Search results for: cyber victim
400 Machine Learning Invariants to Detect Anomalies in Secure Water Treatment
Authors: Jonathan Heng, Yoong Cheah Huei
Abstract:
A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too.Keywords: machine learning invariants, generalized CUSUM algorithm with invariants and detection strategy, scope of cyber attacks, strategic model, tuning parameters
Procedia PDF Downloads 181399 False Assumptions Made in Cybersecurity Curriculum: K-12
Authors: Nathaniel Evans, Jessica Boersma, Kenneth Kass
Abstract:
With technology and STEM fields growing every day, there is a significant projected shortfall in qualified cybersecurity workers. As such, it is essential to develop a cybersecurity curriculum that builds skills and cultivates interest in cybersecurity early on. With new jobs being created every day and an already significant gap in the job market, it is vital that educators are pro-active in introducing a cybersecurity curriculum where students are able to learn new skills and engage in an age-appropriate cyber curriculum. Within this growing world of cybersecurity, students should engage in age-appropriate technology and cybersecurity curriculum, starting with elementary school (k-5), extending through high school, and ultimately into college. Such practice will provide students with the confidence, skills, and, ultimately, the opportunity to work in the burgeoning information security field. This paper examines educational methods, pedagogical practices, current cybersecurity curricula, and other educational resources and conducts analysis for false assumptions and developmental appropriateness. It also examines and identifies common mistakes with current cyber curriculum and lessons and discuss strategies for improvement. Throughout the lessons that were reviewed, many common mistakes continued to pop up. These mistakes included age appropriateness, technology resources that were available, and consistency of student’s skill levels. Many of these lessons were written for the wrong grade levels. The ones written for the elementary level all had activities that assumed that every student in the class could read at grade level and also had background knowledge of the cyber activity at hand, which is not always the case. Another major mistake was that these lessons assumed that all schools had any kind of technology resource available to them. Some schools are 1:1, and others are only allotted three computers in their classroom where the students have to share. While coming up with a cyber-curriculum, it has to be kept in mind that not all schools are the same, not every classroom is the same. There are many students who are not reading at their grade level or have not had exposure to the digital world. We need to start slow and ease children into the cyber world. Once they have a better understanding, it will be easier to move forward with these lessons and get the students engaged. With a better understanding of common mistakes that are being made, a more robust curriculum and lessons can be created that no only spark a student’s interest in this much-needed career field but encourage learning while keeping our students safe from cyber-attacks.Keywords: assumptions, cybersecurity, k-12, teacher
Procedia PDF Downloads 166398 Perpetrator Trauma in Current World Cinema
Authors: Raya Morag
Abstract:
This paper proposes a new paradigm for cinema/trauma studies - the trauma of the perpetrator. Canonical trauma research from Freud’s Aetiology of Hysteria to the present has been carried out from the perspective of identification with the victim, as have cinema trauma research and contemporary humanities-based trauma studies, climaxing during the 1990s in widespread interest in the victim vis-à-vis the Holocaust, war, and domestic violence. Breaking over 100 years of repression of the abhorrent and rejected concept of the perpetrator in psychoanalytic-based research proposes an uncanny shift in our conception of psychoanalysis' trajectory from women's 'hysteria' to 'post-traumatic stress disorder'. This new paradigm is driven by the global emergence of new waves of films (2007-2015) representing trauma suffered by perpetrators involved in the new style of war entailing deliberate targeting of non-combatants. Analyzing prominent examples from Israeli post-second Intifada documentaries (e.g., Ari Folman’s Waltz with Bashir), and post post-Iraq (and Afghanistan) War American documentaries (e.g., Errol Morris' Standard Operating Procedure), the paper discusses the limitations of victim trauma by the firm boundaries it (rightly) set in order to defend such victims of nineteenth and especially twentieth-century catastrophes; the epistemological processes needed in order to consider perpetrators’ trauma as an inevitable part of psychiatric-psychological and cultural perspectives on trauma, and, thus, the definition of perpetrators' trauma in contrast to victims'. It also analyzes the perpetrator's figure in order to go beyond the limitation of current trauma theory's relation to the Real, thus transgressing the 'unspeakableness' of the trauma itself. The paper seeks an exploration of what perpetrator trauma teaches us not only as a counter-paradigm to victim trauma, but as a reflection on the complex intertwining of the two paradigms in the twenty-first century collective new war unconscious, and on what psychoanalysis might offer us in the first decade of this terrorized-ethnicized century.Keywords: American war documentaries, Israeli war documentaries, 'new war', perpetrator trauma
Procedia PDF Downloads 297397 Acceptance towards Counselling Services among Flood Victims in Selangor
Authors: Husni Mohd Radzi, Lilie Zahara Ramly, Sapora Sipon, Salhah Abdullah
Abstract:
Malaysia have been experiencing series of huge floods all around the country for the past decades despide planned development done by local authorities. The floods incurred due to factors like natural climate change or man-made disaster. Floods have caused a lot of damages, destructions and losses in term of infrastructure, financial implications and physical health. However, other damaging aspect was not being given much attention are the psychological need of the flood victim. The traumatic impact from the natural disaster like floods may cause serious psychological and spiritual deterioration. Many flood relief shelters in the past did not provide counseling services for flood victims to consult, and as a result, it contributes to added stress among the flood victims, as the issue were not being addressed. Some studies indicates that flood victims did not look for counseling service being offered. A total of 257 flood victim was involved in this study. Main area of the study was Kg Bukit Changgang, Kg. Rancangan Tanah Belia, Kg. Labohan Dagang and Kg.Olak Lempit in Kuala Langat, Selangor. The flood victims have responded to the survey given and the data was analyze using SPSS for descriptive information and other measures. At least 13 victims were reported to have experienced moderate to severe level of stress and anxiety over the flood disaster incidents and a total of 88 respondents admitted to have at least thought and consider getting counseling service.Keywords: perception, acceptance towards counseling, counseling service for flood victim, disaster
Procedia PDF Downloads 319396 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 211395 Case Study of Child Labour in Pakistan
Authors: Ahmad Ali Ansari, Hassan Arshad, Basharat Hussani, Adnan Raza, Ahmad Ali Khan
Abstract:
Child labor is a kind of an issue which was found all over the world, but now the first world countries like countries in Europe and America (USA) got hold of it up to a large extent but Underdeveloped or the developing countries including Pakistan are still a victim of this issue. The following attempt has been made in this research article to figure out the main reasons of child labor in underdeveloped countries especially in Pakistan and also some of the issues are discussed which are hindering the solution of child labor in Pakistan. In this research we interviewed 70 working children in the area of Rawalpindi, Islamabad, Taxila and Hatar who belonged to the different parts of the country and figured out the basic causes of the child labor in Pakistan, what are its bad effects on the young one who is a victim of it and we also put a light on what the government of Pakistan is doing in this context and what the government still have to do.Keywords: child labour, Pakistan, case study, underdeveloped countries
Procedia PDF Downloads 664394 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022
Authors: Mojtaba Fayaz, Richard Hallal
Abstract:
This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks
Procedia PDF Downloads 116393 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 218392 Oedipus as Victim of Fate and Human Psychology: The Fatal Curiosity
Authors: Soham Das
Abstract:
Oedipus in Oedipus Rex is necessarily a victim of fate and his own psychology. His curiosity brings about his downfall. Ancient Greek plays weren't just portrayals of some obscure tale but were insights into human nature. Oedipus, although a victim of circumstances, digs his own grave by curiously unravelling his past. Jocasta foresees his doom and begs him to stop, but to no avail. The curiosity of Oedipus forces him, almost like a drug, to explore the mystery regarding his birth. This curiosity is not something extraordinary in Oedipus - it is an intrinsic attribute of human nature. Knowledge is not always desired - whether it is Adam or Oedipus, their curiosity caused their eventual downfall. Oedipus was ill-fated since birth. He did not know that Laius was his biological father and therefore killed him. He arrived at Thebes, solved the riddle of the Sphinx, and married Jocasta without knowing that she, in fact, was his biological mother. He begot children and was living happily with his family when a sudden calamity struck Thebes. The calamity, though at first seemed public in nature, but later proved to be very personal for Oedipus. It drives home the fundamental truth about uncertainty of human life. That Laius was slayed by his own son, even after many precautions, proves the helplessness of humans in front of the designs of fate. Oedipus's mutilation of his eyes is also fated. It was committed by him in the heat of the moment and was certainly not a rational decision. It is evident to any modern reader that Oedipus does not have justice. Destiny treats him unfairly. Oedipus, in fact, defends his actions in Oedipus Rex in its sequel Oedipus At Colonus. The research paper discusses the unhappy fate of Oedipus and the role of destiny and his own curiosity in achieving it.Keywords: ancient Greek drama, Oedipus Rex, Sophocles, destiny
Procedia PDF Downloads 1018391 Computer Fraud from the Perspective of Iran's Law and International Documents
Authors: Babak Pourghahramani
Abstract:
One of the modern crimes against property and ownership in the cyber-space is the computer fraud. Despite being modern, the aforementioned crime has its roots in the principles of religious jurisprudence. In some cases, this crime is compatible with the traditional regulations and that is when the computer is considered as a crime commitment device and also some computer frauds that take place in the context of electronic exchanges are considered as crime based on the E-commerce Law (approved in 2003) but the aforementioned regulations are flawed and until recent years there was no comprehensive law in this regard; yet after some years the Computer Crime Act was approved in 2009/26/5 and partly solved the problem of legal vacuum. The present study intends to investigate the computer fraud according to Iran's Computer Crime Act and by taking into consideration the international documents.Keywords: fraud, cyber fraud, computer fraud, classic fraud, computer crime
Procedia PDF Downloads 332390 Nature of Traffic Robbery Victimisation Experience 2015-2023
Authors: Idenyi Goshen Peter, Oludayo Tade
Abstract:
Traffic robbery is a prevalent issue in Lagos State, impacting commuters and transport workers, necessitating an examination of victimization experiences and offender-victim dynamics. The research aim is to investigate the nature of traffic robbery victimization experiences, strategies employed by offenders, and the extent of the crime as reported in newspapers. Utilizing content analysis, the study examines 167 traffic robbery cases from 2015 to 2023 reported in five newspapers using the routine activity theory to understand the dynamics between offenders and victims. The research discusses the victimization experience and convergence of the offenders and victims, it documents the extent of the crime as captured by various newspapers (Vanguard, Punch. Tribune, Sun and Guardian ), and it also interrogates the strategies, methods deployed by traffic robbers. The study addresses the nature, strategies, and extent of traffic robbery victimization experiences, shedding light on the dynamics of the crime over an eight-year period. The paper implored secondary research from newspaper publications, and also content analysis for the research. Routine activity theory was used to explain the phenomenon that exists between the offender and the victim. Consequently, the common method used by offenders is dispossessing victims of their valuables, leading to fear-driven victim experiences, with spikes in incidents observed in June and December, particularly in Vanguard and Punch publications.Keywords: traffic robbery, victimisation experience, offender, routine activity
Procedia PDF Downloads 21389 Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems
Authors: Manpreet Kaur, Amita Rani, Sanjay Kumar
Abstract:
The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios.Keywords: internet of things, cyber-physical systems, congestion control, priority, transmission rate
Procedia PDF Downloads 308388 Regulatory and Economic Challenges of AI Integration in Cyber Insurance
Authors: Shreyas Kumar, Mili Shangari
Abstract:
Integrating artificial intelligence (AI) in the cyber insurance sector represents a significant advancement, offering the potential to revolutionize risk assessment, fraud detection, and claims processing. However, this integration introduces a range of regulatory and economic challenges that must be addressed to ensure responsible and effective deployment of AI technologies. This paper examines the multifaceted regulatory landscape governing AI in cyber insurance and explores the economic implications of compliance, innovation, and market dynamics. AI's capabilities in processing vast amounts of data and identifying patterns make it an invaluable tool for insurers in managing cyber risks. Yet, the application of AI in this domain is subject to stringent regulatory scrutiny aimed at safeguarding data privacy, ensuring algorithmic transparency, and preventing biases. Regulatory bodies, such as the European Union with its General Data Protection Regulation (GDPR), mandate strict compliance requirements that can significantly impact the deployment of AI systems. These regulations necessitate robust data protection measures, ethical AI practices, and clear accountability frameworks, all of which entail substantial compliance costs for insurers. The economic implications of these regulatory requirements are profound. Insurers must invest heavily in upgrading their IT infrastructure, implementing robust data governance frameworks, and training personnel to handle AI systems ethically and effectively. These investments, while essential for regulatory compliance, can strain financial resources, particularly for smaller insurers, potentially leading to market consolidation. Furthermore, the cost of regulatory compliance can translate into higher premiums for policyholders, affecting the overall affordability and accessibility of cyber insurance. Despite these challenges, the potential economic benefits of AI integration in cyber insurance are significant. AI-enhanced risk assessment models can provide more accurate pricing, reduce the incidence of fraudulent claims, and expedite claims processing, leading to overall cost savings and increased efficiency. These efficiencies can improve the competitiveness of insurers and drive innovation in product offerings. However, balancing these benefits with regulatory compliance is crucial to avoid legal penalties and reputational damage. The paper also explores the potential risks associated with AI integration, such as algorithmic biases that could lead to unfair discrimination in policy underwriting and claims adjudication. Regulatory frameworks need to evolve to address these issues, promoting fairness and transparency in AI applications. Policymakers play a critical role in creating a balanced regulatory environment that fosters innovation while protecting consumer rights and ensuring market stability. In conclusion, the integration of AI in cyber insurance presents both regulatory and economic challenges that require a coordinated approach involving regulators, insurers, and other stakeholders. By navigating these challenges effectively, the industry can harness the transformative potential of AI, driving advancements in risk management and enhancing the resilience of the cyber insurance market. This paper provides insights and recommendations for policymakers and industry leaders to achieve a balanced and sustainable integration of AI technologies in cyber insurance.Keywords: artificial intelligence (AI), cyber insurance, regulatory compliance, economic impact, risk assessment, fraud detection, cyber liability insurance, risk management, ransomware
Procedia PDF Downloads 33387 Beyond Black Friday: The Value of Collaborative Research on Seasonal Shopping Events and Behavior
Authors: Jasmin H. Kwon , Thomas M. Brinthaupt
Abstract:
There is a general lack of consumer behavior research on seasonal shopping events. Studying these kinds of events is interesting and important for several reasons. First, global shopping opportunities have implications for cross-cultural shopping events and effects on seasonal events in other countries. Second, seasonal shopping events are subject to economic conditions and may wane in popularity, especially with e-commerce options. Third, retailers can expand the success of their seasonal shopping events by taking advantage of cross-cultural opportunities. Fourth, it is interesting to consider how consumers from other countries might take advantage of different countries’ seasonal shopping events. Many countries have seasonal shopping events such as Black Friday. Research on these kinds of events can lead to the identification of cross-cultural similarities and differences in consumer behavior. We compared shopping motivations of college students who did (n=36) and did not (n=81) shop on Cyber Monday. The results showed that the groups did not differ significantly on any of the shopping motivation subscales. The Cyber Monday shoppers reported being significantly more likely to agree than disagree that their online shopping experience was enjoyable and exciting. They were more likely to disagree than agree that their experience was overwhelming. In addition, they agreed that they shopped only for deals, purchased the exact items they wanted, and thought that their efforts were worth it. Finally, they intended to shop again at next year’s Cyber Monday. It appears that there are many positive aspects to online seasonal shopping, independent of one’s typical shopping motivations. Different countries have seasonal events similar to the Black Friday and Cyber Monday shopping holiday (e.g., Boxing Day, Fukubukuro, China’s Singles Day). In Korea, there is increasing interest in taking advantage of U.S. Black Friday and Cyber Monday opportunities. Government officials are interested in adapting the U.S. holiday to Korean retailers, essentially recreating the Black Friday/Cyber Monday holiday there. Similarly, the Japanese Fukubukuro ('Lucky Bag') holiday is being adapted by other countries such as Korea and the U.S. International shipping support companies are also emerging that help customers to identify and receive products from other countries. U.S. department stores also provide free shipping on international orders for certain items. As these structural changes are occurring and new options for global shopping emerge, the need to understand the role of shoppers’ motivations becomes even more important. For example, the Cyber Monday results are particularly relevant to the new landscape with e-commerce and cross-cultural opportunities, since many of these events involve e-commerce. Within today’s global market, physical location of a retail store is no longer a limitation to growing one’s market share. From a consumer perspective, it is important to investigate how shopping motivations are related to e-commerce seasonal events. From a retail perspective, understanding the shopping motivations of international customers would help retailers to expand and better tailor their seasonal shopping events beyond the boundaries of their own countries. From a collaborative perspective, research on this topic can include interdisciplinary researchers, including those from fashion merchandising, marketing, retailing, and psychology.Keywords: Black Friday, cross-cultural research, Cyber Monday, seasonal shopping behavior
Procedia PDF Downloads 398386 Commentary on Successful and Emerging Bullying Control Programs: A Comparison between Eighteen Bullying Interventions Applied Worldwide
Authors: Sohni Siddiqui, Anja Schultze-Krumbholz
Abstract:
Our lives now revolve more around online-related tasks, as the internet has become a necessity. One of the disturbance concerns with high internet usage is the multiplication of cyber-associated risky behaviors such as cyber aggression and/or cyberbullying. Cyber Bullying is an emerging issue that needs immediate attention from many stakeholders such as parents, doctors, school administrators, policymakers, researchers, and others, especially in the COVID-19 pandemic when online learning has been adopted as an instructional strategy, and there is a continuous rise in cyberbullying cases. The aim of the article is to review existing successful and emerging interventions designed to control bullying and cyberbullying by engaging individuals through teachers’ professional development and adopting a whole-school approach. The study identified the strengths and limitations of the programs and suggested improvements to existing interventions. Preparing interventions with a strong theoretical framework, integrating applications of emerging theories in interventions, promoting proactive and reactive strategies in combination, beginning with the baseline needs assessment surveys, reducing digital time and digital divide among parents and children, promoting the concept of lead trainer, peer trainer, and hot spots, focusing on physical activities, use of landmarks are some of the recommendations proposed by authors. In addition to face-to-face intervention, the researchers recommend updating and improving previous intervention programs with games and apps. Especially in the time of pandemic crises, when face-to-face interactions are limited and cyberbullying is triggered, the use of apps, web-based interventions, and games can be an effective way to control electronic perpetration and victimization.Keywords: anti bullying programs, cyber bullying, individualized trainings, teachers’ professional development, whole school interventions
Procedia PDF Downloads 150385 The Colombian Special Jurisdiction for Peace, a Transitional Justice Mechanism That Prioritizes Reconciliation over Punishment: A Content Analysis of the Colombian Peace Agreement
Authors: Laura Mendez
Abstract:
Tribunals for the prosecution of crimes against humanity have been implemented in recent history via international intervention or imposed by one side of the conflict, as in the cases of Rwanda, Iraq, Argentina, and Chile. However, the creation of a criminal tribunal as the result of a peace agreement between formerly warring parties has been unique to the Colombian peace process. As such, the Colombian Jurisdiction for Peace (SJP), or JEP for its Spanish acronym, is viewed as a site of social contestation where actors shape its design and implementation. This study contributes to the literature of transitional justice by analyzing how the framing of the creation of the Colombian tribunal reveals the parties' interests. The analysis frames the interests of the power-brokers, i.e., the government and the Revolutionary Armed Forces of Colombia (FARC), and the victims in light of the tribunal’s functions. The purpose of this analysis is to understand how the interests of the parties are embedded in the designing of the SJP. This paper argues that the creation of the SJP rests on restorative justice, for which the victim, not the perpetrator, is at the center of prosecution. The SJP’s approach to justice moves from prosecution as punishment to prosecution as sanctions. SJP’s alternative sanctions focused on truth, reparation, and restoration are designed to humanize both the victim and the perpetrator in order to achieve reconciliation. The findings also show that requiring the perpetrator to perform labor to repair the victim as an alternative form of sanction aims to foster relations of reintegration and social learning between victims and perpetrators.Keywords: transitional justice mechanisms, criminal tribunals, Colombia, Colombian Jurisdiction for Peace, JEP
Procedia PDF Downloads 118384 Cyber Security in Nigeria: A Collaboration between Communities and Professionals
Authors: Alese Boniface K., Adu Michael K., Owa Victor K.
Abstract:
Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.Keywords: security, cybercrime, internet, government, stakeholders, partnerships
Procedia PDF Downloads 538383 Pattern of Cybercrime Among Adolescents: An Exploratory Study
Authors: Mohamamd Shahjahan
Abstract:
Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.Keywords: cybercrime, adolescents, pattern, internet
Procedia PDF Downloads 80382 Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells
Authors: Andrea Tundis, Carlos García Cordero, Rolf Egert, Alfredo Garro, Max Mühlhäuser
Abstract:
Resilience is an important system property that relies on the ability of a system to automatically recover from a degraded state so as to continue providing its services. Resilient systems have the means of detecting faults and failures with the added capability of automatically restoring their normal operations. Mastering resilience in the domain of Cyber-Physical Systems is challenging due to the interdependence of hybrid hardware and software components, along with physical limitations, laws, regulations and standards, among others. In order to overcome these challenges, this paper presents a modeling approach, based on the concept of Dynamic Cells, tailored to the management of Smart Grids. Additionally, a heuristic algorithm that works on top of the proposed modeling approach, to find resilient configurations, has been defined and implemented. More specifically, the model supports a flexible representation of Smart Grids and the algorithm is able to manage, at different abstraction levels, the resource consumption of individual grid elements on the presence of failures and faults. Finally, the proposal is evaluated in a test scenario where the effectiveness of such approach, when dealing with complex scenarios where adequate solutions are difficult to find, is shown.Keywords: cyber-physical systems, energy management, optimization, smart grids, self-healing, resilience, security
Procedia PDF Downloads 326381 Oath Taking-An Approach to Combating Criminality: Challenges and Implication to the Victim Centered Approach in Human Trafficking
Authors: Faith G. Ehiemua, Chandra E. Ulinfun
Abstract:
This work presents two approaches that use competing models to combat criminality in human trafficking. It argues that oath-taking is an approach used to combat and repress crime by natives of African descent. Therefore, certain value choices reflected explicitly or implicitly in its habitual functioning are features of crime control, a model of the criminal process used to repress and prevent crime. By pitting the approaches against each other, the work examines the utility of the purpose of each approach with the aim of assessing moral worthiness. The approaches adopted are descriptive, normative, and theoretical. The findings reveal that oath-taking is effective in human trafficking mainly because Africans believe that the African traditional system is efficient. However, the utilitarian ethical theory applied to the use of oath-taking in human trafficking shows oath-taking as protecting the interest of human traffickers against the general good of society.Keywords: human rights, human trafficking, oath taking, utilitarianism, victim-centered approach
Procedia PDF Downloads 216380 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability
Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi
Abstract:
There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitizationKeywords: cybersecurity, supply chain methodology, secure substation, digitization
Procedia PDF Downloads 64379 Victim Witnesses of Human Trafficking: A Phenomenological Study
Authors: Jireh Reinor L. Vitto, Mylene S. Gumarao, Levy M. Fajanilan, Sheryll Ann M. Castillo, Leonardo B. Dorado, Miriam P. Narbarte
Abstract:
Human trafficking may happen to anyone. The study aimed to explore the experiences of victim witnesses of human trafficking. It utilized a qualitative phenomenological study design. Eighteen women, 15 to 46 years old, had experienced human trafficking (sex or labor trafficking), and with a filed case or not. An in-depth semi-structured, open-ended interview was employed to gather information. Guardians were also interviewed for triangulation purposes. Findings showed that the participants experienced fatigue and abuse for their physical aspect and gained negative feelings such as burdened, sad, scared (fear), stress, anger, trauma, depress and suicidal thoughts for their psychological aspect. For the spiritual aspect, the participants concluded to have enhanced spiritual life where they knew about God, became closer to God, and learned how to pray. They also faced challenges such as dysfunctional family, delinquent friends, exploitation, problems kept from the family, and poverty, which resulted in their becoming victims of human trafficking. To cope with the situation, they utilized family support, prayers, guts or courage (lakas ng loob), negotiation with their employer, and support from kababayans. Their practices and mechanisms to recover were the Blas Ople Center, rescue/entrapment operation, shelter, and embassy. After the incident, the participants shared that they earned to have thoughts of having a good life without going abroad/makabayan, knowledge of overseas Filipino workers, wise choice of friends, contentment, and value for the family.Keywords: victim-witnesses, human trafficking, lived experiences, challenges, coping strategies
Procedia PDF Downloads 131378 Journey to Cybercrime and Crime Opportunity: Quantitative Analysis of Cyber Offender Spatial Decision Making
Authors: Sinchul Back, Sun Ho Kim, Jennifer LaPrade, Ilju Seong
Abstract:
Due to the advantage of using the Internet, cybercriminals can reach target(s) without border controls. Prior research on criminology and crime science has largely been void of empirical studies on journey-to-cybercrime and crime opportunity. Thus, the purpose of this study is to understand more about cyber offender spatial decision making associated with crime opportunity factors (i.e., co-offending, offender-stranger). Data utilized in this study were derived from 306 U.S. Federal court cases of cybercrime. The findings of this study indicated that there was a positive relationship between co-offending and journey-to-cybercrime, whereas there was no link between offender-stranger and journey-to-cybercrime. Also, the results showed that there was no relationship between cybercriminal sex, age, and journey-to-cybercrime. The policy implications and limitations of this study are discussed.Keywords: co-offending, crime opportunity, journey-to-cybercrime, offender-stranger
Procedia PDF Downloads 179377 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection
Authors: Muhammad Ali
Abstract:
Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection
Procedia PDF Downloads 125376 Refuge(e)s in Digital Diaspora: Reimagining and Reimaging ‘Ethnically Cleansed’ Villages as ‘Cyber Villages’
Authors: Hariz Halilovich
Abstract:
Based on conventional and digital ethnography, this paper discusses the ways Bosnian refugees utilise digital technologies and new media to recreate, synchronise and sustain their identities and memories in the aftermath of ‘ethnic cleansing’ and genocide and in the contexts of their new emplacements and home-making practices in diaspora. In addition to discussing representations of displacement and emplacement in the ‘digital age’, the paper also aims to make a contribution to the understanding and application of digital ethnography as an emerging method of inquiry in anthropology and related social science disciplines. While some researchers see digital ethnography as an exclusively online–based research, the author of this paper argues that it is critical to understand the online world in the context of the real world—made of real people, places, and social relations.Keywords: Bosnia, cyber villages, digital diaspora, refugees
Procedia PDF Downloads 242375 The Image of Victim and Criminal in Love Crimes on Social Media in Egypt: Facebook Discourse Analysis
Authors: Sherehan Hamdalla
Abstract:
Egypt has experienced a series of terrifying love crimes in the last few months. This ‘trend’ of love crimes started with a young man caught on video slaughtering his ex-girlfriend in the street in the city of El Mansoura. The crime shocked all Egyptian citizens at all levels; unfortunately, not less than three similar crimes took place in other different Egyptian cities with the same killing trigger. The characteristics and easy access and reach of social media consider the reason why it is one of the most crucial online communication channels; users utilize social media platforms for sharing and exchanging ideas, news, and many other activities; they can freely share posts that reflect their mindset or personal views regarding any issues, these posts are going viral in all social media account by reposting or numbers of shares for these posts to support the content included, or even to attack. The repetition of sharing certain posts could mobilize other supporters with the same point of view, especially when that crowd’s online participation is confronting a public opinion case’s consequences. The death of that young woman was followed by similar crimes in other cities, such as El Sharkia and Port Said. These love crimes provoked a massive wave of contention among all social classes in Egypt. Strangely, some were supporting the criminal and defending his side for several reasons, which the study will uncover. Facebook, the most popular social media platform for Egyptians, reflects the debate between supporters of the victim and supporters of the criminal. Facebook pages were created specifically to disseminate certain viewpoints online, for example, asking for the maximum penalty to be given to criminals. These pages aimed to mobilize the maximum number of supporters and to affect the outcome of the trials.Keywords: love crimes, victim, criminal, social media
Procedia PDF Downloads 76374 Adaptive Data Approximations Codec (ADAC) for AI/ML-based Cyber-Physical Systems
Authors: Yong-Kyu Jung
Abstract:
The fast growth in information technology has led to de-mands to access/process data. CPSs heavily depend on the time of hardware/software operations and communication over the network (i.e., real-time/parallel operations in CPSs (e.g., autonomous vehicles). Since data processing is an im-portant means to overcome the issue confronting data management, reducing the gap between the technological-growth and the data-complexity and channel-bandwidth. An adaptive perpetual data approximation method is intro-duced to manage the actual entropy of the digital spectrum. An ADAC implemented as an accelerator and/or apps for servers/smart-connected devices adaptively rescales digital contents (avg.62.8%), data processing/access time/energy, encryption/decryption overheads in AI/ML applications (facial ID/recognition).Keywords: adaptive codec, AI, ML, HPC, cyber-physical, cybersecurity
Procedia PDF Downloads 78373 An Exploration of Parenting By Perpetrator Fathers and Victim Mothers in the Context of Domestic Violence
Authors: Gunendra Rathnawali Kumarihamy Dissanayake
Abstract:
Research on parenting of both perpetrators and victims of domestic violence (DV) is growing but limited. Further, much of this research in the Asian context is limited to explorations of victim mothers' parenting capacities, not shedding much light on the parenting of the perpetrator fathers. The current qualitative study aimed to explore how both the perpetrators and victims of DV engaged in parenting in the Sri Lankan cultural context. Twenty case studies were conducted with a sample of help-seeking women aged 20 to 40 years representing working to upper-middle social class. Participants have interviewed about their own as well as their partners´ parenting behaviors. The majority of women reported that their partners were often aggressive, controlling and authoritarian, less consistent, and engaged in a variety of manipulative behaviors intending to harm the relationship between their child and them. Further, victim mothers' styles of parenting and authority as parents have been severely undermined by their partners through frequent criticism, ridicule, and insulting in front of the children. As a result, mothers experienced great difficulty specifically trying to discipline their adolescent children as the children have started to disregard the mothers' authority. Most of the children also have shown treatment similar to that of their fathers', treating the mother as a personal servant not worthy of being listened to, thereby increasing the mothers' parenting stress. The mothers were often blamed and held responsible for the problems of the children by their partners, encouraging the children to disrespect and blame the mother for their problems leading them to take the side of the father who had more power. Findings are similar to those of the western context. This study highlights the intersection between domestic violence and parenting, and specific implications and recommendations for DV service providers are offered.Keywords: parenting, domestic violence, impact, children
Procedia PDF Downloads 166372 Approaches to Ethical Hacking: A Conceptual Framework for Research
Authors: Lauren Provost
Abstract:
The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.Keywords: ethical hacking, literature review, penetration testing, social engineering
Procedia PDF Downloads 218371 A Digital Twin Approach to Support Real-time Situational Awareness and Intelligent Cyber-physical Control in Energy Smart Buildings
Authors: Haowen Xu, Xiaobing Liu, Jin Dong, Jianming Lian
Abstract:
Emerging smart buildings often employ cyberinfrastructure, cyber-physical systems, and Internet of Things (IoT) technologies to increase the automation and responsiveness of building operations for better energy efficiency and lower carbon emission. These operations include the control of Heating, Ventilation, and Air Conditioning (HVAC) and lighting systems, which are often considered a major source of energy consumption in both commercial and residential buildings. Developing energy-saving control models for optimizing HVAC operations usually requires the collection of high-quality instrumental data from iterations of in-situ building experiments, which can be time-consuming and labor-intensive. This abstract describes a digital twin approach to automate building energy experiments for optimizing HVAC operations through the design and development of an adaptive web-based platform. The platform is created to enable (a) automated data acquisition from a variety of IoT-connected HVAC instruments, (b) real-time situational awareness through domain-based visualizations, (c) adaption of HVAC optimization algorithms based on experimental data, (d) sharing of experimental data and model predictive controls through web services, and (e) cyber-physical control of individual instruments in the HVAC system using outputs from different optimization algorithms. Through the digital twin approach, we aim to replicate a real-world building and its HVAC systems in an online computing environment to automate the development of building-specific model predictive controls and collaborative experiments in buildings located in different climate zones in the United States. We present two case studies to demonstrate our platform’s capability for real-time situational awareness and cyber-physical control of the HVAC in the flexible research platforms within the Oak Ridge National Laboratory (ORNL) main campus. Our platform is developed using adaptive and flexible architecture design, rendering the platform generalizable and extendable to support HVAC optimization experiments in different types of buildings across the nation.Keywords: energy-saving buildings, digital twins, HVAC, cyber-physical system, BIM
Procedia PDF Downloads 110