Search results for: social media security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13272

Search results for: social media security

12552 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 326
12551 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 59
12550 Objectifying Media and Preadolescents' Media Internalization: A Developmental Perspective

Authors: Ann Rousseau, Steven Eggermont

Abstract:

The current study sought to explain pre-adolescents’ differential susceptibility to the internalization of mediated appearance ideals, using a three-wave panel survey of preadolescent girls and boys (N = 973, Mage = 11.14). Based on the premises of objectification theory and sexual script theory, we proposed a double role for pubertal timing and cross-sex interactions in preadolescents’ media internalization. More specifically, we expected pubertal timing and cross-sex interactions to (a) trigger higher levels of media internalization, directly and indirectly via body surveillance, and (b) positively moderate the relationship between objectifying media exposure and girls’ and boys’ media internalization. A first cross-lagged model tested whether the pubertal timing and cross-sex interactions could trigger preadolescents media internalization and body surveillance. Structural equation analysis indicated that pubertal timing (Wave1) positively predicted body surveillance and media internalization (both Wave3). Cross-sex involvement (Wave1) was positively linked to media internalization (Wave2), but body surveillance (Wave2) was not associated with cross-sex interactions. Results also showed a reciprocal interaction between media internalization (Wave 2 and 3) and body surveillance (Wave2 and 3). Multiple group analysis showed that the observed relationships did not vary by gender. A second moderated moderation model examined whether (a) the relationship between objectifying media exposure (television and magazines, both Wave1) and media internalization (Wave3) depended on pubertal timing (Wave1), and (b) the two-way interaction between objectifying media exposure (Wave1) and pubertal timing (Wave1) varied depending on cross-sex interactions (Wave1). Results revealed that cross-sex interactions functioned as a buffer against media internalization. For preadolescents who had fewer cross-sex interactions, early puberty (relative to peers) positively moderated the relationship between magazine exposure and the internalization of mediated appearance ideals. No significant relationships were found for television. Again, no gender difference could be observed. The present study suggests a double role for pubertal timing and cross-sex interactions in preadolescents media internalization, and indicate that early developers with few cross-sex experiences are particularly vulnerable for media internalization. Additionally, the current findings suggest that there is relative gender equity in magazines’ ability to cultivate media internalization among preadolescents.

Keywords: cross-sex interactions, media effects, objectification theory, pubertal timing

Procedia PDF Downloads 327
12549 Three Decades of the Fourth Estate in Ghana: Issues, Challenges and the Way Forward

Authors: Samuel Pimpong

Abstract:

In most liberal and constitutional democracies, the media serves as a dominant power in the construction of the fundamental building blocks for the consolidation of democratic governance. However, the extent to which the media can enhance democratic consolidation in a country depends to a large extent on the independence of the media, the robustness of legislative frameworks and the safety of journalists in discharging their duties without fear or favor. This study sought to examine pertinent issues, practices and challenges facing the media in Ghana’s Fourth Republic and attempts to make recommendations regarding the way forward. The work adopted a qualitative study approach. A total of sixteen (16) participants were purposively selected for face-to-face interviews. The study hinges on the democratic participant media theory and the development media theory. Primary data was analyzed via thematic analysis procedure. The study revealed that although Ghana has repealed its criminal libel laws, nonetheless other statutory Acts, such as the Electronic Communications Act 2008 (ACT 775) and the Criminal and other offences Act 1960 (Act 29), among others continue to stifle freedom of expression. On the other hand, press freedom is being abused by the use of fake content publication. Further, the study revealed that the absence of a comprehensive regulatory structure impedes the activities carried out by the media. Consequently, the study recommends a regulatory structure to oversee media activities and content, as the National Media Commission (NMC) lacks the authority to do so. In this direction, the study recommends a limitation on the role of the National Communications Authority (NCA) to administer broadcasting signals and transfer its licensing and sanctioning powers to the NMC in order to create one sole and completely independent media regulatory authority that deals with all media related issues.

Keywords: media, constitutional democracy, democratic consolidation, fourth republic

Procedia PDF Downloads 67
12548 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 206
12547 Examining Diversity, Equity, and Inclusion in New Media Strategies within Contemporary Marketing Communication

Authors: Namirimu Beatrice Doreen

Abstract:

In recent years, there has been growing recognition of the importance of diversity, equity, and inclusion (DEI) in advertising, driven in part by the increasing diversity of society and the expanding reach of new media platforms. As marketers grapple with the challenge of creating campaigns that resonate with a wide range of audiences, the role of new media adoption emerges as a critical, independent variable shaping the landscape of DEI in advertising. This paper delves into the evolving dynamics of DEI in advertising, examining the multifaceted challenges and opportunities encountered by brands in their pursuit of more inclusive marketing strategies. Drawing on theoretical frameworks from marketing, sociology, and communication studies, this paper explores the intricate interplay between DEI initiatives and their impact on consumer perceptions, brand reputation, and market performance. The analysis considers how new media adoption influences the effectiveness and reach of DEI initiatives as brands leverage digital platforms to engage with diverse audiences in innovative ways. Through insightful case studies, this paper illustrates best practices and identifies areas for improvement in the realm of inclusive advertising, shedding light on the practical implications of DEI principles for marketers. By synthesizing insights from academia and industry, this paper offers actionable recommendations for marketers seeking to navigate the complexities of DEI in their advertising strategies. By embracing DEI principles and harnessing the power of new media platforms, brands can foster a more equitable and inclusive advertising landscape, ultimately enhancing their connections with diverse audiences and driving positive social change.

Keywords: diversity, equity, inclusion, new media, contemporary marketing communication

Procedia PDF Downloads 58
12546 Television and Virtual Public Sphere: A Study on Malayali Tribes in Salem District, Tamil Nadu

Authors: P. Viduthalai, A. K. Divakar, V. Natarajan

Abstract:

Media is one of the powerful tools that manipulate the world in numerous aspects especially in the form of a communication process. For instance, the concept of the public sphere, which was earlier represented by landlords and elites has now transformed into a virtual public sphere, which is also represented by marginalized people. Unfortunately, this acquisition is still paradoxical. Though the media proliferation and its effects are humongous, still it has not been the same throughout the world. Inequality in access to media has created a technological divide among people. Finally, globalization and approach by the government towards using media for development communication has significantly changed the way in which the media reaches every nook and corner. Monarchy, oligarchy, republic and democracy together form the basis of most governments of the world. Of which, democracy is the one with the highest involvement and participation of the people. Ideally, the participation of the people is what, that keeps the democracy running. A healthy democracy is possible only when people are able to access information that makes citizens responsible and serves to check the functioning of their elected representatives. On one side the media consumption of people plays a crucial role in the formation of the public sphere, and on the other side, big media conglomerates are a serious threat to community participation, which is a goal that the media should strive for in a country like India. How different people consume these different media, differs greatly from length and breadth of the country. Another aspect of this media consumption is that it isn’t passive. People usage and consumption of media are related with the gratification that they derive from the particular media. This aspect varies from person to person and from society to society according to both internal and external factors. This article sets out from the most underlying belief that Malayali Tribes have adopted television and becomes a part of daily life and a day never passes without it especially after the introduction of Free Television Scheme by the past state government. Though they are living in hilly and socially isolated places, they too have started accessing media for understanding about the people of the plains and their culture, dictated by their interest. Many of these interests appear to have a social and psychological origin. The present research attempts to study how gratification of these needs lead Malayali Tribes to form such a virtual public sphere where they could communicate with people of the plains. Data was collected through survey method, from 300 respondents on “Exposure towards Television and their perception”. Conventional anthropological methods like unstructured interviews were also used to supplement the data collection efforts in the three taluks namely Yercaud, Pethanayankkanpalayam and Panamaraththuppatty in Salem district of TamilNadu. The results highlight the role of Television in gratifying needs of the Malayali Tribes.

Keywords: democracy, gratification, Malayali Tribes and television, virtual public sphere

Procedia PDF Downloads 250
12545 Advancing Communication Theory in the Age of Digital Technology: Bridging the Gap Between Traditional Models and Emerging Platforms

Authors: Sidique Fofanah

Abstract:

This paper explores the intersection of traditional communication theories and modern digital technologies, analyzing how established models adapt to contemporary communication platforms. It examines the evolving nature of interpersonal, group, and mass communication within digital environments, emphasizing the role of social media, AI-driven communication tools, and virtual reality in reshaping communication paradigms. The paper also discusses the implications for future research and practice in communication studies, proposing an integrated framework that accommodates both classical and emerging theories.

Keywords: communication, traditional models, emerging platforms, digital media

Procedia PDF Downloads 16
12544 Foreign Policy and National Security Dilemma: Examining Nigerian Experience

Authors: Shuaibu Umar Abdul

Abstract:

The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.

Keywords: foreign policy, nation, national security, Nigeria, security

Procedia PDF Downloads 508
12543 Can Empowering Women Farmers Reduce Household Food Insecurity? Evidence from Malawi

Authors: Christopher Manyamba

Abstract:

Women in Malawi produce perform between 50-70 percent of all agricultural tasks and yet the majority remain food insecure. The aim of his paper is to build on existing mixed evidence that indicates that empowering women in agriculture is conducive to improving food security. The WEAI is used to provide evidence on the relationship between women’s empowerment in agriculture and household food security. A multinomial logistic regression is applied to the Women Empowerment in Agriculture Index (WEAI) components and the Household Hunger Scale. The overall results show that the WEAI can be used to determine household food insecurity; however it has to be contextually adapted. Assets ownership, credit, group membership and leisure time are positively associated with food security. Contrary to other literature, empowerment in having control and decisions on income indicate negative association with household food security. These results could potentially better inform public, private and civil society stakeholders’ dialogues in creating the most effective and sustainable interventions to help women attain long-term food security.

Keywords: food security, gender, empowerment, agriculture index, framework for African food security, household hunger scale

Procedia PDF Downloads 363
12542 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 355
12541 Identifying Effective Strategies to Promote Vietnamese Fashion Brands in an Internationally Dominated Market

Authors: Lam Hong Lan, Gabor Sarlos

Abstract:

It is hard to search for best practices in promotion for local fashion brands in Vietnam as the industry is still very young. Local fashion start-ups have grown quickly in the last five years, thanks in part to the internet and social media. However, local designer/owners can face a huge challenge when competing with international brands in the Vietnamese market – and few local case studies are available for guidance. In response, this paper studied how local small- to medium-sized enterprises (SMEs) promote to their target customers in order to compete with international brands. Knowledge of both successful and unsuccessful approaches generated by this study is intended to both contribute to the academic literature on local fashion in Vietnam as well as to help local designers to learn from and improve their brand-building strategy. The primary study featured qualitative data collection via semi-structured depth interviews. Transcription and data analysis were conducted manually in order to identify success factors that local brands should consider as part of their promotion strategy. Purposive sampling of SMEs identified five designers in Ho Chi Minh City (the biggest city in Vietnam) and three designers in Hanoi (the second biggest) as interviewees. Participant attributes included: born in the 1980s or 1990s; familiar with internet and social media; designer/owner of a successful local fashion brand in the key middle market and/or mass market segments (which are crucial to the growth of local brands). A secondary study was conducted using social listening software to gather further qualitative data on what were considered to be successful or unsuccessful approaches to local fashion brand promotion on social media. Both the primary and secondary studies indicated that local designers had maximized their promotion budget by using owned media and earned media instead of paid media. Findings from the qualitative interviews indicate that internet and social media have been used as effective promotion platforms by local fashion start-ups. Facebook and Instagram were the most popular social networks used by the SMEs interviewed, and these social platforms were believed to offer a more affordable promotional strategy than traditional media such as TV and/or print advertising. Online stores were considered an important factor in helping the SMEs to reach customers beyond the physical store. Furthermore, a successful online store allowed some SMEs to reduce their business rental costs by maintaining their physical store in a cheaper, less central city area as opposed to a more traditional city center store location. In addition, the small comparative size of the SMEs allowed them to be more attentive to their customers, leading to higher customer satisfaction and rate of return. In conclusion, this study found that these kinds of cost savings helped the SMEs interviewed to focus their scarce resources on producing unique, high-quality collections in order to differentiate themselves from international brands. Facebook and Instagram were the main platforms used for promotion and brand-building. The main challenge to this promotion strategy identified by the SMEs interviewed was to continue to find innovative ways to maximize the impact of a limited marketing budget.

Keywords: Vietnam, SMEs, fashion brands, promotion, marketing, social listening

Procedia PDF Downloads 119
12540 Query Task Modulator: A Computerized Experimentation System to Study Media-Multitasking Behavior

Authors: Premjit K. Sanjram, Gagan Jakhotiya, Apoorv Goyal, Shanu Shukla

Abstract:

In psychological research, laboratory experiments often face the trade-off issue between experimental control and mundane realism. With the advent of Immersive Virtual Environment Technology (IVET), this issue seems to be at bay. However there is a growing challenge within the IVET itself to design and develop system or software that captures the psychological phenomenon of everyday lives. One such phenomena that is of growing interest is ‘media-multitasking’ To aid laboratory researches in media-multitasking this paper introduces Query Task Modulator (QTM), a computerized experimentation system to study media-multitasking behavior in a controlled laboratory environment. The system provides a computerized platform in conducting an experiment for experimenters to study media-multitasking in which participants will be involved in a query task. The system has Instant Messaging, E-mail, and Voice Call features. The answers to queries are provided on the left hand side information panel where participants have to search for it and feed the information in the respective communication media blocks as fast as possible. On the whole the system will collect multitasking behavioral data. To analyze performance there is a separate output table that records the reaction times and responses of the participants individually. Information panel and all the media blocks will appear on a single window in order to ensure multi-modality feature in media-multitasking and equal emphasis on all the tasks (thus avoiding prioritization to a particular task). The paper discusses the development of QTM in the light of current techniques of studying media-multitasking.

Keywords: experimentation system, human performance, media-multitasking, query-task

Procedia PDF Downloads 552
12539 South Korean Discourse on Bioecomomy in the Sector of Agriculture

Authors: Mi Sun Park

Abstract:

Biotechnology provides us with technological solutions to resource-based challenges facing the global society. A bioeconomy or bio-based economy emerged as all economic activities derived from biotechnology. This paper aims to understand discourses on bioeconomy in the sector of agriculture with three dimensions; media discourse, science discourse, and policy discourse. For achieving research goals, content analysis was applied to this research. Media articles, academic journal articles and policy documents published from 2000 to 2016 were collected in South Korea. The text was coded and analyzed with the categories of speakers and their arguments. The research findings indicate that powerful actors and key messages of bioeconomy in South Korean agriculture. Differences and similarities among media, science, and policy were examined. Therefore this case study can contribute to understanding dynamic interaction and interfaces of media, science and policy discourse on biotechnology in the sector of agriculture.

Keywords: media, discourse, bioeconomy, agriculture

Procedia PDF Downloads 232
12538 Case Studies on the Impact of COVID-19 on Films and Digital Media

Authors: Hitender Sehrawat

Abstract:

COVID-19 has been a game-changer for many industries and businesses across the globe. In this article, the impact of COVID-19 is discussed, specifically on films, television, and digital media industry. Based on the review of the newspaper articles, three case studies are presented. One case study is on the impact of COVID-19 on Bollywood, the second case study is on the impact of COVID-19 on Hollywood, and third case study is on the impact of COVID-19 on television and digital media industry. It is argued that COVID-19 has had a negative impact on Bollywood and Hollywood, whereas it has impacted the television and digital media industry in a positive way. COVID-19 has brought about disruption in the lives and businesses of people, and the film and television industry is not an exception. Although there are negative impacts of COVID-19 on Bollywood and Hollywood, it has positive impacts on television and the digital media industry. Maybe the disruption of the traditional film industry by the digital media industry will be the normal for a long time to come. However, measures need to be thought about a revival of the Bollywood and Hollywood for the many livelihoods they cater to. Bollywood and Hollywood are not just film industries, but the core identities of India and the United States. What shape film industry will take in the future would be interesting to see. This article opens up avenues for more in-depth empirical research in this area in the future.

Keywords: films, COVID-19, television, media industry

Procedia PDF Downloads 166
12537 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 309
12536 Homogenization of Culture and Its Effect on Preferred Reading of Media Communications Aimed at Members of Generation Z

Authors: Philip Katz

Abstract:

The research examines preferred reading of contemporary ads aimed at Generation Z through digital media. A qualitative analysis of focus groups consisting of members of Generation Z from 13 countries in Europe, the Middle East, South America and Asia has shown that, among this cohort, the influence of national culture does not create a strong impediment to understanding media communications targeting Generation Z. The familiarity of members of Generation Z with other countries’ popular culture through the spread of digital media has allowed a homogenizing effect and allowed a greater understanding of those cultures among this generation that lessens the impact of geographic separation.

Keywords: audience, Generation Z, marketing communication, preferred reading

Procedia PDF Downloads 172
12535 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 197
12534 The Media and Reportage of Boko Haram Insurgency in Nigeria

Authors: Priscilla Marcus

Abstract:

The mass media was a force to reckon with in the struggle and attainment of Nigeria’s independence in 1960 and since then, the Nigerian media has carved a niche for itself in performing its traditional role of education, information, entertainment, shaping of opinions and swinging of views of the society on knotty national issues. Boko Haram insurgency in Nigeria which emerged from an unnoticed, negligible and quiet beginning, has turned out daring, monstrous and unstoppable. This paper examines The Media and Reportage of Boko Haram Insurgency in Nigeria and to suggest strategies the mass media could adopt in combating this form of terrorism. Data for the study were collected from a variety of sources including the print and electronic media. The major observation of this study is that the mass media have an enormous role to play if Boko Haram’s activities are to be combated. It argued that even though the media houses are just doing their job – reporting the incident(s) as they occur, thus keeping the citizens abreast of facts; the rate at which news keeps coming regarding the activities of the sect has portrayed the media as information dissemination and terror campaign spread. It also argued that the ceaseless reporting has not translated to a decrease in the activities of the sect or increase in the level of government actions to check the insurgency. However, the information being disseminated is enlightening the populace and also creating an atmosphere of panic and insecurity. It further argued that the media should move beyond mere recitation of events to providing the public with knowledge needed to make things better. This is because the sect has been accorded too much undeserved and unnecessary publicity while the government on the other hand has been portrayed, albeit indirectly as a weak organization incapable of handling the ‘more organized’ Boko Haram. The study, concluded that, to effectively address the problem of this form of terrorism in Nigeria, the media have to brace up to the task of uncovering activities of the sect in appreciation of their watch-dog role.

Keywords: Boko Haram, insurgency, mass media, Nigeria

Procedia PDF Downloads 321
12533 The Works of Ibrahim Eissa: A Controversy

Authors: Malak Khaled Hosny

Abstract:

The paper inspects Ibrahim Eissa, a famous Egyptian writer and TV persona, and his literary and film works. Having faced threats of persecution and assassination, Eissa is a controversial figure in Egyptian media, and his works always pose a trigger of outrage and conversation. His book The Preacher, his movie The Guest, and his TV show Faten Amal Harby all led to some controversy unfolding in Egyptian society, and all led to conversations erupting in Egyptian households and on social media platforms. Through a close reading of his written work and an analytic watch of his work on-screen, the paper delves into the details of the intentions behind and the repercussions of Ibrahim Eissa's work.

Keywords: censorship, film, literature, religion

Procedia PDF Downloads 101
12532 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 166
12531 The Covid-19 Pandemic: Transmission, Misinformation, and Implications on Public Health

Authors: Jonathan De Rothewelle

Abstract:

A pandemic, such as that of COVID-19, can be a time of panic and stress; concerns about health supersede others such as work and leisure. With such concern comes the seeking of crucial information— information that, during a global health crisis, could mean the difference between life and death. Whether newspapers, cable news, or radio, media plays an important role in the transmission of medical information to the general public. Moreover, the news media in particular must uphold its obligation to the public to only disseminate factual, useful information. The circulation of misinformation, whether explicit or implicit, may profoundly impact global health. Using a discursive analytic framework founded in linguistics, the images and headlines of top coverage of COVID-19 from the most influential media outlets will be examined. Micro-analyses reveal what may be interpreted as evidence of sensationalism, which may be argued to a form of misinformation, and ultimately a departure from ethical media. Withdrawal from responsible reporting and publishing, expressly in times of epidemic, may cause further confusion and panic.

Keywords: public health, pandemic, public education, media

Procedia PDF Downloads 146
12530 Human Security and Human Trafficking Related Corruption

Authors: Ekin D. Horzum

Abstract:

The aim of the proposal is to examine the relationship between human trafficking related corruption and human security. The proposal suggests that the human trafficking related corruption is about willingness of the states to turn a blind eye to the human trafficking cases. Therefore, it is important to approach human trafficking related corruption in terms of human security and human rights violation to find an effective way to fight against human trafficking. In this context, the purpose of this proposal is to examine the human trafficking related corruption as a safe haven in which trafficking thrives for perpetrators.

Keywords: human trafficking, human security, human rights, corruption, organized crime

Procedia PDF Downloads 472
12529 Mass Media and Tobacco in Bangladesh: An Investigation on the Role of Mass Media in the Light of Tobacco Control

Authors: Tahsina Sadeque Kapil Ahmed

Abstract:

Context: The tobacco epidemic is one of the biggest public health threats the world has ever faced. Tobacco use is a widespread phenomenon in Bangladesh, and that causes numerous deaths and disabilities in a year. The studies conducted elsewhere have strengthened the evidence that mass media campaigns conducted in the context of comprehensive tobacco control programs can promote quitting and reduce smoking, as well as smokeless tobacco prevalence. Awareness building campaigns in mass-media against tobacco use should be prioritized more, and this paper will be an initiative towards enhancing mass-media’s role in controlling tobacco in Bangladesh. Objective: the main objective of this study is to investigate the role of mass-media in controlling tobacco in Bangladesh. Methods: This is a qualitative study and both primary, as well as secondary data were used where information gathered through the Key Informant Interviews (KIIs) and media contents. The employees of media houses (five national papers, two online news portals and six TV channels) were selected as study respondent. Media Content Analysis is used through the broad range of ‘texts’ from transcripts of interviews and discussions along with the materials like reports, footages, advertisements, talk-shows, articles etc. Results: The study result documented several opinions of discussants where Mass media was found to play a strong role in support of the amended tobacco control law and its implication that could be created public support against tobacco farming, exposing to companies’ tactics and other tobacco control activities. The study results also revealed that in controlling tobacco supply and demand effectively, media has been assisting the government and anti-tobacco activities productively. Majority of the Key Informants opined spontaneously on tobacco control program publicity, organizational interference, and influence of other activities on media. They also emphasized role of media for activities of anti-tobacco organizations, awareness building actions, popularization of tobacco control law and its amendment. Conclusion and Recommendation: The study shows evidence that mass media coverage of tobacco control issues is influencing the context of comprehensive tobacco control programs. To reduce tobacco consumption, along with strict enforcement efforts, media should be used to assist with the implementation of the tobacco control law. A sustained nationwide campaign to educate the masses against the dangers of smoking and smokeless tobacco is needed, and media can play an important role in creating further awareness about the dangers associated with tobacco consumption.

Keywords: Bangladesh media, mass media, role of media, tobacco control

Procedia PDF Downloads 209
12528 The Conflict between Empowerment and Exploitation: The Hypersexualization of Women in the Media

Authors: Seung Won Park

Abstract:

Pornographic images are becoming increasingly normalized as innovations in media technology arise, the porn industry explosively grows, and transnational capitalism spreads due to government deregulation and privatization of media. As the media evolves, pornography has become more and more violent and non-consensual; this growth of ‘raunch culture’ reifies the traditional power balance between men and women in which men are dominant, and women are submissive. This male domination objectifies and commodifies women, reducing them to merely sexual objects for the gratification of men. Women are exposed to pornographic images at younger and younger ages, providing unhealthy sexual role models and teaching them lessons on sexual behavior before the onset of puberty. The increasingly sexualized depiction of women in particular positions them as appropriately desirable and available to men. As a result, women are not only viewed as sexual prey but also end up treating themselves primarily as sexual objects, basing their worth off of their sexuality alone. Although many scholars are aware of and have written on the great lack of agency exercised by women in these representations, the general public tends to view some of these women as being empowered, rather than exploited. Scholarly discourse is constrained by the popular misconception that the construction of women’s sexuality in the media is controlled by women themselves.

Keywords: construction of gender, hypersexualization, media, objectification

Procedia PDF Downloads 295
12527 Infodemic and Misinformation in the Era of Coronavirus: An Analysis of Selected Rhetoric from Africa

Authors: Kunle Oparinde

Abstract:

The Covid-19 pandemic has seen several rumors and conspiracy theories overtake the truth in many online platforms across several African countries. Just as the coronavirus has travelled widely, misinformation has equally spread. Thus, it is important to launch investigations into these conspiracy theories in order to detect them early and as a result, implore health practitioners and agencies to be more proactive in repelling misinformation while at the same time provide the general populace with purely undiluted information regarding the virus. Through social media posts on platforms such as Twitter, Facebook, and WhatsApp, as well as online platforms such as Google, this study intends to draw as many instances as possible of infodemic and misinformation by reviewing and analyzing these texts and the resulting implication if the misinformation continues to gain popularity. The study discovers the use of conspiracy theories, rumors, hyperbolism, and unverified claims as elements of infodemic used during the coronavirus pandemic. Importantly, the findings of the study will assist the public to be cautious and vigilant against false information that are being peddled as original.

Keywords: infodemic, miscommunication, accuracy, social media, rumors, conspiracy

Procedia PDF Downloads 189
12526 Optimizing the Passenger Throughput at an Airport Security Checkpoint

Authors: Kun Li, Yuzheng Liu, Xiuqi Fan

Abstract:

High-security standard and high efficiency of screening seem to be contradictory to each other in the airport security check process. Improving the efficiency as far as possible while maintaining the same security standard is significantly meaningful. This paper utilizes the knowledge of Operation Research and Stochastic Process to establish mathematical models to explore this problem. We analyze the current process of airport security check and use the M/G/1 and M/G/k models in queuing theory to describe the process. Then we find the least efficient part is the pre-check lane, the bottleneck of the queuing system. To improve passenger throughput and reduce the variance of passengers’ waiting time, we adjust our models and use Monte Carlo method, then put forward three modifications: adjust the ratio of Pre-Check lane to regular lane flexibly, determine the optimal number of security check screening lines based on cost analysis and adjust the distribution of arrival and service time based on Monte Carlo simulation results. We also analyze the impact of cultural differences as the sensitivity analysis. Finally, we give the recommendations for the current process of airport security check process.

Keywords: queue theory, security check, stochatic process, Monte Carlo simulation

Procedia PDF Downloads 197
12525 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 318
12524 Practitioner Reflections: The Live Case Studies

Authors: Kate Barnett-Richards, Marie Sams

Abstract:

As the need for integration between students and industry grows, classroom practitioners must find ways of engaging students whilst also involving industry professionals to help shape the changing nature of university level education. As part of a project funded by the Disruptive Media Learning Lab at Coventry University, traditional case study based seminars on two modules were replaced by interactive live cases. Utilising Google+ as a social media platform allowed students and industry professional to come together and share ideas on a range of current issues. As technology becomes an ever increasingly important part of the higher education landscape, classroom practitioners need to adapt and find ways of utilising technological tools which can enhance the overall classroom experience. Given that many of these innovations come from the individuals involved in delivering classroom based sessions it is vital to share ideas, experiences and best practices so as to allow and encourage others to use the numerous free tools and platforms available. This poster presents the reflections, challenges, and problems faced by education practitioners when engaging students with industry partners in live case study discussions via Google+ within a classroom setting. It is expected that this poster will be of interest to a number of academics and teaching fellows who may be considering utilising social media tools to connect their students with industry.

Keywords: case study, Google+, practitioner, reflections.

Procedia PDF Downloads 303
12523 Unreality of Real: Debordean Reading of Gillian Flynn's Gone Girl

Authors: Sahand Hamed Moeel Ardebil, Zohreh Taebi Noghondari, Mahmood Reza Ghorban Sabbagh

Abstract:

Gillian Flynn’s Gone Girl, depicts a society in which, as a result of media dominance, the reality is very precarious and difficult to grasp. In Gone Girl, reality and image of reality represented on TV, are challenging to differentiate. Along with reality, individuals’ agency and independence before media and the capitalist rule are called in to question in the novel. In order to expose the unstable nature of reality and an individual’s complicated relationship with media, this study has deployed the ideas of Marxist-media theorist Guy Debord (1931-1992). In his book Society of the Spectacle (1966), Debord delineates a society in which images replace the objective reality, and people are incapable of making real changes. The results of the current study show that despite their efforts, Nick and Amy, the two main characters of the novel, are no more than spectators with very little agency before the media. Moreover, following Debord’s argument about the replacement of reality with images, everyone and every institution in Gone Girl projects an image that does not necessarily embody the objective reality, a fact that makes it very hard to differentiate the real from unreal.

Keywords: agency, Debord, Gone Girl, media studies, society of spectacle, reality

Procedia PDF Downloads 118