Search results for: cyber victim
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 520

Search results for: cyber victim

220 Community Based Disaster Risk Reduction in Mizoram, India

Authors: Lalrokima Chenkual

Abstract:

Legal provision and various guidelines issued by the National Disaster Management Authority in India strives for setting up of disaster management authority from the central government to the district level. Community-Based Disaster Risk Reduction practice is still relevant as the communities are the victim as well as the first responder in any incidents. The primary goal of Community Based Disaster Risk Reduction is to reduce vulnerability of the concerned community and strengthen its existing capacity to cope with disaster. By involving the community in the preparedness phase, it not only increases the likelihood of coordinated action by the communities to help in mitigating disasters and lessening the impact of disaster but also brings the community together to address the issue collectively. Community participation ensures local ownership, addresses local needs, and promotes volunteerism and mutual help to prevent and minimise damage. Community-Based Disaster Risk Reduction is very much relevant for Mizoram as the society is closed knit, population is very less, religion homogeneity i.e Christianity, very active and widespread community-based organization viz, Young Mizo Association, MHIP (Women Federation), MUP (Elders Clubs which are guided together by Mizo code of morals conduct termed as Tlawmngaihna.

Keywords: community, close-knit, first responder, Tlawmngaihna

Procedia PDF Downloads 142
219 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 141
218 The Social Construction of the Family among the Survivors of Sex Trafficking

Authors: Nisha James, Shubha Ranganathan

Abstract:

Sex trafficking is a traumatic ongoing process which includes human rights violations against the victims. Majority of the trafficked individuals in India are from families with low socioeconomic status, from rural areas, unmarried or married off at a very young age. Many of the sex trafficked feel that it is necessary to make sacrifices, for the benefit of their families. The combination of these cultural family values with the stigma of rape and prostitution are manipulated and used as a tool in the abuse of power against the sex trafficked. The rescue, rehabilitation and reintegration of these individuals are usually difficult due to the stigma and social exclusion that they face. In these circumstances, social support is very effective in social inclusion of these individuals. The present study was a qualitative one, using semi-structured interviews with 29 Indian survivors of sex trafficking and a few sex workers. Thematic analysis was done on the data derived from the semi-structured interviews. The major findings indicate that the family can be seen as both the ‘cause’ for being sex trafficked, and the factor in victim continuing to be sex trafficked. At the same time, it can also become a driver for getting rescued, rehabilitated and reintegrated. The study also explores the social construction about ‘family’ among the survivors of sex trafficking, reflecting on who they refer to as ‘family’, what they mean by the term ‘family’ and how these families emerge. Therefore the analytic concept of ‘family’ is a crucial element in sex trafficking and cannot be defined only in terms of its conventional definition of a basic unit of society.

Keywords: sex-trafficking, survivor, family, social construction

Procedia PDF Downloads 591
217 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 89
216 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria

Authors: Anyaogu Paul

Abstract:

The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.

Keywords: child labour, family income, national security, survey research

Procedia PDF Downloads 424
215 The Value of Online News: Addressing the Problem of Online Investment Fraud Crimes in Thailand

Authors: Thapthep Paprach, Benya Lertsuwan

Abstract:

Investment fraud is not a new criminal, but there are still more victims during the Internet of Things era. This kind of criminal has been classified as a national and transnational financial crime problem all over the world. In Thailand, the country has also been attacked by this kind of crime. This research concerns whether the mass media that is supposed to cover news about online investment scams realized and warned Thais about this crime. Thus, this study explores the value of news about investment fraud in terms of frequency. The methodology uses web crawling from the top 5 news agency websites that have the most access. We pull out all information reporting about investment fraud. The findings revealed that the ‘Khaosod’ news agency was the first rank in reporting on investment crime. On the other hand, ‘Matichon’ was the least reported. Thairat news agencies frequently reported such criminals from midnight to very early in the morning, while other news agencies reported during the daytime. The results between the frequency of news reporting about investment fraud and the monthly number of victim reports are not correlated. Although the most cases reported to Thai police were in February 2023, but the most news reported was in January 2023. In conclusion, there might be a negative correlation between the amount of investment fraud news reported and the number of victims.

Keywords: investment fraud, news value, online news report, Ponzi schemes, Romance scam

Procedia PDF Downloads 76
214 Shared Beliefs and Behavioral Labels in Bullying among Middle Schoolers: Qualitative Analysis of Peer Group Dynamics

Authors: Malgorzata Wojcik

Abstract:

Groups are a powerful and significant part of human development. They serve as major emergent microsocial structures in children’s and youth’s ecological system. During middle and secondary school, peer groups become a particularly salient influence. While they promote a range of prosocial and positive emotional and behavioral attributes, they can also elicit negative or antisocial attributes, effectively “bringing out the worst” in some individuals. The grounded theory approach was employed to guide data collection and analysis, as it allows for a deeper understanding of the group processes and students’ perspectives on complex intragroup relations. Students’ perspectives on bullying cases were investigated by observing daily interactions among those involved and interviewing 47 students. The results complement theories of labeling in bullying by showing that all students self-label themselves and find it difficult to break patterns of behaviors related to bullying, such as supporting the bully or not defending the victim. In terms of the practical implications, the findings indicate that it could be beneficial to use non-punitive, restorative anti-bullying interventions that implement peer influence to transform bullying relations by removing behavioral labels.

Keywords: bullying, peer group, victimization, class reputation

Procedia PDF Downloads 117
213 Edward Bond's Questioning of Existence in His Play 'Have I None?'

Authors: Aycan Gurluyer

Abstract:

21st-century theatre has been shaped by lots of world-changing forces devastating human psychology and existence. Accepted as the greatest living English playwright, it is post-war British dramatist Edward Bond who uses a late-21st-century apocalyptic landscape as a weapon to question the human existence in his play 'Have I None?'. In this play, he tries to underline the degenerating and destructive effects of the society and environment on a couple whose lives are changed by an unexpected and annoying stranger. As victim of the society and the cultural corruption, the three vulnerable Bondian characters struggle for their expectations to find a place in this fictional world by sacrificing their own lives. Set in the 2077’s world, the play depicts that rigidly formed rules of the system/authority eliminates the existence of humans. According to Bond, the fascist practices of the governments/systems make people paralyzed in any way, so they choose to deny all realities by becoming biological beings or they gather to commit to suicide as troops. Our main aim is to underscore the questioning of the human existence by drawing the socio-political framework of the era, the capitalist system’s dehumanized individuals and their defence to survive, and what reality is in the 21st century, by focusing on Bond’s hallucinatory and tragic vision of the future in 'Have I None?'.

Keywords: Edward Bond, apocalyptic, existence, Have I None?

Procedia PDF Downloads 143
212 Current Status of Industry 4.0 in Material Handling Automation and In-house Logistics

Authors: Orestis Κ. Efthymiou, Stavros T. Ponis

Abstract:

In the last decade, a new industrial revolution seems to be emerging, supported -once again- by the rapid advancements of Information Technology in the areas of Machine-to-Machine (M2M) communication permitting large numbers of intelligent devices, e.g. sensors to communicate with each other and take decisions without any or minimum indirect human intervention. The advent of these technologies have triggered the emergence of a new category of hybrid (cyber-physical) manufacturing systems, combining advanced manufacturing techniques with innovative M2M applications based on the Internet of Things (IoT), under the umbrella term Industry 4.0. Even though the topic of Industry 4.0 has attracted much attention during the last few years, the attempts of providing a systematic literature review of the subject are scarce. In this paper, we present the authors’ initial study of the field with a special focus on the use and applications of Industry 4.0 principles in material handling automations and in-house logistics. Research shows that despite the vivid discussion and attractiveness of the subject, there are still many challenges and issues that have to be addressed before Industry 4.0 becomes standardized and widely applicable.

Keywords: Industry 4.0, internet of things, manufacturing systems, material handling, logistics

Procedia PDF Downloads 127
211 Cognitive Stylistics and Horror Fiction: A Case Study of Stephen King’s Misery

Authors: Kriangkrai Vathanalaoha

Abstract:

Misery generates fear and anxiety in readers through its intense plot associated with the unpredictable emotional states of the nurse, Annie Wilkes. At the same time, she mentally and physically abuses the novelist victim, Paul Sheldon. The suspense is not only at the story level, where the violent expressions are used but also at the discourse level, where the linguistic structures may intentionally cause the reader to view language as disturbing performative. This performativity could be reflected through linguistic choices where the writer triggers a new imaginative world through experiential metafunction and schema disruption. This study explores striking excerpts from the fiction through mind style and transitivity analysis to demonstrate how the horrific experience contrasts when the protagonist and the antagonist converse extensively. The results reveal that stylistic deviation can be found at the syntactic levels, where the intensity of emotions can be apparent when the protagonist is verbally abused. In addition, transitivity can flesh out how the protagonist is expressed chiefly through the internalized process, whereas the antagonist is eminent with the externalized process. The findings suggest that the application of cognitive stylistics, such as mind style and transitivity analysis, could contribute to the mental representation of horrific reality.

Keywords: horror, mind style, misery, stylistics, transitivity

Procedia PDF Downloads 140
210 Genetic Algorithms Based ACPS Safety

Authors: Emine Laarouchi, Daniela Cancila, Laurent Soulier, Hakima Chaouchi

Abstract:

Cyber-Physical Systems as drones proved their efficiency for supporting emergency applications. For these particular applications, travel time and autonomous navigation algorithms are of paramount importance, especially when missions are performed in urban environments with high obstacle density. In this context, however, safety properties are not properly addressed. Our ambition is to optimize the system safety level under autonomous navigation systems, by preserving performance of the CPS. At this aim, we introduce genetic algorithms in the autonomous navigation process of the drone to better infer its trajectory considering the possible obstacles. We first model the wished safety requirements through a cost function and then seek to optimize it though genetics algorithms (GA). The main advantage in the use of GA is to consider different parameters together, for example, the level of battery for navigation system selection. Our tests show that the GA introduction in the autonomous navigation systems minimize the risk of safety lossless. Finally, although our simulation has been tested for autonomous drones, our approach and results could be extended for other autonomous navigation systems such as autonomous cars, robots, etc.

Keywords: safety, unmanned aerial vehicles , CPS, ACPS, drones, path planning, genetic algorithms

Procedia PDF Downloads 181
209 Carthage-Burned and Rome-Reiterative: Mirrored Distortions of Imperial Trauma and Historiography

Authors: Sarah H. Davies

Abstract:

In the year 146 BCE, the Roman general Scipio Aemilianus – soon to be ‘anointed,’ via mass-spilling of blood-on-land, as “(‘triumphal’) Africanus” – stood atop a hill, overlooking the city of Carthage, as its urban-scape was burned and people killed, violated, captured… ‘poetically’ consumed. From an ineffable-seeming distance – constructed, in imperial fascination – the scene was (and is, apparently) painted in a disturbingly ‘romantic’ light. Such a snap-shot vista, projected before a mind’s-eye in panorama, and in (ongoing) construction, has seeped across ancient and modern lines, with multiple, interwoven iterations. This study conducts a reading, both ‘postcolonial’ and anti-imperial, in interruption of an ongoing (re)iteration of imperial violence, mirrored in distortion between “ancient” and “modern” forms that are physical, ideological, and ontological. Using an analysis of ancient literary works, from the historiographical (Polybius’ Histories) to the epic-poetic (Vergil’s Aeneid), placed in juxtaposition with a range of modern material, both literary-historical (e.g., Gibbon’s Decline & Fall of the Roman Empire) and visual (Cole’s The Course of Empire), this study destabilizes ongoing formations. Such formations attempt to inflict ‘an assumed’ repetition, engaged in normalizing a city violently destroyed as somehow ‘natural’ and/or ‘inevitable,’ and by extension, ‘tragically necessary.’ The reiterations – across media and contexts – create a distorted aesthetic (itself an act of profound violence) that fetishizes and even produces sensory, illusory pleasures (of co-complicit harm, within and across communities) regarding ‘period-shifting events’ of mass-murder and cultural erasure. ‘The vista over Carthage burning’ was/is (but does not ever have to be) thereby a manufactured stage-set, a commodity for imperial reproduction. Such a projection frames an overly-simplistic, ‘safe’-seeming (and yet incredibly dangerous) binary regarding (caricatured) “victims” and “victors.” At the same time, the projection renders an epistemological frame whereby ‘The One’ and ‘The Other’ are asserted as inherently antagonistic categories of being, in which One ‘must’ replace Other – the latter portrayed in gendered, exoticized, and time-distorted ways, as a scripted-object. All the while, a very particular subset of narrative is woven, whereby Carthage (elided in ‘victim’ status) specifically is/was Troy (again, elided), is/was every ‘destroyed city’ (also elided), and is/was yet another essential marking-point of “History,” twisted into ‘becoming’ a ‘reset’ point in a ‘cyclical pattern,’ inscribed as a tragic plot or lifetime repeated. The script itself entails pervasive violence. And yet, there always remains a trip-wire written into the constructed-cyclical. In part, this realization comes from a deconstruction of the tiered violences of an over-worn trope. The realization then also comes from a revelation of erased realities of human-experiences, in which ‘victim’ and ‘victor’ suffer, in fractured differences of ongoing, system(at)ic (re)trauma. The contours and silences of the historical records contain all the ongoing scars. This study therefore unravels the intersectional tableaux of ‘Carthage-burning’ and ‘Rome-reiterative,’ providing a collective investigation into conceptual formations, fractured across millennia. Ultimately, perhaps, such a re-reading – occurring via a commodified past will echo words from the Aeneid: “perhaps, once upon a time, to have remembered even these things, it will have been healing.

Keywords: antiquity, carthage, empire, historiography, rome, ruination

Procedia PDF Downloads 18
208 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Rady Farag Aziz Ibrahim

Abstract:

The gap between Islamic terrorism and human rights has become an important issue in the fight against Islamic terrorism worldwide. This situation is repeated because terrorism and human rights are interconnected in such a way that when the former begins, the latter becomes subject to violence. This unknown relationship was recognized in the Vienna Declaration and Program of Action adopted at the International Conference on Human Rights held in Vienna on 25 June 1993, confirming that terrorist acts, in all their forms and manifestations, aim to destroy the rights of individuals. humanity to destroy. Therefore, Islamic terrorism is a violation of basic human rights. For this purpose, the first part of the article will focus on the relationship between terrorism and human rights and the synergy between these two concepts. The second part then explores the emerging concept of cyber threats and how they exist. Additionally, technology analysis will be conducted against threats based on human rights. This will be achieved through analysis of the concept of 'securitization' of human rights and by striking a balance between counter-terrorism measures and the protection of human rights at all costs. This article concludes with recommendations on how to balance terrorism and human rights today.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development

Procedia PDF Downloads 40
207 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks

Authors: Jameelah O. Yaqub

Abstract:

The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.

Keywords: banks, e-products, innovation, Nigeria

Procedia PDF Downloads 337
206 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 323
205 The Role of Virtual Reality in Mediating the Vulnerability of Distant Suffering: Distance, Agency, and the Hierarchies of Human Life

Authors: Z. Xu

Abstract:

Immersive virtual reality (VR) has gained momentum in humanitarian communication due to its utopian promises of co-presence, immediacy, and transcendence. These potential benefits have led the United Nations (UN) to tirelessly produce and distribute VR series to evoke global empathy and encourage policymakers, philanthropic business tycoons and citizens around the world to actually do something (i.e. give a donation). However, it is unclear whether or not VR can cultivate cosmopolitans with a sense of social responsibility towards the geographically, socially/culturally and morally mediated misfortune of faraway others. Drawing upon existing works on the mediation of distant suffering, this article constructs an analytical framework to articulate the issue. Applying this framework on a case study of five of the UN’s VR pieces, the article identifies three paradoxes that exist between cyber-utopian and cyber-dystopian narratives. In the “paradox of distance”, VR relies on the notions of “presence” and “storyliving” to implicitly link audiences spatially and temporally to distant suffering, creating global connectivity and reducing perceived distances between audiences and others; yet it also enables audiences to fully occupy the point of view of distant sufferers (creating too close/absolute proximity), which may cause them to feel naive self-righteousness or narcissism with their pleasures and desire, thereby destroying the “proper distance”. In the “paradox of agency”, VR simulates a superficially “real” encounter for visual intimacy, thereby establishing an “audiences–beneficiary” relationship in humanitarian communication; yet in this case the mediated hyperreality is not an authentic reality, and its simulation does not fill the gap between reality and the virtual world. In the “paradox of the hierarchies of human life”, VR enables an audience to experience virtually fundamental “freedom”, epitomizing an attitude of cultural relativism that informs a great deal of contemporary multiculturalism, providing vast possibilities for a more egalitarian representation of distant sufferers; yet it also takes the spectator’s personally empathic feelings as the focus of intervention, rather than structural inequality and political exclusion (an economic and political power relations of viewing). Thus, the audience can potentially remain trapped within the minefield of hegemonic humanitarianism. This study is significant in two respects. First, it advances the turn of digitalization in studies of media and morality in the polymedia milieu; it is motivated by the necessary call for a move beyond traditional technological environments to arrive at a more novel understanding of the asymmetry of power between the safety of spectators and the vulnerability of mediated sufferers. Second, it not only reminds humanitarian journalists and NGOs that they should not rely entirely on the richer news experience or powerful response-ability enabled by VR to gain a “moral bond” with distant sufferers, but also argues that when fully-fledged VR technology is developed, it can serve as a kind of alchemy and should not be underestimated merely as a “bugaboo” of an alarmist philosophical and fictional dystopia.

Keywords: audience, cosmopolitan, distant suffering, virtual reality, humanitarian communication

Procedia PDF Downloads 142
204 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 146
203 Developing Serious Games to Improve Learning Experience of Programming: A Case Study

Authors: Shan Jiang, Xinyu Tang

Abstract:

Game-based learning is an emerging pedagogy to make the learning experience more effective, enjoyable, and fun. However, most games used in classroom settings have been overly simplistic. This paper presents a case study on a Python-based online game designed to improve the effectiveness in both teaching and research in higher education. The proposed game system not only creates a fun and enjoyable experience for students to learn various topics in programming but also improves the effectiveness of teaching in several aspects, including material presentation, helping students to recognize the importance of the subjects, and linking theoretical concepts to practice. The proposed game system also serves as an information cyber-infrastructure that automatically collects and stores data from players. The data could be useful in research areas including human-computer interaction, decision making, opinion mining, and artificial intelligence. They further provide other possibilities beyond these areas due to the customizable nature of the game.

Keywords: game-based learning, programming, research-teaching integration, Hearthstone

Procedia PDF Downloads 165
202 "Black Book": Dutch Prototype or Jewish Outsider

Authors: Eyal Boers

Abstract:

This paper shall demonstrate how films can offer a valuable and innovative approach to the study of images, stereotypes, and national identity. "Black Book" ("Zwartboek", 2006), a World War Two film directed by Paul Verhoeven, tells the story of Rachel Stein, a young Jewish woman who becomes a member of a resistance group in the Netherlands. The main hypothesis in this paper maintains that Rachel's character possesses both features of the Dutch prototype (a white, secular, sexual, freedom-loving individualist who seems "Dutch" enough to be accepted into a Dutch resistance group and even infiltrate the local Nazi headquarters) and features which can be defined as specifically Jewish (a black-haired victim persecuted by the Nazis, transforming herself into a gentile, while remaining loyal to her fellow Jews and ultimately immigrating to Israel and becoming a Hebrew teacher in a Kibbutz). Finally, this paper claims that Rachel's "Dutchness" is symptomatic of Dutch nostalgia in the 21st century for the Jews as "others" who blend into dominant Dutch culture, while Rachel's "Jewish Otherness" reflects a transnational identity – one that is always shifting and traverses cultural and national boundaries. In this sense, a film about Dutch Jews in the Second World War reflects on issues of identity in the 21st Century.

Keywords: Dutch, film, stereotypes, identity

Procedia PDF Downloads 127
201 Social Media as a Source of Radicalization; A Case Study of Pakistan

Authors: Manam Hanfi

Abstract:

Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.

Keywords: counter radicalization, extremism, social media, terrorism

Procedia PDF Downloads 155
200 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 390
199 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 66
198 Linguistic Devices Reflecting Violence in Border–Provinces of Southern Thailand on the Front Page of Local and National Newspapers

Authors: Chanokporn Angsuviriya

Abstract:

The objective of the study is to analyse linguistic devices reflecting the violence in the south border provinces; namely Pattani, Yala, Narathiwat and Songkla on 1,344 front pages of three local newspapers; namely ChaoTai, Focus PhakTai and Samila Time and of two national newspapers, including ThaiRath and Matichon, between 2004 and 2005, and 2011 and 2012. The study shows that there are two important linguistic devices: 1) lexical choices consisting of the use of verbs describing violence, the use of quantitative words and the use of words naming someone who committed violent acts, and 2) metaphors consisting of “a violent problem is heat”, “a victim is a leaf”, and “a terrorist is a dog”. Comparing linguistic devices between two types of newspapers, national newspapers choose to use words more violently than local newspapers do. Moreover, they create more negative images of the south of Thailand by using stative verbs. In addition, in term of metaphors “a terrorist is a fox.” is only found in national newspapers. As regards naming terrorists “southern insurgents”, this noun phrase which is collectively called by national newspapers has strongly negative meaning. Moreover, “southern insurgents” have been perceived by the Thais in the whole country while “insurgents” that are not modified have been only used by local newspapers.

Keywords: linguistic devices, local newspapers, national newspapers, violence

Procedia PDF Downloads 241
197 Women in the Soviet Press during the Great Patriotic War (1941-1945)

Authors: Nani Manvelishvili

Abstract:

Soviet propaganda tried to shape common public opinion through Soviet Press. The activation of propaganda gained special importance to increase the fighting ability of the military and people behind the front During the Great Patriotic war (1941-1945). The state propaganda used unnecessary intervention in Press and created characters who were supposed to be role models for society. The new female role models were identified, which were supported by the authorities. The representation of the mother, warrior woman, working woman, victim, feminine woman, etc., in the works aimed to raise the fighting ability of the Soviet citizen and incite patriotism. This paper analyzes the soviet Press (The newspaper “Komunisti”) that was written and published during the Great Patriotic war in Soviet Georgia. The study aims to find propagandistic content in Press that used Soviet ideology during the Great Patriotic war. We analyzed the Soviet Newspaper "Komunisti," published during wartime. Soviet Press had the most significant impact on the formation of public opinion. The Soviet government actively used this resource to increase combat capability. While at the beginning of the war, women were supposed to replace men, propaganda by the end of the war moved to reassert conservative gender politics. Women returned to their traditional roles.

Keywords: Great Patriotic War, Soviet Georgia, women in war, women's history, Soviet press

Procedia PDF Downloads 98
196 Criminals not Addicts: Newspaper Framing of Gambling-Related Crimes

Authors: Cameron Brown, Jessica Vanburen, Scott Hunt

Abstract:

This study analyzed 411 international newspaper stories pertaining to gambling-related crimes from January 2013 to December 2014. These stories included accounts of crimes committed to fund gambling or pay gambling debts or that occurred at gambling establishments. Our analysis pays particular attention to those crimes that were imputed to be committed by “problem” or “addictive” gamblers, who commit crimes to fund gambling or pay gambling debts. Previous research on problem/addictive gambling has focused on its etiology or prevalence rates and has not attended to the media portrayals of this behavior and its association with crime. Using frame analysis concepts, the data demonstrate that the newspaper stories typically frame the events as “crimes” and not the result of illness or addiction. The “evidence” of motive that could have indicated psychological problems or additions were rather framed as “criminal motive.” This framing practice advances an identity of a “problem/addictive gambler” as a deviant criminal perpetrator and not a victim of addiction. The paper concludes with a discussion of how these findings can be used to advance research on social portrayals of problem/addictive gamblers. Specifically, we consider how these media frames impede an understanding of problem/addictive gambling as a public health problem.

Keywords: problem gambling, addictive gambling, identity resonace, frame analysis

Procedia PDF Downloads 303
195 Effective Sexual Assault Treatment as Viewed by Survivors and Expert Therapists

Authors: Avigail Moor

Abstract:

Rape and sexual assault have been widely linked to severe psychological sequelae, the recovery from which often requires professional help. Thanks to the current shift in societal attitudes towards sexual violence, the victim's perspective is increasingly being heard. The present study is yet another step in that direction. Through the investigation of what recovered survivors of sexual assault identify as the therapeutic interventions that most assisted them in overcoming their trauma, guidelines for optimal sexual assault treatment are established. These receive further support from a comparison with expert therapists as to what they view as being most conducive to recovery from rape. In-depth semi-structured interviews were conducted with 15 survivors who have experienced a successful course of therapy and 15 therapists with extensive expertise in the field. The results document considerable agreement between the two perspectives, which share much in common. First, irrespective of the specific techniques involved, both survivors and therapists placed the greatest importance on a respectful and validating therapeutic relationship, that operates to counter the dehumanization and degradation entailed in the assault. In addition, specific interventions were identified, which include the reprocessing of all rape-specific peri-traumatic reactions coupled with the intentional countering of their consequences within the therapeutic relationship. Together, these reports provide a detailed account of post-rape treatment needs and the interventions required for their effective resolution.

Keywords: sexual assault, rape, treatment efficacy, survivors

Procedia PDF Downloads 143
194 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 328
193 Predictive Output Feedback Linearization for Safe Control of Collaborative Robots

Authors: Aliasghar Arab

Abstract:

Autonomous robots interacting with humans, as safety-critical nonlinear control systems, are complex closed-loop cyber-physical dynamical machines. Keeping these intelligent yet complicated systems safe and smooth during their operations is challenging. The aim of the safe predictive output feedback linearization control synthesis is to design a novel controller for smooth trajectory following while unsafe situations must be avoided. The controller design should obtain a linearized output for smoothness and invariance to a safety subset. Inspired by finite-horizon nonlinear model predictive control, the problem is formulated as constrained nonlinear dynamic programming. The safety constraints can be defined as control barrier functions. Avoiding unsafe maneuvers and performing smooth motions increases the predictability of the robot’s movement for humans when robots and people are working together. Our results demonstrate the proposed output linearization method obeys the safety constraints and, compared to existing safety-guaranteed methods, is smoother and performs better.

Keywords: robotics, collaborative robots, safety, autonomous robots

Procedia PDF Downloads 97
192 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 349
191 Domestic Violence, Well-Being and Women's Inclusion: Evidence from Northern Ireland

Authors: Jessica Leigh Doyle

Abstract:

In recent years there has been increasing academic and policy interest in domestic violence (DV) and in the implications of DV for the physical and psychological well-being of those who experience it. Yet, despite this interest, very few detailed empirical explorations of these issues have been conducted to date. Of the detailed empirical work that does exist, most studies have focused narrowly on physical violence and the impact of physical violence on rates of depression, post-traumatic stress disorder (PTSD) and substance use. This has often been to the exclusion of wider experiences of DV in relation to psychological, sexual and financial abuse, and of broader victim self-perceptions of psychological well-being that include self-esteem, social participation and quality of life as core components. This paper contributes towards filling this gap by examining these issues on the basis of comprehensive empirical evidence from the Northern Ireland context. Using qualitative methods, the paper presents the findings from 63 semi-structured interviews with women victims of DV from across Northern Ireland. The findings discuss the varied types of violence (physical, psychological, sexual, and financial) that women experience, how these experiences shape their broad physical and psychological well-being and capacity to live active and fulfilling lives and the processes of recovery from IPV. The implications of these findings for research and policy are then discussed.

Keywords: domestic violence, gender equality, intimate partner violence, violence against women, well-being

Procedia PDF Downloads 284