Search results for: cyber victims
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 704

Search results for: cyber victims

344 Visual Overloaded on User-Generated Content by the Net Generation: Participatory Cultural Viewpoint

Authors: Hasanah Md. Amin

Abstract:

The existence of cyberspace and its growing contents is real and overwhelming. Visual as one of the properties of cyber contents is increasingly becoming more significant and popular among creator and user. The visual and aesthetic of the content is consistent with many similarities. Aesthetic, although universal, has slight differences across the world. Aesthetic power could impress, influence, and cause bias among the users. The content creator who knows how to manipulate this visuals and aesthetic expression can dominate the scenario and the user who is ‘expressive literate’ will gain much from the scenes. User who understands aesthetic will be rewarded with competence, confidence, and certainly, a personality enhanced experience in carrying out a task when participating in this chaotic but promising cyberworld. The aim of this article is to gain knowledge from related literature and research regarding User-Generated Content (UGC), which focuses on aesthetic expression by the Net generation. The objective of this preliminary study is to analyze the aesthetic expression linked to visual from the participatory cultural viewpoint looking for meaning, value, patterns, and characteristics.

Keywords: visual overloaded, user-generated content, net generation, visual arts

Procedia PDF Downloads 418
343 The Inclusive Human Trafficking Checklist: A Dialectical Measurement Methodology

Authors: Maria C. Almario, Pam Remer, Jeff Resse, Kathy Moran, Linda Theander Adam

Abstract:

The identification of victims of human trafficking and consequential service provision is characterized by a significant disconnection between the estimated prevalence of this issue and the number of cases identified. This poses as tremendous problem for human rights advocates as it prevents data collection, information sharing, allocation of resources and opportunities for international dialogues. The current paper introduces the Inclusive Human Trafficking Checklist (IHTC) as a measurement methodology with theoretical underpinnings derived from dialectic theory. The presence of human trafficking in a person’s life is conceptualized as a dynamic and dialectic interaction between vulnerability and exploitation. The current papers explores the operationalization of exploitation and vulnerability, evaluates the metric qualities of the instrument, evaluates whether there are differences in assessment based on the participant’s profession, level of knowledge, and training, and assesses if users of the instrument perceive it as useful. A total of 201 participants were asked to rate three vignettes predetermined by experts to qualify as a either human trafficking case or not. The participants were placed in three conditions: business as usual, utilization of the IHTC with and without training. The results revealed a statistically significant level of agreement between the expert’s diagnostic and the application of the IHTC with an improvement of 40% on identification when compared with the business as usual condition While there was an improvement in identification in the group with training, the difference was found to have a small effect size. Participants who utilized the IHTC showed an increased ability to identify elements of identity-based vulnerabilities as well as elements of fraud, which according to the results, are distinctive variables in cases of human trafficking. In terms of the perceived utility, the results revealed higher mean scores for the groups utilizing the IHTC when compared to the business as usual condition. These findings suggest that the IHTC improves appropriate identification of cases and that it is perceived as a useful instrument. The application of the IHTC as a multidisciplinary instrumentation that can be utilized in legal and human services settings is discussed as a pivotal piece of helping victims restore their sense of dignity, and advocate for legal, physical and psychological reparations. It is noteworthy that this study was conducted with a sample in the United States and later re-tested in Colombia. The implications of the instrument for treatment conceptualization and intervention in human trafficking cases are discussed as opportunities for enhancement of victim well-being, restoration engagement and activism. With the idea that what is personal is also political, we believe that the careful observation and data collection in specific cases can inform new areas of human rights activism.

Keywords: exploitation, human trafficking, measurement, vulnerability, screening

Procedia PDF Downloads 311
342 Sustainable Strategies for Post-Disaster Shelters: Case Study-Based Review and Future Prospects

Authors: Fangwen Ni, Hongpeng Xu

Abstract:

When disasters occur, it is important to provide temporary shelters to protect victims from their environment and to comfort them with privacy and dignity. However, the commonly used shelters like tents and shanties can not ensure a comfortable condition. Furthermore, the demand for more energy and less pollution has become a major challenge. Focusing on the sustainable of temporary shelters, this study intends to clarify the essential role of temporary shelters before the reconstruction work is done. The paper also identifies the main problems from three aspects including spatial layout, thermal comfort and utilization of passive technology. Moreover, it expounds the passive strategies of ecological design by case study and simulation. It is found that the living condition of shelters can be improved from the perspective of architectural space, ventilation theory and construction techniques. Regardless of being temporary, these shelters are crucial elements in emergency situations and should be taken more seriously.

Keywords: architectural space, construction technique, sustainable strategy, temporary shelter

Procedia PDF Downloads 250
341 Banks' Financial Performance in Pakistan from 2012-2015

Authors: Saima Akbar

Abstract:

The global financial crisis severely and adversely impacted the Pakistanis’ financial setups with far-reaching consequences for its victims. This study aimed to analyze the various determinants of the banks’ financial performance in Pakistan. The stepwise multiple regression analysis and pre-post analysis were carried out in this regard by using SPSS ver 22. The study found that the assets quality is the most influential determinant of return over assets followed by bank size and solvency. Advances, liquidity, investments, and size have positive while poor assets quality and deposits have a negative impact on the return over assets. The comparison of the pre-crisis and post-crisis coefficient values of the independent variables revealed that the global financial crisis had exerted a significant impact on the relative ability of the financial performance determinants to explain variations in return over assets.

Keywords: pre-crisis, post-crisis, coefficient values, determinants

Procedia PDF Downloads 253
340 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 111
339 Learning Grammars for Detection of Disaster-Related Micro Events

Authors: Josef Steinberger, Vanni Zavarella, Hristo Tanev

Abstract:

Natural disasters cause tens of thousands of victims and massive material damages. We refer to all those events caused by natural disasters, such as damage on people, infrastructure, vehicles, services and resource supply, as micro events. This paper addresses the problem of micro - event detection in online media sources. We present a natural language grammar learning algorithm and apply it to online news. The algorithm in question is based on distributional clustering and detection of word collocations. We also explore the extraction of micro-events from social media and describe a Twitter mining robot, who uses combinations of keywords to detect tweets which talk about effects of disasters.

Keywords: online news, natural language processing, machine learning, event extraction, crisis computing, disaster effects, Twitter

Procedia PDF Downloads 461
338 Breaching Treaty Obligations of the Rome Statute of the International Criminal Court: The Case of South Africa

Authors: David Abrahams

Abstract:

In October 2016 South Africa deposited its ‘instrument of withdrawal’ from the Rome Statute of the International Criminal Court, with the Secretary-General of the United Nations. The Rome Statute is the founding document of the treaty-based International Criminal Court (ICC). The ICC has jurisdiction to hear cases where crimes against humanity, war crimes and genocide have been committed, on the basis of individual criminal responsibility. It is therefore not surprising that one of the ICCs mandates is to ensure that the sufferings, due to gross human rights violations towards the civilian population is, in principle, brought to an end by punishing those individuals responsible, thus providing justice to the victims. The ICC is unable to effectively fulfill its mandate and thus depends, in part on the willingness of states to assist the Court in its functions. This requires states to ratify the Statute and to domesticate its provisions, depending on whether it is a monist or dualist state. South Africa ratified the Statute in November 2000, and domesticated the Statute in 2002 by virtue of the Implementation of the Rome Statute of the International Criminal Court Act 27 of 2002. South Africa thus remains under an obligation to cooperate with the ICC until the final date of withdrawal, which is October 2017. An AU Summit was hosted by South Africa during June 2015. Omar Al-Bashir, whom the prosecutor of the ICC has indicted on two separate occasions, was invited to the summit. South Africa made an agreement with the AU that it will honour its obligations in terms of its Diplomatic and Immunities Privileges Act of 2001, by granting immunity to all heads of state, including that of Sudan. This decision by South Africa has raised a plethora of questions regarding the status and hierarchy of international laws versus regional laws versus domestic laws. In particular, this paper explores whether a state’s international law treaty obligations may be suspended in favour of, firstly, regional peace (thus safeguarding the security of the civilian population against further atrocities and other gross violations of human rights), and secondly, head of state immunity. This paper also reflects on the effectiveness of the trias politca in South Africa in relation the manner in which South African courts have confirmed South Africa’s failure in fulfilling its obligations in terms of the Rome Statute. A secondary question which will also be explored, is whether the Rome Statute is currently an effective tool in dealing with gross violations of human rights, particularly in a regional African context, given the desire by a number of African states currently party to the Statute, to engage in a mass exodus from the Statute. Finally, the paper concludes with a proposal that there can be no justice for victims of gross human rights violations unless states are serious in playing an instrumental role in bringing an end to impunity in Africa, and that withdrawing from the ICC without an alternative, effective system in place, will simply perpetuate impunity.

Keywords: African Union, diplomatic immunity, impunity, international criminal court, South Africa

Procedia PDF Downloads 509
337 Examining Child Rape Provisions of Bangladesh in Comparison with Other South Asian Countries

Authors: Monira Nazmi Jahan

Abstract:

Child rape or child abuse is a serious and fearsome crime against children, which is an epidemic almost in every state of today’s world. However, in the case of Bangladesh, the scenario is terrifying. The objective of this paper is to examine the laws relating to child rape in Bangladesh as according to a renowned Daily Newspaper 'Prothom Alo', nearly 346 children are being raped since January 2019. This paper discusses and draws the difference of child rape provisions of Bangladesh with other South-Asian countries, comprises of India, Maldives, Pakistan, Sri Lanka, Nepal, Bhutan, and Afghanistan. In Bangladesh, girls below 18 years are considered to be a child. ‘The Penal Code, 1860’ and a special law ‘Nari O Shishu Nirjatan Daman Ain, 2012’ provides that any person committing child rape will be punished with rigorous life imprisonment and fine. This piece of law also gives provisions for punishment in case of child’s death after the commission of rape and gang rape, and the punishment is the death penalty. In India there is ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) which has separate provisions for sexual assault, penetrative sexual assault and aggravated penetrative sexual assault by different categories of person such as relatives, institutional officers and trustees and also for mentally and physically challenged child victims and provides punishment up to death penalty. In Pakistan, there is ‘Pakistan Penal Code Amended Act, 2016’ which has only two provisions for child rape. In case offence committed by one person, the punishment is 10 to 25 years of imprisonment and fine. In case of offence committed by two or more persons, each shall be liable to death or imprisonment for life. Unfortunately, Afghanistan has no laws for the protection of rape victims of women let alone children, whereas there are a lot of child rape cases, including both girls and boys who are used for sexual slavery. The Maldives has a special law named ‘Special Provisions Act to Deal with Child Sex Abuse Offenders.’ This has categorized the offenders like POSCO and has provided punishments accordingly. The punishments are: punishments range from 1 to 25 years accordingly, whereas Bangladesh has lesser provisions, but the gravity and duration of punishments are much higher. The Penal Code of Sri Lanka imposes a minimum sentence of 10 years for those convicted of raping a child under 18 years. In Bhutan, child rape provision is made according to the age of a child. ‘The Penal Code of Bhutan, 2004’, mentions provisions for the rape of a child in case of child rape below and above 12 years, gang rape of a child below and above 12 years and has graded the punishments as first, second and third degree. Though Bangladesh has better provisions for punishments, the ages are not categorized in the laws. In Nepal there is ‘Act relating to Children, 2018’ provisions are made for offenders who use or cause or engage child sexual exploitation, and the punishment is same for rape offenders according to prevailing laws in Nepal. No separate punishments for child offenders are made. The ultimate conclusion that can be drawn is Bangladesh has better punishments than all other South-Asian countries and same punishment as India however, Bangladesh can make or amend the laws and categorize offenders as like POSCO of India, Special provisions of Maldives and Bhutan.

Keywords: child rape, death penalty, sexual slavery, South Asia

Procedia PDF Downloads 92
336 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 114
335 Gender Norms and Psychological Mechanisms that Make Sexual Assault Possible

Authors: Moor Avigail

Abstract:

This research examines gender norms that underlie the propensity to commit sexual assault and to carry it out. Factors that have been shown to relate to such propensity will be enumerated and tied to their ramifications. These include sexual objectification of women, endorsement of gender-based rape myths blaming the victim, masculine entitlement, low empathy to victims, along with elevated empathy towards rapists. Heavy use of pornography as well as a misconstruing of the meaning of refusal to sex, have also been implicated. Additionally, a cutting-edge investigation, which we have just completed, examined what seems to occur in the perpetrator's mind during the assault. No research to date has ventured to uncover what essentially allows the rape to be carried out in real time, in the sense of what mental mechanisms go into operation in rapists during the assault itself. Our findings demonstrate that dehumanization and rationalization are pivotal. On the one hand, the perpetrator apparently allows himself to disregard the victim's humanity while simultaneously justifying his actions in relation to the victim's behavior.

Keywords: gender norms, gender psychology, sexual assault, gender

Procedia PDF Downloads 54
334 Confusion on the Definition of Terrorism and Difficulty in Criminalizing Terrorist Financing

Authors: Hamed Tofangsaz

Abstract:

In the absence of an internationally agreed definition of terrorism, the question which needs to be posed is whether there is a clear and common understanding of what constitutes terrorism, terrorist acts and terrorist groups, the financing of which needs to be stopped. That is, from a criminal law perspective, whether the Terrorist Financing Convention, as the backbone of the counter-terrorist financing regime, clarifies what types of conduct, by who, in what circumstances and when, against whom (targets or victims) and with what intention or motivation should be considered terrorism? It will be explained how and why it has been difficult to reach an agreement on the definition of terrorism. The endeavour of the drafters of the Terrorist Financing Convention and others involved in countering terrorist financing to establish a general definition of terrorism will be examined. The record of attempts to define the elements of terrorism proves that it is hardly possible to reach an agreement on a generic definition of terrorism because the concept of terrorism is elusive and subject to various understandings. Even the definition provided by the Terrorist Financing Convention, is not convincing. With regard to the findings, this paper calls for further research on the legal consequences of the implementation of the terrorist financing-counter measures while the scope of terrorism, terrorist acts and terrorist organizations have been left vague.

Keywords: terrorism, terrorist financing, crime, convention

Procedia PDF Downloads 554
333 Neuropsychological Aspects in Adolescents Victims of Sexual Violence with Post-Traumatic Stress Disorder

Authors: Fernanda Mary R. G. Da Silva, Adriana C. F. Mozzambani, Marcelo F. Mello

Abstract:

Introduction: Sexual assault against children and adolescents is a public health problem with serious consequences on their quality of life, especially for those who develop post-traumatic stress disorder (PTSD). The broad literature in this research area points to greater losses in verbal learning, explicit memory, speed of information processing, attention and executive functioning in PTSD. Objective: To compare the neuropsychological functions of adolescents from 14 to 17 years of age, victims of sexual violence with PTSD with those of healthy controls. Methodology: Application of a neuropsychological battery composed of the following subtests: WASI vocabulary and matrix reasoning; Digit subtests (WISC-IV); verbal auditory learning test RAVLT; Spatial Span subtest of the WMS - III scale; abbreviated version of the Wisconsin test; concentrated attention test - D2; prospective memory subtest of the NEUPSILIN scale; five-digit test - FDT and the Stroop test (Trenerry version) in adolescents with a history of sexual violence in the previous six months, referred to the Prove (Violence Care and Research Program of the Federal University of São Paulo), for further treatment. Results: The results showed a deficit in the word coding process in the RAVLT test, with impairment in A3 (p = 0.004) and A4 (p = 0.016) measures, which compromises the verbal learning process (p = 0.010) and the verbal recognition memory (p = 0.012), seeming to present a worse performance in the acquisition of verbal information that depends on the support of the attentional system. A worse performance was found in list B (p = 0.047), a lower priming effect p = 0.026, that is, lower evocation index of the initial words presented and less perseveration (p = 0.002), repeated words. Therefore, there seems to be a failure in the creation of strategies that help the mnemonic process of retention of the verbal information necessary for learning. Sustained attention was found to be impaired, with greater loss of setting in the Wisconsin test (p = 0.023), a lower rate of correct responses in stage C of the Stroop test (p = 0.023) and, consequently, a higher index of erroneous responses in C of the Stroop test (p = 0.023), besides more type II errors in the D2 test (p = 0.008). A higher incidence of total errors was observed in the reading stage of the FDT test p = 0.002, which suggests fatigue in the execution of the task. Performance is compromised in executive functions in the cognitive flexibility ability, suggesting a higher index of total errors in the alternating step of the FDT test (p = 0.009), as well as a greater number of persevering errors in the Wisconsin test (p = 0.004). Conclusion: The data from this study suggest that sexual violence and PTSD cause significant impairment in the neuropsychological functions of adolescents, evidencing risk to quality of life in stages that are fundamental for the development of learning and cognition.

Keywords: adolescents, neuropsychological functions, PTSD, sexual violence

Procedia PDF Downloads 113
332 Face Sketch Recognition in Forensic Application Using Scale Invariant Feature Transform and Multiscale Local Binary Patterns Fusion

Authors: Gargi Phadke, Mugdha Joshi, Shamal Salunkhe

Abstract:

Facial sketches are used as a crucial clue by criminal investigators for identification of suspects when the description of eyewitness or victims are only available as evidence. A forensic artist develops a sketch as per the verbal description is given by an eyewitness that shows the facial look of the culprit. In this paper, the fusion of Scale Invariant Feature Transform (SIFT) and multiscale local binary patterns (MLBP) are proposed as a feature to recognize a forensic face sketch images from a gallery of mugshot photos. This work focuses on comparative analysis of proposed scheme with existing algorithms in different challenges like illumination change and rotation condition. Experimental results show that proposed scheme can lead to better performance for the defined problem.

Keywords: SIFT feature, MLBP, PCA, face sketch

Procedia PDF Downloads 316
331 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 61
330 Mapping and Measuring the Vulnerability Level of the Belawan District Community in Encountering the Rob Flood Disaster

Authors: Dessy Pinem, Rahmadian Sembiring, Adanil Bushra

Abstract:

Medan Belawan is one of the subdistricts of 21 districts in Medan. Medan Belawan Sub-district is directly adjacent to the Malacca Strait in the North. Due to its direct border with the Malacca Strait, the problem in this sub-district, which has continued for many years, is a flood of rob. In 2015, rob floods inundated Sicanang urban village, Belawan I urban village, Belawan Bahagia urban village and Bagan Deli village. The extent of inundation in the flood of rob that occurred in September 2015 reached 540, 938 ha. Rob flood is a phenomenon where the sea water is overflowing into the mainland. Rob floods can also be interpreted as a puddle of water on the coastal land that occurs when the tidal waters. So this phenomenon will inundate parts of the coastal plain or lower place of high tide sea level. Rob flood is a daily disaster faced by the residents in the district of Medan Belawan. Rob floods can happen every month and last for a week. The flood is not only the residents' houses, the flood also soaked the main road to Belawan Port reaching 50 cm. To deal with the problems caused by the flood and to prepare coastal communities to face the character of coastal areas, it is necessary to know the vulnerability of the people who are always the victims of the rob flood. Are the people of Medan Belawan sub-district, especially in the flood-affected villages, able to cope with the consequences of the floods? To answer this question, it is necessary to assess the vulnerability of the Belawan District community in the face of the flood disaster. This research is descriptive, qualitative and quantitative. Data were collected by observation, interview and questionnaires in 4 urban villages often affected by rob flood. The vulnerabilities measured are physical, economic, social, environmental, organizational and motivational vulnerabilities. For vulnerability in the physical field, the data collected is the distance of the building, floor area ratio, drainage, and building materials. For economic vulnerability, data collected are income, employment, building ownership, and insurance ownership. For the vulnerability in the social field, the data collected is education, number of family members, children, the elderly, gender, training for disasters, and how to dispose of waste. For the vulnerability in the field of organizational data collected is the existence of organizations that advocate for the victims, their policies and laws governing the handling of tidal flooding. The motivational vulnerability is seen from the information center or question and answer about the rob flood, and the existence of an evacuation plan or path to avoid disaster or reduce the victim. The results of this study indicate that most people in Medan Belawan sub-district have a high-level vulnerability in physical, economic, social, environmental, organizational and motivational fields. They have no access to economic empowerment, no insurance, no motivation to solve problems and only hope to the government, not to have organizations that support and defend them, and have physical buildings that are easily destroyed by rob floods.

Keywords: disaster, rob flood, Medan Belawan, vulnerability

Procedia PDF Downloads 107
329 The Causes of Non-Disclosure of Intrafamilial Childhood Sexual Abuse and Its Effects

Authors: Ishtiaque Qureshi, Erum Muzaffar

Abstract:

This study aimed to analyze the causes of non-disclosure of intrafamilial childhood sexual abuse (IFCSA) among survivors studying in higher education institutions in Sindh, Pakistan. Employing a mixed-method approach, the research investigated the reasons behind non-disclosure. A quantitative survey conducted in higher education institutions identified IFCSA victims through purposive sampling, and the causes were assessed through in-depth interviews with 18 respondents. Subsequent analysis of the interview transcripts resulted in the categorization of respondents into three groups: (1) those fearing the consequences of revealing facts to their parents, (2) individuals unwilling to subject their parents to conflict with the perpetrator, and (3) those who could not disclose the abuse due to reasons not understood by them. Correlations among non-disclosing respondents were examined with respect to their socio-economic status, family structure, emotional availability of parents, and parenting style.

Keywords: intrafamilial childhood sexual abuse, non-disclosure, survivors of IFCSA, in-depth interviews

Procedia PDF Downloads 35
328 Current Status of Industry 4.0 in Material Handling Automation and In-house Logistics

Authors: Orestis Κ. Efthymiou, Stavros T. Ponis

Abstract:

In the last decade, a new industrial revolution seems to be emerging, supported -once again- by the rapid advancements of Information Technology in the areas of Machine-to-Machine (M2M) communication permitting large numbers of intelligent devices, e.g. sensors to communicate with each other and take decisions without any or minimum indirect human intervention. The advent of these technologies have triggered the emergence of a new category of hybrid (cyber-physical) manufacturing systems, combining advanced manufacturing techniques with innovative M2M applications based on the Internet of Things (IoT), under the umbrella term Industry 4.0. Even though the topic of Industry 4.0 has attracted much attention during the last few years, the attempts of providing a systematic literature review of the subject are scarce. In this paper, we present the authors’ initial study of the field with a special focus on the use and applications of Industry 4.0 principles in material handling automations and in-house logistics. Research shows that despite the vivid discussion and attractiveness of the subject, there are still many challenges and issues that have to be addressed before Industry 4.0 becomes standardized and widely applicable.

Keywords: Industry 4.0, internet of things, manufacturing systems, material handling, logistics

Procedia PDF Downloads 109
327 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network

Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad

Abstract:

Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway

Procedia PDF Downloads 454
326 Genetic Algorithms Based ACPS Safety

Authors: Emine Laarouchi, Daniela Cancila, Laurent Soulier, Hakima Chaouchi

Abstract:

Cyber-Physical Systems as drones proved their efficiency for supporting emergency applications. For these particular applications, travel time and autonomous navigation algorithms are of paramount importance, especially when missions are performed in urban environments with high obstacle density. In this context, however, safety properties are not properly addressed. Our ambition is to optimize the system safety level under autonomous navigation systems, by preserving performance of the CPS. At this aim, we introduce genetic algorithms in the autonomous navigation process of the drone to better infer its trajectory considering the possible obstacles. We first model the wished safety requirements through a cost function and then seek to optimize it though genetics algorithms (GA). The main advantage in the use of GA is to consider different parameters together, for example, the level of battery for navigation system selection. Our tests show that the GA introduction in the autonomous navigation systems minimize the risk of safety lossless. Finally, although our simulation has been tested for autonomous drones, our approach and results could be extended for other autonomous navigation systems such as autonomous cars, robots, etc.

Keywords: safety, unmanned aerial vehicles , CPS, ACPS, drones, path planning, genetic algorithms

Procedia PDF Downloads 162
325 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Rady Farag Aziz Ibrahim

Abstract:

The gap between Islamic terrorism and human rights has become an important issue in the fight against Islamic terrorism worldwide. This situation is repeated because terrorism and human rights are interconnected in such a way that when the former begins, the latter becomes subject to violence. This unknown relationship was recognized in the Vienna Declaration and Program of Action adopted at the International Conference on Human Rights held in Vienna on 25 June 1993, confirming that terrorist acts, in all their forms and manifestations, aim to destroy the rights of individuals. humanity to destroy. Therefore, Islamic terrorism is a violation of basic human rights. For this purpose, the first part of the article will focus on the relationship between terrorism and human rights and the synergy between these two concepts. The second part then explores the emerging concept of cyber threats and how they exist. Additionally, technology analysis will be conducted against threats based on human rights. This will be achieved through analysis of the concept of 'securitization' of human rights and by striking a balance between counter-terrorism measures and the protection of human rights at all costs. This article concludes with recommendations on how to balance terrorism and human rights today.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development

Procedia PDF Downloads 14
324 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks

Authors: Jameelah O. Yaqub

Abstract:

The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.

Keywords: banks, e-products, innovation, Nigeria

Procedia PDF Downloads 321
323 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 300
322 The Role of Virtual Reality in Mediating the Vulnerability of Distant Suffering: Distance, Agency, and the Hierarchies of Human Life

Authors: Z. Xu

Abstract:

Immersive virtual reality (VR) has gained momentum in humanitarian communication due to its utopian promises of co-presence, immediacy, and transcendence. These potential benefits have led the United Nations (UN) to tirelessly produce and distribute VR series to evoke global empathy and encourage policymakers, philanthropic business tycoons and citizens around the world to actually do something (i.e. give a donation). However, it is unclear whether or not VR can cultivate cosmopolitans with a sense of social responsibility towards the geographically, socially/culturally and morally mediated misfortune of faraway others. Drawing upon existing works on the mediation of distant suffering, this article constructs an analytical framework to articulate the issue. Applying this framework on a case study of five of the UN’s VR pieces, the article identifies three paradoxes that exist between cyber-utopian and cyber-dystopian narratives. In the “paradox of distance”, VR relies on the notions of “presence” and “storyliving” to implicitly link audiences spatially and temporally to distant suffering, creating global connectivity and reducing perceived distances between audiences and others; yet it also enables audiences to fully occupy the point of view of distant sufferers (creating too close/absolute proximity), which may cause them to feel naive self-righteousness or narcissism with their pleasures and desire, thereby destroying the “proper distance”. In the “paradox of agency”, VR simulates a superficially “real” encounter for visual intimacy, thereby establishing an “audiences–beneficiary” relationship in humanitarian communication; yet in this case the mediated hyperreality is not an authentic reality, and its simulation does not fill the gap between reality and the virtual world. In the “paradox of the hierarchies of human life”, VR enables an audience to experience virtually fundamental “freedom”, epitomizing an attitude of cultural relativism that informs a great deal of contemporary multiculturalism, providing vast possibilities for a more egalitarian representation of distant sufferers; yet it also takes the spectator’s personally empathic feelings as the focus of intervention, rather than structural inequality and political exclusion (an economic and political power relations of viewing). Thus, the audience can potentially remain trapped within the minefield of hegemonic humanitarianism. This study is significant in two respects. First, it advances the turn of digitalization in studies of media and morality in the polymedia milieu; it is motivated by the necessary call for a move beyond traditional technological environments to arrive at a more novel understanding of the asymmetry of power between the safety of spectators and the vulnerability of mediated sufferers. Second, it not only reminds humanitarian journalists and NGOs that they should not rely entirely on the richer news experience or powerful response-ability enabled by VR to gain a “moral bond” with distant sufferers, but also argues that when fully-fledged VR technology is developed, it can serve as a kind of alchemy and should not be underestimated merely as a “bugaboo” of an alarmist philosophical and fictional dystopia.

Keywords: audience, cosmopolitan, distant suffering, virtual reality, humanitarian communication

Procedia PDF Downloads 121
321 Idea of International Criminal Justice in the Function of Prosecution International Crimes

Authors: Vanda Božić, Željko Nikač

Abstract:

The wars and armed conflicts have often resulted in violations of international humanitarian law, and often commit the most serious international crimes such as war crimes, crimes against humanity, aggression and genocide. However, only in the XX century the rule was articulated idea of establishing a body of international criminal justice in order to prosecute these crimes and their perpetrators. The first steps in this field have been made by establishing the International military tribunals for war crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. In the end, The International Criminal Court was established in Rome in 1998 with the aim of justice and in order to give satisfaction the victims of crimes and their families. The aim of the paper was to provide a historical and comparative analysis of the institutions of international criminal justice based on which these institutions de lege lata fulfilled the goals of individual criminal responsibility and justice. Furthermore, the authors suggest de lege ferenda that the Permanent International Criminal Tribunal, in addition to the prospective case, also takes over the current ICTY and ICTR cases.

Keywords: international crimes, international criminal justice, prosecution of crimes, ad hoc tribunal, the international criminal court

Procedia PDF Downloads 252
320 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 120
319 Developing Serious Games to Improve Learning Experience of Programming: A Case Study

Authors: Shan Jiang, Xinyu Tang

Abstract:

Game-based learning is an emerging pedagogy to make the learning experience more effective, enjoyable, and fun. However, most games used in classroom settings have been overly simplistic. This paper presents a case study on a Python-based online game designed to improve the effectiveness in both teaching and research in higher education. The proposed game system not only creates a fun and enjoyable experience for students to learn various topics in programming but also improves the effectiveness of teaching in several aspects, including material presentation, helping students to recognize the importance of the subjects, and linking theoretical concepts to practice. The proposed game system also serves as an information cyber-infrastructure that automatically collects and stores data from players. The data could be useful in research areas including human-computer interaction, decision making, opinion mining, and artificial intelligence. They further provide other possibilities beyond these areas due to the customizable nature of the game.

Keywords: game-based learning, programming, research-teaching integration, Hearthstone

Procedia PDF Downloads 144
318 The Promise of Social Enterprise to Improve Health Outcomes in Trafficking Survivors: A Quantitative Case Study

Authors: Sean Roy, Mercedes Miller

Abstract:

A study was conducted to assess the positive outcomes related to Filipino human trafficking survivors working at a social enterprise. As most existing research on human survivors pertains to the adverse outcomes of victims, the researchers were seeking to fill the dearth of existing data related to positive outcomes. A quantitative study was conducted using a convenience sample of 41 participants within three staggered cohorts of the social enterprise. A Kruskal-Wallis H test was conducted and indicated that participants in the third cohort (who were employed at the social enterprise the longest) had significantly lower anxiety scores than participants in other cohorts. This study indicates that social enterprises hold the promise of positively impacting anxiety of human trafficking survivors and provides a starting point for researchers looking to assess ways to positively influence the lives of survivors.

Keywords: human trafficking, Philippines, quantitative analysis, self-identity

Procedia PDF Downloads 151
317 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 367
316 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 39
315 Nazi Propaganda and the 1930 Berlin Film Premiere of “All Quiet on the Western Front”

Authors: Edward C. Smith

Abstract:

Historical narration in literature and film is an act that necessarily develops and deforms history, whether consciously or unconsciously. Such “translation” suffers or thrives depending on its historical context and on the ability of the artist/artists to make choices that enhance or diminish social and political reality. This “translation” and its challenges is examined from within the historical and political context of the 1930 Berlin film premiere of “All Quiet on the Western Front,” a film based on Erich Maria Remarque’s 1928 best-selling novel. Both the film and the novel appeared during a period in which the “aestheticization” of reality predominated. This was an era in early 20th-century European society in which life was conceived of as innately artistic and structured like an art form. The emergence of this modern consciousness, one in which memory and history surrendered their former authority, enabled conservative propaganda of the period to denounce all art that did not adhere conceptually to its political tenets, with “All Quiet” becoming yet another of its “victims.”

Keywords: documentary and propaganda film, film and TV audiences, international literature in film studies, popular culture and film

Procedia PDF Downloads 384