Search results for: cyber victims
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 718

Search results for: cyber victims

298 Persistence of DNA on Clothes Contaminated by Semen Stains after Washing

Authors: Ashraf Shebl, Bassam Garah, Radah Youssef

Abstract:

Sexual assault is usually a hidden crime where the only witnesses are the victim and the assailant. For a variety of reasons, even the victim may be unable to provide a detailed account of the assault or the identity of the perpetrator. Often the case history deteriorates into one person’s word against another. With such limited initial information, the physical and biological evidence collected from the victim, from the crime scene, and from the suspect will play a pivotal role in the objective and scientific reconstruction of the events in question. The aim of work is to examine whether DNA profiles could be recovered from repeated washed clothes after contaminated by semen stains. Fresh semen about 1ml. ( <1 h old) taken from donor was deposited on four types of clothes (cotton, silk, polyester, and jeans). Then leave to dry in room temperature and washed by washing machine at temperature (30°C-60°C) and by hand washing. Some items of clothing were washed once, some twice and others three times. DNA could be extracted from some of these samples even after multiple washing. This study demonstrates that complete DNA profiles can be obtained from washed semen stains on different types of clothes, even after many repeated washing. These results indicated that clothes of the victims must be examined even if they were washed many times.

Keywords: sexual assault, DNA, persistence, clothes

Procedia PDF Downloads 189
297 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: temporal graph network, anomaly detection, cyber security, IDS

Procedia PDF Downloads 99
296 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics

Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood

Abstract:

We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.

Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka

Procedia PDF Downloads 386
295 Changes in Religious Belief after Flood Disasters

Authors: Sapora Sipon, Mohd Fo’ad Sakdan, Che Su Mustaffa, Najib Ahmad Marzuki, Mohamad Sukeri Khalid, Mohd Taib Ariffin, Husni Mohd Radzi, Salhah Abdullah

Abstract:

Flood disasters occur throughout the world including Malaysia. The major flood disaster that hit Malaysia in the 2014-2015 episodes proved the psychosocial and mental health consequences such as vivid images of destruction, upheaval, death and loss of lives. Flood, flood survivors reported that flood has changed one looks at their religious belief. The main objective of this paper is to investigate the changes in religious belief after the 2014-2015 Malaysia flood disaster. The total population of 1300 respondents who experienced the 2014-2015 Malaysia flood were surveyed a month after the disaster. The questionnaires were used to measure religiosity and stress. The results provide compelling evidence that religion played an important role in the lives of Malaysia flood disasters’ survivor where more than half of the respondents (>75%) experiencing the strengthening of their religious belief. It was also reported the victims’ strengthening of their religious belief proved to be a powerful factor in reducing stress in the aftermath of the flood.

Keywords: religious belief, flood disaster, humanity, society

Procedia PDF Downloads 402
294 Rehabilitative Walking: The Development of a Robotic Walking Training Device Using Functional Electrical Stimulation for Treating Spinal Cord Injuries and Lower-Limb Paralysis

Authors: Chung Hyun Goh, Armin Yazdanshenas, X. Neil Dong, Yong Tai Wang

Abstract:

Physical rehabilitation is a necessary step in regaining lower body function after a partial paralysis caused by a spinal cord injury or a stroke. The purpose of this paper is to present the development and optimization of a training device that accurately recreates the motions in a gait cycle with the goal of rehabilitation for individuals with incomplete spinal cord injuries or who are victims of a stroke. A functional electrical stimulator was used in conjunction with the training device to stimulate muscle groups pertaining to rehabilitative walking. The feasibility and reliability of the design are presented. To validate the design functionality, motion analyses of the knee and ankle gait paths were made using motion capture systems. Key results indicate that the robotic walking training device provides a viable mode of physical rehabilitation.

Keywords: functional electrical stimulation, rehabilitative walking, robotic walking training device, spinal cord injuries

Procedia PDF Downloads 141
293 Political Economy of Development Induced Re-Territorialization: A South African Uppercut

Authors: K. Lekshmi

Abstract:

Land becomes a predominant constituent of transitional justice paradigm subsequent to the apartheid inspired land grabs and conflict induced forceful evictions in South Africa effecting land encroachment, expropriation, and alienation. In this pretext, post-Apartheid regime initiated land reconciliation measures which presume to overcome the politically appropriated historical injustices in conjunction with reconstructing transitional justice. As land grabs became one of the quintessential repercussions followed by ethnic cleansing in South Africa, it is prominent to study how land reconciliation becomes necessary in imparting transitional justice to the victims. The study also looks into the nature of developmental pattern after re- territorialization process in a post-conflict country like South Africa and, tries to look how re-territorialization process construed the functional distribution of income vis-a-vis income inequality in particular. Further the paper attempts to study how far land distribution and equal access as part of the land reconciliation process juxtaposed the principle of restitution. Research methodology applied is empirical followed by analytical research.

Keywords: development, land reconciliation, transitional justice, income inequality and displacement, re-territorialization

Procedia PDF Downloads 199
292 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases

Authors: Suglo Tohari Luri

Abstract:

Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.

Keywords: data, engine, intelligence, customer, neo4j, database

Procedia PDF Downloads 191
291 Data Modeling and Calibration of In-Line Pultrusion and Laser Ablation Machine Processes

Authors: David F. Nettleton, Christian Wasiak, Jonas Dorissen, David Gillen, Alexandr Tretyak, Elodie Bugnicourt, Alejandro Rosales

Abstract:

In this work, preliminary results are given for the modeling and calibration of two inline processes, pultrusion, and laser ablation, using machine learning techniques. The end product of the processes is the core of a medical guidewire, manufactured to comply with a user specification of diameter and flexibility. An ensemble approach is followed which requires training several models. Two state of the art machine learning algorithms are benchmarked: Kernel Recursive Least Squares (KRLS) and Support Vector Regression (SVR). The final objective is to build a precise digital model of the pultrusion and laser ablation process in order to calibrate the resulting diameter and flexibility of a medical guidewire, which is the end product while taking into account the friction on the forming die. The result is an ensemble of models, whose output is within a strict required tolerance and which covers the required range of diameter and flexibility of the guidewire end product. The modeling and automatic calibration of complex in-line industrial processes is a key aspect of the Industry 4.0 movement for cyber-physical systems.

Keywords: calibration, data modeling, industrial processes, machine learning

Procedia PDF Downloads 285
290 Presenting a Model for Predicting the State of Being Accident-Prone of Passages According to Neural Network and Spatial Data Analysis

Authors: Hamd Rezaeifar, Hamid Reza Sahriari

Abstract:

Accidents are considered to be one of the challenges of modern life. Due to the fact that the victims of this problem and also internal transportations are getting increased day by day in Iran, studying effective factors of accidents and identifying suitable models and parameters about this issue are absolutely essential. The main purpose of this research has been studying the factors and spatial data affecting accidents of Mashhad during 2007- 2008. In this paper it has been attempted to – through matching spatial layers on each other and finally by elaborating them with the place of accident – at the first step by adding landmarks of the accident and through adding especial fields regarding the existence or non-existence of effective phenomenon on accident, existing information banks of the accidents be completed and in the next step by means of data mining tools and analyzing by neural network, the relationship between these data be evaluated and a logical model be designed for predicting accident-prone spots with minimum error. The model of this article has a very accurate prediction in low-accident spots; yet it has more errors in accident-prone regions due to lack of primary data.

Keywords: accident, data mining, neural network, GIS

Procedia PDF Downloads 43
289 Mental Health of Caregivers in Public Hospital Intensive Care Department: A Multicentric Cross-Sectional Study

Authors: Lamia Bouzgarrou, Amira Omrane, Naima Bouatay, Chaima Harrathi, Samia Machroughl, Ahmed Mhalla

Abstract:

Background and Aims: Professionals of health care sector are exposed to psychosocial constraints like stress, harassment, violence, which can lead to many mental health problems such as, depression, addictive behavior, and burn-out. Moreover, it’s well established that caregivers affected to intensive care units are more likely to experience such constraints and mental health problems. For these caregivers, the mental health state may affect care quality and patient’s safety. This study aims either to identify occupational psychosocial constraints and their mental health consequences among paramedical and medical caregivers affected to intensive units in Tunisian public hospital. Methods: An exhaustive three months cross-sectional study conducted among medical and paramedical staffs of intensive care units in three Tunisian university hospitals. After informed consent collection, we evaluated work-related stress, workplace harassment, depression, anxious troubles, addictive behavior, and self-esteems through an anonymous self-completed inquiry form. Five validated questionnaires and scales were included in this form: Karasek's Job Content Questionnaire, Negative Acts Questionnaire, Rosenberg, Beck depression inventory and Hamilton Anxiety scale. Results: We included 129 intensive unit caregivers; with a mean age of 36.1 ± 1.1 years and a sex ratio of 0.58. Among these caregivers, 30% were specialist or under-specialization doctors. The average seniority in the intensive care was 6.1 ± 1.2 (extremes=1 to 40 years). Atypical working schedules were noted among 36.7% of the subjects with an imposed choice in 52.4% of cases. During the last 12 months preceding the survey, 51.7% of care workers were absent from work because of a health problem with stops exceeding 15 days in 11.7%. Job strain was objective among 15% of caregivers and 38.33% of them were victims of moral harassment. A low or very low self-esteem was noted among 40% of respondents. Moreover, active smoking was reported by 20% subjects, alcohol consumption by 13.3% and psychotropic substance use by 1.7% of them. According to Beck inventory and Hamilton Anxiety scale, we concluded that 61.7% of intensive care providers were depressed, with 'severe' depression in 13.3% of cases and 49.9% of them present anxious disorders. Multivariate analysis objective that, job strain was correlated with young age (p=0.005) and shorter work seniority (p=0.001). Workplace and moral harassment was more prevalent among females (p=0.009), under-specialization doctor (p=0.021), those affected to atypical schedules (p=0.008). Concerning depression, it was more prevalent among staff in job strain situation (p = 0.004), among smokers caregivers (p = 0.048), and those with no leisure activity (p < 0.001). Anxious disorders were positively correlated to chronic diseases history (p = 0.001) and work-bullying exposure (p = 0.004). Conclusions: Our findings reflected a high frequency of caregivers who are under stress at work and those who are victims of moral harassment. These health professionals were at increased risk for developing psychiatric illness such depressive and anxious disorders and addictive behavior. Our results suggest the necessity of preventive strategies of occupational psychosocial constraints in order to preserve professional’s mental health and maximize patient safety and quality of care.

Keywords: health care sector, intensive care units, mental health, psychosocial constraints

Procedia PDF Downloads 151
288 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 142
287 Perception of Violence through the Drawing: A Research with Mexican University Students

Authors: Yessica Martinez Soto, Cesar E. Jimenez Yanez, Margarita Barak Velasquez, Yaralin Aceves Villanueva

Abstract:

The presence of violent behavior in society is growing rapidly, which causes people to live in an environment of constant tension due to fear of becoming victims of violent acts. It is up to social scientists to be able to carry out analyzes in this regard to identify the different ways in which violence is normalized among people. The interest of this research work focuses on investigating the perception of violence in Mexican University students through the technique of drawing. To carry out this research, we worked with 67 university students from the Autonomous University of Baja California in Mexico, who drew an image of how they understood the concept of violence. His works showed us a variety of emotions, actions, and elements that relate and link with violence. One of the methodological tools to recognize and establish the link between the knowledge of a concept between discourse and practice is through graphic representations, that is, drawings. Although the drawing gives us a personal interpretation of the reality of each artist, the repetition of elements and the representation of similar situations allowed us to identify the degrees of incidence of the different types of violence and the areas in which it manifests itself.

Keywords: college students, Mexico, social representations, violence

Procedia PDF Downloads 228
286 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 376
285 Disaster Management Using Wireless Sensor Networks

Authors: Akila Murali, Prithika Manivel

Abstract:

Disasters are defined as a serious disruption of the functioning of a community or a society, which involves widespread human, material, economic or environmental impacts. The number of people suffering food crisis as a result of natural disasters has tripled in the last thirty years. The economic losses due to natural disasters have shown an increase with a factor of eight over the past four decades, caused by the increased vulnerability of the global society, and also due to an increase in the number of weather-related disasters. Efficient disaster detection and alerting systems could reduce the loss of life and properties. In the event of a disaster, another important issue is a good search and rescue system with high levels of precision, timeliness and safety for both the victims and the rescuers. Wireless Sensor Networks technology has the capability of quick capturing, processing, and transmission of critical data in real-time with high resolution. This paper studies the capacity of sensors and a Wireless Sensor Network to collect, collate and analyze valuable and worthwhile data, in an ordered manner to help with disaster management.

Keywords: alerting systems, disaster detection, Ad Hoc network, WSN technology

Procedia PDF Downloads 401
284 Platooning Method Using Dynamic Correlation of Destination Vectors in Urban Areas

Authors: Yuya Tanigami, Naoaki Yamanaka, Satoru Okamoto

Abstract:

Economic losses due to delays in traffic congestion regarding urban transportation networks have become a more serious social problem as traffic volume increases. Platooning has recently been attracting attention from many researchers to alleviate traffic jams, especially on the highway. On highways, platooning can have positive effects, such as reducing inter-vehicular distance and reducing air resistance. However, the impacts of platooning on urban roads have not been addressed in detail since traffic lights may break the platoons. In this study, we propose a platooning method using L2 norm and cosine similarity to form a platoon with highly similar routes. Also, we investigate the sorting method within a platoon according to each vehicle’s straightness. Our proposed sorting platoon method, which uses two lanes, eliminates Head of Line Blocking at the intersection and improves throughput at intersections. This paper proposes a cyber-physical system (CPS) approach to collaborative urban platoon control. We conduct simulations using the traffic simulator SUMO and the road network, which imitates Manhattan Island. Results from the SUMO confirmed that our method shortens the average travel time by 10-20%. This paper shows the validity of forming a platoon based on destination vectors and sorting vehicles within a platoon.

Keywords: CPS, platooning, connected car, vector correlation

Procedia PDF Downloads 69
283 Problems of Drought and Its Management in Yobe State, Nigeria

Authors: Hassan Gana Abdullahi, Michael A. Fullen, David Oloke

Abstract:

Drought poses an enormous global threat to sustainable development and is expected to increase with global climate change. Drought and desertification are major problems in Yobe State (north-east Nigeria). This investigation aims to develop a workable framework and management tool for drought mitigation in Yobe State. Mixed methods were employed during the study and additional qualitative information was gathered through Focus Group Discussions (FGD). Data on socio-economic impacts of drought were thus collected via both questionnaire surveys and FGD. In all, 1,040 questionnaires were distributed to farmers in the State and 721 were completed, representing a return rate of 69.3%. Data analysis showed that 97.9% of respondents considered themselves to be drought victims, whilst 69.3% of the respondents were unemployed and had no other means of income, except through rain-fed farming. Developing a viable and holistic approach to drought mitigation is crucial, to arrest and hopefully reverse environment degradation. Analysed data will be used to develop an integrated framework for drought mitigation and management in Yobe State. This paper introduces the socio-economic and environmental effects of drought in Yobe State.

Keywords: drought, climate change, mitigation, management, Yobe State

Procedia PDF Downloads 367
282 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 260
281 User Selections on Social Network Applications

Authors: C. C. Liang

Abstract:

MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.

Keywords: consumer behavior, social media, technology acceptance model, flow experience

Procedia PDF Downloads 351
280 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.

Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes

Procedia PDF Downloads 242
279 The Social Construction of the Family among the Survivors of Sex Trafficking

Authors: Nisha James, Shubha Ranganathan

Abstract:

Sex trafficking is a traumatic ongoing process which includes human rights violations against the victims. Majority of the trafficked individuals in India are from families with low socioeconomic status, from rural areas, unmarried or married off at a very young age. Many of the sex trafficked feel that it is necessary to make sacrifices, for the benefit of their families. The combination of these cultural family values with the stigma of rape and prostitution are manipulated and used as a tool in the abuse of power against the sex trafficked. The rescue, rehabilitation and reintegration of these individuals are usually difficult due to the stigma and social exclusion that they face. In these circumstances, social support is very effective in social inclusion of these individuals. The present study was a qualitative one, using semi-structured interviews with 29 Indian survivors of sex trafficking and a few sex workers. Thematic analysis was done on the data derived from the semi-structured interviews. The major findings indicate that the family can be seen as both the ‘cause’ for being sex trafficked, and the factor in victim continuing to be sex trafficked. At the same time, it can also become a driver for getting rescued, rehabilitated and reintegrated. The study also explores the social construction about ‘family’ among the survivors of sex trafficking, reflecting on who they refer to as ‘family’, what they mean by the term ‘family’ and how these families emerge. Therefore the analytic concept of ‘family’ is a crucial element in sex trafficking and cannot be defined only in terms of its conventional definition of a basic unit of society.

Keywords: sex-trafficking, survivor, family, social construction

Procedia PDF Downloads 589
278 The Causes and Consequences of Anti-muslim Prejudice: Evidence from a National Scale Longitudinal Study in New Zealand

Authors: Aarif Rasheed, Joseph Bulbulia

Abstract:

Western democracies exhibit signs of distinctive anti-Muslim prejudice, but little is known about its causes and effects on Muslim minorities. Here, drawing on nine years of responses from a nationally representative longitudinal sample of New Zealanders (New Zealand Attitudes and Values Study, N > 31,000), we systematically investigate the demographic and ideological predictors of factors that predict both positive and negative change in Muslim attitudes. First, we find that that education, moderate and liberal political ideology, and positive views about religion predict greater Muslim acceptance. Second, we find a there though there is a general trend for increasing acceptance over nine years, we find evidence of increasing extremism at the margins. Third, focusing on the Muslim sub-sample and comparing it to other religious sub-groups, we find substantially higher reports of perceived anti-religious prejudice. Collectively, these results point to serious challenges to the health of New Zealand as a democracy where people can worship freely without discrimination. Finally, we find consistency in our responses with the reported experiences of victims of the Christchurch attacks, in terms of harassment, assault, slurs, and other hostile behaviour both before and after the attacks.

Keywords: democracy, longitudinal, Muslim, panel data, prejudice

Procedia PDF Downloads 139
277 Second Order Journalism: A Study of Selected Niche Authorities on Facebook and Twitter

Authors: Yvonne Dedzo

Abstract:

Social media has become a powerful tool in bridging the distance between individuals regardless of their location. It has become a convenient platform for public discussion and, consequently, generated the phenomenon of citizen journalists who have become both proactive and reactive participants in the dissemination of news, information and other epochal and historical events. This phenomenon has fueled the growth of niche authorities who deliver exceptional democratically consequential information online. This study, therefore, investigates how some selected niche authorities maintain their status on social media. Using the selective processes theory, the study further interrogates the information shared by niche authorities and further analyses the extent to which a public interest-altruistic motive or personal interest-self-serving motive drives their agenda of new sharing and usage. Through cyber-ethnography and, qualitative content analysis and semi-structured interviews, data was gathered and analysed from the posts of two purposely selected niche authorities on Facebook and Twitter. The findings indicate that niche authorities maintain their status by being consistent, prompt, informative, resourceful and interactive in their postings on the social media platform. The study also discovered that even though niche authorities are motivated by both public interest-altruism and interest-self-serving, the latter had a higher of motivation than the former.

Keywords: social medida, citizen journalist, niche authorities, selective processes theory

Procedia PDF Downloads 57
276 Behavior Analysis Based on Nine Degrees of Freedom Sensor for Emergency Rescue Evacuation Support System

Authors: Maeng-Hwan Hyun, Dae-Man Do, Young-Bok Choi

Abstract:

Around the world, there are frequent incidents of natural disasters, such as earthquakes, tsunamis, floods, and snowstorms, as well as man made disasters such as fires, arsons, and acts of terror. These diverse and unpredictable adversities have resulted in a number of fatalities and injuries. If disaster occurrence can be assessed quickly and information such as the exact location of the disaster and evacuation routes can be provided, victims can promptly move to safe locations, minimizing losses. This paper proposes a behavior analysis method based on a nine degrees-of-freedom (9-DOF) sensor that is effective for the emergency rescue evacuation support system (ERESS), which is being researched with an objective of providing evacuation support during disasters. Based on experiments performed using the acceleration sensor and the gyroscope sensor in the 9-DOF sensor, data are analyzed for human behavior regarding stationary position, walking, running, and during emergency situation to suggest guidelines for system judgment. Using the results of the experiments performed to determine disaster occurrence, it was confirmed that the proposed method quickly determines whether a disaster has occurred.

Keywords: behavior analysis, nine degrees of freedom sensor, emergency rescue, disaster

Procedia PDF Downloads 298
275 The Applicability of Western Environmental Criminology Theories to the Arabic Context

Authors: Nawaf Alotaibi, Andy Evans, Alison Heppenstall, Nick Malleson

Abstract:

Throughout the last two decades, motor vehicle theft (MVT) has accounted for the largest proportion of property crime incidents in Saudi Arabia (SA). However, to date, few studies have investigated SA’s MVT problem. Those that have are primarily focused on the characteristics of car thieves, and most have overlooked any spatial-temporal distribution of MVT incidents and the characteristics of victims. This paper represents the first step in understanding this problem by reviewing the existing MVT studies contextualised within the theoretical frameworks developed in environmental criminology theories – originating in the West – and exploring to what extent they are relevant to the SA context. To achieve this, the paper has identified a range of key features in SA that are different from typical Western contexts, that could limit the appropriateness and capability of applying existing environmental criminology theories. Furthermore, despite these Western studies reviewed so far having introduced a number of explanatory variables for MVT rates, a range of significant elements are apparently absent in the current literature and this requires further analysis. For example, almost no attempts have been made to quantify the associations between the locations of vehicle theft, recovery of stolen vehicles, joyriding and traffic volume.

Keywords: environmental criminology theories, motor vehicle theft, Saudi Arabia, spatial analysis

Procedia PDF Downloads 294
274 The Role of the Defense and Future War in Ukraine

Authors: Matthew J. Flynn

Abstract:

In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus.

Keywords: cyber, domains, future war, Putin, Ukraine

Procedia PDF Downloads 108
273 Carbon Monoxide Poisoning in Children

Authors: Atitallah Sofien, Bouyahia Olfa, Hadj Salah Ibrahim, Ben Saleh Foued, Missaoui Nada, Ben Rabeh Rania, Yahyaoui Salem, Mazigh Sonia, Boukthir Samir

Abstract:

Introduction: Carbon monoxide (CO) poisoning is a common pathology responsible for high morbidity and mortality worldwide. Aim: The purpose of this study was to determine the epidemiological profile of CO poisoning as well as its clinical, paraclinical, therapeutic, and evolutionary aspects. Methods: Our study included observations of CO poisoning in children hospitalized in the pediatric department C of the Children's Hospital in Tunis over a period of 3 years. Results: We have collected 199 cases of CO poisoning in children. The average age was 5.43 years, with a sex ratio of 0.98. The source of CO was inside the home in 73.2% of cases, and it was the gas bath heater in 68.8% of cases. The intoxication was collective in 93.5% of the cases, and it occurred during the month of January in 35.8% of the cases. The clinical manifestations were headaches in 69.5% of cases. The rate of carboxyhemoglobin was pathological in 73.9% of cases. All patients received normobaric oxygen therapy, and only 3.6% of patients had a hyperbaric oxygen therapy session. We did not deplore any case of death in our study. Conclusion: CO poisoning remains a public health problem in Tunisia with high morbidity. The risk of secondary complications, particularly neuropsychiatric, requires clinical and possibly neuroradiological monitoring of these victims.

Keywords: poisoning, carbon monoxide, children, hyperbaric oxygenation

Procedia PDF Downloads 58
272 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 143
271 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 260
270 Risk Indicators of Massive Removal Phenomena According to the Mora - Vahrson Method, Applied in Pitalito and Campoalegre Municipalities

Authors: Laura Fernanda Pedreros Araque, Sebastian Rivera Pardo

Abstract:

The massive removal phenomena have been one of the most frequent natural disasters in the world, causing thousands of deaths, victims, damage to homes and diseases. In Pitalito, and Campoalegre department of Huila municipalities - Colombia, disasters have occurred due to various events such as high rainfall, earthquakes; it has caused landslides, floods, among others, affected the economy, the community, and transportation. For this reason, a study was carried out on the area’s most prone to suffer these phenomena to take preventive measures in favor of the protection of the population, the resources of management, and the planning of civil works. For the proposed object, the Mora-Varshon method was used, which allows classifying the degree of susceptibility to landslides in which the areas are found. Also, various factors or parameters were evaluated such as the soil moisture, lithology, slope, seismicity, and rain, each of these indicators were obtained using information from IDEAM, Servicio Geologico Colombiano (SGC) and using geographic information for geoprocessing in the Arcgis software to realize a mapping to indicate the susceptibility to landslides, classifying the areas of the municipalities such as very low, low, medium, moderate, high or very high.

Keywords: geographic information system, landslide, mass removal phenomena, Mora-Varshon method

Procedia PDF Downloads 137
269 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 400