Search results for: cyber violence measurement tool
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8171

Search results for: cyber violence measurement tool

7961 Kinect Station: Using Microsoft Kinect V2 as a Total Station Theodolite for Distance and Angle Determination in a 3D Cartesian Environment

Authors: Amin Amini

Abstract:

A Kinect sensor has been utilized as a cheap and accurate alternative to 3D laser scanners and electronic distance measurement (EDM) systems. This research presents an inexpensive and easy-to-setup system that utilizes the Microsoft Kinect v2 sensor as a surveying and measurement tool and investigates the possibility of using such a device as a replacement for conventional theodolite systems. The system was tested in an indoor environment where its accuracy in distance and angle measurements was tested using virtual markers in a 3D Cartesian environment. The system has shown an average accuracy of 97.94 % in measuring distances and 99.11 % and 98.84 % accuracy for area and perimeter, respectively, within the Kinect’s surveying range of 1.5 to 6 meters. The research also tested the system competency for relative angle determination between two objects.

Keywords: kinect v2, 3D measurement, depth map, ToF

Procedia PDF Downloads 44
7960 Direct and Indirect Effects of Childhood Traumas, Emotion Regulation Difficulties and Age on Tendency to Violence

Authors: Selin Kara-Bahçekapılı, Bengisu Nehir Aydın

Abstract:

Objective: In this study, it is aimed to examine the relationship between childhood traumas (overprotection-control, emotional/physical/sexual abuse, emotional/physical neglect), age, emotional regulation difficulties, and the tendency of violence in adults. In the study, the direct and indirect effects of 6 sub-factors of childhood traumas, emotion regulation difficulties, and age on tendency to violence are evaluated on a model that theoretically reveals. Method: The population of this cross-sectional study consists of individuals between the ages of 18-65 living in Turkey. The data from 527 participants were obtained by online surveys and convenience sampling method within the scope of the study. As a result of exclusion criteria and then outlier data analysis, the data of 443 participants were included in the analysis. Data were collected by demographic information form, childhood trauma scale, emotion regulation difficulty scale, and violence tendency scale. Research data were analyzed by SPSS and AMOS using correlation, path analysis, direct and indirect effects. Results: According to the research findings, the variables in the model explained 28.2% of the variance of the mean scores of the individuals' tendency to violence. Emotion regulation difficulties have the most direct effect on the tendency to violence (d=.387; p<.01). The effects of excessive protection and control, emotional neglect, and physical neglect variables on the tendency to violence are not significant. When the significant and indirect effects of the variables on tendency to violence over emotion regulation difficulties are examined, age has a negative effect, emotional neglect has a positive effect, emotional abuse has a positive effect, and overprotection-control has a positive effect. The indirect effects of sexual abuse, physical neglect, and physical abuse on tendency to violence are not significant. Childhood traumas and age variables in the model explained 24.1% of the variance of the mean scores of the individuals’ emotion regulation difficulties. The variable that most affects emotion regulation difficulties is age (d=-.268; p<.001). The direct effects of sexual abuse, physical neglect, and physical abuse on emotion regulation difficulties are not significant. Conclusion: The results of the research emphasize the critical role of difficulty in emotion regulation on the tendency to violence. Difficulty in emotion regulation affects the tendency to violence both directly and by mediating different variables. In addition, it is seen that some sub-factors of childhood traumas have direct and/or indirect effects on the tendency to violence. Emotional abuse and age have both direct and indirect effects on the tendency to violence over emotion regulation difficulties.

Keywords: childhood trauma, emotion regulation difficulties, tendency to violence, path analysis

Procedia PDF Downloads 68
7959 Experience of Intimate Partner Violence and Mental Health Status of Women of Reproductive Age Group in a Rural Community in Southwest Nigeria

Authors: Ayodeji Adebayo, Tolulope Soyannwo, Oluwakemi A. Sigbeku

Abstract:

Intimate Partner Violence (IPV) is a significant public health problem with adverse health consequences. There is increasing evidence of association of IPV with mental health problems. Understanding the association between IPV and mental health status of women of reproductive aged group in the rural communities in Nigeria can provide information to improve maternal health status. Therefore, this study was conducted to examine the relationship between experience of IPV and mental health status of women of reproductive aged group in a rural community in Southwest Nigeria. A community based cross-sectional survey was conducted using a cluster sampling technique to select 283 non-pregnant women of reproductive age group (15-49 years Mental health was assessed based on respondents’ experience of any symptoms of depression, anxiety and/or low self-esteem. IPV was assessed over a period of 12 months and the forms of IPV assessed were emotional, physical and sexual. An interviewer administered questionnaire was used to collect information on experience of IPV, reproductive history and factors influencing mental health. Data was analyzed using descriptive statistics, Chi-square and multivariate logistic regression at 5% level of significance. The mean age of respondents was 26.1± 7.8 with 57.1% aged 15-24years. More than half (58.0%) were married. Overall, 60.7% of respondents had mental health problems while 84.8% experienced all categories of violence. The pattern of IPV includes physical violence (10.7%), emotional violence (82.7%) and sexual violence (20.8%). Women who experienced sexual violence by a partner are most likely to suffer from all mental issues. Also, gynaecological morbidities are associated with increasing risk of mental health problems. The research demonstrates an urgent need for mental health policies to recognize the relationship between intimate partner violence, gynaecological morbidities and mental health problems in women in Nigeria.

Keywords: intimate partner violence, mental health, reproductive age group, women

Procedia PDF Downloads 303
7958 An Investigation of Cyber Financial Crimes After the Enactment of PECA: A Case Study of Pakistan’s Banking Sector During 2016 to 2022

Authors: Zain Khalid

Abstract:

The paper outlines the trends of cyber financial crimes and frauds – approximating upto – in Pakistan after the enactment of The Prevention of Electronic Crimes Act in 2016. The paper elaborates on the newer methods that fraudsters have adopted after tighter preventive and counter measures were employed in Pakistan partly as a result of following the international finance related commitments, particularly the FATF regulations. The paper adopts case studies methods to highlight various aspects of the financial frauds and crimes committed and later investigated jointly by Pakistan’s one of the federal law enforcement agencies, the Federal Investigation Agency, and Mobilink Microfinance Bank , Pakistan’s premier microfinance bank. It additionally enriches the data through expert interviews – with crime investigators and the experts to carry out an in-depth analysis of the various factors involving the crime. This paper emphasizes the structural and situational factors that shape up the cyber financial crimes in Pakistan vis-à-vis digital illiteracy and lack of awareness among the users of financial services. This paper, thus, on the basis of findings and expert interviews, suggests policy reforms to reduce the instances of the financial crimes, especially in the remotest areas of the country.

Keywords: financial crimes, cyber crimes, digital literacy, terrorism financing, banking sector

Procedia PDF Downloads 58
7957 In Patribus Fidelium Leftist Discourses on Political Violence in Lebanon and Algeria: A Critical Discourse Analysis

Authors: Mehdi Heydari Sanglaji

Abstract:

The dramatic events of the 11 September, and their tragic repercussions, catapulted issues of the political violence in and from the ‘Muslim world’ onto the political discourse, be it in patriotic speeches of campaigning politicians or the TV and news punditry. Depending on what end of the political spectrum the politician/pundit pledges fealty to, the overall analyses of political violence in the West Asia and North Africa (WANA) tends towards two overarching categories: on the Right, the diagnosis has unanimously been, ‘they must hate our freedom.’ On the Left, however, there is the contention that the West has to be counted as the primary cause of such rage, for the years of plundering of lives and resources, through colonialism, the Cold War, coups, etc. All these analyses are premised on at least two presuppositions: the violence in and from the WANA region a) is always reactionary, in the sense that it happens only in response to something the West is or does; and b) must always already be condemned, as it is essentially immoral and wrong. It is the aim of this paper to challenge such viewpoints. Through a rigorous study of the historical discourses on political violence in the Leftist organizations active in Algeria and Lebanon, we claim there is a myriad of diverse reasons and justifications presented for advocating political violence in these countries that defy facile categorization. Inspecting such rhetoric for inciting political violence in Leftist discourses, and how some of these reasonings have percolated into other movements in the region (e.g., Islamist ones), will reveal a wealth of indigenous discourses on the subject that has been largely neglected by the Western Media punditry and even by the academia. The indigenous discourses on political violence, much of which overlaps with emancipatory projects in the region, partly follow grammar and logic, which may be different from those developed in the West, even by its more critical theories. Understanding so different epistemology of violence, and the diverse contexts in which political violence might be justifiable in the mind of ‘the other,’ necessitates a historical, materialist, and genealogical study of the discourse already in practice in the WANA region. In that regard, both critical terrorism studies and critical discourse analysis provide exemplary tools of analysis. Capitalizing on such tools, this project will focus on unearthing a history of thought that renders moot the reduction of all instances of violence in the region to an Islamic culture or imperialism/colonialism. The main argument in our research is that by studying the indigenous discourses on political violence, we will be far more equipped in understanding the reasons and the possible solutions for acts of terrorism in and from the region.

Keywords: political violence, terrorism, leftist organizations, West Asia/North Africa

Procedia PDF Downloads 105
7956 Study on Angle Measurement Interferometer around Any Axis Direction Selected by Transmissive Liquid Crystal Device

Authors: R. Furutani, G. Kikuchi

Abstract:

Generally, the optical interferometer system is too complicated and difficult to change the measurement items, pitch, yaw, and row, etc. In this article, the optical interferometer system using the transmissive Liquid Crystal Device (LCD) as the switch of the optical path was proposed. At first, the normal optical interferometer, Michelson interferometer, was constructed to measure the pitch angle and the yaw angle. In this optical interferometer, the ball lenses with the refractive indices of 2.0 were used as the retroreflectors. After that, the transmissive LCD was introduced as the switch to select the adequate optical path. In this article, these optical systems were constructed. Pitch measurement interferometer and yaw measurement interferometer were switched by the transmissive LCD. When the LCD was open for the yaw measurement, the yaw was sufficiently measured and optical path for the pitch measurement was blocked. On the other hand, when the LCD was open for the pitch measurement, the pitch was measured and the optical path for the yaw measurement was also blocked. In this article, the results of both of pitch measurement and yaw measurement were shown, and the result of blocked yaw measurement and pitch measurement were shown. As this measurement system was based on Michelson interferometer, the other measuring items, the deviation along the optical axis, the vertical deviation to the optical axis and row angle, could be measured by the additional ball lenses and the additional switching in future work.

Keywords: any direction angle, ball lens, laser interferometer, transmissive liquid crystal device

Procedia PDF Downloads 133
7955 Acoustic Emission for Tool-Chip Interface Monitoring during Orthogonal Cutting

Authors: D. O. Ramadan, R. S. Dwyer-Joyce

Abstract:

The measurement of the interface conditions in a cutting tool contact is essential information for performance monitoring and control. This interface provides the path for the heat flux to the cutting tool. This elevate in the cutting tool temperature leads to motivate the mechanism of tool wear, thus affect the life of the cutting tool and the productivity. This zone is representative by the tool-chip interface. Therefore, understanding and monitoring this interface is considered an important issue in machining. In this paper, an acoustic emission (AE) technique was used to find the correlation between AE parameters and the tool-chip interface. For this reason, a response surface design (RSD) has been used to analyse and optimize the machining parameters. The experiment design was based on the face centered, central composite design (CCD) in the Minitab environment. According to this design, a series of orthogonal cutting experiments for different cutting conditions were conducted on a Triumph 2500 lathe machine to study the sensitivity of the acoustic emission (AE) signal to change in tool-chip contact length. The cutting parameters investigated were the cutting speed, depth of cut, and feed and the experiments were performed for 6082-T6 aluminium tube. All the orthogonal cutting experiments were conducted unlubricated. The tool-chip contact area was investigated using a scanning electron microscope (SEM). The results obtained in this paper indicate that there is a strong dependence of the root mean square (RMS) on the cutting speed, where the RMS increases with increasing the cutting speed. A dependence on the tool-chip contact length has been also observed. However there was no effect observed of changing the cutting depth and feed on the RMS. These dependencies have been clarified in terms of the strain and temperature in the primary and secondary shear zones, also the tool-chip sticking and sliding phenomenon and the effect of these mechanical variables on dislocation activity at high strain rates. In conclusion, the acoustic emission technique has the potential to monitor in situ the tool-chip interface in turning and consequently could indicate the approaching end of life of a cutting tool.

Keywords: Acoustic emission, tool-chip interface, orthogonal cutting, monitoring

Procedia PDF Downloads 463
7954 Domestic Violence Against Women (With Special Reference to India): A Human Rights Issue

Authors: N. B. Chandrakala

Abstract:

Domestic violence is one of the most under-reported crimes. Problem with domestic violence is that it is not even considered as abuse in many parts of the world especially certain parts of Asia, Africa and Middle East. It is viewed as “doing the needful”. Domestic violence could be in form of emotional harassment, physical injury or psychological abuse perpetrated by one of the family members to another. It is a worldwide phenomenon mainly targeting women. The acts of violence have terrible negative impact on women. It is also an infringement of women’s rights and can be safely termed as human rights abuse. In cases pertaining to domestic violence, male adults often misuses his authority and power to control another using physical or psychological means. Violence and other forms of abuse are common in domestic violence. Sexual assaults, molestation and battering are common in these cases. Domestic violence is a human rights issue and a serious deterrent to development. Domestic violence could also take place in subtle forms like making the person feel worthless or not giving the victims any personal space or freedom. The problematic aspect is cases of domestic violence are very rarely reported. The majority of the victims are women but children are also made to suffer silently. They are abused and neglected. Their innocent minds are adversely affected with the incidents of domestic violence. According to a report by World Health Organization (WHO), sexual trafficking, female feticide, dowry death, public humiliation and physical torture are some of the most common forms of domestic violence against Indian women. Such acts belie our growth and claim as an economic superpower. It is ironic that we claim to be one of the most rapidly advancing countries in the world and yet we have done hardly anything of note against social hazards like domestic violence. Laws are not that stringent when it comes to reporting acts of domestic violence. Even if the report is filed it turns out to be a long drawn process and not every victim has that much resource to fight till the end. It is also a social taboo to make your family matters public. The big challenge in front now is to enforce it in true sense. Steps that are actually needed; tough laws against domestic violence, speedy execution and change in the mindset of society only then we can expect to have some improvement in such inhuman cases. An effective response to violence must be multi-sectoral; addressing the immediate practical needs of women experiencing abuse; providing long-term follow up and assistance; and focusing on changing those cultural norms, attitudes and legal provisions that promote the acceptance of and even encourage violence against women, and undermine women's enjoyment of their full human rights and freedoms. Hence the responses to the problem must be based on integrated approach. The effectiveness of measures and initiatives will depend on coherence and coordination associated with their design and implementation.

Keywords: domestic violence, human rights, sexual assaults, World Health Organization

Procedia PDF Downloads 516
7953 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware

Authors: Azita Ramezani, Atousa Ramezani

Abstract:

In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.

Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection

Procedia PDF Downloads 41
7952 Difficulties in the Emotional Processing of Intimate Partner Violence Perpetrators

Authors: Javier Comes Fayos, Isabel RodríGuez Moreno, Sara Bressanutti, Marisol Lila, Angel Romero MartíNez, Luis Moya Albiol

Abstract:

Given the great impact produced by gender-based violence, its comprehensive approach seems essential. Consequently, research has focused on risk factors for violent behaviour, linking various psychosocial variables, as well as cognitive and neuropsychological deficits with the aggressors. However, studies on affective processing are scarce, so the present study investigates possible emotional alterations in men convicted of gender violence. The participants were 51 aggressors, who attended the CONTEXTO program with sentences of less than two years, and 47 men with no history of violence. The sample did not differ in age, socioeconomic level, education, or alcohol and other substances consumption. Anger, alexithymia and facial recognition of other people´s emotions were assessed through the State-Trait Anger Expression Inventory (STAXI-2), the Toronto Alexithymia Scale (TAS-20) and Reading the mind in the eyes (REM), respectively. Men convicted of gender-based violence showed higher scores on the anger trait and temperament dimensions, as well as on the anger expression index. They also scored higher on alexithymia and in the identification and emotional expression subscales. In addition, they showed greater difficulties in the facial recognition of emotions by having a lower score in the REM. These results seem to show difficulties in different affective areas in men condemned for gender violence. The deficits are reflected in greater difficulty in identifying and expressing emotions, in processing anger and in recognizing the emotions of others. All these difficulties have been related to the use of violent behavior. Consequently, it is essential and necessary to include emotional regulation in intervention programs for men who have been convicted of gender-based violence.

Keywords: alexithymia, anger, emotional processing, emotional recognition, empathy, intimate partner violence

Procedia PDF Downloads 169
7951 Violence and Aggression of Women in Native Canada: A Postcolonial Feminist Study of The Rez Sisters and Rose by Tomson Highway

Authors: Sonia Sharma

Abstract:

In a multicultural country like Canada, Colonialism is still maintained in the form of Violence and Oppression. The Aboriginals are persistently facing Oppression and Marginalization in their own land owing to Colonial presence. Women in particular are getting most affected. They are facing double burden of patriarchy and their being Native. Tomson Highway, the Cree Canadian playwright has deftly exposed the theme of women violence and empowerment. In his plays (The Rez Sisters and Rose) taken from his Rez Septology, he has depicted Aboriginal women’s predicaments and sufferings. But simultaneously also talks about their empowerment and aggression refuting and fighting back to patriarchy and oppression. The Rez Sisters portrays women with shattering images and as a victim of both the male dominating society and the system. It represents the painful odyssey of the seven women facing several hardships. Rose represents women in entirely different light. They are shown more assertive and empowered raising their voice against the Violence and Discrimination meted out to them. The Aboriginal women in Canada are facing dual burden of Colonialism and Patriarchy which indeed is a Colonial construct. This paper is an attempt to explore the above facets Tomson Highway’s The Rez Sisters and Rose.

Keywords: violence, racism, discrimination, postcolonialism feminism

Procedia PDF Downloads 588
7950 The Portrayal of Violence Against Women in Bangladesh News Media: Seeing It Through Rumana Manzur’s Case

Authors: Zerrin Akter Anni

Abstract:

The media's role in shaping perceptions of violence against women (VAW) and their portrayal in news reporting significantly influences our understanding of this critical issue. My research delves into the portrayal of violence against women in mainstream media, using the prominent case of Dr. Rumana Manzur, a former UBC Fulbright Scholar from Bangladesh who suffered a brutal assault by her ex-husband in June 2011. Employing a qualitative research approach, this study uses an ethnographic media analysis method to scrutinize news reports of the aforementioned case from selected newspapers in Bangladesh. The primary objectives are to investigate how the popular news media in Bangladesh addresses the issue of violence against women and frames the victims of such violence. The findings of this research highlight that news media can perpetuate gender stereotypes and subtly shift blame onto the victim through various techniques, creating intricate interactions between the reader and the text. These techniques include sensationalized headlines, textual content, and graphic images. This victim-blaming process not only retraumatizes the survivor but also distorts the actual facts when presenting the case to a larger audience. Consequently, the representation of violence against women cases in media, particularly the portrayal of women as victims during reporting, significantly impacts our collective comprehension of this issue. In conclusion, this paper asserts that the Bangladeshi media, particularly news outlets, in conjunction with society, continue to follow a pattern of depicting gender-based violence in ways that devalue the image of women. This research underscores the need for critical analysis of media representations of violence against women cases, as they can perpetuate harmful stereotypes and hinder efforts to combat this pervasive problem. Therefore, the outcome of this research is to comprehend the complex dynamics between media and violence against women, which is essential for fostering a more empathetic and informed society that actively works towards eradicating this problem from our society.

Keywords: media representation, violence against women (vaw), ethnographic media analysis, victim-blaming, sensationalized headline

Procedia PDF Downloads 47
7949 Hybrid Strategies of Crisis Intervention for Sexualized Violence Using Digital Media

Authors: Katharina Kargel, Frederic Vobbe

Abstract:

Sexualized violence against children and adolescents using digital media poses particular challenges for practitioners with a focus on crisis intervention (social work, psychotherapy, law enforcement). The technical delimitation of violence increases the burden on those affected and increases the complexity of interdisciplinary cooperation. Urgently needed recommendations for practical action do not yet exist in Germany. Funded by the Federal Ministry of Education and Research, these recommendations for action are being developed in the HUMAN project together with science and practice. The presentation introduces the participatory approach of the HUMAN project. We discuss the application-oriented, casuistic approach of the project and present its results using the example of concrete case-based recommendations for Action. The participants will be presented with concrete prototypical case studies from the project, which will be used to illustrate quality criteria for crisis intervention in cases of sexualized violence using digital media. On the basis of case analyses, focus group interviews and interviews with victims of violence, we present the six central challenges of sexualized violence with the use of digital media, namely: • Diffusion (Ambiguities regarding the extent and significance of violence) , • Transcendence (Space and time independence of the dynamics of violence, omnipresence), • omnipresent anxiety (considering diffusion and transcendence), • being haunted (repeated confrontation with digital memories of violence or the perpetrator), • disparity (conflicts of interpretative power between those affected and the social environment) • simultaneity (of all other factors). We point out generalizable principles with which these challenges can be dealt with professionally. Dealing professionally with sexualized violence using digital media requires a stronger networking of professional actors. A clear distinction must be made between their own mission and the mission of the network partners. Those affected by violence must be shown options for crisis intervention in the context of the aid networks. The different competencies and the professional mission of the offers of help are to be made transparent. The necessity of technical possibilities for deleting abuse images beyond criminal prosecution will be discussed. Those affected are stabilized by multimodal strategies such as a combination of rational emotive therapy, legal support and technical assistance.

Keywords: sexualized violence, intervention, digital media, children and youth

Procedia PDF Downloads 209
7948 Evaluation of the Factors Affecting Violence Against Women (Case Study: Couples Referring to Family Counseling Centers in Tehran)

Authors: Hassan Manouchehri

Abstract:

The present study aimed to identify and evaluate the factors affecting violence against women. The statistical population included all couples referring to family counseling centers in Tehran due to domestic violence during the past year. A number of 305 people were selected as a statistical sample using simple random sampling and Cochran's formula in unlimited conditions. A researcher-made questionnaire including 110 items was used for data collection. The face validity and content validity of the questionnaire were confirmed by 30 experts and its reliability was obtained above 0.7 for all studied variables in a preliminary test with 30 subjects and it was acceptable. In order to analyze the data, descriptive statistical methods were used with SPSS software version 22 and inferential statistics were used for modeling structural equations in Smart PLS software version 2. Evaluating the theoretical framework and domestic and foreign studies indicated that, in general, four main factors, including cultural and social factors, economic factors, legal factors, as well as medical factors, underlie violence against women. In addition, structural equation modeling findings indicated that cultural and social factors, economic factors, legal factors, and medical factors affect violence against women.

Keywords: violence against women, cultural and social factors, economic factors, legal factors, medical factors

Procedia PDF Downloads 115
7947 Obstetric Violence Consequences And Coping Strategies: Insights Through The Voices Of Arab And Jewish Women In Israel

Authors: Dganit Sharon, Raghda Alnabilsy

Abstract:

The goal of this qualitative research was to sound the voices of Jewish and Arab women in Israel who had experienced obstetric violence, to learn the consequences of the violence to them on different levels and over time, and to present their coping strategies from their perspective. Another goal was to expand the research knowledge on an issue that has not been studied among Arab and Jewish women in Israel. The premise of this study is the feminist approach that aims to promote human rights, and to eradicate phenomena related to cultural, structural, gender and patriarchal structures of women, their bodies, and their health. The research was based on the qualitative-constructivist methodology, by means of thematic analysis of 20 in-depth semi-structured interviews. Two main themes emerged from the analysis. First, the physical and emotional consequences of obstetric violence, consequences to spousal relationships, and mistrust of the health system and service providers. Second, women’s coping strategies with obstetric violence that included repression and avoidance as a way of coping with the pain and trauma of the abuse; garnering inner strengths, resilience, knowledge and awareness of the delivery process; recruiting and relying on external help; sharing on social media, and discussions with other women who had similar experiences; or reaching out to therapists / legal aid / public complaints.

Keywords: obstetric violence, Jewish and arab women in israel, consequences, coping strategies, gender-related perspective

Procedia PDF Downloads 41
7946 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 130
7945 Levels and Determinants of Experiencing Violence during Pregnancy among Adolescent Women - The Case of Southern Africa

Authors: Sibusiso Mkwananzi

Abstract:

The health of mother and child remain at risk among pregnant adolescents. Nevertheless, these are placed in even greater jeopardy when an expectant adolescent experiences violence. This paper sought to explore the levels and determinants of expecting adolescents in five Southern African countries. The study used the most recent (2010/2015) nationally representative demographic health survey (DHS) data from Malawi, Mozambique, Namibia, Zambia, and Zimbabwe. The highest levels of violence during pregnancy occurred amongst adolescent females living in Zimbabwe at 11.4%, followed by Zambia (8.3%) and Namibia (7.7%). Lowest levels were seen in Mozambique at 3.6%. Additionally, the determinants of experiencing violence during pregnancy included educational attainment, marital status, wealth and place of residence. Expectant adolescents that had a higher likelihood of experiencing violence were married and lived predominantly in rural settings. Higher risk was also associated with lower acquisition of education and poverty. These results show a very similar pattern to the risk factors associated with early pregnancy in the region. The predictors point to issues of possible lowered empowerment amongst younger women in their relationships and the structural challenges faced by this fledgling group. Nevertheless, addressing these dynamics could go a long way in not only decreasing the likelihood of unwanted motherhood at this early stage of the life course, but indeed even ensuring the prevention of violence during wanted early pregnancy. This would lead to improved levels of maternal and child health despite younger maternal age and aid in achieving a number of sustainable development goals.

Keywords: adolescents, determinants, Southern Africa, violence during pregnancy

Procedia PDF Downloads 76
7944 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 298
7943 The Relations between Coping Strategies, Caregiver Bonding, and Dating Violence of Emerging Adults: Cross-Cultural Comparison between China and Turkiye

Authors: Zubaidan Yushan, Hudayar Cıhan

Abstract:

Turkiye and China are countries that have collective cultures, but they have different cultural backgrounds. They have different cultures, different religions, and different levels of economic development. The aim of this study is to test the moderation effect of caregiver bonding on the relationship between dating violence and coping strategies among unmarried emerging adults in China and Turkiye. Participants ages were 19 and 26 years (X=23.66, SD=3.66), unmarried emerging adults Turkish 171 participants (72.5% women, 24% men, 3.5% prefer not to say), Chinese 170 participants (71.8% women, 21.8% men, 6.5% prefer not to say). All participants had been in a relationship for more than six months. Participants completed The Conflict Tactics Scales—(CTS2), The Cope Inventory, and The Parental Bonding Instrument (PBI). Examining the dating violence and coping strategies of the participant's relationship through caregiver bonding moderation analysis was performed using the Jamovi. Significance was tested using the bootstrapping method with bias-corrected confidence estimates. The outcome variable for analysis was dating violence, and the predictor variable for the analysis was coping strategies. The moderator variable evaluated for the analysis was parent attachment. Before the analysis, the mean-centered scores of each variable and moderator were calculated. Furthermore, the moderation analysis was conducted separately for each outcome. The Moderation analysis results show that the sub-dimension of over-protection moderates psychological aggression perpetration and avoidance coping in China. The sub-dimension of care moderates injury victimization and avoidance management in Turkiye; also, over-protection moderates injury victimization and social support coping. Moreover, the sub-dimension of care moderates sexual coercion perpetration and avoidance coping. In the results, caregiver bonding moderates the relationship between coping strategies and dating violence, which may be explained by the fact that our ways of coping with problems are learned, and people are influenced by their parents when they face problems. Therefore, problem-solving is permanently fixed, and each person has his or her fixed solution, which leads to a habit of using solutions to problems. However, sometimes, these solutions become the justification for the injured or abusive person. The quality of the attachment between parents can regulate this state. The results are somewhat similar to and slightly different from those in the previous literature. These mixed results indicate the need for further exploration. Many other factors, such as alcohol, drug violence, and pathological problems, maybe the reasons for these differences. In addition, diverse factors such as the study environment and the applied measurement scales may also affect the results.

Keywords: caregiver bonding, coping strategies, dating violence, emerging adulthood, cross-cultural, comparison

Procedia PDF Downloads 34
7942 Information Technology Service Management System Measurement Using ISO20000-1 and ISO15504-8

Authors: Imam Asrowardi, Septafiansyah Dwi Putra, Eko Subyantoro

Abstract:

Process assessments can improve IT service management system (IT SMS) processes but the assessment method is not always transparent. This paper outlines a project to develop a solution- mediated process assessment tool to enable transparent and objective SMS process assessment. Using the international standards for SMS and process assessment, the tool is being developed following the International standard approach in collaboration and evaluate by expert judgment from committee members and ITSM practitioners.

Keywords: SMS, tools evaluation, ITIL, ISO service

Procedia PDF Downloads 455
7941 The Special Testimony as a Methodology for Social Workers to Ensure the Rights of Children and Adolescents Who Are Victims of Sexual Violence

Authors: Natany Rodrigues De Carvalho, Denise Bomtempo Birche De Carvalho

Abstract:

The purpose of this study is to analyze the Special Testimony as a methodology for social workers to ensure the rights of children and adolescents who are victims of sexual violence. The specific objectives are: a) to contextualize, through the specialized literature, the social history of childhood and adolescence; b) to investigate, in the scientific literature, the sexual violence against children and adolescents as an analytical category; c) identify, with the social workers, if there is any defense of children and adolescents in the special testimony. To answer the research objectives we use qualitative research, in three axes that complement each other: a) participant observation through the insertion in the research field (supervised internship I and II); b) survey of literature on the subject; c) semi-structured interviews with social workers of the TJDFT. We used content analysis to systematize and interpret the collected data. The results of the research were organized into three chapters with the following contents: a) literature review, contextualizing the social history of childhood and adolescence to the present; b) sexual violence against children and adolescents and their categories of analysis; c) understanding of the special testimony in the Federal District and Territories in guaranteeing the rights of children and adolescents, identifying their main points from the perspective of social workers. The results showed how the lack of interdisciplinarity in the Special Testimony can lead to the non-integral protection of children and adolescents victims of sexual violence.

Keywords: childhood and adolescence, sexual violence, special testimony, social work

Procedia PDF Downloads 287
7940 The Difference Between Islamic Terrorism and Tha Human Rights In The Middle East

Authors: Mina Latif Ghaly Sawiras

Abstract:

The difference between Islamic terrorism and human-rights has become a big question in the fight against Islamic terrorism globally. This is was raised on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognized in the Vienna Declaration and Program of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, Islamic-terrorism constitutes a violation on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitization’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then conclude with recommendations on how to balance counter-terrorism and human rights in the modern age.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation

Procedia PDF Downloads 37
7939 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 336
7938 זכור (Remember): An Analysis of Art as a Reflection of Sexual and Gendered Violence against Jewish Women during the Pogroms (1919-1920S) And the Nazi Era (1933-1943)

Authors: Isabella B. Davidman

Abstract:

Violence used against Jewish women in both the Eastern European pogroms and during the Nazi era was specifically gendered, targeting their female identity and dignity of womanhood. Not only did these acts of gendered violence dehumanize Jewish women, but they also hurt the Jewish community as a whole. The devastating sexual violence that women endured during the pogroms and the Nazi era caused profound trauma. Out of shame and fear, silence about women’s experiences of sexual abuse manifests in forms that words cannot translate. Women have turned to art and other means of storytelling to convey their female experiences in visual and non-verbal ways. Therefore, this paper aims to address the historical accounts of gendered violence against Jewish women during the pogroms and Nazi era, as well as art that reflects upon the female experience, in order to understand the emotional impact resulting from these events. To analyze the artwork, a feminist analysis was used to understand the intersection of gender with the other systems of inequality, such as systemic anti-semitism, in women’s lives; this ultimately explained the ways in which cultural productions undermine and reinforce the political and social oppression of women by exploring how art confronts the exploitation of women's bodies. By analyzing the art in the context of specific acts of violence, such as public rape, as a strategic weapon, we are able to understand women’s experiences and how these experiences, in turn, challenged their womanhood. Additionally, these atrocities, which often occurred in the public space, were dismissed and forgotten due to the social stigma of rape. In this sense, the experiences of women in pogroms and the Nazi era were both highly unacknowledged and forgotten. Therefore, the art that was produced during those time periods, as well as those after those events, gives voice to the profound silence on the narratives of Jewish women. Sexual violence is a weapon of war used to cause physical and psychological destruction, not only as a product of war. In both the early twentieth-century pogroms and the Holocaust, the sexual violence that Jewish women endured was fundamentally the same: the rape of Jewish women became a focal target in the theater of violence– women were not raped because they were women, but specifically, because they were Jewish women. Although the events of the pogroms and the Holocaust are in the past, the art that serves as testimony to the experience of Jewish women remains an everlasting reminder of the gendered violence that occurred. Even though covert expressions, such as an embroidered image of a bird eating an apple, the artwork gives voice to the many silenced victims of sexualized and gendered violence.

Keywords: gendered violence, holocaust, Nazi era, pogroms

Procedia PDF Downloads 79
7937 Gender-based Violence and Associated Factors among Private College Female Students in Harar City, Ethiopia, Jan 2023

Authors: Taju Abdela Mohammed

Abstract:

Introduction: There has been a rise in awareness of violence against young women and girls, particularly when it occurs in educational environments. Gender-based violence in schools is a significant barrier. Therefore, it would be a threat to the achievement of the sustainable development goals, strive for gender equality in all our programs, right from the planning stages, to make sure we are as equitable as possible. Research on the causes, attitudes, and perceptions of gender-based violence was scant. Furthermore, there aren't many studies done on female students attending private colleges. Thus, the purpose of this study is to evaluate the frequency of gender-based violence and related variables among female students attending private colleges in Harar City, Ethiopia. Methodology: A facility-based mixed method concurrent triangulation study design was conducted among 500 randomly selected Private college female students in Harar City. Self-administered questionnaire and an in-depth interview were used to collect the data. The collected data were cleaned and analyzed using a statistical package for social science. Descriptive statistics were conducted and the results were reported using frequency, and percentile. Bivariate logistic regression was performed to identify associated factors. Adjusted odds ratios with 95% confidence intervals and p values < 0.05 were used to explain statistically significant associations. Thematic analysis was used to manually translate, transcribe, and analyze qualitative data. Result: The study showed the prevalence of gender-based violence was 338 (67.6%) (CI 0.432–0.721) Private college female students in Harar city Administration. Age less than 20 years and 20–24 years, [AOR = 0.21, 95% CI (0.03–0.81)] and [AOR = 0.12, 95% CI (0.03–0.51)], tight family control, [AOR = 5.12, 95% CI (1.43–6.9)], Witnessed father abuse mother at childhood; [AOR = 4.04, 95% CI (1.36–12.1)], had drunkenness female or boyfriend; [AOR = 2.12, 95% CI (1.60–14.05)] had significant association with gender-based violence. Conclusion: Our study shows the prevalence of gender-based violence among Private college female students is significant. This is due to the fact that gender-based violence, such as school dropout, unintended pregnancy, abortion, STDs, and psychological disorders, is abandoning young girls' lives and lowering their productivity.

Keywords: female students, gender-violence, harar, Ethiopia

Procedia PDF Downloads 43
7936 Uncertainty Quantification of Corrosion Anomaly Length of Oil and Gas Steel Pipelines Based on Inline Inspection and Field Data

Authors: Tammeen Siraj, Wenxing Zhou, Terry Huang, Mohammad Al-Amin

Abstract:

The high resolution inline inspection (ILI) tool is used extensively in the pipeline industry to identify, locate, and measure metal-loss corrosion anomalies on buried oil and gas steel pipelines. Corrosion anomalies may occur singly (i.e. individual anomalies) or as clusters (i.e. a colony of corrosion anomalies). Although the ILI technology has advanced immensely, there are measurement errors associated with the sizes of corrosion anomalies reported by ILI tools due limitations of the tools and associated sizing algorithms, and detection threshold of the tools (i.e. the minimum detectable feature dimension). Quantifying the measurement error in the ILI data is crucial for corrosion management and developing maintenance strategies that satisfy the safety and economic constraints. Studies on the measurement error associated with the length of the corrosion anomalies (in the longitudinal direction of the pipeline) has been scarcely reported in the literature and will be investigated in the present study. Limitations in the ILI tool and clustering process can sometimes cause clustering error, which is defined as the error introduced during the clustering process by including or excluding a single or group of anomalies in or from a cluster. Clustering error has been found to be one of the biggest contributory factors for relatively high uncertainties associated with ILI reported anomaly length. As such, this study focuses on developing a consistent and comprehensive framework to quantify the measurement errors in the ILI-reported anomaly length by comparing the ILI data and corresponding field measurements for individual and clustered corrosion anomalies. The analysis carried out in this study is based on the ILI and field measurement data for a set of anomalies collected from two segments of a buried natural gas pipeline currently in service in Alberta, Canada. Data analyses showed that the measurement error associated with the ILI-reported length of the anomalies without clustering error, denoted as Type I anomalies is markedly less than that for anomalies with clustering error, denoted as Type II anomalies. A methodology employing data mining techniques is further proposed to classify the Type I and Type II anomalies based on the ILI-reported corrosion anomaly information.

Keywords: clustered corrosion anomaly, corrosion anomaly assessment, corrosion anomaly length, individual corrosion anomaly, metal-loss corrosion, oil and gas steel pipeline

Procedia PDF Downloads 286
7935 Understanding Cyber Kill Chains: Optimal Allocation of Monitoring Resources Using Cooperative Game Theory

Authors: Roy. H. A. Lindelauf

Abstract:

Cyberattacks are complex processes consisting of multiple interwoven tasks conducted by a set of agents. Interdictions and defenses against such attacks often rely on cyber kill chain (CKC) models. A CKC is a framework that tries to capture the actions taken by a cyber attacker. There exists a growing body of literature on CKCs. Most of this work either a) describes the CKC with respect to one or more specific cyberattacks or b) discusses the tools and technologies used by the attacker at each stage of the CKC. Defenders, facing scarce resources, have to decide where to allocate their resources given the CKC and partial knowledge on the tools and techniques attackers use. In this presentation CKCs are analyzed through the lens of covert projects, i.e., interrelated tasks that have to be conducted by agents (human and/or computer) with the aim of going undetected. Various aspects of covert project models have been studied abundantly in the operations research and game theory domain, think of resource-limited interdiction actions that maximally delay completion times of a weapons project for instance. This presentation has investigated both cooperative and non-cooperative game theoretic covert project models and elucidated their relation to CKC modelling. To view a CKC as a covert project each step in the CKC is broken down into tasks and there are players of which each one is capable of executing a subset of the tasks. Additionally, task inter-dependencies are represented by a schedule. Using multi-glove cooperative games it is shown how a defender can optimize the allocation of his scarce resources (what, where and how to monitor) against an attacker scheduling a CKC. This study presents and compares several cooperative game theoretic solution concepts as metrics for assigning resources to the monitoring of agents.

Keywords: cyber defense, cyber kill chain, game theory, information warfare techniques

Procedia PDF Downloads 120
7934 Mob Justice in Ghana: Implication for Peace

Authors: Ishaq Alhassan Meriga

Abstract:

This study examined the phenomenon of mob violence and its implication for peace in Ghana. The study used the archival study of media reports and content analysis of other secondary data as well as eyewitness accounts. The study examined trends and patterns of vigilante violence within the Ghanaian context. Results showed a considerable increase in the occurrence of mob violence within the last 10 years. Theft and robbery emerged as the most frequently suspected crimes for which victims were attacked, while the LGBT community is not left out. Cases of mob violence were most frequently reported in urban areas. This study has shown that the patterns, scope, nature, and implication of mob justice in Ghana are fairly and comparatively similar to those found in other parts of Africa and the globe. Mob violence is identified as undermining the rule of law and thereby infringing on the fundamental human rights of the victims. It is confirmed to have a cycle of effects that is an impediment to the peace of the country. The study underscores the implications of mob violence in terms of disdaining human life and dignity, revisiting our justice systems and punishment procedures, resourcing, and empowering law enforcers to fight the menace of vigilantism. First, the archival study had a limitation regarding missing data. The majority of the cases used for the study lack information mostly on perpetrators and the steps taken by public authorities and security agencies after reports of a mob attack have been lodged with them. The study recommends for further research to be undertaken on the perpetrators and survivors of mob actions in order to get a holistic understanding of the phenomenon. This will give a more comprehensive view of the issue of mob violence in Ghana. From the findings, it can be concluded that mob justice is a social canker in Ghanaian communities, which has a great impact on the peace of the country.

Keywords: LGBT, mob justice, peace, vigilantism

Procedia PDF Downloads 47
7933 The Socio Demographic Correlates of Post-Traumatic Stress Disorder among Youth Undergoing Domestic Violence in Kenya

Authors: Muchiri Josephine, Qdero Agnes

Abstract:

The current study was conducted during the coronavirus pandemic (COVID-19) period, soon after the lifting of the lockdown measures and schools had just re-opened. It investigated the sociodemographic correlates of Post-Traumatic Stress Disorder (PTSD) among adolescents (13-18 years) who had undergone domestic violence (DV) in Kajiado County, Kenya. The adolescents were administered a sociodemographic questionnaire to ascertain the forms of domestic violence experienced, and those who met the criteria were assessed for the presence of PTSD using the Harvard Trauma Questionnaire (HTQ). Overall, 93(90.3%) had experienced domestic violence, and 57(61.3%) had PTSD; where the severity and prevalence of PTSD increased with increased age, and it also increased significantly among those in higher academic levels, indicating that PTSD prevalence was chronic and additionally influenced by increased academic pressure. Social connections seemed to mitigate PTSD prevalence, whereas, regarding the family background, those living with guardians seemed to have more severe PTSD.

Keywords: age, education level, gender, post-traumatic stress disorder

Procedia PDF Downloads 53
7932 Representation of Islamophobia on Social Media: Facebook Comments Analysis

Authors: Nadia Syed

Abstract:

The digital age has inevitably changed the way in which hate crime is committed. The cyber world has become a highly effective means for individuals and groups to be targeted, harmed, and marginalized , largely through online medium. Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also an increasing number of online virtual communities, and hate groups who are using this freedom to share a violent, Islamophobic and racist description which attempts to create a aggressive virtual environment. This paper is a research on the rise of Islamophobia and the role of media in spreading it. This paper focusing on how the media especially Facebook is portraying Islam as the religion which promotes violence and ultimately playing a significant role in the global rise of Islamophobia against Muslims. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a harmful impact on community cohesion within society. Additionally, as a result of recent figures that shows an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. On the whole, this study found Muslims being demonized and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.

Keywords: Islamophobia, online, social media, facebook, internet, extremism

Procedia PDF Downloads 74