Search results for: social media security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13186

Search results for: social media security

12526 Venezuela in the US Oil Geopolitics: An Analysis in the Light of the New Oil Landscape

Authors: William Clavijo, Edmar Almeida

Abstract:

The article analyzes the importance of Venezuela in the US geopolitics of oil considering the new oil landscape. To this end, the importance of oil in the geopolitics of the United States is discussed from the perspective of energy security as well as considering a broader view of national security. Based on this discussion, the relevance of Venezuelan oil reserves on US geopolitical agenda is analyzed. Among the results, the article shows that the transformations in the supply structure of the international oil market during the last decade have allowed the United States to achieve greater levels of independence from oil imports from other producing countries. This new reality has profoundly changed the US interest in Venezuelan oil to a broader subject that involves sensitive issues of its national security agenda.

Keywords: oil geopolitics, Venezuela, United States, energy security, national security

Procedia PDF Downloads 159
12525 A Development of Creative Instruction Model through Digital Media

Authors: Kathaleeya Chanda, Panupong Chanplin, Suppara Charoenpoom

Abstract:

This purposes of the development of creative instruction model through digital media are to: 1) enable learners to learn from instruction media application; 2) help learners implementing instruction media correctly and appropriately; and 3) facilitate learners to apply technology for searching information and practicing skills to implement technology creatively. The sample group consists of 130 cases of secondary students studying in Bo Kluea School, Bo Kluea Nuea Sub-district, Bo Kluea District, Nan Province. The probability sampling was selected through the simple random sampling and the statistics used in this research are percentage, mean, standard deviation and one group pretest – posttest design. The findings are summarized as follows: The congruence index of instruction media for occupation and technology subjects is appropriate. By comparing between learning achievements before implementing the instruction media and learning achievements after implementing the instruction media, it is found that the posttest achievements are higher than the pretest achievements with statistical significance at the level of .05. For the learning achievements from instruction media implementation, pretest mean is 16.24 while posttest mean is 26.28. Besides, pretest and posttest results are compared and differences of mean are tested, the test results show that the posttest achievements are higher than the pretest achievements with statistical significance at the level of .05. This can be interpreted that the learners achieve better learning progress.

Keywords: teaching learning model, digital media, creative instruction model, Bo Kluea school

Procedia PDF Downloads 138
12524 Human Security through Human Rights in the Contemporary World

Authors: Shilpa Bagade Poharkar

Abstract:

The basis for traditional notion of security was the use of force to preserve vital interest which based on either realism or power politics. The modern approach to security extends beyond the traditional notions of security which focus on issues as development and respect for human rights. In global politics, the issue of human security plays a vital role in most of the policy matter. In modern era, the protection of human rights is now recognized as one of the main functions of any legitimate modern state. The research paper will explore the relationship between human rights and security. United Nations is facing major challenges like rampant poverty, refugee outflows, human trafficking, displacement, conflicts, terrorism, intra-inter ethnic conflicts, proliferation of small arms, genocide, piracy, climate change, health issues and so on. The methodology is observed in this paper is doctrinaire which includes analytical and descriptive comparative method. The hypothesis of the paper is the relationship between human rights and a goal of United Nations to attain peace and security. Although previous research has been done in this field but this research paper will try to find out the challenges in the human security through human rights in the contemporary world and will provide measures for it. The study will focus on the following research questions: What are the issues and challenges United Nations facing while advancing human security through human rights? What measures the international community would take for ensuring the protection of human rights while protecting state security and contribute in the attainment of goals of United Nations?

Keywords: human rights, human security, peace, security, United Nations

Procedia PDF Downloads 239
12523 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 222
12522 Understanding the Popularity of Historical Conservation in China: The Depoliticized Narratives as a Counter-Insurgency Strategy in Guangzhou

Authors: Luxi Chen

Abstract:

The land finance in China in recent years has propelled urban renewals in the name of historical conservation and led to massive gentrification and compulsory relocation. Such inequalities cause insurgence. Drawing on public planning information, ethnographic field notes, and online interview data about Guangzhou's Enninglu Area, this paper aims to present how such insurgence has been contained and put down gradually through depoliticization narratives represented by "improving living conditions," "conserving historical culture," and "public participation”. This paper's findings include that 1) Besides economic growth, maintaining social stability in alignment with the central government are equally important to local government, reveals the latter efforts to mediate the growth coalition, residents, media, and academics so as to reconstruct the interface between state and society; 2) To empower the insurgence, the media and academics use public interests for propaganda, that diverts attention away from its political dimension; 3) In response, the government introduces improved regulations and planning, turning social inequalities into technical inadequacy so as to become the defender of public interests, which justifies the incoming renewal and prevents public questioning. By comparing regime changes among governments, developers, residents, media, and academics caused by renewal policies, this paper presents the depoliticized narrative as a counter-insurgence strategy to contain social conflicts and to boost inner-city renewal.

Keywords: inner city renewal, depoliticization, historical conservation, public participation

Procedia PDF Downloads 230
12521 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: cryptography, networking, quantum, encryption and decryption

Procedia PDF Downloads 178
12520 Content Analysis of Depictions of Terrorism in U.S. Major Motion Pictures: A Social Constructionist Perspective

Authors: Raleigh Blasdell, Amanda M. Sharp Parker, Lauren Waldrop, Brigid Toney

Abstract:

It has been demonstrated that fictional media sources have persuasive effects on public beliefs; this study contributes to the social constructionist literature by conducting a content analysis of U.S. major motion pictures involving terrorism. Using the Unified Film Population Sampling Methodology, the top-grossing films were identified to examine the frequency and context of several constructs of terrorism, including terrorist demographics, type of terrorism, country of origin, organizational affiliation, crime typology, and victim demographics. Comparisons of these constructs, as depicted in the films, were then made with the extant academic literature on terrorism. The data provide notable information regarding the representation of terrorism by the film industry, as well the discrepancies between the scholarly literature and depictions in popular films. The results indicate vast differences between fiction and reality, emphasizing a 'Middle Eastern Islamic male' terrorist stereotype. Using the theoretical foundation of social constructionism, the findings provide insight into how inaccurate depictions in film can influence society’s beliefs about terrorism and terrorists, which subsequently can translate into public support for legislation and policies that are often fueled by misinformation.

Keywords: film, media, social constructionism, terrorism

Procedia PDF Downloads 165
12519 A Three Tier Secure KQML Interface with Novel Performatives

Authors: Dimple Juneja, Aarti Singh, Renu Hooda

Abstract:

Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.

Keywords: multiagent systems, KQML, FIPA ACL, performatives

Procedia PDF Downloads 404
12518 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 80
12517 The Awareness of Computer Science Students Regarding the Security of Location Based Games

Authors: Jacques Barnard, Magda Huisman, Gunther R. Drevin

Abstract:

Rapid expansion and development in die mobile technology market has created an opportunity for users to participate in location based games. As a consequence of this fast expanding market and new technology, it is important to be aware of the implications this has on security. This paper measures the impact on the security awareness of games’ participants, as well as on that of students at university level with regards to their various stages of input in years of studying and gamer classification. This serves to provide insight into the matter as to discernible differences in the awareness of the security implications concerning these technologies. The data was accumulated via a web questionnaire that was to be completed yearly by students from respective year groups. Results signify a meaningful disparity in security awareness among students completing the varying study years and research. This awareness, however, does not always impact on gamers.

Keywords: gamer classifications, location based games, location based data, security awareness

Procedia PDF Downloads 288
12516 The Media, Language, and Political Stability in Nigeria: The Example of the Dog and the Baboon Politics

Authors: Attahiru Sifawa Ahmad

Abstract:

The media; electronic, print, and social, is playing very significant roles towards promoting political awareness and stability of any nation. However, for the media to play its role effectively, a clear and sound grasp of the language of communication is necessary. Otherwise, there is the tendency of the media spreading wrong and, or, misinterpreted information to the public, capable of generating rancour and political instability. One such clear misinterpretation or misrepresentation of information was the Hausa metaphorical expression, Kare Jinni Biri Jinni quoted from the statement made by Rtd. General Muhammadu Buhari, sometimes in April, 2013, while addressing his supporters from Niger State. In the political presentation of the term Kare - Jini Biri – Jini, quoted and translated by many print media in Nigeria, it was interpreted to mean; ‘The Dog and the Baboon will be soaked in blood’, denoting bloodshed and declaration of war. However, the term Kare - jini Biri - Jini, literally; the Dog with blood and the Baboon with blood, or, the Dog is bleeding the Baboon is bleeding, or, both the Dog and the Baboon sustained injuries. It is a metaphorical expression denoting a hot competition, and serious struggle, between two competing parties that are closer in strength and stamina. The expression got its origin among the hunting communities in traditional Hausa Societies. From experience, it was always not easy to wrestle and hunt Baboon by the Hunter’s Dog. In many instances, it ended a futile exercise, and even at instances whereby the latter hunted the former, it would be after a serious struggle with both two sustaining injuries. This paper seeks to highlight the poverty of vocabulary, and poor grasp of Nigerian languages among Journalists and young citizens in the country. The paper, therefore, advocated for the retention and effective teaching of the indigenous languages in primary and secondary school’s curriculums in Nigeria. The paper equally analysed the political origin of the print media in Nigeria, how since its first appearance, the print Media is being assigned very important political role by political elites in the country.

Keywords: Baboon, dog, media, politics

Procedia PDF Downloads 216
12515 Numerical Study of Fluid Flow and Heat Transfer in the Spongy-Porous Media

Authors: Zeinab Sayed Abdel Rehim, M. A. Ziada, H. Salwa El-Deeb

Abstract:

Numerical study of fluid flow, heat transfer and thermal energy storing or released in/from spongy-porous media to predict the thermal performance and characteristics of the porous media as packed bed system is presented in this work. This system is cylindrical channel filled with porous media (carbon foam). The system consists of working fluid (air) and spongy-porous medium; they act as the heat exchanger (heating or cooling modes) where thermal interaction occurs between the working fluid and the porous medium. The spongy-porous media are defined by the different type of porous medium employed in the storing or cooling modes. Two different porous media are considered in this study: Carbon foam, and Silicon rubber. The flow of the working fluid (air) is one dimensional in the axial direction from the top to downward and steady state conditions. The numerical results of transient temperature distribution for both working fluid and the spongy-porous medium phases and the amount of stored/realized heat inside/from the porous medium for each case with respect to the operating parameters and the spongy-porous media characteristics are illustrated.

Keywords: fluid flow, heat transfer, numerical analysis, spongy-porous media, thermal performance, transient conditions

Procedia PDF Downloads 541
12514 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan

Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain

Abstract:

Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.

Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism

Procedia PDF Downloads 106
12513 “Divorced Women are Like Second-Hand Clothes” - Hate Language in Media Discourse (Using the Example of Electronic Media Platforms)

Authors: Sopio Totibadze

Abstract:

Although the legal framework of Georgia reflects the main principles of gender equality and is in line with the international situation (UNDP, 2018), Georgia remains a male-dominated society. This means that men prevail in many areas of social, economic, and political life, which frequently gives women a subordinate status in society and the family (UN women). According to the latest study, “violence against women and girls in Georgia is also recognized as a public problem, and it is necessary to focus on it” (UN women). Moreover, the Public Defender's report on the protection of human rights in Georgia (2019) reveals that “in the last five years, 151 women were killed in Georgia due to gender and family violence”. Sadly, these statistics have increased significantly since that time. The issue was acutely reflected in the document published by the Organization for Security and Cooperation in Europe, “Gender Hate Crime” (March 10, 2021). “Unfortunately, the rates of femicide ..... are still high in the country, and distrust of law enforcement agencies often makes such cases invisible, which requires special attention from the state.” More precisely, the cited document considers that there are frequent cases of crimes based on gender-based oppression in Georgia, which pose a threat not only to women but also to people of any gender whose desires and aspirations do not correspond to the gender norms and roles prevailing in society. According to the study, this type of crime has a “significant and lasting impact on the victim(s) and also undermines the safety and cohesion of society and gender equality”. It is well-known that language is often used as a tool for gender oppression (Rusieshvili-Cartledge and Dolidze, 2021; Totibadze, 2021). Therefore, feminist and gender studies in linguistics ultimately serve to represent the problem, reflect on it, and propose ways to solve it. Together with technical advancement in communication, a new form of discrimination has arisen- hate language against women in electronic media discourse. Due to the nature of social media and the internet, messages containing hate language can spread in seconds and reach millions of people. However, only a few know about the detrimental effects they may have on the addressee and society. This paper aims to analyse the hateful comments directed at women on various media platforms to determine (1) the linguistic strategies used while attacking women and (2) the reasons why women may fall victim to this type of hate language. The data have been collected over six months, and overall, 500 comments will be examined for the paper. Qualitative and quantitative analysis was chosen for the methodology of the study. The comments posted on various media platforms, including social media posts, articles, or pictures, have been selected manually due to several reasons, the most important being the problem of identifying hate speech as it can disguise itself in different ways- humour, memes, etc. The comments on the articles, posts, pictures, and videos selected for sociolinguistic analysis depict a woman, a taboo topic, or a scandalous event centred on a woman that triggered a lot of hatred and hate language towards the person to whom the post/article was dedicated. The study has revealed that a woman can become a victim of hatred directed at them if they do something considered to be a deviation from a societal norm, namely, get a divorce, be sexually active, be vocal about feministic values, and talk about taboos. Interestingly, people who utilize hate language are not only men trying to “normalize” the prejudiced patriarchal values but also women who are equally active in bringing down a "strong" woman. The paper also aims to raise awareness about the hate language directed at women, as being knowledgeable about the issue at hand is the first step to tackling it.

Keywords: femicide, hate language, media discourse, sociolinguistics

Procedia PDF Downloads 78
12512 Migrant Workers and the Challenge for Human Security in Southeast Asia since 1997

Authors: Hanen Khaldi

Abstract:

This paper aims to study the impact of international migration on human security in the Southeastern region of Asia, especially after Asian Financial Crisis 1997-98. International migration has impacts on many dimensions of security: the state security (sovereignty and autonomy); international relationships security (conflicts, terrorism, etc); and immigrants security. The paper aims to improve our comprehension of the impact of international migration on immigrant security in the region of Southeast Asia, particularly “vulnerable workers’’ whose number is growing very fast in the region. The literature review carried out on this matter led us to ask the following two question: 1) Did the creation of ASEAN Community matter on the evolution of immigrants in the region? And How governments try to resolve the gap between economic objectifs and security of immigrants in the region? To answer these two questions, the paper is subdivided in three parts: Firstly, we will show how the creation of the ASEAN Community, especially ASEAN Economic Community, had a significant impact on the pattern of evolution of immigration in this region. Secondly, we will paint a portrait illustrating the vulnerability of immigrants in Southeast Asia, particularly unskilled workers. Finally, using the theories of regional integration, we will assess how governments try to ensure the security and safety of the immigrants. Overall, our analysis illustrate the significant change of the official discourse of the leaders of the ASEAN member states, now more conciliator and especially more open to cooperation, as well as the proliferation of meetings and initiatives between these countries to control mobility flows in the region, and the ensure immigrants security.

Keywords: migrant workers, human security, human rights

Procedia PDF Downloads 162
12511 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 385
12510 Challenges in E-Government: Conceptual Views and Solutions

Authors: Rasim Alguliev, Farhad Yusifov

Abstract:

Considering the international experience, conceptual and architectural principles of forming of electron government are researched and some suggestions were made. The assessment of monitoring of forming processes of electron government, intellectual analysis of web-resources, provision of information security, electron democracy problems were researched, conceptual approaches were suggested. By taking into consideration main principles of electron government theory, important research directions were specified.

Keywords: electron government, public administration, information security, web-analytics, social networks, data mining

Procedia PDF Downloads 465
12509 A Pattern Practise for Awareness Educations on Information Security: Information Security Project

Authors: Fati̇h Apaydin

Abstract:

Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics.

Keywords: computer, information security, education, technology, development

Procedia PDF Downloads 590
12508 Tweets to Touchdowns: Predicting National Football League Achievement from Social Media Optimism

Authors: Rohan Erasala, Ian McCulloh

Abstract:

The NFL Draft is a chance for every NFL team to select their next superstar. As a result, teams heavily invest in scouting, and millions of fans partake in the online discourse surrounding the draft. This paper investigates the potential correlations between positive sentiment in individual draft selection threads from the subreddit r/NFL and if this data can be used to make successful player recommendations. It is hypothesized that there will be limited correlations and nonviable recommendations made from these threads. The hypothesis is tested using sentiment analysis of draft thread comments and analyzing correlation and precision at k of top scores. The results indicate weak correlations between the percentage of positive comments in a draft selection thread and a player’s approximate value, but potentially viable recommendations from looking at players whose draft selection threads have the highest percentage of positive comments.

Keywords: national football league, NFL, NFL Draft, sentiment analysis, Reddit, social media, NLP

Procedia PDF Downloads 74
12507 Historical Analysis of the First Lady of the Silent Screen: Exploring Parallels between Media Portrayals and Fan Letters to Film Star Lillian Gish

Authors: Annette Davies

Abstract:

This paper examines a collection of four fan letters written by two fans to the early film star, Lillian Gish. The letters were sent to Gish between 1929 and 1962 and were later archived at the New York Library of Performing Arts in Manhattan, New York. This paper also analyzes the media's portrayal of Gish during the time period of these written letters in order to identify parallels between the portrayal of Gish in the media and the perception of Gish by her fans, which is espoused in these fan letters. The media analyzed includes newspapers, fan magazines, Paine's 1932 biography Life and Lillian Gish, a film publicity poster for Gish's film Intolerance, and the film roles performed by Gish. Several parallels are found and assessed using the four processes of audience involvement with a media persona-transportation, parasocial interaction, identification, and worship.

Keywords: celebrity, congruency, fan, persona

Procedia PDF Downloads 139
12506 The Instrumentalization of Digital Media in the Context of Sexualized Violence

Authors: Katharina Kargel, Frederic Vobbe

Abstract:

Sexual online grooming is generally defined as digital interactions for the purpose of sexual exploitation of children or minors, i.e. as a process for preparing and framing sexual child abuse. Due to its conceptual history, sexual online grooming is often associated with perpetrators who are previously unknown to those affected. While the strategies of perpetrators and the perception of those affected are increasingly being investigated, the instrumentalisation of digital media has not yet been researched much. Therefore, the present paper aims at contributing to this research gap by examining in what kind of ways perpetrators instrumentalise digital media. Our analyses draw on 46 case documentations and 18 interviews with those affected. The cases and the partly narrative interviews were collected by ten cooperating specialist centers working on sexualized violence in childhood and youth. For this purpose, we designed a documentation grid allowing for a detailed case reconstruction i.e. including information on the violence, digital media use and those affected. By using Reflexive Grounded Theory, our analyses emphasize a) the subjective benchmark of professional practitioners as well as those affected and b) the interpretative implications resulting from our researchers’ subjective and emotional interaction with the data material. It should first be noted that sexualized online grooming can result in both online and offline sexualized violence as well as hybrid forms. Furthermore, the perpetrators either come from the immediate social environment of those affected or are unknown to them. The perpetrator-victim relationship plays a more important role with regard to the question of the instrumentalisation of digital media than the question of the space (on vs. off) in which the primary violence is committed. Perpetrators unknown to those affected instrumentalise digital media primarily to establish a sexualized system of norms, which is usually embedded in a supposed love relationship. In some cases, after an initial exchange of sexualized images or video recordings, a latent play on the position of power takes place. In the course of the grooming process, perpetrators from the immediate social environment increasingly instrumentalise digital media to establish an explicit relationship of power and dependence, which is directly determined by coercion, threats and blackmail. The knowledge of possible vulnerabilities is strategically used in the course of maintaining contact. The above explanations lead to the conclusion that the motive for the crime plays an essential role in the question of the instrumentalisation of digital media. It is therefore not surprising that it is mostly the near-field perpetrators without commercial motives who initiate a spiral of violence and stress by digitally distributing sexualized (violent) images and video recordings within the reference system of those affected.

Keywords: sexualized violence, children and youth, grooming, offender strategies, digital media

Procedia PDF Downloads 180
12505 Educaton for Social Reconstruction: Impact of Social Terrorism on Women Education in Nigeria

Authors: Theresa Chinyere ONU

Abstract:

This paper examines the effect of social terrorism on education in Nigeria. The article looked into some prevailing conditions of international political unrest and insecurity. The fear and risk of these conditions to national security and the struggle for power establishment which has further intensified and taken the shape of terrorism has imposed devastating effects on the growth and prosperity of Nigeria; as traffic patterns get disturbed, hospitals and schools get dysfunctional. This has also affected the educational standard in Nigeria as parents are no longer comfortable in sending their children to schools in some states for the fear of terrorist attacks. The study emphasized the integrated the effort of the government management institutions.

Keywords: education, social terrorism, women, Nigeria

Procedia PDF Downloads 572
12504 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 79
12503 Turkey-Syria Relations between 2002-2011 from the Perspective of Social Construction

Authors: Didem Aslantaş

Abstract:

In this study, the reforms carried out by the Justice and Development Party, which came to power in 2002, and how the foreign policy understanding it transformed reflected on the relations with Syria will be analyzed from the social constructivist theory. Contrary to the increasing security concerns of the states after the September 11 attacks, the main problem of the research is how the relations between Syria and Turkey developed and how they progressed in non-security dimensions. In order to find an answer to this question, the basic assumptions of the constructivist theory will be used. Since there is a limited number of studies in the literature, a comparative analysis of the Adana Consensus and the Cooperation Agreement between the Republic of Turkey and the Syrian Arab Republic, and the Joint Cooperation Agreement Against Terrorism and Terrorist Organizations will be included. In order to answer the main problem of the research and to support the arguments, document and archive scanning methods from qualitative research methods will be used. In the first part of the study, what the social constructivist theory is and its basic assumptions are explained, while in the second part, Turkey-Syria relations between 2002-2011 are included. In the third and last part, the relations between the two countries will be tried to be read through social constructivism by referring to the foreign policy features of the Ak Party period.

Keywords: Social Constructivist Theory, foreign policy analysis, Justice and Development Party, Syria

Procedia PDF Downloads 77
12502 Future Outlook and Current Situation for Security of Gas Supply in Eastern Baltic Region

Authors: Ando Leppiman, Kati Kõrbe Kaare, Ott Koppel

Abstract:

The growing demand for gas has rekindled a debate on gas security of supply due to supply interruptions, increasing gas prices, transportation and distribution bottlenecks and a growing reliance on imports over longer distances. Security of supply is defined mostly as an infrastructure package to satisfy N-1 criteria. In case of Estonia, Finland, Latvia, and Lithuania all the gas infrastructure is built to supply natural gas only from one single supplier, Russia. In 2012, almost 100% of natural gas to the Eastern Baltic Region was supplied by Gazprom. under such circumstances infrastructure N-1 criteria does not guarantee security of supply. In the Eastern Baltic Region, the assessment of risk of gas supply disruption has been worked out by applying the method of risk scenarios. There are various risks to be tackled in Eastern Baltic States in terms of improving security of supply, such as single supplier risk, physical infrastructure risk, regulatory gap, fair price, and competition. The objective of this paper is to evaluate the energy security of the Eastern Baltic Region within the framework of the European Union’s policies and to make recommendations on how to better guarantee the energy security of the region.

Keywords: security of supply, supply routes for natural gas, energy balance, diversified supply options, common regulative package

Procedia PDF Downloads 255
12501 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 85
12500 Semantic Network Analysis of the Saudi Women Driving Decree

Authors: Dania Aljouhi

Abstract:

September 26th, 2017, is a historic date for all women in Saudi Arabia. On that day, Saudi Arabia announced the decree on allowing Saudi women to drive. With the advent of vision 2030 and its goal to empower women and increase their participation in Saudi society, we see how Saudis’ Twitter users deliberate the 2017 decree from different social, cultural, religious, economic and political factors. This topic bridges social media 'Twitter,' gender and social-cultural studies to offer insights into how Saudis’ tweets reflect a broader discourse on Saudi women in the age of social media. The present study aims to explore the meanings and themes that emerge by Saudis’ Twitter users in response to the 2017 royal decree on women driving. The sample used in the current study involves (n= 1000) tweets that were collected from Sep 2017 to March 2019 to account for the Saudis’ tweets before and after implementing the decree. The paper uses semantic and thematic network analysis methods to examine the Saudis’ Twitter discourse on the women driving issue. The paper argues that Twitter as a platform has mediated the discourse of women driving among the Saudi community and facilitated social changes. Finally, framing theory (Goffman, 1974) and Networked framing (Meraz & Papacharissi 2013) are both used to explain the tweets on the decree of allowing Saudi women to drive based on # Saudi women-driving-cars.

Keywords: Saudi Arabia, women, Twitter, semantic network analysis, framing

Procedia PDF Downloads 143
12499 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 66
12498 The Coverage of Women's Sport of Greek Sports Websites

Authors: Eleni Tsalkatidou

Abstract:

Despite the fact that women's sport has flourished in recent years, its media coverage remains low, as it is observed that every day men’s sports stories dominate the most popular sports websites and the same doesn’t apply to women. Many studies in the past have demonstrated that the participation of women in sport is greatly underrepresented in the media and even when it does get covered, the focus is often on femininity and attractiveness, not athleticism. This means that female athletes are often portrayed in a sexist manner and, in general, they are more deserving of media coverage as celebrities rather than because of their sporting achievements. Scholars have argued that sport is a place where sexism is cultivated, as gender roles are constructed and disputed based on social context. Although images and information about women athletes are now more than ever, thanks to Social Media where they also act as 'producers', sport is still considered as «masculine». There are many reasons why this happens, the most important of which are: a. It is considered that females don’t have the physical and athletic qualifications such as men and b. Women's sport is less commercial than men’s, so the interest is lower. Moreover, scholars have pointed out that men journalists/reporters don’t cover the women’s sport: it is more common for a woman to write about a women's sport or a female athlete. This has its roots in the conception that sport is synonymous with masculinity - which is defined as the opposite of femininity – and so if men deal with women’s sport, this will probably menace their association with masculinity. Given the above, this paper seeks to examine the amount of women’s sport coverage of five Greek popular sports websites (metrosport.gr, gazzeta.gr, sport24.gr, sdna.gr, sport-fm.gr). The posted articles from these Greek websites from January to June 2020 were selected for my content analysis, which will be used to categorize the themes in order that the following research questions could be answered: 1) Are there any articles that cover women's sports or that refer to female athletes?, 2) And if so, are they articles/reports or is it a reproduction of the press release?, 3) What kind of sports do they refer to (individual-team sport)?, 4) Are the articles signed? And if so, are they written by men or women?, 5) What textual practices are used to cover women's sport/female athletes?, 6) Based on the findings, could we argue that we have entered a new age of media coverage of women’s sport in Greece with a shift towards greater gender equality or not?

Keywords: Coverage, Greek websites, Sport, Women

Procedia PDF Downloads 138
12497 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 350