes and classifies vulnerabilities. GEN defines what a vulnerability is through a technical definition. Moreover, GEN identifies what vulnerabilities are relevant for NGMEs and how to find them. Typically, memory vulnerabilities expose limited capabilities. Control techniques are necessary to exploit such vulnerabilities. Heap Layout Manipulation is one technique to overwrite useful data structures. We propose a toolchain that can generate puzzles from real-world applications, to then be solved in a puzzle game called Hack the Heap. This way, we can solve the Heap Layout Manipulation problem through gamification while remaining heap manager agnostic and explainable. With control gained over a vulnerable application, the next step is to deliver the payload: what the exploit wants to achieve. To halt this payload, we propose System Call Argument Integrity: automatic data-flow protection tailored towards security-sensitive system calls. It protects against data-only attacks while incurring overhead only when handling security-sensitive data-flows. Concluding, we propose a novel framework for characterising NGMEs (and vulnerabilities more broadly), in addition to techniques for assessing and mitigating their impact during different phases of the exploitation lifecycle. Considering the increasing risk of real-world NGMEs, we hope this dissertation fosters further research into both NGME threats and mitigations.