Search results for: cyber resilience
1174 Cyber-Bullying Beyond Parental Control in High Schools
Authors: Eke Chidi Idi
Abstract:
School violence is a global phenomenon that affects one of the core institutions of modern society to some degree across many countries, and on a global scale. Within this context, this study explores the impact of parental control on perpetrators of cyber bullying as a form of school-based violence in high schools in uMgungundlovu district of KwaZulu-Natal province in South Africa. Insights for this study were drawn from 18 in-depth interviews and two (2) focus group forums. The key themes that emerged from the findings include: (1) Parents are ignorant of their children involvement in cyber-crimes (2) Parents cannot adequately monitor what their children do on their cell phones (3) Female learners are the most affected as victims of cyber-crime.Keywords: school, violence, parental control, cyber bullying
Procedia PDF Downloads 1531173 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems
Authors: Gaurav Kumar Sinha
Abstract:
The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity
Procedia PDF Downloads 481172 Making Sense of Cyber Pornography among Young Adult Couples
Authors: Marianne Lumacang, Jessarine Dultra, Joana Fenol
Abstract:
Filipinos are known to be conservative, sex or pornography is not discussed openly in the Philippines, topic of sex, when raised, will most likely elicit snickers, jokes, and blushes in most Filipino or expressions of disgust. However, a lot of Filipinos are still engaging into this kind of activity for some reasons. The study aims to determine young adult’s point of view about cyber pornography viewing, as well as their reasons for engagement, and its effects on them and their relationship with their partner. Interpretative Phenomenological Analysis was used to explore how young adults make sense of cyber pornography viewing. The study focused on Filipino young adults who are in a romantic or married relationship, engage in cyber pornography viewing, and currently residing in Cavite, Philippines. A total of four young adult couples, four females and four males participated in the study as research participants. Data gathered from a total of four young adult couples resulted to a total of nine superordinate themes focusing on (1) exploring young adult couple’s rationales for cyber pornography viewing, (2) experiences of positive effects in engaging to cyber pornography viewing, (3) experiences of negative effects in engaging to cyber pornography viewing, (4) experience of infidelity, (5) experience of necessity, (6) females perception about cyber pornography viewing towards self, (7) males perception about cyber pornography viewing towards self, (8) males perception about cyber pornography viewing towards romantic partner, and (9) males perception about cyber pornography viewing towards others.Keywords: cyberpornography, Filipino, interpretative phenomenological analysis, making sense of cyberpornography, young adult
Procedia PDF Downloads 3141171 Supply Chain Resilience Triangle: The Study and Development of a Framework
Authors: M. Bevilacqua, F. E. Ciarapica, G. Marcucci
Abstract:
Supply Chain Resilience has been broadly studied during the last decade, focusing the research on many aspects of Supply Chain performance. Consequently, different definitions of Supply Chain Resilience have been developed by the research community, drawing inspiration also from other fields of study such as ecology, sociology, psychology, economy et al. This way, the definitions so far developed in the extant literature are therefore very heterogeneous, and many authors have pointed out a lack of consensus in this field of analysis. The aim of this research is to find common points between these definitions, through the development of a framework of study: the Resilience Triangle. The Resilience Triangle is a tool developed in the field of civil engineering, with the objective of modeling the loss of resilience of a given structure during and after the occurrence of a disruption such as an earthquake. The Resilience Triangle is a simple yet powerful tool: in our opinion, it can summarize all the features that authors have captured in the Supply Chain Resilience definitions over the years. This research intends to recapitulate within this framework all these heterogeneities in Supply Chain Resilience research. After collecting a various number of Supply Chain Resilience definitions present in the extant literature, the methodology approach provides a taxonomy step with the scope of collecting and analyzing all the data gathered. The next step provides the comparison of the data obtained with the plotting of a disruption profile, in order to contextualize the Resilience Triangle in the Supply Chain context. The tool and the results developed in this research will allow to lay the foundation for future Supply Chain Resilience modeling and measurement work.Keywords: supply chain resilience, resilience definition, supply chain resilience triangle
Procedia PDF Downloads 3181170 Making Sense of Adversity Triggers Using Organisational Resilience, a Systematic Literature Review
Authors: Luke McGowan, David Pickernell, Martini Battisti
Abstract:
In this paper, Adversity Triggers were explored through the lens of Organisational Resilience. Adversity Triggers are contextualized by temporal factors, thus, naturally aligning to Resilience literature. Resilience has been chosen as the theoretical framework as risk management approaches are often not geared towards providing meaningful responses to high-impact, low-probability events. Adversity Triggers and Organisational Resilience both consider temporal factors which enabled investigation of each phase of recovery. A systematic literature was employed to assess previous literature and define further areas of research. The systematic literature review method was chosen to catalogue and identify gaps in current literature.Keywords: adversity triggers, crisis, extreme events, organisational resilience, resilience
Procedia PDF Downloads 1471169 Holding the Stick from the Middle: The European Union's Attempt to Balance Between Its Inward and Outward Building Resilience Approach in Response to the Syrian Refugee Crisis
Authors: Lina Aleassa
Abstract:
When the EU launched the European Union Global strategy in 2016, state and societal resilience to the EU's East and South was a main priority, and it was a ‘Governing Principle’ when responding to crises, including its migration crisis of 2015. Yet, with the launching of the EU strategic compass in 2022, after the return of high-intensity war, namely the Ukrainian war, the emphasis became on the EU’s own resilience. Consequently, this can be interpreted as a shift from outward building resilience into inward-building resilience. However, this paper argues that the EU effort is not a shift but rather an attempt to balance between building the EU's own resilience and its neighbors’ resilience. Thus, the main question of this paper is about the EU’s balance between building its own resilience and building the resilience of its neighbors in the case of Jordan in response to crises. To answer this question, this article attempts an in-depth analysis considering the case of displacement from Syria and the Ukrainian war focuses on the EU’s approach to building its own resilience and building resilience in its neighborhood through the EU’s refugee cooperation with Jordan, one of the key regional hosts of Syrian refugees. Textual analysis of secondary data of various texts from official European and Jordanian websites, news reports, and scholarly literature on resilience, as well as document analysis of different EU and the EU-Jordan policies, including their bilateral and multilateral agreements, will be examined to trace the EU's effort to maintain a balance between building its own resilience in its neighbor’s resilience.Keywords: inward approach, outward approach, resilience, Syrian refugee crisis
Procedia PDF Downloads 21168 Women's Cyber Intimate Partner Violence Victimization
Authors: Mylène Fernet, Geneviève Brodeur, Martine Hébert
Abstract:
Background: The growth of information and communication technologies has led to an increase in the prevalence of cyber intimate partner violence among women in early adulthood. However, there is a lack of research addressing the intervention needs of women who have been victims of cyber intimate partner violence. This qualitative study aimed to identify the knowledge, resources, and tools that women require to better respond to such violence. Methodology: Semi-structured individual interviews and four online discussion groups were conducted with 28 Canadian women aged 18 to 29 who had experienced cyber intimate partner violence by a romantic or intimate partner or an ex-partner. The data were analyzed using thematic analysis. Findings: The key elements identified suggest that women need information to help them recognize the signs and varied forms of cyber intimate partner violence, particularly those that are more nuanced and harder to detect. Furthermore, participants emphasized the importance of having access to both online and offline support to aid in their recovery from cyber intimate partner violence. Additionally, the women's narratives also highlighted their need for resources on how to protect themselves from cyber intimate partner violence. Conclusion: Based on the findings from this study, it is essential to develop prevention and intervention strategies for cyber intimate partner violence that address these knowledge gaps, provide support options, and offer prevention tools tailored to adult women.Keywords: women, cyberviolence, intimate partner violence, prevention strategies
Procedia PDF Downloads 231167 Perceived Seriousness of Cybercrime Types: A Comparison across Gender
Authors: Suleman Ibrahim
Abstract:
Purpose: The research is seeking people's perceptions on cybercrime issues, rather than their knowledge of the facts. Unlike the Tripartite Cybercrime Framework (TCF), the binary models are ill-equipped to differentiate between cyber fraud (a socioeconomic crime) and cyber bullying or cyber stalking (psychosocial cybercrimes). Whilst the binary categories suggested that digital crimes are dichotomized: (i.e. cyber-enabled and cyber-dependent), the TCF, recently proposed, argued that cybercrimes can be conceptualized into three groups: socioeconomic, psychosocial and geopolitical. Concomitantly, as regards to the experience/perceptions of cybercrime, the TCF’s claim requires substantiation beyond its theoretical realm. Approach/Methodology: This scholar endeavor framed with the TCF, deploys a survey method to explore the experience of cybercrime across gender. Drawing from over 400 participants in the UK, this study aimed to contrast the differential perceptions/experiences of socioeconomic cybercrime (e.g. cyber fraud) and psychological cybercrime (e.g. cyber bullying and cyber stalking) across gender. Findings: The results revealed that cyber stalking was rated as least serious of the different digital crime categories. Further revealed that female participants judged all types of cybercrimes as more serious than male participants, with the exception of socioeconomic cybercrime – cyber fraud. This distinction helps to emphasize that gender cultures and nuances not only apply both online and offline, it emphasized the utilitarian value of the TCF. Originality: Unlike existing data, this study has contrasted the differential perceptions and experience of socioeconomic and psychosocial cybercrimes with more refined variables.Keywords: gender variations, psychosocial cybercrime, socioeconomic cybercrime, tripartite cybercrime framework
Procedia PDF Downloads 3901166 The Relationship between Resource Sharing and Economic Resilience: An Empirical Analysis of Firms’ Resilience from the Perspective of Resource Dependence Theory
Authors: Alfredo R. Roa-Henriquez
Abstract:
This paper is about organizational-level resilience and decision-making in the face of natural hazards. Research on resilience emerged to explain systems’ ability to absorb and recover in the midst of adversity and uncertainty from natural disasters, crises, and other disruptive events. While interest in resilience has accelerated, research multiplied, and the number of policies and implementations of resilience to natural hazards has increased over the last several years, mainly at the level of communities and regions, there has been a dearth of empirical work on resilience at the level of the firm. This paper uses empirical data and a sample selection model to test some hypotheses related to the firm’s dependence on critical resources, the sharing of resources and its economic resilience. The objective is to understand how the sharing of resources among organizations is related to economic resilience. Empirical results that are obtained from a sample of firms affected by Superstorm Sandy and Hurricane Harvey indicate that there is unobserved heterogeneity that explains the strategic behavior of firms in the post-disaster and that those firms that are more likely to resource share are also the ones that exhibit higher economic resilience. The impact of property damage on the sharing of resources and economic resilience is explored.Keywords: economic resilience, resource sharing, critical resources, strategic management
Procedia PDF Downloads 1581165 Nursing Workers’ Capacity of Resilience at a Psychiatric Hospital in Brazil
Authors: Cheila Cristina Leonardo Oliveira Gaioli, Fernanda Ludmilla Rossi Rocha, Sandra Cristina Pillon
Abstract:
Resilience is a psychological process that facilitates the maintenance of health, developed in response to numerous existing stressors in daily life. Furthermore, resilience can be described as the ability which allows an individual or group to hold up well before unfavorable situations. This study aimed to identify nursing workers’ resilience at a psychiatric hospital in Brazil. This is an exploratory research with quantitative data approach. The sample consisted of 56 workers, using the Resilience Scale. Of the 56 subjects, 45 (80.4%) were women; 22 (39.2%) were 20- to 40-years-old and 30 (53.6%) were 41- to 60-years-old; 11 (19.6%) were nurses and 45 (80.4%) were technicians or nursing assistants. The results also showed that 50% of subjects showed a high resilience degree and 42.9% an average resilience degree. Thus, it was found that workers seek to develop protective factors in coping with a work environment that does not value the individual subjectivity and does not allow professional development, discouraging workers.Keywords: health promotion, nursing, occupational health, resilience
Procedia PDF Downloads 5221164 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 201163 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures
Authors: Mastoor Qubra
Abstract:
Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation
Procedia PDF Downloads 2691162 A Socio-Technical Approach to Cyber-Risk Assessment
Authors: Kitty Kioskli, Nineta Polemi
Abstract:
Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005
Procedia PDF Downloads 1671161 Resilience in Children: A Comparative Analysis between Children with and without Parental Supervision Bandar Abbas
Authors: N. Taghinejad, F. Dortaj, N. Khodabandeh
Abstract:
This research aimed at comparing resilience among male and female children with and without parental supervision in Bandar Abbas. The sample consists of 200 subjects selected through cluster sampling. The research method was comparative causal and Conner and Davidson’s questionnaire form resilience was used for data collection. Results indicated that there is no difference between children with and without parental supervision regarding their resilience capacity. These findings may be challenging and useful for psychologists, officials of children’s affairs and legislators.Keywords: resilience, children , children with parental supervision, children without parental supervision
Procedia PDF Downloads 4561160 The Mediating Effect of Resilience on the Relationship between Cultural Identity and Self-Concordance among Tibetan, Han and Hui Students
Authors: Chunhua Ma
Abstract:
Background: There is a relationship between cultural identity and psychological health. Resilience is an important factor of psychological health, and cultural identity will protect the resilience. The research showed that the cultural identity, resilience, and self-concordance of students from different cultures. It should be a theoretical basis to improve mental health of different nationalities students. And the role of resilience factors for adults’ cultural identity and self-concordance was deserve studied. Aims: The current study aimed to examine the relationship between cultural identity and self-concordance among Chinese academician from 3 minorities, postulating mediating by resilience. Methods: This study used cross-sectional and correlational design. Participants were 328 Chinese aged between 18 and 25 years. Data was collected via self-reports including both closed and opened questions. Results: Linear regression analysis controlling for age, gender, the result showed that: (a) Cultural identity was related to self-concordance, resilience was related to self-concordance and cultural identity was related to resilience, (b) Resilience mediated the link between cultural identity and self-concordance, respectively. Discussion: Our findings suggested that resilience and cultural identity are important factors in self-concordance. If minority college students realized the heterogeneous culture, it would alleviate their psychological conflict, stimulate their strength potential and improve their self-concordance.Keywords: cultural identity, resilience, self-concordance, mediating effect
Procedia PDF Downloads 4141159 Organizational Learning Strategies for Building Organizational Resilience
Authors: Stephanie K. Douglas, Gordon R. Haley
Abstract:
Organizations face increasing disruptions, changes, and uncertainties through the rapid shifts in the economy and business environment. A capacity for resilience is necessary for organizations to survive and thrive in such adverse conditions. Learning is an essential component of an organization's capability for building resilience. Strategic human resource management is a principal component of learning and organizational resilience. To achieve organizational resilience, human resource management strategies must support individual knowledge, skills, and ability development through organizational learning. This study aimed to contribute to the comprehensive knowledge of the relationship between strategic human resource management and organizational learning to build organizational resilience. The organizational learning dimensions of knowledge acquisition, knowledge distribution, knowledge interpretation, and organizational memory can be fostered through human resource management strategies and then aggregated to the organizational level to build resilience.Keywords: human resource development, human resource management, organizational learning, organizational resilience
Procedia PDF Downloads 1381158 Effects and Coping Strategies of Cyber Bullying in Pakistan: A Gender Response
Authors: Rabia Qusien
Abstract:
New media has emerged as a significant force in the society which connects people across the globe. Where new media brought many advantages for its users, there is a darker aspect of new technology in the form of cyberbullying. Researcher has employed survey method to reach to its targeted audience. Sample of 604 respondents was selected from one of metropolitan city of Pakistan Lahore to collect the data. Equal sample from both genders was selected to apply gender analysis. Results of this study indicate that cyber bullying is having significant psychological and educational effects. Females face more cyber bullying incidents as compared to males so they face more severe effects of cyber bullying. A comprehensive analysis of managing strategies depicts that mostly youth tries to handle this issue personally but at times they seek the support of their family and friends when they face severe issues. Due to privacy concerns females get more upset and they are more likely to seek social support from friends and family.Keywords: cyber bullying, cyber victims, educational impacts, psychological impacts
Procedia PDF Downloads 1481157 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks
Authors: Emhemed Shaklawoon, Ibrahim Althomali
Abstract:
We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.Keywords: cloud computing, privacy, cyber attacks, defend the cloud
Procedia PDF Downloads 4231156 Perceived Social Support, Resilience and Relapse Risk in Recovered Addicts
Authors: Islah Ud Din, Amna Bibi
Abstract:
The current study was carried out to examine the perceived social support, resilience and relapse risk in recovered addicts. A purposive sampling technique was used to collect data from recovered addicts. A multidimensional scale of perceived social support by was used to measure the perceived social support. The brief Resilience Scale (BRS) was used to assess resilience. The Stimulant Relapse Risk Scale (SRRS) was used to examine the relapse risk. Resilience and Perceived social support have substantial positive correlations, whereas relapse risk and perceived social support have significant negative associations. Relapse risk and resilience have a strong inverse connection. Regression analysis was used to check the mediating effect of resilience between perceived social support and relapse risk. The findings revealed that perceived social support negatively predicted relapse risk. Results showed that Resilience plays a role as partial mediation between perceived social support and relapse risk. This Research will allow us to explore and understand the relapse risk factor and the role of perceived social support and resilience in recovered addicts. The study's findings have immediate consequences in the prevention of relapse. The study will play a significant part in drug rehabilitation centers, clinical settings and further research.Keywords: perceived social support, resilience, relapse risk, recovered addicts, drugs addiction
Procedia PDF Downloads 371155 Community Resilience to Violent Extremism: A Case Study of Swat in the Wake of Operation Rah-E-Raast
Authors: Khushboo Ejaz
Abstract:
Community Resilience to Violent Extremism gain importance in the post 9/11 scenario. Resilience is a word that came from the engineering domain. Prior to 9/11, this word community resilience has been used in disasters and natural hazards. The literature on Community Resilience has been published in different multiethnic and multi-religious communities. There is less data and research done on Pakistan’s Community resilience experience. This research is a case study; how local community showed resilience against violent extremism of Tehrik-e-Taliban Swat in the wake of Operation Rah-e- Raast. Qualitative research based on interviews and focus group discussions from male and female groups of different Tehsils of Swat has been carried out to highlight the Community Resilience to Violent Extremism of Tehrik- e- Taliban and Tehrik- e- Nifaz- e -Shariat- e-Muhamadi (TNSM) .NVivo software has been used for data analysis and highlighting all factors of Community Resilience to Violent extremism (CRVE) in Swat . Recommendations has been made in the end to suggest Civil Society Organizations, NGOs and government departments in order to facilitate and enhance community resilience of tribal and rural areas affected by violent elements in Pakistan. This study will fill the gap in literature related to CRVE policies in Pakistani context.Keywords: community resilience, operation Rah -e Raast, counter extremism, swat, Pakistan
Procedia PDF Downloads 1421154 Navigating Cyber Attacks with Quantum Computing: Leveraging Vulnerabilities and Forensics for Advanced Penetration Testing in Cybersecurity
Authors: Sayor Ajfar Aaron, Ashif Newaz, Sajjat Hossain Abir, Mushfiqur Rahman
Abstract:
This paper examines the transformative potential of quantum computing in the field of cybersecurity, with a focus on advanced penetration testing and forensics. It explores how quantum technologies can be leveraged to identify and exploit vulnerabilities more efficiently than traditional methods and how they can enhance the forensic analysis of cyber-attacks. Through theoretical analysis and practical simulations, this study highlights the enhanced capabilities of quantum algorithms in detecting and responding to sophisticated cyber threats, providing a pathway for developing more resilient cybersecurity infrastructures.Keywords: cybersecurity, cyber forensics, penetration testing, quantum computing
Procedia PDF Downloads 721153 A Resilience Process Model of Natural Gas Pipeline Systems
Authors: Zhaoming Yang, Qi Xiang, Qian He, Michael Havbro Faber, Enrico Zio, Huai Su, Jinjun Zhang
Abstract:
Resilience is one of the key factors for system safety assessment and optimization, and resilience studies of natural gas pipeline systems (NGPS), especially in terms of process descriptions, are still being explored. Based on the three main stages, which are function loss process, recovery process, and waiting process, the paper has built functions and models which are according to the practical characteristics of NGPS and mainly analyzes the characteristics of deterministic interruptions. The resilience of NGPS also considers the threshold of the system function or users' satisfaction. The outcomes, which quantify the resilience of NGPS in different evaluation views, can be combined with the max flow and shortest path methods, help with the optimization of extra gas supplies and gas routes as well as pipeline maintenance strategies, the quick analysis of disturbance effects and the improvement of NGPS resilience evaluation accuracy.Keywords: natural gas pipeline system, resilience, process modeling, deterministic disturbance
Procedia PDF Downloads 1291152 Using Social Network Analysis for Cyber Threat Intelligence
Authors: Vasileios Anastopoulos
Abstract:
Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis
Procedia PDF Downloads 1781151 Examination of Relationship between Internet Addiction and Cyber Bullying in Adolescents
Authors: Adem Peker, Yüksel Eroğlu, İsmail Ay
Abstract:
As the information and communication technologies have become embedded in everyday life of adolescents, both their possible benefits and risks to adolescents are being identified. The information and communication technologies provide opportunities for adolescents to connect with peers and to access to information. However, as with other social connections, users of information and communication devices have the potential to meet and interact with in harmful ways. One emerging example of such interaction is cyber bullying. Cyber bullying occurs when someone uses the information and communication technologies to harass or embarrass another person. Cyber bullying can take the form of malicious text messages and e-mails, spreading rumours, and excluding people from online groups. Cyber bullying has been linked to psychological problems for cyber bullies and victims. Therefore, it is important to determine how internet addiction contributes to cyber bullying. Building on this question, this study takes a closer look at the relationship between internet addiction and cyber bullying. For this purpose, in this study, based on descriptive relational model, it was hypothesized that loss of control, excessive desire to stay online, and negativity in social relationships, which are dimensions of internet addiction, would be associated positively with cyber bullying and victimization. Participants were 383 high school students (176 girls and 207 boys; mean age, 15.7 years). Internet addiction was measured by using Internet Addiction Scale. The Cyber Victim and Bullying Scale was utilized to measure cyber bullying and victimization. The scales were administered to the students in groups in the classrooms. In this study, stepwise regression analyses were utilized to examine the relationships between dimensions of internet addiction and cyber bullying and victimization. Before applying stepwise regression analysis, assumptions of regression were verified. According to stepwise regression analysis, cyber bullying was predicted by loss of control (β=.26, p<.001) and negativity in social relationships (β=.13, p<.001). These variables accounted for 9 % of the total variance, with the loss of control explaining the higher percentage (8 %). On the other hand, cyber victimization was predicted by loss of control (β=.19, p<.001) and negativity in social relationships (β=.12, p<.001). These variables altogether accounted for 8 % of the variance in cyber victimization, with the best predictor loss of control (7 % of the total variance). The results of this study demonstrated that, as expected, loss of control and negativity in social relationships predicted cyber bullying and victimization positively. However, excessive desire to stay online did not emerge a significant predictor of both cyberbullying and victimization. Consequently, this study would enhance our understanding of the predictors of cyber bullying and victimization since the results proposed that internet addiction is related with cyber bullying and victimization.Keywords: cyber bullying, internet addiction, adolescents, regression
Procedia PDF Downloads 3111150 Resilience, Mental Health, and Life Satisfaction
Authors: Saba Harati, Nasrin Arian Parsa
Abstract:
The current research was an attempt to investigate the effect of resilience on mental health and life satisfaction. In one Cross Sectional research, 287 (173 females and 114 males) students of Tehran University were participated their average age was 23.17 years old (SD=4.9). The instruments used for assessing the research variables included: Cutter and Davidson resilience scale (CD-RISC), the short form of the depression-anxiety-stress scale, and life satisfaction scale. The data analysis was done in the form of structural equation model. The results of Simultaneous Hierarchical Multiple Regression Analysis indicated that there was a significant mediating role of the negative emotions (depression, anxiety, and stress), in the relationship between the family resilience (p < 0.001) and satisfaction with life (p < 0.001). Resilience results in life satisfaction by reducing the emotional problems (or increasing the mental health level). The effect of the resilience variable on life satisfaction was indirect.Keywords: resilience, negative emotion, mental health, life satisfaction
Procedia PDF Downloads 5011149 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types
Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke
Abstract:
The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution
Procedia PDF Downloads 451148 Supply Chain Resilience Strategies and Their Impact on Supply Chain Sustainability of the Export-oriented Apparel Industry in Sri Lanka
Authors: Anuradha Ranawakage, Nimalashanithi Amarasekara
Abstract:
Supply chain resilience and sustainability have received great attention from both academia and business professionals since last few decades. However, the relationship between supply chain resilience and sustainability has not been empirically tested in the apparel industry, where both concepts play a crucial role. Thus, this study aims to investigate how supply chain resilience strategies (digital connectivity, inventory and reserve capacity, and collaboration) impact the supply chain sustainability of export-oriented apparel manufacturing companies in Sri Lanka. An online questionnaire was used to collect data on the impact of supply chain resilience strategies on the supply chain sustainability of 99 apparel companies operating in Sri Lanka. This research makes a significant contribution to the field of supply chain management by assessing the impact of supply chain resilience strategies on supply chain sustainability in the context of the developing country, Sri Lanka, where economic crises and the pandemic have had a profound impact on the apparel industry. The findings have important theoretical and managerial implications for maintaining congruence between supply chain resilience and supply chain sustainability in the long run.Keywords: supply chain resilience, supply chain sustainability, apparel, supply chain
Procedia PDF Downloads 281147 Cyber Victimization: School Experience of Malaysian Cyberbullied Teenagers
Authors: Shireen Simon
Abstract:
Cyberbullying among schoolchildren and teenagers became a hot issue discussed by Malaysian society. Cyberbullying is a new age of bullying because it uses the modern digital technology intentionally to hurt and degrade someone in the cyber world. Cyberbullying is a problem affecting many teenagers as they embrace online communication and interaction whereby virtual world with no borders. By adopting a qualitative approach, this study has captured 8 cyberbullied victims’ school experience. Even years after leaving school, these 8 cyberbullied victims remember how it feels to be bullied in the cyber world. The principal investigator also tries to identify the possibility factors that contribute to cyberbullying among these 8 victims. The result shows that these victims were bullied differently in cyber world. This study not just primarily focuses on cyberbullying issues among schoolchildren and teenagers; it also addresses the motives and causes of cyberbullying. Lastly, this article will be served as guidance for school teachers, parents and teenagers to prepare to tackle cyberbullying together. Cyberbullying is no laughing matter in our community, and it is time to spread the seeds of peace inspires others to do the same.Keywords: cyberbullying, cyber victimization, internet, school experience, teenagers
Procedia PDF Downloads 2881146 Theoretical Approach of Maritime Transport Sector’s Specialist’s Resilience Enhancement
Authors: Elena Valionienė, Genutė Kalvaitienė
Abstract:
The issue of resilience of an individual, an organisation, or an entire ecosystem of organisations has recently become an integral part of the education system, where the uncertainties that lead to societal development in the short term create economic, social, and psycho-emotional instability. The Maritime Transport Sector (MTS) is no exception, and the aim of the article is to model the possibilities of enhancing the professional, sociocultural, and psycho-emotional resilience of MTS specialists to proactively respond to crises caused by uncertainties. The research consists of theoretical model creation that helps to identify general maritime business resilience factors and critical success factors. This can develop high resilience and achieve business excellence in a highly volatile, uncertain, complex, and ambiguous (VUCA) environment.Keywords: maritime transport sector, resilience, uncertainties, VUCA
Procedia PDF Downloads 821145 Disaster Resilience Analysis of Atlanta Interstate Highway System within the Perimeter
Authors: Mengmeng Liu, J. David Frost
Abstract:
Interstate highway system within the Atlanta Perimeter plays an important role in residents’ daily life. The serious influence of Atlanta I-85 Collapses implies that transportation system in the region lacks a cohesive and comprehensive transportation plan. Therefore, disaster resilience analysis of the transportation system is necessary. Resilience is the system’s capability to persist or to maintain transportation services when exposed to changes or shocks. This paper analyzed the resilience of the whole transportation system within the Perimeter and see how removing interstates within the Perimeter will affect the resilience of the transportation system. The data used in the paper are Atlanta transportation networks and LEHD Origin-Destination Employment Statistics data. First, we calculate the traffic flow on each road section based on LEHD data assuming each trip travel along the shortest travel time paths. Second, we calculate the measure of resilience, which is flow-based connectivity and centrality of the transportation network, and see how they will change if we remove each section of interstates from the current transportation system. Finally, we get the resilience function curve of the interstates and identify the most resilient interstates section. The resilience analysis results show that the framework of calculation resilience is effective and can provide some useful information for the transportation planning and sustainability analysis of the transportation infrastructures.Keywords: connectivity, interstate highway system, network analysis, resilience analysis
Procedia PDF Downloads 263