Search results for: cyber crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 711

Search results for: cyber crime

321 Towards a Proof Acceptance by Overcoming Challenges in Collecting Digital Evidence

Authors: Lilian Noronha Nassif

Abstract:

Cybercrime investigation demands an appropriated evidence collection mechanism. If the investigator does not acquire digital proofs in a forensic sound, some important information can be lost, and judges can discard case evidence because the acquisition was inadequate. The correct digital forensic seizing involves preparation of professionals from fields of law, police, and computer science. This paper presents important challenges faced during evidence collection in different perspectives of places. The crime scene can be virtual or real, and technical obstacles and privacy concerns must be considered. All pointed challenges here highlight the precautions to be taken in the digital evidence collection and the suggested procedures contribute to the best practices in the digital forensics field.

Keywords: digital evidence, digital forensics process and procedures, mobile forensics, cloud forensics

Procedia PDF Downloads 381
320 Technology Impact on the Challenge between Human Rights and Cyber Terrorism

Authors: Abanoub Zare Zakaria Herzalla

Abstract:

The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 23
319 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 391
318 The Effect of Artificial Intelligence on Human Rights Obligations and Theories

Authors: Sameh Sarwat Melek Mikheal

Abstract:

The relationship between development and human rights has long been the subject of academic debate. To understand the dynamics between these two concepts, various principles are adopted, from the right to development to development-based human rights. Despite the initiatives taken, the relationship between development and human rights remains unclear. However, the overlap between these two views and the idea that efforts should be made in the field of human rights have increased in recent years. It is then evaluated whether the right to sustainable development is acceptable or not. This article concludes that the principles of sustainable development are directly or indirectly recognized in various human rights instruments, and this is a good answer to the question posed above. This book therefore cites regional and international human rights agreements such as , as well as the jurisprudence and interpretative guidelines of human rights institutions, to prove this hypothesis.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation sustainable development, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 24
317 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Shenouda Farag Aziz Ibrahim

Abstract:

The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 10
316 Digital Transformation in Production Planning and Control: Evaluation of the Organizational Readiness

Authors: Tobias Wissing, Peter Burggräf, Johannes Wagner

Abstract:

Cost pressure, competitiveness and the increasing turbulence of globalized saturated markets has been the driver for a variety of research activities in the field of production planning and control (PPC) during the past decades. For some time past an increasing awareness for innovative technologies in terms of Industry 4.0 can be noticed. Although there are many promising approaches a solely installation of those smart solutions will not maximize the PPC performance. To accelerate the successful digital transformation the cooperation between employee and technology also has to be adapted. The existing processes and organizational structures might be not sufficient to maximize the utilization of technological innovations. This paper presents the key results of an extensive study which was conducted by the Laboratory for Machine Tools and Production Engineering (WZL) of the RWTH Aachen University to evaluate the current situation and examine the organizational readiness for this digital transformation.

Keywords: cyber-physical production system, digital transformation, industry 4.0, production planning and control

Procedia PDF Downloads 325
315 Net Folklore as a Part of Kazakhstani Internet Literature

Authors: Dina Sabirova, Madina Moldagali

Abstract:

The rapid development of new media, especially the Internet, has led to major changes in folk culture. The net space is increasingly becoming a creation of the ‘folk’ imagination, saturated with multimedia stories with collective authorship, like traditional folklore. Moreover, the Internet picks up and changes old folklore traditions, such as the form of publication, the way of storytelling, or gave a new morality to the ‘old tales’. In this article, the similarities and differences between Internet folklore/ cyber-folklore/ digital folklore and oral folk art were examined by using the material of modern Kazakh authors. The relationship between tradition and innovation was studied in order to interpret the sequence of the authors' research taking into account the realities. The material of the article was the prose texts of Kazakh writers published in internet magazines and social networks. An immanent and intertextual analysis of the text was carried out. Thus, the new forms of Internet folklore lead to new forms of expression and social morality in society

Keywords: internet literature, modern Kazakhstani authors, net folklore, oral folk art

Procedia PDF Downloads 79
314 Media Coverage on Child Sexual Abuse in Developing Countries

Authors: Hayam Qayyum

Abstract:

Print and Broadcast media are considered to be the most powerful social change agents and effective medium that can revolutionize the deter society into the civilized, responsible, composed society. Beside all major roles, imperative role of media is to highlight the human rights’ violation issues in order to provide awareness and to prevent society from the social evils and injustice. So, by pointing out the odds, media can lessen the magnitude of happenings within the society. For centuries, the “Silent Crime” i.e. Child Sexual Abuse (CSA) is gulping down the developing countries. This study will explore that how the appropriate Print and Broadcast media coverage can eliminate Child Sexual Abuse from the society. The immense challenge faced by the journalists today; is the accurate and ethical reporting and appropriate coverage to disclose the facts and deliver right message on the right time to lessen the social evils in the developing countries, by not harming the prestige of the victim. In case of CSA most of the victims and their families are not in favour to expose their children to media due to family norms and respect in the society. Media should focus on in depth information of CSA and use this coverage is to draw attention of the concern authorities to look into the matter for reforms and reviews in the system. Moreover, media as a change agent can bring such issue into the knowledge of the international community to make collective efforts with the affected country to eliminate the ‘Silent Crime’ from the society. The model country selected for this research paper is South Africa. The purpose of this research is not only to examine the existing reporting patterns and content of print and broadcast media coverage of South Africa but also aims to create awareness to eliminate Child Sexual abuse and indirectly to improve the condition of stake holders to overcome this social evil. The literature review method is used to formulate this paper. Trends of media content on CSA will be identified that how much amount and nature of information made available to the public through the media General view of media coverage on child sexual abuse in developing countries like India and Pakistan will also be focused. This research will be limited to the role of print and broadcast media coverage to eliminate child sexual abuse in South Africa. In developing countries, CSA issue needs to be addressed on immediate basis. The study will explore the CSA content of the most influential broadcast and print media outlets of South Africa. Broadcast media will be comprised of TV channels and print media will be comprised of influential newspapers. South Africa is selected as a model for this research paper.

Keywords: child sexual abuse, developing countries, print and broadcast media, South Africa

Procedia PDF Downloads 557
313 Ambivilance, Denial, and Adaptive Responses to Vulnerable Suspects in Police Custody: The New Limits of the Sovereign State

Authors: Faye Cosgrove, Donna Peacock

Abstract:

This paper examines current state strategies for dealing with vulnerable people in police custody and identifies the underpinning discourses and practices which inform these strategies. It has previously been argued that the state has utilised contradictory and conflicting responses to the control of crime, by employing opposing strategies of denial and adaptation in order to simultaneously both display sovereignty and disclaim responsibility. This paper argues that these contradictory strategies are still being employed in contemporary criminal justice, although the focus and the purpose have now shifted. The focus is upon the ‘vulnerable’ suspect, whose social identity is as incongruous, complex and contradictory as his social environment, and the purpose is to redirect attention away from negative state practices, whilst simultaneously displaying a compassionate and benevolent countenance in order to appeal to the voting public. The findings presented here result from intensive qualitative research with police officers, with health care professionals, and with civilian volunteers who work within police custodial environments. The data has been gathered over a three-year period and includes observational and interview data which has been thematically analysed to expose the underpinning mechanisms from which the properties of the system emerge. What is revealed is evidence of contemporary state practices of denial relating to the harms of austerity and the structural relations of vulnerability, whilst simultaneously adapting through processes of ‘othering’ of the vulnerable, ‘responsibilisation’ of citizens, defining deviance down through diversionary practices, and managing success through redefining the aims of the system. The ‘vulnerable’ suspect is subject to individual pathologising, and yet the nature of risk is aggregated. ‘Vulnerable’ suspects are supported in police custody by private citizens, by multi-agency partnerships, and by for-profit organisations, while the state seeks to collate and control services, and thereby to retain a veneer of control. Late modern ambivalence to crime control and the associated contradictory practices of abjuration and adjustment have extended to state responses to vulnerable suspects. The support available in the custody environment operates to control and minimise operational and procedural risk, rather than for the welfare of the detained person, and in fact, the support available is discovered to be detrimental to the very people that it claims to benefit. The ‘vulnerable’ suspect is now subject to the bifurcated logics employed at the new limits of the sovereign state.

Keywords: custody, policing, sovereign state, vulnerability

Procedia PDF Downloads 143
312 Perceived Ethnic Discrimination, Aggression, and School Connectedness among Adolescents in Finland

Authors: Isik Z. Ulubas, Kaj Bjorkqvist

Abstract:

The relationships between perceived ethnic discrimination, peer aggression and school connectedness are being examined among 1,000 adolescents in Ostrobothnia, Finland with an online questionnaire. The study aims at investigating perceived ethnic discrimination in school environment by peers and teachers, and within society in general. Six types of aggressive behavior are measured: physical, verbal, indirect, and cyber aggression, in addition to both verbal and physical sexual harassment. High perceived ethnic discrimination is expected to be related with high aggression and low school connectedness. Adolescents who have special diet and clothing because of their cultural or religious background are expected to score higher on perceived ethnic discrimination and lower school connectedness. Adolescents who have lower domestic language skills (Finnish/Swedish) are expected to show lower school connectedness and higher perceived ethnic discrimination.

Keywords: adolescents, aggression, ethnic discrimination, school connectedness

Procedia PDF Downloads 205
311 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 76
310 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 205
309 Comparative Forensic Analysis of Lipsticks Using Thin Layer Chromatography and Gas Chromatography

Authors: M. O. Ezegbogu, H. B. Osadolor

Abstract:

Lipsticks constitute a significant source of transfer evidence, and can, therefore, provide corroborative or inclusionary evidence in criminal investigation. This study aimed to determine the uniqueness and persistence of different lipstick smears using Thin Layer Chromatography (TLC), and Gas Chromatography with a Flame Ionisation Detector (GC-FID). In this study, we analysed lipstick smears retrieved from tea cups exposed to the environment for up to four weeks. The n-alkane content of each sample was determined using GC-FID, while TLC was used to determine the number of bands, and retention factor of each band per smear. This study shows that TLC gives more consistent results over a 4-week period than GC-FID. It also proposes a maximum exposure time of two weeks for the analysis of lipsticks left in the open using GC-FID. Finally, we conclude that neither TLC nor GC-FID can distinguish lipstick evidence recovered from hypothetical crime scenes.

Keywords: forensic science, chromatography, identification, lipstick

Procedia PDF Downloads 166
308 Forensic Comparison of Facial Images for Human Identification

Authors: D. P. Gangwar

Abstract:

Identification of human through facial images has got great importance in forensic science. The video recordings, CCTV footage, passports, driver licenses and other related documents are invariably sent to the laboratory for comparison of the questioned photographs as well as video recordings with suspected photographs/recordings to prove the identity of a person. More than 300 questioned and 300 control photographs received in actual crime cases, received from various investigation agencies, have been compared by me so far using various familiar analysis and comparison techniques such as Holistic comparison, Morphological analysis, Photo-anthropometry and superimposition. On the basis of findings obtained during the examination huge photo exhibits, a realistic and comprehensive technique has been proposed which could be very useful for forensic.

Keywords: CCTV Images, facial features, photo-anthropometry, superimposition

Procedia PDF Downloads 508
307 Active Victim Participation in the Criminal Justice System: The Indian Scenario

Authors: Narayani Sepaha

Abstract:

In earlier days, the sufferer was burdened to prove the offence as well as to put the offender to punishment. The adversary system of legal procedure was characterized simply by two parties: the prosecution and the defence. With the onset of this system, firstly the judge started acting as a neutral arbitrator, and secondly, the state inadvertently started assuming the lead role and thereby relegated the victims to the position of oblivion. In this process, with the increasing role of police forces and the government, the victims got systematically excluded from the key stages of the case proceedings and were reduced to the stature of a prosecution witness. This paper tries to emphasise the increasing control over the various stages of the trial, by other stakeholders, leading to the marginalization of victims in the trial process. This monopolization has signalled the onset of an era of gross neglect of victims in the whole criminal justice system. This consciousness led some reformists to raise their concerns over the issue, during the early part of the 20th century. They started supporting the efforts which advocated giving prominence to the participation of victims in the trial process. This paved the way for the evolution of the science of victimology. Markedly the innovativeness to work out facts, seek opinions and statements of the victims and reassure that their voice is also heard has ensured the revival of their rightful roles in the justice delivery system. Many countries, like the US, have set an example by acknowledging the advantages of participation of victims in trials like in the proceedings of the Ariel Castro Kidnappings of Cleveland, Ohio and enacting laws for protecting their rights within the framework of the legal system to ensure speedy and righteous delivery of justice in some of the most complicated cases. An attempt has been made to flag that the accused have several rights in contrast to the near absence of separate laws for victims of crime, in India. It is sad to note that, even in the initial process of registering a crime the victims are subjected to the mercy of the officers in charge and thus begins the silent suffering of these victims, which continues throughout the process of their trial. The paper further contends, that the degree of victim participation in trials and its impact on the outcomes, can be debated and evaluated, but its potential to alter their position and make them regain their lost status cannot be ignored. Victim participation in trial proceedings will help the court in perceiving the facts of the case in a better manner and in arriving at a balanced view of the case. This will not only serve to protect the overall interest of the victims but will act to reinforce the faith in the criminal justice delivery system. It is pertinent to mention that there is an urgent need to review the accused centric prosecution system and introduce appropriate amendments so that the marginalization of victims comes to an end.

Keywords: victim participation, criminal justice, India, trial, marginalised

Procedia PDF Downloads 135
306 Visual Overloaded on User-Generated Content by the Net Generation: Participatory Cultural Viewpoint

Authors: Hasanah Md. Amin

Abstract:

The existence of cyberspace and its growing contents is real and overwhelming. Visual as one of the properties of cyber contents is increasingly becoming more significant and popular among creator and user. The visual and aesthetic of the content is consistent with many similarities. Aesthetic, although universal, has slight differences across the world. Aesthetic power could impress, influence, and cause bias among the users. The content creator who knows how to manipulate this visuals and aesthetic expression can dominate the scenario and the user who is ‘expressive literate’ will gain much from the scenes. User who understands aesthetic will be rewarded with competence, confidence, and certainly, a personality enhanced experience in carrying out a task when participating in this chaotic but promising cyberworld. The aim of this article is to gain knowledge from related literature and research regarding User-Generated Content (UGC), which focuses on aesthetic expression by the Net generation. The objective of this preliminary study is to analyze the aesthetic expression linked to visual from the participatory cultural viewpoint looking for meaning, value, patterns, and characteristics.

Keywords: visual overloaded, user-generated content, net generation, visual arts

Procedia PDF Downloads 416
305 Polish Police in the Fight against Terrorism and Cyberterrorism

Authors: Izabela Nowicka, Jacek Dworzecki

Abstract:

The paper will be presented to selected legal and organizational solutions for the prevention and combating of terrorism by the police in Poland. Development will include information on the organization and functioning of the police anti-terrorist sub-units, whose officers are on the front line of the fight against terrorism. They will be presented to the conditions and cases of use of firearms by police officers in the course of special operations aimed against organizations and terrorist groups, and the perpetrators of criminal acts of terrorism as well as the legal foundation for the Polish police to take immediate counterterrorism operations. Article will be prepared in the context of an international research project entitled. Understand the Dimensions of Organised Crime and Terrorist Networks for Developing Effective and Efficient Security Solutions for First-line-practitioners and Professionals [Project: H2020-FCT-2015, No: 700688].

Keywords: the fight against terrorism, police, Poland, takedown

Procedia PDF Downloads 313
304 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 110
303 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 113
302 Whistleblowing a Contemporary Topic Concerning Businesses

Authors: Andreas Kapardis, Maria Krambia-Kapardis, Sofia Michaelides-Mateou

Abstract:

Corruption and economic crime is a serious problem affecting the sustainability of businesses in the 21st century. Nowadays, many corruption or fraud cases come to light thanks to whistleblowers. This article will first discuss the concept of whistleblowing as well as some relevant legislation enacted around the world. Secondly, it will discuss the findings of a survey of whistleblowers or could-have-been whistleblowers. Finally, suggestions for the development of a comprehensive whistleblowing framework will be considered. Whistleblowing can be described as expressing a concern about a wrongdoing within an organization, such as a corporation, an association, an institution or a union. Such concern must be in the public interest and in good faith and should relate to the cover up of matters that could potentially result in a miscarriage of justice, a crime, criminal offence and threats to health and safety. Whistleblowing has proven to be an effective anti-corruption mechanism and a powerful tool that helps deterring fraud, violations, and malpractices within organizations, corporations and the public sector. Research in the field of whistleblowing has concentrated on the reasons for whistleblowing and financial bounties; the effectiveness of whistleblowing; whistleblowing being a prosocial behavior with a psychological perspective and consequences; as a tool in protecting shareholders, saving lives and billions of dollars of public funds. Whilst, no other study of whistleblowing has been carried out on whistleblowers or intended whistleblowers. The study reported in the current paper analyses the findings of 74 whistleblowers or intended whistleblowers, the reasons behind their decision to blow the whistle, or not to proceed to blow the whistle and any regrets they may have had. In addition a profile of a whistleblower is developed concerning their age, gender, marital and family status and position in an organization. Lessons learned from the intended whistleblowers and in response to the questions if they would be willing to blow the whistle again show that enacting legislation to protect the whistleblower is not enough. Similarly, rewarding the whistleblower does not appear to provide the whistleblower with an incentive since the majority noted that “work ethics is more important than financial rewards”. We recommend the development of a comprehensive and holistic framework for the protection of the whistleblower and to ensure that remedial actions are immediately taken once a whistleblower comes forward. The suggested framework comprises (a) hard legislation in ensuring the whistleblowers follow certain principles when blowing the whistle and, in return, are protected for a period of 5 years from being fired, dismissed, bullied, harassed; (b) soft legislation in establishing an agency to firstly ensure psychological and legal advice is provided to the whistleblowers and secondly any required remedial action is immediately taken to avert the undesirable events reported by a whistleblower from occurring and, finally; (c) mechanisms to ensure the coordination of actions taken.

Keywords: whistleblowing, business ethics, legislation, business

Procedia PDF Downloads 284
301 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 60
300 A Phenomenological Exploration of Alcohol Consumption Patterns and Problems Among Male Students at the University of Kwazulu-Natal

Authors: Isaiah Phillip Smith

Abstract:

It is reported that alcohol consumption accounts for 3 million annual deaths globally, thus, it is a significant public health challenge internationally. The excessive consumption of alcohol is argued in literature to be related to problematic behaviors like crime, accident, fighting, violence, and unprotected sex, among others. Alcohol consumption among university students in South Africa particularly is considered endemic – with a prevalence rate of 25.27%, 32.34%, and 23.34% across universities, colleges, and high schools. Adopting the tenets of social learning and ecological theories, the culture of drinking amongst male university students is critically explored. This study found that age, gender, early exposure to alcohol, and peer pressure are significant factors contributing to alcohol consumption amongst university students. While participants acknowledged that moderate and responsible consumption of alcohol is necessary, they agree that it does not translate to responsible drinking behaviours.

Keywords: alcohol, drinking, university, students

Procedia PDF Downloads 106
299 The Characteristics of a Fair and Efficient Tax Auditing Information System as a Tool against Tax Evasion: A Theoretical Framework

Authors: Dimitris Balios, Stefanos Tantos

Abstract:

Economic growth and social evolution are connected to trust relationships in a society. The quality of the accounting information, the tax information system and the tax audit mechanism evolve multiple benefits in an economy. Tax evasion, the illegal practice where people and companies do not pay taxes, is a crime because of the negative effect in economy and society. In this paper, we describe a theoretical framework on the characteristics of a fair and efficient tax auditing information system which could be a tool against tax evasion, a tool for an economy to grow, especially in countries that face fluctuations in economic activity. We conclude that a fair and efficient tax auditing information system increases the reliability of tax administration, improves taxpayers’ tax compliance and causes a developmental trajectory for the economy.

Keywords: auditing information system, auditing mechanism, tax evasion, taxation

Procedia PDF Downloads 127
298 Cognition in Context: Investigating the Impact of Persuasive Outcomes across Face-to-Face, Social Media and Virtual Reality Environments

Authors: Claire Tranter, Coral Dando

Abstract:

Gathering information from others is a fundamental goal for those concerned with investigating crime, and protecting national and international security. Persuading an individual to move from an opposing to converging viewpoint, and an understanding on the cognitive style behind this change can serve to increase understanding of traditional face-to-face interactions, as well as synthetic environments (SEs) often used for communication across varying geographical locations. SEs are growing in usage, and with this increase comes an increase in crime being undertaken online. Communication technologies can allow people to mask their real identities, supporting anonymous communication which can raise significant challenges for investigators when monitoring and managing these conversations inside SEs. To date, the psychological literature concerning how to maximise information-gain in SEs for real-world interviewing purposes is sparse, and as such this aspect of social cognition is not well understood. Here, we introduce an overview of a novel programme of PhD research which seeks to enhance understanding of cross-cultural and cross-gender communication in SEs for maximising information gain. Utilising a dyadic jury paradigm, participants interacted with a confederate who attempted to persuade them to the opposing verdict across three distinct environments: face-to-face, instant messaging, and a novel virtual reality environment utilising avatars. Participants discussed a criminal scenario, acting as a two-person (male; female) jury. Persuasion was manipulated by the confederate claiming an opposing viewpoint (guilty v. not guilty) to the naïve participants from the outset. Pre and post discussion data, and observational digital recordings (voice and video) of participant’ discussion performance was collected. Information regarding cognitive style was also collected to ascertain participants need for cognitive closure and biases towards jumping to conclusions. Findings revealed that individuals communicating via an avatar in a virtual reality environment reacted in a similar way, and thus equally persuasive, when compared to individuals communicating face-to-face. Anonymous instant messaging however created a resistance to persuasion in participants, with males showing a significant decline in persuasive outcomes compared to face to face. The findings reveal new insights particularly regarding the interplay of persuasion on gender and modality, with anonymous instant messaging enhancing resistance to persuasion attempts. This study illuminates how varying SE can support new theoretical and applied understandings of how judgments are formed and modified in response to advocacy.

Keywords: applied cognition, persuasion, social media, virtual reality

Procedia PDF Downloads 126
297 Current Status of Industry 4.0 in Material Handling Automation and In-house Logistics

Authors: Orestis Κ. Efthymiou, Stavros T. Ponis

Abstract:

In the last decade, a new industrial revolution seems to be emerging, supported -once again- by the rapid advancements of Information Technology in the areas of Machine-to-Machine (M2M) communication permitting large numbers of intelligent devices, e.g. sensors to communicate with each other and take decisions without any or minimum indirect human intervention. The advent of these technologies have triggered the emergence of a new category of hybrid (cyber-physical) manufacturing systems, combining advanced manufacturing techniques with innovative M2M applications based on the Internet of Things (IoT), under the umbrella term Industry 4.0. Even though the topic of Industry 4.0 has attracted much attention during the last few years, the attempts of providing a systematic literature review of the subject are scarce. In this paper, we present the authors’ initial study of the field with a special focus on the use and applications of Industry 4.0 principles in material handling automations and in-house logistics. Research shows that despite the vivid discussion and attractiveness of the subject, there are still many challenges and issues that have to be addressed before Industry 4.0 becomes standardized and widely applicable.

Keywords: Industry 4.0, internet of things, manufacturing systems, material handling, logistics

Procedia PDF Downloads 106
296 Practical Limitations of the Fraud Triangle Framework in Fraud Prevention

Authors: Alexander Glebovskiy

Abstract:

Practitioners charged with fraud prevention and investigation strongly rely on the Fraud Triangle framework developed by Joseph T. Wells in 1997 while analyzing the causes of fraud at business organizations. The Fraud Triangle model explains fraud by elements such as pressure, opportunity, and rationalization. This view is not fully suitable for effective fraud prevention as the Fraud Triangle model provides limited insight into the causation of fraud. Fraud is a multifaceted phenomenon, the contextual factors of which may not fit into any framework. Employee criminal behavior in business organizations is influenced by environmental, individual, and organizational aspects. Therefore, further criminogenic factors and processes facilitating fraud in organizational settings need to be considered in the root-cause analysis: organizational culture, leadership style, groupthink effect, isomorphic behavior, crime of obedience, displacement of responsibility, lack of critical thinking and unquestioning conformity and loyalty.

Keywords: criminogenesis, fraud triangle, fraud prevention, organizational culture

Procedia PDF Downloads 260
295 Genetic Algorithms Based ACPS Safety

Authors: Emine Laarouchi, Daniela Cancila, Laurent Soulier, Hakima Chaouchi

Abstract:

Cyber-Physical Systems as drones proved their efficiency for supporting emergency applications. For these particular applications, travel time and autonomous navigation algorithms are of paramount importance, especially when missions are performed in urban environments with high obstacle density. In this context, however, safety properties are not properly addressed. Our ambition is to optimize the system safety level under autonomous navigation systems, by preserving performance of the CPS. At this aim, we introduce genetic algorithms in the autonomous navigation process of the drone to better infer its trajectory considering the possible obstacles. We first model the wished safety requirements through a cost function and then seek to optimize it though genetics algorithms (GA). The main advantage in the use of GA is to consider different parameters together, for example, the level of battery for navigation system selection. Our tests show that the GA introduction in the autonomous navigation systems minimize the risk of safety lossless. Finally, although our simulation has been tested for autonomous drones, our approach and results could be extended for other autonomous navigation systems such as autonomous cars, robots, etc.

Keywords: safety, unmanned aerial vehicles , CPS, ACPS, drones, path planning, genetic algorithms

Procedia PDF Downloads 159
294 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Rady Farag Aziz Ibrahim

Abstract:

The gap between Islamic terrorism and human rights has become an important issue in the fight against Islamic terrorism worldwide. This situation is repeated because terrorism and human rights are interconnected in such a way that when the former begins, the latter becomes subject to violence. This unknown relationship was recognized in the Vienna Declaration and Program of Action adopted at the International Conference on Human Rights held in Vienna on 25 June 1993, confirming that terrorist acts, in all their forms and manifestations, aim to destroy the rights of individuals. humanity to destroy. Therefore, Islamic terrorism is a violation of basic human rights. For this purpose, the first part of the article will focus on the relationship between terrorism and human rights and the synergy between these two concepts. The second part then explores the emerging concept of cyber threats and how they exist. Additionally, technology analysis will be conducted against threats based on human rights. This will be achieved through analysis of the concept of 'securitization' of human rights and by striking a balance between counter-terrorism measures and the protection of human rights at all costs. This article concludes with recommendations on how to balance terrorism and human rights today.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development

Procedia PDF Downloads 13
293 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks

Authors: Jameelah O. Yaqub

Abstract:

The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.

Keywords: banks, e-products, innovation, Nigeria

Procedia PDF Downloads 317
292 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 300