Search results for: cyber victims
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 718

Search results for: cyber victims

418 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 154
417 A Scoping Review of Psychosocial Interventions for the Survivors and/or Victims of Intimate Partner Violence in Low- and Middle-Income Countries

Authors: Mukondi Nethavhakone

Abstract:

The high prevalence of violence against women is a global public health problem. Our societies have become dangerous places for women. Women during their child-bearing ages are at a higher risk of experiencing emotional, physical, and sexual violence. What makes it more concerning is that these violent acts are perpetrated by family members or partners, or ex-partners. Intimate Partner Violence (IPV) is associated with long-lasting physical, reproductive, sexual, mental, and maternal health implications. Expectedly women’s mental health would dimmish as a result of experiencing IPV. The burden of violence against women is seen to be heavier in low- and middle-income countries (LMICs) compared to the rest of the world. Countries have committed to eliminating all forms of violence against women through the sustainable development goal, aiming to see changes by the year 2030. As such, various countries have implemented psychosocial interventions of different levels of impact. However, little is known, especially in low- and middle-income countries, with regard to the potential of psychosocial interventions for IPV to improve the mental health outcomes for the survivors and/or victims of IPV. Analysing the risk for IPV through a social-ecological theoretical approach, low- and middle-income countries still readdressing gender inequality which is the cause of intimate partner violence. That is why it is taking time for these countries to shift psychosocial interventions to focus more on the improvement of the mental health of the survivors. It is, therefore, against this backdrop that the researcher intends to undertake a scoping review to understand the nature and characteristics of psychosocial interventions that have been implemented in low- and middle-income countries. With the findings from the scoping review, the researcher aims to develop a conceptual framework that may be a useful resource for healthcare practitioners and researchers in low- and middle-income countries. As this area of research has not been thoroughly reviewed, the results from this scoping will determine whether a systematic review will be justifiable. Additionally, the researcher will identify gaps and opportunities for future research in this area.

Keywords: mental health improvement, psychosocial interventions, intimate partner violence, LMICs

Procedia PDF Downloads 125
416 Representation of Memory of Forced Displacement in Central and Eastern Europe after World War II in Polish and German Cinemas

Authors: Ilona Copik

Abstract:

The aim of this study is to analyze the representation of memories of the forced displacement of Poles and Germans from the eastern territories in 1945 as depicted by Polish and German feature films between the years 1945-1960. The aftermath of World War II and the Allied agreements concluded at Yalta and Potsdam (1945) resulted in changes in national borders in Central and Eastern Europe and the large-scale transfer of civilians. The westward migration became a symbol of the new post-war division of Europe, new spheres of influence separated by the Iron Curtain. For years it was a controversial topic in both Poland and Germany due to the geopolitical alignment (the socialist East and capitalist West of Europe), as well as the unfinished debate between the victims and perpetrators of the war. The research premise is to take a comparative view of the conflicted cultures of Polish and German memory, to reflect on the possibility of an international dialogue about the past recorded in film images, and to discover the potential of film as a narrative warning against totalitarian inclinations. Until now, films made between 1945 and 1960 in Poland and the German occupation zones have been analyzed mainly in the context of artistic strategies subordinated to ideology and historical politics. In this study, the intention is to take a critical approach leading to the recognition of how films work as collective memory media, how they reveal the mechanisms of memory/forgetting, and what settlement topoi and migration myths they contain. The main hypothesis is that feature films about forced displacement, in addition to the politics of history - separate in each country - reveal comparable transnational individual experiences: the chaos of migration, the trauma of losing one's home, the conflicts accompanying the familiar/foreign, the difficulty of cultural adaptation, the problem of lost identity, etc.

Keywords: forced displacement, Polish and German cinema, war victims, World War II

Procedia PDF Downloads 65
415 Disaster Management Approach for Planning an Early Response to Earthquakes in Urban Areas

Authors: Luis Reynaldo Mota-Santiago, Angélica Lozano

Abstract:

Determining appropriate measures to face earthquakesarea challenge for practitioners. In the literature, some analyses consider disaster scenarios, disregarding some important field characteristics. Sometimes, software that allows estimating the number of victims and infrastructure damages is used. Other times historical information of previous events is used, or the scenarios’informationis assumed to be available even if it isnot usual in practice. Humanitarian operations start immediately after an earthquake strikes, and the first hours in relief efforts are important; local efforts are critical to assess the situation and deliver relief supplies to the victims. A preparation action is prepositioning stockpiles, most of them at central warehouses placed away from damage-prone areas, which requires large size facilities and budget. Usually, decisions in the first 12 hours (standard relief time (SRT)) after the disaster are the location of temporary depots and the design of distribution paths. The motivation for this research was the delay in the reaction time of the early relief efforts generating the late arrival of aid to some areas after the Mexico City 7.1 magnitude earthquake in 2017. Hence, a preparation approach for planning the immediate response to earthquake disasters is proposed, intended for local governments, considering their capabilities for planning and for responding during the SRT, in order to reduce the start-up time of immediate response operations in urban areas. The first steps are the generation and analysis of disaster scenarios, which allow estimatethe relief demand before and in the early hours after an earthquake. The scenarios can be based on historical data and/or the seismic hazard analysis of an Atlas of Natural Hazards and Risk as a way to address the limited or null available information.The following steps include the decision processes for: a) locating local depots (places to prepositioning stockpiles)and aid-giving facilities at closer places as possible to risk areas; and b) designing the vehicle paths for aid distribution (from local depots to the aid-giving facilities), which can be used at the beginning of the response actions. This approach allows speeding up the delivery of aid in the early moments of the emergency, which could reduce the suffering of the victims allowing additional time to integrate a broader and more streamlined response (according to new information)from national and international organizations into these efforts. The proposed approachis applied to two case studies in Mexico City. These areas were affectedby the 2017’s earthquake, having limited aid response. The approach generates disaster scenarios in an easy way and plans a faster early response with a short quantity of stockpiles which can be managed in the early hours of the emergency by local governments. Considering long-term storage, the estimated quantities of stockpiles require a limited budget to maintain and a small storage space. These stockpiles are useful also to address a different kind of emergencies in the area.

Keywords: disaster logistics, early response, generation of disaster scenarios, preparation phase

Procedia PDF Downloads 109
414 Establishing an Evidence-Based Trauma Informed Care Pathway for Survivors of Modern Slavery

Authors: I. Brezeanu, J. Mackrill, A. Cajo, C. Mogollon

Abstract:

Modern Slavery is a serious crime, where often the victims are unable to leave their situation of exploitation, being controlled by threats, punishment, violence, coercion, and deception. In the UK, this term encompasses both Slavery and Human Trafficking. The number of potential victims who were referred to the National Referral Mechanism (NRM) increased exponentially in the past decade, passing from fewer than 700 potential victims referred in 2010 to more than 12.000 in 2021. Our study aims to explore how the concept of Trauma-Informed Care (TIC) approach can be adopted by services working with survivors of Modern Slavery and Trafficking (MST). Notably, in this paper, we will elaborate on how the complex needs of survivors are related to their traumatic experiences and what are the necessary steps and resources for implementing a Modern Slavery Trauma-Informed model. While there are relatively few services in the UK that have a deep understanding of the survivors’ and practitioners’ views of how trauma impacts their daily life, there is a strong need for developing services that are organised and delivered in ways that prevent retraumatisation and enable trauma survivors to engage safely with the right professionals at the right time, promoting healing through positive relationships. Such models, known as Trauma-Informed Approaches (TIAs), are seen as crucial to the empowerment of survivors, yet they remain a marginal implementation model by governments, law enforcement, judiciary, or care providers, who are frequently survivors’ first point of contact in the recovery process. In order to understand better how to provide best practice and to adopt the concept, this study is based on a multi-disciplinary approach, encompassing both theoretical perspectives and co-production. By combining qualitative and quantitative research and comparing different analysis of applied examples of TIC in the US and the UK, we gained important insights about the prevention and impact of trauma on survivors’ life. The articulation between more general expertise on Trauma-Informed Care developed by other institutions operating in the field, and the SJOG delivery, based on the Salvation Army’s Modern Slavery Victim Care and Coordination Contract (MSVCC) and the Care Quality Commission regulations, allowed to identify on one side what are the complex needs of survivors derived from their traumatic experiences, and on the other side, how could MST services prevent retraumatisation. Additional, two in-depth interviews with survivors, who receive support from one of our services at Olallo House in London, and a survey shared among all colleagues working with MST services completed the findings of the research with their personal experience and knowledge. Ultimately, we developed an evidence-based Trauma-Informed Care Pathway that aims to improve the wellbeing of survivors and to support them to live a meaningful life. The establishedpathway delivers three main outcomes belonging to the social determinants of health criteria – health and wellbeing, purpose and relationship, and covers key themes of the context of trauma, needs of individuals, and service support.

Keywords: trauma-informed care, modern slavery, human trafficking, trauma, retraumatisation

Procedia PDF Downloads 89
413 The Portrayal of Violence Against Women in Bangladesh News Media: Seeing It Through Rumana Manzur’s Case

Authors: Zerrin Akter Anni

Abstract:

The media's role in shaping perceptions of violence against women (VAW) and their portrayal in news reporting significantly influences our understanding of this critical issue. My research delves into the portrayal of violence against women in mainstream media, using the prominent case of Dr. Rumana Manzur, a former UBC Fulbright Scholar from Bangladesh who suffered a brutal assault by her ex-husband in June 2011. Employing a qualitative research approach, this study uses an ethnographic media analysis method to scrutinize news reports of the aforementioned case from selected newspapers in Bangladesh. The primary objectives are to investigate how the popular news media in Bangladesh addresses the issue of violence against women and frames the victims of such violence. The findings of this research highlight that news media can perpetuate gender stereotypes and subtly shift blame onto the victim through various techniques, creating intricate interactions between the reader and the text. These techniques include sensationalized headlines, textual content, and graphic images. This victim-blaming process not only retraumatizes the survivor but also distorts the actual facts when presenting the case to a larger audience. Consequently, the representation of violence against women cases in media, particularly the portrayal of women as victims during reporting, significantly impacts our collective comprehension of this issue. In conclusion, this paper asserts that the Bangladeshi media, particularly news outlets, in conjunction with society, continue to follow a pattern of depicting gender-based violence in ways that devalue the image of women. This research underscores the need for critical analysis of media representations of violence against women cases, as they can perpetuate harmful stereotypes and hinder efforts to combat this pervasive problem. Therefore, the outcome of this research is to comprehend the complex dynamics between media and violence against women, which is essential for fostering a more empathetic and informed society that actively works towards eradicating this problem from our society.

Keywords: media representation, violence against women (vaw), ethnographic media analysis, victim-blaming, sensationalized headline

Procedia PDF Downloads 71
412 An Ethnographic Study of Commercial Surrogacy Industry in India

Authors: Dalia Bhattacharjee

Abstract:

Motherhood as an institution is considered as sacred. Reproduction and motherhood have always been a concern of the private space of home. However, with the emergence of technologies like the Assisted Reproductive Technologies (ARTs), this intimate area has moved into the public. A woman can now become a mother with artificial insemination done by expert medical professionals in a hospital. With this development, the meanings of motherhood and childrearing have altered. Mothers have been divided into ‘ovarian mothers’ (those who provide the eggs), ‘uterine mothers’ (those who carry out the pregnancy and give birth), and ‘social mothers’ (those who raise the child). Thus, the ART business deconstructs motherhood by defining who the biological mother is and who the social mother is and who – despite contributing parts or processes of her body to the life of the child is not a mother, but merely the donor of a product, be it the egg or the womb, which is owned by those who are favoured by the contract. The industry of commercial surrogacy in India has been estimated to be of $2.3 billion as of 2012. There are many women who work as surrogate mothers in this industry for the exchange of money. It runs like a full-fledged business guided by a highly profit oriented capitalist market. The reproductive labourers are identified as mere womb renters or victims and not as active agents in such arrangements. Such a discourse undercuts the agency exercised by the women. The present study is an ethnography into the commercial surrogacy industry in India. This journey furthers the understanding of the dilemmas faced by the reproductive labourers. The paper emphasizes on the experiences of reproduction and motherhood outside the private space of the home in the commercial surrogacy industry in India, and, argues that this multiplicity of experiences need much focus and attention, where, the consumer becomes ‘the’ citizen and the women workers continue to be victims. The study draws on the narratives of the reproductive labourers, who remain at the center, and yet, at the periphery of such arrangements. This feminist ethnography is informed by the feminist standpoint theory to account for and analyse these varied experiences which further the understanding of the dilemmas faced by the reproductive labourers.

Keywords: commercial surrogacy, ethnography, motherhood, standpoint theory

Procedia PDF Downloads 233
411 A Conceptual Model of Sex Trafficking Dynamics in the Context of Pandemics and Provisioning Systems

Authors: Brian J. Biroscak

Abstract:

In the United States (US), “sex trafficking” is defined at the federal level in the Trafficking Victims Protection Act of 2000 as encompassing a number of processes such as recruitment, transportation, and provision of a person for the purpose of a commercial sex act. It involves the use of force, fraud, or coercion, or in which the person induced to perform such act has not attained 18 years of age. Accumulating evidence suggests that sex trafficking is exacerbated by social and environmental stressors (e.g., pandemics). Given that “provision” is a key part of the definition, “provisioning systems” may offer a useful lens through which to study sex trafficking dynamics. Provisioning systems are the social systems connecting individuals, small groups, entities, and embedded communities as they seek to satisfy their needs and wants for goods, services, experiences and ideas through value-based exchange in communities. This project presents a conceptual framework for understanding sex trafficking dynamics in the context of the COVID pandemic. The framework is developed as a system dynamics simulation model based on published evidence, social and behavioral science theory, and key informant interviews with stakeholders from the Protection, Prevention, Prosecution, and Partnership sectors in one US state. This “4 P Paradigm” has been described as fundamental to the US government’s anti-trafficking strategy. The present research question is: “How do sex trafficking systems (e.g., supply, demand and price) interact with other provisioning systems (e.g., networks of organizations that help sexually exploited persons) to influence trafficking over time vis-à-vis the COVID pandemic?” Semi-structured interviews with stakeholders (n = 19) were analyzed based on grounded theory and combined for computer simulation. The first step (Problem Definition) was completed by open coding video-recorded interviews, supplemented by a literature review. The model depicts provision of sex trafficking services for victims and survivors as declining in March 2020, coincidental with COVID, but eventually rebounding. The second modeling step (Dynamic Hypothesis Formulation) was completed by open- and axial coding of interview segments, as well as consulting peer-reviewed literature. Part of the hypothesized explanation for changes over time is that the sex trafficking system behaves somewhat like a commodities market, with each of the other subsystems exhibiting delayed responses but collectively keeping trafficking levels below what they would be otherwise. Next steps (Model Building & Testing) led to a ‘proof of concept’ model that can be used to conduct simulation experiments and test various action ideas, by taking model users outside the entire system and seeing it whole. If sex trafficking dynamics unfold as hypothesized, e.g., oscillated post-COVID, then one potential leverage point is to address the lack of information feedback loops between the actual occurrence and consequences of sex trafficking and those who seek to prevent its occurrence, prosecute the traffickers, protect the victims and survivors, and partner with the other anti-trafficking advocates. Implications for researchers, administrators, and other stakeholders are discussed.

Keywords: pandemics, provisioning systems, sex trafficking, system dynamics modeling

Procedia PDF Downloads 70
410 Peer Bullying and Mentalization from the Perspective of Pupils

Authors: Anna Siegler

Abstract:

Bullying among peers is not uncommon; however, adults can notice only a fragment of the cases of harassment during everyday life. The systemic approaches of bullying investigation put the whole school community in the focus of attention and propose that the solution should emerge from the culture of the school. Bystanders are essential in the prevention and intervention processes as an active agent rather than passive. For combating exclusion, stigmatization and harassment, it is important that the bystanders have to realize they have the power to take action. To prevent the escalation of violence, victims must believe that students and teachers will help them and their environment is able to provide safety. The study based on scientific narrative psychological approach, and focuses on the examination of the different perspectives of students, how peers are mentalizing with each other in case of bullying. The data collection contained responses of students (N = 138) from three schools in Hungary, and from three different area of the country (Budapest, Martfű and Barcs). The test battery include Bullying Prevalence Questionnaire, Interpersonal Reactivity Index and an instruction to get narratives about bullying, which effectiveness was tested during a pilot test. The obtained results are in line with the findings of previous bullying research: the victims are mentalizing less with their peers and experience greater personal distress when they are in identity threatening situations, thus focusing on their own difficulties rather than social signals. This isolation is an adaptive response in short-term although it seems to lead to a deficit in social skills later in life and makes it difficult for students to become socially integrated to society. In addition the results also show that students use more mental state attribution when they report verbal bullying than in case of physical abuse. Those who witness physical harassment also witness concrete answers to the problem from teachers, in contrast verbal abuse often stays without consequences. According to the results students mentalizing more in these stories because they have less normative explanation to what happened. To expanding bullying literature, this research helps to find ways to reduce school violence through community development.

Keywords: bullying, mentalization, narrative, school culture

Procedia PDF Downloads 157
409 Pattern of Admission and Recruitment for PhD Positions in European Universities: Globalization of Education or Evading the Hidden Agenda of Racism through Systematic Rejection

Authors: Bashar Dahiru Bashar

Abstract:

Growing research reveals an unprecedented increase in African applicants for PhD positions across European universities. Meanwhile, a very small percentage is accepted as qualified candidates to marginalize, perpetuate stereotypes, and institute racial discrimination. Candidates of color very often encounter barriers and prejudices that not only diminish their sense of belonging but also hinder their academic progress. Although this issue has existed for quite some time, it attracts little attention, even from the academic community in higher education. Moreover, the focus is mostly on the applicants. In this contribution, concern has been raised that the African applicants for PhD positions in European Universities are the victims rather than the perpetrators. The Universities designed a recruitment process that is in all respects exclusive, biased, and European. The recruitment exercise is a hocus-post in order to cover language and racial and ethnic rejection. Just in the same way legacy admission is practiced in the US. The paper further expressed that the logic is to systematically maintain racial hierarchy and social dominance within the education sector. And because those at an advantage are also the ones that have the media and are predominant in academia, issues like this are not receiving deserved attention. Many people were victims of this recruitment process, while others survived severely wounded as a result of mental, social, and economic trauma. It is not the aim of this paper to provide an armchair solution to this issue but only to showcase the process with the hope of providing something that is needed to improve the present day's literacy and situation. The findings contribute to the broader discourse on diversity, equity, and inclusiveness within European Universities, emphasizing, amongst others, the need for cultivating an atmosphere where individuals are valued for their contributions rather than assessed based on race and ethnicity is essential for creating a vibrant and equitable global academic community, forging a path towards a just and harmonious educational landscape where everyone irrespective of race or ethnicity can thrive and contribute to the collective pursuit of knowledge.

Keywords: admission and recruitment for PhD position, globalization of education, systemic rejection, European university

Procedia PDF Downloads 44
408 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 314
407 Comparing the SALT and START Triage System in Disaster and Mass Casualty Incidents: A Systematic Review

Authors: Hendri Purwadi, Christine McCloud

Abstract:

Triage is a complex decision-making process that aims to categorize a victim’s level of acuity and the need for medical assistance. Two common triage systems have been widely used in Mass Casualty Incidents (MCIs) and disaster situation are START (Simple triage algorithm and rapid treatment) and SALT (sort, asses, lifesaving, intervention, and treatment/transport). There is currently controversy regarding the effectiveness of SALT over START triage system. This systematic review aims to investigate and compare the effectiveness between SALT and START triage system in disaster and MCIs setting. Literatures were searched via systematic search strategy from 2009 until 2019 in PubMed, Cochrane Library, CINAHL, Scopus, Science direct, Medlib, ProQuest. This review included simulated-based and medical record -based studies investigating the accuracy and applicability of SALT and START triage systems of adult and children population during MCIs and disaster. All type of studies were included. Joana Briggs institute critical appraisal tools were used to assess the quality of reviewed studies. As a result, 1450 articles identified in the search, 10 articles were included. Four themes were identified by review, they were accuracy, under-triage, over-triage and time to triage per individual victim. The START triage system has a wide range and inconsistent level of accuracy compared to SALT triage system (44% to 94. 2% of START compared to 70% to 83% of SALT). The under-triage error of START triage system ranged from 2.73% to 20%, slightly lower than SALT triage system (7.6 to 23.3%). The over-triage error of START triage system was slightly greater than SALT triage system (START ranged from 2% to 53% compared to 2% to 22% of SALT). The time for applying START triage system was faster than SALT triage system (START was 70-72.18 seconds compared to 78 second of SALT). Consequently; The START triage system has lower level of under-triage error and faster than SALT triage system in classifying victims of MCIs and disaster whereas SALT triage system is known slightly more accurate and lower level of over-triage. However, the magnitude of these differences is relatively small, and therefore the effect on the patient outcomes is not significance. Hence, regardless of the triage error, either START or SALT triage system is equally effective to triage victims of disaster and MCIs.

Keywords: disaster, effectiveness, mass casualty incidents, START triage system, SALT triage system

Procedia PDF Downloads 128
406 LIS Students’ Experience of Online Learning During Covid-19

Authors: Larasati Zuhro, Ida F Priyanto

Abstract:

Background: In March 2020, Indonesia started to be affected by Covid-19, and the number of victims increased slowly but surely until finally, the highest number of victims reached the highest—about 50,000 persons—for the daily cases in the middle of 2021. Like other institutions, schools and universities were suddenly closed in March 2020, and students had to change their ways of studying from face-to-face to online. This sudden changed affected students and faculty, including LIS students and faculty because they never experienced online classes in Indonesia due to the previous regulation that academic and school activities were all conducted onsite. For almost two years, school and academic activities were held online. This indeed has affected the way students learned and faculty delivered their courses. This raises the question of whether students are now ready for their new learning activities due to the covid-19 disruption. Objectives: this study was conducted to find out the impact of covid-19 pandemic on the LIS learning process and the effectiveness of online classes for students of LIS in Indonesia. Methodology: This was qualitative research conducted among LIS students at UIN Sunan Kalijaga, Yogyakarta, Indonesia. The population are students who were studying for masters’program during covid-19 pandemic. Results: The study showed that students were ready with the online classes because they are familiar with the technology. However, the Internet and technology infrastructure do not always support the process of learning. Students mention slow WIFI is one factor that causes them not being able to study optimally. They usually compensate themselves by visiting a public library, a café, or any other places to get WIFI network. Noises come from the people surrounding them while they are studying online.Some students could not concentrate well when attending the online classes as they studied at home, and their families sometimes talk to other family members, or they asked the students while they are attending the online classes. The noise also came when they studied in a café. Another issue is that the classes were held in shorter time than that in the face-to-face. Students said they still enjoyed the onsite classes instead of online, although they do not mind to have hybrid model of learning. Conclusion: Pandemic of Covid-19 has changed the way students of LIS in Indonesia learn. They have experienced a process of migrating the way they learn from onsite to online. They also adapted their learning with the condition of internet access speed, infrastructure, and the environment. They expect to have hybrid classes in the future.

Keywords: learning, LIS students, pandemic, covid-19

Procedia PDF Downloads 124
405 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law

Authors: Barakat Adebisi Raji

Abstract:

In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.

Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah

Procedia PDF Downloads 28
404 Progression of Trauma: Myth Mess Mastery, Addressing and Grooming

Authors: Stuart Bassman

Abstract:

Services that focus on the synthesis of research and clinical practice are vital in providing efficacious change for the men and women who have been victims of childhood sexual abuse. This study will address what processes have been helpful in being a catalyst in changing one’s inner life as well as providing meaningful applications and fulfilling experiences. Initially, we would focus on the Myths regarding childhood sexual abuse. This would include Grooming behaviors and Delayed Disclosures. Subsequently, we would address the Mess that follows from not recognizing the adverse impairments that result from Childhood Sexual Abuse. Finally, we would conclude by looking at the Mastery that could arise from moving from being a Victim to a Survivor and a Thriver.

Keywords: trauma, childhood, somatic, treatment

Procedia PDF Downloads 45
403 Fears of Strangers: Causes of Anonymity Rejection on Virtual World

Authors: Proud Arunrangsiwed

Abstract:

This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.

Keywords: anonymous, anonymity, online identity, trust message, reliability

Procedia PDF Downloads 355
402 Testing a Dose-Response Model of Intergenerational Transmission of Family Violence

Authors: Katherine Maurer

Abstract:

Background and purpose: Violence that occurs within families is a global social problem. Children who are victims or witness to family violence are at risk for many negative effects both proximally and distally. One of the most disconcerting long-term effects occurs when child victims become adult perpetrators: the intergenerational transmission of family violence (ITFV). Early identification of those children most at risk for ITFV is needed to inform interventions to prevent future family violence perpetration and victimization. Only about 25-30% of child family violence victims become perpetrators of adult family violence (either child abuse, partner abuse, or both). Prior research has primarily been conducted using dichotomous measures of exposure (yes; no) to predict ITFV, given the low incidence rate in community samples. It is often assumed that exposure to greater amounts of violence predicts greater risk of ITFV. However, no previous longitudinal study with a community sample has tested a dose-response model of exposure to physical child abuse and parental physical intimate partner violence (IPV) using count data of frequency and severity of violence to predict adult ITFV. The current study used advanced statistical methods to test if increased childhood exposure would predict greater risk of ITFV. Methods: The study utilized 3 panels of prospective data from a cohort of 15 year olds (N=338) from the Project on Human Development in Chicago Neighborhoods longitudinal study. The data were comprised of a stratified probability sample of seven ethnic/racial categories and three socio-economic status levels. Structural equation modeling was employed to test a hurdle regression model of dose-response to predict ITFV. A version of the Conflict Tactics Scale was used to measure physical violence victimization, witnessing parental IPV and young adult IPV perpetration and victimization. Results: Consistent with previous findings, past 12 months incidence rates severity and frequency of interpersonal violence were highly skewed. While rates of parental and young adult IPV were about 40%, an unusually high rate of physical child abuse (57%) was reported. The vast majority of a number of acts of violence, whether minor or severe, were in the 1-3 range in the past 12 months. Reported frequencies of more than 5 times in the past year were rare, with less than 10% of those reporting more than six acts of minor or severe physical violence. As expected, minor acts of violence were much more common than acts of severe violence. Overall, regression analyses were not significant for the dose-response model of ITFV. Conclusions and implications: The results of the dose-response model were not significant due to a lack of power in the final sample (N=338). Nonetheless, the value of the approach was confirmed for the future research given the bi-modal nature of the distributions which suggest that in the context of both child physical abuse and physical IPV, there are at least two classes when frequency of acts is considered. Taking frequency into account in predictive models may help to better understand the relationship of exposure to ITFV outcomes. Further testing using hurdle regression models is suggested.

Keywords: intergenerational transmission of family violence, physical child abuse, intimate partner violence, structural equation modeling

Procedia PDF Downloads 237
401 An Approach of High Scalable Production Capacity by Adaption of the Concept 'Everything as a Service'

Authors: Johannes Atug, Stefan Braunreuther, Gunther Reinhart

Abstract:

Volatile markets, as well as increasing global competition in manufacturing, lead to a high demand of flexible and agile production systems. These advanced production systems in turn conduct to high capital expenditure along with high investment risks. Developments in production regarding digitalization and cyber-physical systems result to a merger of informational- and operational technology. The approach of this paper is to benefit from this merger and present a framework of a production network with scalable production capacity and low capital expenditure by adaptation of the IT concept 'everything as a service' into the production environment.

Keywords: digital manufacturing system, everything as a service, reconfigurable production, value network

Procedia PDF Downloads 340
400 Gender Based Violence and Women’s Health

Authors: Sangita Bharati

Abstract:

Violence against women is now well recognised as a public health problem and human rights violation of worldwide significance. It is an important risk factor for women's ill health, with far reaching consequences for both their physical and mental health. Gender based violence takes many forms and results in physical, sexual and psychological harm to the women throughout their lives. Gender based violence often manifests unequal power relation between men and women in society and the secondary status of the women because of which women have to suffer a range of health problems in silence. This paper will aim at describing a few problems related to women’s health which are directly linked to their experience as victims of gender based violence.

Keywords: violence, health, women, society

Procedia PDF Downloads 474
399 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 502
398 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 418
397 Demographic Determinants of Spatial Patterns of Urban Crime

Authors: Natalia Sypion-Dutkowska

Abstract:

Abstract — The main research objective of the paper is to discover the relationship between the age groups of residents and crime in particular districts of a large city. The basic analytical tool is specific crime rates, calculated not in relation to the total population, but for age groups in a different social situation - property, housing, work, and representing different generations with different behavior patterns. They are the communities from which criminals and victims of crimes come. The analysis of literature and national police reports gives rise to hypotheses about the ability of a given age group to generate crime as a source of offenders and as a group of victims. These specific indicators are spatially differentiated, which makes it possible to detect socio-demographic determinants of spatial patterns of urban crime. A multi-feature classification of districts was also carried out, in which specific crime rates are the diagnostic features. In this way, areas with a similar structure of socio-demographic determinants of spatial patterns on urban crime were designated. The case study is the city of Szczecin in Poland. It has about 400,000 inhabitants and its area is about 300 sq km. Szczecin is located in the immediate vicinity of Germany and is the economic, academic and cultural capital of the region. It also has a seaport and an airport. Moreover, according to ESPON 2007, Szczecin is the Transnational and National Functional Urban Area. Szczecin is divided into 37 districts - auxiliary administrative units of the municipal government. The population of each of them in 2015-17 was divided into 8 age groups: babes (0-2 yrs.), children (3-11 yrs.), teens (12-17 yrs.), younger adults (18-30 yrs.), middle-age adults (31-45 yrs.), older adults (46-65 yrs.), early older (66-80) and late older (from 81 yrs.). The crimes reported in 2015-17 in each of the districts were divided into 10 groups: fights and beatings, other theft, car theft, robbery offenses, burglary into an apartment, break-in into a commercial facility, car break-in, break-in into other facilities, drug offenses, property damage. In total, 80 specific crime rates have been calculated for each of the districts. The analysis was carried out on an intra-city scale, this is a novel approach as this type of analysis is usually carried out at the national or regional level. Another innovative research approach is the use of specific crime rates in relation to age groups instead of standard crime rates. Acknowledgments: This research was funded by the National Science Centre, Poland, registration number 2019/35/D/HS4/02942.

Keywords: age groups, determinants of crime, spatial crime pattern, urban crime

Procedia PDF Downloads 168
396 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 224
395 The Role Of Data Gathering In NGOs

Authors: Hussaini Garba Mohammed

Abstract:

Background/Significance: The lack of data gathering is affecting NGOs world-wide in general to have good data information about educational and health related issues among communities in any country and around the world. For example, HIV/AIDS smoking (Tuberculosis diseases) and COVID-19 virus carriers is becoming a serious public health problem, especially among old men and women. But there is no full details data survey assessment from communities, villages, and rural area in some countries to show the percentage of victims and patients, especial with this world COVID-19 virus among the people. These data are essential to inform programming targets, strategies, and priorities in getting good information about data gathering in any society.

Keywords: reliable information, data assessment, data mining, data communication

Procedia PDF Downloads 175
394 Translingual Discrimination and Migrants

Authors: Sender Dovchin

Abstract:

Moving beyond two main frameworks of interlingual and intralingual discrimination, this paper will address the understanding of translingual discrimination. This concept refers to discrimination based on how one uses certain languages, linguistic and communicative repertoires, which are (il)legitimised by the interactants. Translingual discrimination contributes intensity to transnational migrations processes, where migrants with transitional backgrounds seem to illustrate two main characteristics of marginalizations – “name discrimination” and “accentism”. The lifelong accumulation of these characteristics of translingual discrimination may cause negative emotionality, such as translingual inferiority complexes, to its victims. As a result, these transnational migrants seem to adopt varied coping strategies such as CV-whitening and accent purifications while probing for translingual safe spaces. The presentation concludes with the socio-cultural and pedagogical implications of translingual discrimination in relation to the language usage of transnational migrants.

Keywords: accentism, discrimination, migrants, translingualism

Procedia PDF Downloads 70
393 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 50
392 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 101
391 A Lifeline Vulnerability Study of Constantine, Algeria

Authors: Mounir Ait Belkacem, Mehdi Boukri, Omar Amellal, Nacim Yousfi, Abderrahmane Kibboua, Med Naboussi Farsi, Mounir Naili

Abstract:

The North of Algeria is located in a seismic zone, then earthquakes are probably the most likely natural disaster that would lead to major lifeline disruption. The adequate operation of lifelines is vital for the economic development of regions under moderate to high seismic activity. After an earthquake, the proper operation of all vital systems is necessary, for instance hospitals for medical attention of the wounded and highways for communication and assistance for victims.In this work we apply the knowledge of pipeline vulnerability to the water supply system, sanitary sewer pipelines (waste water), and telephone in Constantine (Algeria).

Keywords: lifeline, earthquake, vulnerability, pipelines

Procedia PDF Downloads 558
390 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 56
389 Child Labour and Contemporary Slavery: A Nigerian Perspective

Authors: Obiageli Eze

Abstract:

Millions of Nigerian children are subjected daily to all forms of abuse, ranging from trafficking to slavery, and forced labor. These under age children are taken from different parts of the Country to be used as sex slaves and laborers in the big cities, killed for rituals, organ transplantation, or used for money laundering, begging on the streets or are put to work in the fields. These children are made to do inhuman jobs under degrading conditions and face all kinds of abuse at the hands of their owners with no hope of escape. While lots of people blame poverty or culture as a basis for human trafficking in Nigeria, the National Agency for the Prohibition and Trafficking in Persons and other Related Matters (NAPTIP) says other causes of the outrageous rate of human trafficking in the country are ignorance, desperation, and the promotion and commercialization of sex by the European Union (EU) as dozens of young Nigerian children and women are forced to work as prostitutes in European countries including the Netherlands, France, Italy, and Spain. In the cause of searching for greener pastures, they are coerced into work they have not chosen and subjected to perpetual life in bondage. The Universal Declaration of Human Rights 1948 prohibits slave trade and slavery. Despite the fact that Nigeria is a Sovereign member of the United Nations and signatory to this International instrument, Child trafficking and slavery is still on the increase. This may be caused by the fact that the punishment for this crime in Nigeria is a maximum term of 10 years imprisonment with some of the worst offenders getting off with as little as 2 years imprisonment or an option of fine. It goes without saying that this punishment is not sufficient to act as a deterrent to these modern slave traders. Another major factor oiling the wheel of trafficking in the country is voodoo. The victims are taken to shrines of voodoo priests for oath taking. There, underage girls and boys are made to swear that they would never reveal the identities of their traffickers to anyone if arrested whether in the course of the journey or in the destination countries and that they would pay off debt. Nigeria needs tougher Laws in order to be able to combat human trafficking and slave trade. Also there has to be aggressive sensitization and awareness programs designed to educate and enlighten the public as to the dangers faced by these victims and the need to report any suspicious activity to the authorities. This paper attempts to give an insight into the plight of under-age Nigerian children trafficked and sold as slaves and offer a more effective stand in the fight against it.

Keywords: child labor, slavery, slave trade, trafficking

Procedia PDF Downloads 497