Search results for: cyber ethics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 918

Search results for: cyber ethics

678 Inter Religion Harmony and World Peace: Theory from Shah Wali Ullah's Philosophy

Authors: Muhammad Usman Ghani

Abstract:

Religious tolerance is essential for the establishment of peace in the world. In the system created by Almighty Allah where a lot of diversity is found, still, this world holds unity itself. In today's world, human beings have been divided into clashes of civilizations or divided on the basis of religions or lingual differences. A religious scholar of Indo- Pak subcontinent describes four ethics, on the basis of which all religions of the world can unite. He says in his philosophy of religion that, there is a number of elements common in all religions but four are very common and they are: cleanliness, nobel deeds, relation to Almighty (existence of Almighty) and justice. He says that this universe also holds its integrity in itself. All humans are different in their attributes but to be a human being is common in them. Similarly, all species of the universe are different in their nature, but to be the creature of God is commonly shared by all of them.

Keywords: inter-religious relation, peace and harmony, unity, four common ethics/virtues

Procedia PDF Downloads 336
677 The Imminent Other in Anna Deavere Smith’s Performance

Authors: Joy Shihyi Huang

Abstract:

This paper discusses the concept of community in Anna Deavere Smith’s performance, one that challenges and explores existing notions of justice and the other. In contrast to unwavering assumptions of essentialism that have helped to propel a discourse on moral agency within the black community, Smith employs postmodern ideas in which the theatrical attributes of doubling and repetition are conceptualized as part of what Marvin Carlson coined as a ‘memory machine.’ Her dismissal of the need for linear time, such as that regulated by Aristotle’s The Poetics and its concomitant ethics, values, and emotions as a primary ontological and epistemological construct produced by the existing African American historiography, demonstrates an urgency to produce an alternative communal self to override metanarratives in which the African Americans’ lives are contained and sublated by specific historical confines. Drawing on Emmanuel Levinas’ theories in ethics, specifically his notion of ‘proximity’ and ‘the third,’ the paper argues that Smith enacts a new model of ethics by launching an acting method that eliminates the boundary of self and other. Defying psychological realism, Smith conceptualizes an approach to acting that surpasses the mere mimetic value of invoking a ‘likeness’ of an actor to a character, which as such, resembles the mere attribution of various racial or sexual attributes in identity politics. Such acting, she contends, reduces the other to a representation of, at best, an ultimate rendering of me/my experience. She instead appreciates ‘unlikeness,’ recognizes the unavoidable actor/character gap as a power that humbles the self, whose irreversible journey to the other carves out its own image.

Keywords: Anna Deavere Smith, Emmanuel Levinas, other, performance

Procedia PDF Downloads 150
676 Anonymity and Irreplaceability: Gross Anatomical Practices in Japanese Medical Education

Authors: Ayami Umemura

Abstract:

Without exception, all the bodies dissected in the gross anatomical practices are bodies that have lived irreplaceable lives, laughing and talking with family and friends. While medical education aims to cultivate medical knowledge that is universally applicable to all human bodies, it relies on a unique, irreplaceable, and singular entity. In this presentation, we will explore the ``irreplaceable relationship'' that is cultivated between medical students and anonymous cadavers during gross anatomical practices, drawing on Emmanuel Levinas's ``ethics of the face'' and Martin Buber's discussion of “I-Thou.'' Through this, we aim to present ``a different ethic'' that emerges only in the context of face-to-face relationships, which differs from the generalized, institutionalized, mass-produced ethics like seen in so-called ``ethics codes.'' Since the 1990s, there has been a movement around the world to use gross anatomical practices as an "educational tool" for medical professionalism and medical ethics, and some educational institutions have started disclosing the actual names, occupations, and places of birth of corpses to medical students. These efforts have also been criticized because they lack medical calmness. In any case, the issue here is that this information is all about the past that medical students never know directly. The critical fact that medical students are building relationships from scratch and spending precious time together without any information about the corpses before death is overlooked. Amid gross anatomical practices, a medical student is exposed to anonymous cadavers with faces and touching and feeling them. In this presentation, we will examine a collection of essays written by medical students on gross anatomical practices collected by the Japanese Association for Volunteer Body Donation from medical students across the country since 1978. There, we see the students calling out to the corpse, being called out to, being encouraged, superimposing the carcasses on their own immediate family, regretting parting, and shedding tears. Then, medical students can be seen addressing the dead body in the second person singular, “you.” These behaviors reveal an irreplaceable relationship between the anonymous cadavers and the medical students. The moment they become involved in an irreplaceable relationship between “I and you,” an accidental and anonymous encounter becomes inevitable. When medical students notice being the inevitable takers of voluntary and addressless gifts, they pledge to become “Good Doctors” owing the anonymous persons. This presentation aims to present “a different ethic” based on uniqueness and irreplaceability that comes from the faces of the others embedded in each context, which is different from “routine” and “institutionalized” ethics. That can only be realized ``because of anonymity''.

Keywords: anonymity, irreplaceability, uniqueness, singularlity, emanuel levinas, martin buber, alain badiou, medical education

Procedia PDF Downloads 55
675 Bringing Ethics to a Violent System

Authors: Zeynep Selin Acar

Abstract:

In international system, there has always been a cycle of violence, war and peace. As there travels the time, after Christianity and later Just War theorists, international relations theorists have been tried to limit violence and war. As pieces of international law, Peace of Augsburg, Kellog-Briand Pact, League of Nations Covenant and UN Charter were and are still not effective to prevent war. Moreover, in order to find a way around these rules, it is believed that a new excuse started to be used instead of violence or war, humanitarian intervention. However, it has neither a legal nor a universally accepted framework. As a result, it is open to be manipulated by states. In order to prevent this, Responsibility to Protect (RtoP) which gives a state the responsibility to protect its citizens against violence, is created. Additionally, RtoP transfers this responsibility to regional or international group of states at the time when a state is the origin of violence. In the lights of these, this paper analyzes RtoP as an ethical approach to war and peace studies because it provides other states as guardians and care-takers of people who do not belong to them or do not share any togetherness.

Keywords: ethics, humanitarian intervention, responsibility to protect, UN charter

Procedia PDF Downloads 320
674 Addressing Cultural Discrimination in Research Design: The Responsibilities of Ethics Committees

Authors: Elspeth McInnes

Abstract:

Research design is central to ethical research. Discriminatory research design is a key risk for researchers examining diverse cultural groups without conscious commitment to anti-discrimination values or knowledge of their culture. Culturally discriminatory research design is defined here as research proceeding from negative assumptions about people on the basis of race, colour, ethnicity, nationality or religion. Such discrimination can be direct or indirect. Direct discrimination is the uncritical mobilization of dominant group negative stereotypes of cultural minorities. Indirect discrimination is the examination of policies or programs grounded in dominant culture negative stereotypes that have been uncritically accepted by the researchers. This paper draws on anonymized elements of planned research projects and considers both direct and indirect cultural discrimination in research design and the responsibilities of ethics committees. Human research ethics committees provide a point of scrutiny with responsibility to alert researchers to risks of basing research on negative cultural stereotypes, as well as protecting participants from being subjected to negative discourses about them. This issue has become an increasing concern in a globalizing world of human displacement and migration creating a rise in the presence of minority cultures in host countries. As a nation established through colonization and immigration Australia has a long history of negative cultural stereotypes of Indigenous Australians as well as a legacy of the White Australia policy, which still echoes in attitudes to each wave of non-European immigration. The task of eliminating cultural discrimination in research design is vital to sustaining research integrity and ensuring that research is not used to reinforce or justify cultural discrimination.

Keywords: cultural discrimination, cultural stereotypes, participant risk, research design

Procedia PDF Downloads 129
673 Livestock Activity Monitoring Using Movement Rate Based on Subtract Image

Authors: Keunho Park, Sunghwan Jeong

Abstract:

The 4th Industrial Revolution, the next-generation industrial revolution, which is made up of convergence of information and communication technology (ICT), is no exception to the livestock industry, and various studies are being conducted to apply the livestock smart farm. In order to monitor livestock using sensors, it is necessary to drill holes in the organs such as the nose, ears, and even the stomach of the livestock to wear or insert the sensor into the livestock. This increases the stress of livestock, which in turn lowers the quality of livestock products or raises the issue of animal ethics, which has become a major issue in recent years. In this paper, we conducted a study to monitor livestock activity based on vision technology, effectively monitoring livestock activity without increasing animal stress and violating animal ethics. The movement rate was calculated based on the difference images between the frames, and the livestock activity was evaluated. As a result, the average F1-score was 96.67.

Keywords: barn monitoring, livestock, machine vision, smart farm

Procedia PDF Downloads 120
672 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 36
671 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 394
670 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 350
669 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 179
668 Information Technology and the Challenges Facing the Legal Profession in Nigeria

Authors: Odoh Ben Uruchi

Abstract:

Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.

Keywords: information technology, challenges, legal profession, Nigeria

Procedia PDF Downloads 514
667 The Ethics of Corporate Social Responsibility Statements in Undercutting Sustainability: A Communication Perspective

Authors: Steven Woods

Abstract:

The use of Corporate Social Responsibility Statements has become ubiquitous in society. The appeal to consumers by being a well-behaved social entity has become a strategy not just to ensure brand loyalty but also to further larger scale projects of corporate interests. Specifically, the use of CSR to position corporations as good planetary citizens involves not just self-promotion but also a way of transferring responsibility from systems to individuals. By using techniques labeled as “greenwashing” and emphasizing ethical consumption choices as the solution, corporations present themselves as good members of the community and pursuing sustainability. Ultimately, the primary function of Corporate Social Responsibility statements is to maintain the economic status quo of ongoing growth and consumption while presenting and environmentally progressive image to the public, as well as reassuring them corporate behavior is superior to government intervention. By analyzing the communication techniques utilized through content analysis of specific examples, along with an analysis of the frames of meaning constructed in the CSR statements, the practices of Corporate Responsibility and Sustainability will be addressed from an ethical perspective.

Keywords: corporate social responsibility, ethics, greenwashing, sustainability

Procedia PDF Downloads 67
666 Challenges for Interface Designers in Designing Sensor Dashboards in the Context of Industry 4.0

Authors: Naveen Kumar, Shyambihari Prajapati

Abstract:

Industry 4.0 is the fourth industrial revolution that focuses on interconnectivity of machine to machine, human to machine and human to human via Internet of Things (IoT). Technologies of industry 4.0 facilitate communication between human and machine through IoT and forms Cyber-Physical Production System (CPPS). In CPPS, multiple shop floors sensor data are connected through IoT and displayed through sensor dashboard to the operator. These sensor dashboards have enormous amount of information to be presented which becomes complex for operators to perform monitoring, controlling and interpretation tasks. Designing handheld sensor dashboards for supervision task will become a challenge for the interface designers. This paper reports emerging technologies of industry 4.0, changing context of increasing information complexity in consecutive industrial revolutions and upcoming design challenges for interface designers in context of Industry 4.0. Authors conclude that information complexity of sensor dashboards design has increased with consecutive industrial revolutions and designs of sensor dashboard causes cognitive load on users. Designing such complex dashboards interfaces in Industry 4.0 context will become main challenges for the interface designers.

Keywords: Industry4.0, sensor dashboard design, cyber-physical production system, Interface designer

Procedia PDF Downloads 124
665 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 388
664 Smart Sensor Data to Predict Machine Performance with IoT-Based Machine Learning and Artificial Intelligence

Authors: C. J. Rossouw, T. I. van Niekerk

Abstract:

The global manufacturing industry is utilizing the internet and cloud-based services to further explore the anatomy and optimize manufacturing processes in support of the movement into the Fourth Industrial Revolution (4IR). The 4IR from a third world and African perspective is hindered by the fact that many manufacturing systems that were developed in the third industrial revolution are not inherently equipped to utilize the internet and services of the 4IR, hindering the progression of third world manufacturing industries into the 4IR. This research focuses on the development of a non-invasive and cost-effective cyber-physical IoT system that will exploit a machine’s vibration to expose semantic characteristics in the manufacturing process and utilize these results through a real-time cloud-based machine condition monitoring system with the intention to optimize the system. A microcontroller-based IoT sensor was designed to acquire a machine’s mechanical vibration data, process it in real-time, and transmit it to a cloud-based platform via Wi-Fi and the internet. Time-frequency Fourier analysis was applied to the vibration data to form an image representation of the machine’s behaviour. This data was used to train a Convolutional Neural Network (CNN) to learn semantic characteristics in the machine’s behaviour and relate them to a state of operation. The same data was also used to train a Convolutional Autoencoder (CAE) to detect anomalies in the data. Real-time edge-based artificial intelligence was achieved by deploying the CNN and CAE on the sensor to analyse the vibration. A cloud platform was deployed to visualize the vibration data and the results of the CNN and CAE in real-time. The cyber-physical IoT system was deployed on a semi-automated metal granulation machine with a set of trained machine learning models. Using a single sensor, the system was able to accurately visualize three states of the machine’s operation in real-time. The system was also able to detect a variance in the material being granulated. The research demonstrates how non-IoT manufacturing systems can be equipped with edge-based artificial intelligence to establish a remote machine condition monitoring system.

Keywords: IoT, cyber-physical systems, artificial intelligence, manufacturing, vibration analytics, continuous machine condition monitoring

Procedia PDF Downloads 82
663 Ethics in the Islamic Political System

Authors: Djehich Mohamed Yousri

Abstract:

This research deals with an important issue in Islamic political thought, which is the relationship of ethics to the Islamic political system. This is done by following the legal politics books and analyzing their texts in order to reach the moral values on which the political system in Islam is based, starting from the concept of politics to the political principles and conditions of the ruler and the reasons for his removal and the conditions of those authorized to choose him, and ending with the ruler’s relationship with his people, and the relationship of the Islamic state with other countries. The research concluded that moral values are the basis of the political system in Islam, and the reason for this is due to the fact that Islam is a religion and a global and realistic human system that embraces morals and higher values in order to preserve its lofty message and calls for brotherhood, love, and justice and does not harm human morals. And if the reality of politics in the Islamic world today is not related to the moral values and the lofty message of Islam, this research tries to show the origins of political theory in Islam, and the purpose of the Islamic political system, towards the morality of politics.

Keywords: moral, politics, islam, political system, islamic political system

Procedia PDF Downloads 96
662 Ethical and Personality Factors and Accounting Professional Judgement

Authors: Shannon Hashemi, Alireza Daneshfar

Abstract:

Accounting ethical awareness has been widely promoted in recent years both in academia and in practice. However, the effectiveness of ethical awareness on accountants' judgment and choice of action is still debatable. This study investigates whether Machiavellianism and gender, as significant personality factors, influence the effect of ethical awareness on accountants' decision-making. Using an experiment, the results of ANOVA tests show that although introducing ethical awareness positively influences the accountants' judgment and choice of action, such an effect is significantly moderated by the accountants' Machiavellianism score and gender. Specifically, the test results show that the effect of introducing ethical awareness was higher on males with low Machiavellian score. The results also show that when the Machiavellian scores were high, the effect of ethical awareness was lower for both males and females. Applications of the results are discussed for accounting professionals as well as accounting ethics educators and researchers.

Keywords: ethical awareness, accounting decision making, Machiavellianism, ANOVA, ethics, accounting education

Procedia PDF Downloads 109
661 Examining Neo-colonialism and Power in Global Surgical Missions: An Historical, Practical and Ethical Analysis

Authors: Alex Knighton, Roba Khundkar, Michael Dunn

Abstract:

Neo-colonialism is defined as the use of economic, political, cultural, or other pressures to control or influence other countries, especially former dependencies, and concerns have been raised about its presence in surgical missions. Surgical missions aim to rectify the huge disparity in surgical access worldwide, but their ethics must be carefully considered. This is especially in light of colonial history which affects international relations and global health today, to ensure that colonial attitudes are not influencing efforts to promote equity. This review examines the history of colonial global health, demonstrating that global health initiatives have consistently been used to benefit those providing them, and then asks whether elements of colonialism are still pervasive in surgical missions today. Data was collected from the literature using specified search terms and snowball searching, as well as from international expert web-based conferences on global surgery ethics. A thematic analysis was then conducted on this data, resulting in the identification of six themes which are identifiable in both past and present global health initiatives. These six themes are power, lack of understanding or respect, feelings of superiority, exploitation, enabling of dependency, and acceptance of poorer standards of care. An ethical analysis follows, concluding that the concerns of power and neo-colonialism in global surgery would be addressed by adopting a framework of procedural justice that promotes a refined governance process in which stakeholders are able to propose and reject decisions that affect them. The paper argues that adopting this model would address concerns of the power disparity in the field directly, as well as promoting an ethical framework to enable the other concerns of power disparity and neo-colonialism identified in the present analysis to be addressed.

Keywords: medical ethics, global surgery, global health, neocolonialism, surgical missions

Procedia PDF Downloads 92
660 Social Media's Roles in the Change of Vietnamese Society: Emerging Public Sphere for Citizens

Authors: Ly Thi Hai Yen

Abstract:

The Internet in Vietnam has developed significantly over the last 20 years and made impressive advances, permeating into every part of daily life, changing people's habits as well as the way people's communication. Under this situation, social media have become useful tools for the citizen to get and share information. About 10 years ago, most Vietnamese people got the information through state media, but thanks to the development of the Internet, nowadays, social media have been giving them rich sources of information at any area of society. By using case study research methods, documentary research method and in-depth interviews conducted with social media users, NGO activists, and Vietnamese scholars in 2017, the paper found that social media has been bringing a cyber public sphere to whom wish to discuss social and political issues. And, more importantly, it gives them a chance to connect with the government and policy makers quickly and effectively. Moreover, people use social media to supervise activities in society to prevent social evils and corruption in Vietnam. However, besides these positive points, people also have to cope with the rising situation of fake news which causing consequences for the society, such as pulling off crimes or cheating money and others. The paper concluded that social media plays important roles in the change of Vietnamese society, giving citizens a cyber public sphere unrestrictedly to discuss social and political issues but also bringing many bad risks to citizens.

Keywords: Vietnamese, social media, politics-society

Procedia PDF Downloads 139
659 Anthropological Basis of Arguments in Plato’s Protagoras

Authors: Zahra Nouri Sangedehy

Abstract:

There are two anthropologies considered in Protagoras. The first of them (Protagoras) considers the appearance of man, like all other beings, as the result of a natural evolution without a predetermined plan and aim. Not only the human's corporeal existence is the result of evolution and natural choices, but also his moral and social life can be explained in the light of this factor. In this anthropology, the moral and political laws derive from the contract and the people's majority agreement of society to survive. Society and socio-political institutions are the reason for the education and training (paidia) of virtues in general. The second anthropology is Socrates's, which is not clearly projected and is hidden behind his arguments. In this way, man's moral and social life is intrinsic. Man is intrinsically a moral and social being. Socrates intends to criticize the theory of the contractual nature of ethics by demonstrating the unity of virtues on the one hand and the identity of virtue and knowledge, and the problem of the teaching of virtues based on intrinsic and a priori knowledge of human beings, on the other hand, albeit with a new kind of education and training, which will replace the Sophists' education. Therefore, ethics will have undoubted foundations, and human beings will be defined again.

Keywords: Protagoras, techne, arête, paidia

Procedia PDF Downloads 84
658 The Diminished Online Persona: A Semantic Change of Chinese Classifier Mei on Weibo

Authors: Hui Shi

Abstract:

This study investigates a newly emerged usage of Chinese numeral classifier mei (枚) in the cyberspace. In modern Chinese grammar, mei as a classifier should occupy the pre-nominal position, and its valid accompanying nouns are restricted to small, flat, fragile inanimate objects rather than humans. To examine the semantic change of mei, two types of data from Weibo.com were collected. First, 500 mei-included Weibo posts constructed a corpus for analyzing this classifier's word order distribution (post-nominal or pre-nominal) as well as its accompanying nouns' semantics (inanimate or human). Second, considering that mei accompanies a remarkable number of human nouns in the first corpus, the second corpus is composed of mei-involved Weibo IDs from users located in first and third-tier cities (n=8 respectively). The findings show that in the cyber community, mei frequently classifies human-related neologisms at the archaic post-normal position. Besides, the 23 to 29-year-old females as well as Weibo users from third-tier cities are the major populations who adopt mei in their user IDs for self-description and identity expression. This paper argues that the creative usage of mei gains popularity in the Chinese internet due to a humor effect. The marked word order switch and semantic misapplication combined to trigger incongruity and jocularity. This study has significance for research on Chinese cyber neologism. It may also lay a foundation for further studies on Chinese classifier change and Chinese internet communication.

Keywords: Chinese classifier, humor, neologism, semantic change

Procedia PDF Downloads 249
657 First 1000 Days: Mothers’ Understanding of an Attachment Bond and the Role That It Plays in Early Childhood

Authors: Athena Pedro, Carushca de Beer, Erin Cupido, Tarryn Johnson, Tawana Keneilwe, Crystal Stoffels, Carinne Annfred Lorraine Petersen, Kuan Michael Truskey

Abstract:

The early experiences of children during their first 1000 days of life are the main determining factor of their development. Therefore, the aim of this study was to explore mothers' understanding of an attachment bond and the role that it plays in early childhood. A qualitative exploratory research design guided this study. Ethics approval was granted by appropriate ethics committees. Data were gathered through the use of semi-structured interviews with 15 participants within the Cape Town area, South Africa. Participants completed informed consents and were informed of confidentiality, anonymity, their rights, and voluntary participation. Thematically analysed data revealed that many participants were unaware of the term ‘the first 1000 days of a child’s life’; however, they were aware of the methods to be used for forming an attachment bond with their children. There is a need for more awareness on the subject matter within South Africa.

Keywords: awareness, children, first 1000 days, milestones, South Africa, understanding

Procedia PDF Downloads 193
656 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method

Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López

Abstract:

The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.

Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people

Procedia PDF Downloads 123
655 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 130
654 A Cross-Cultural Analysis of Ethical Standards in Social and Behavioral Research

Authors: Xiwu Feng

Abstract:

The paper is to analyze research ethics in social and behavioral sciences from a cross-cultural perspective. A multi-phase study investigated implementations of ethical standards and guidelines in higher institutions in China. Institutional policies and procedures on human subject research and perceptions of human subject protection were assessed in the Chinese research universities from different regions. The findings of the study indicate that the implementations of ethical standards and guidelines vary from institution to institution and from region to region. Education and cultural backgrounds of the participants influence their perceptions of the welfare and privacy of human subjects. The results of the study reveal great differences and complexities in ethical standards for the protection of human subjects of research in contrast to the Western world. The Chinese collectivistic values and the cooperative-harmonious democracy play a significant role in perceiving and implementing ethical guidelines. Chinese researchers find themselves a long way to go before seeing implementations of regulations and guidelines on human subject research in social and behavioral sciences.

Keywords: ethical standards, human subjects, research ethics, social and behavioral research

Procedia PDF Downloads 191
653 Antecedent Factors Affecting Evaluation of Quality of Students at Graduate School

Authors: Terada Pinyo

Abstract:

This study is a survey research designed to evaluate the quality of graduate students and factors influencing their quality. The sample group consists of 240 students. The data are collected from stratified sampling and are analyzed and calculated by instant computer program. Statistics used are percentage, mean, standard deviation, Pearson correlation coefficient, Cramer’s V and logistic regression analysis. It is found that the graduate students’ opinions regarding their characteristics according to the Thai Qualifications Framework for Higher Education (TQF) are at high score range both overall and specific category. The top categories that received the top score are interpersonal skills and responsibility, ethics and morals, knowledge, cognitive skills, numerical analysis with communication and information technology skills, respectively. On the other hand, factors affecting the quality of graduate students are cognitive skills, numerical analysis with communication and information technology, knowledge, interpersonal skills and responsibility, ethics and morals, and career regarding sales/business, respectively.

Keywords: student quality evaluation, Thai qualifications framework for higher education, graduate school, cognitive skills

Procedia PDF Downloads 393
652 Accounting Knowledge Management and Value Creation of SME in Chatuchak Market: Case Study Ceramics Product

Authors: Runglaksamee Rodkam

Abstract:

The purpose of this research was to study the influence of accountants’ potential performance on their working process, a case study of Government Savings Banks in the northeast of Thailand. The independent variables included accounting knowledge, accounting skill, accounting value, accounting ethics, and accounting attitude, while the dependent variable included the success of the working process. A total of 155 accountants working for Government Savings Banks were selected by random sampling. A questionnaire was used as a tool for collecting data. Descriptive statistics in this research included percentage, mean, and multiple regression analyses. The findings revealed that the majority of accountants were female with an age between 35-40 years old. Most of the respondents had an undergraduate degree with ten years of experience. Moreover, the factors of accounting knowledge, accounting skill, accounting a value and accounting ethics and accounting attitude were rated at a high level. The findings from regression analysis of observation data revealed a causal relationship in that the observation data could explain at least 51 percent of the success in the accountants’ working process.

Keywords: influence, potential performance, success, working process

Procedia PDF Downloads 248
651 Using the World Cafe Discussion Method to Practice Professional Ethics Courses: Taking Life Education as an Example

Authors: Li-Jia Chiu

Abstract:

The purpose of this study is to integrate the content of professional ethics curriculum into life education. This course is a required course for the third-year students of the university. The curriculum is based on professional ethics, which can help students gain insights into a conceptual understanding of professional theory, learning the meaning and the value of life. This study enhances students' attitude toward learning through multi-teaching methods. It takes ‘professionalism’ as the subject of discussion. Additionally, the course combines the connotation and issues of the student's career development. Using the world cafe discussion method, students can think about the role of the future career, and inspire students to integrate their career development and life value reflection and connection. This study recruited the third-year undergraduate students as samples to collect data. This study was conducted in the course of the fall semester in 2016 for thematic discussions, classroom observations, course study forms, coursework, and results in publication reports, etc. The researcher conducted induction data analysis to reflect the practice and reflection of the course. The subjects included 117 students from two classes, including 54 male and 63 female students. The findings of this study comprised the following two parts: the student’s learning and teacher’s teaching reflection. The students’ gains were that: 1) The curriculum design is different from that of other subjects; 2) The curriculum is highly interactive with teachers and classmates; 3) These students are willing to actively participate and share ideas in group discussions; 4 ) They thought the possibility of further discussions with other groups of students through table-to-table discussions; 5) They experienced the respect from other students in the learning process and their appreciation of other students in the same group. The instruction reflections were as follows: 1) Students learned to get link to the value of life and future development through topical discussions; 2) After the main course design guided through gradual guidance, the students’ psychology reached a certain degree of cognition, and further themes then added would cause more sensuous learning effects; 3) Combining students’ expertise in drawing in this department (digital media design department) into curriculum design is effective in stimulating learning motivation and sense of accomplishment; 4) In order to compare and explore learning benefits, future researches are recommended to conduct the similar studies with different departments. Finally, the researcher looks forward to providing research results and findings to the related curriculum teachers as a reference for practical curriculum planning and teaching methods.

Keywords: life education, World Cafe, professional ethics, professionalism

Procedia PDF Downloads 134
650 Ethical Considerations for Conducting Research on Violence against Women with Disabilities: Discussing Issues of Reasonable Accommodation, Capacity and Equal Participation

Authors: Ingrid Van Der Heijden, Naeemah Abrahams, Jane Harries

Abstract:

Background: Women with disabilities are largely missing from global research on violence prevention, yet research shows that women with disabilities are a particularly marginalised group who experience heightened levels and unique forms of violence than men with disabilities, and women without disabilities. They face heightened stigma, discrimination, and violence due to their gender and their disability. Including women with disabilities in violence, research helps inform policy and prevention interventions that are relevant and inclusive. To ensure their inclusion in violence research, we need ethical guidelines that are sensitive to their heightened risk and vulnerability, that recognize the diversity in the disabled population, but that also promote disabled people’s agency in defining their own violence prevention needs and agendas. Objective: To highlight pertinent ethical issues around women with disabilities’ inclusion and participation in violence research. Methodology: Considering the lack of formalized guidelines for research of people with disabilities, we draw from the literature on international ethics guidelines for researching violence against women, and the Emancipatory Disability Research paradigm, as well as drawing from our own experiences from the field in applying the guidelines when doing research with disabled women. Findings: Following the guiding ethical principles of respect, benefit, justice, and do no harm, we argue that reasonable accommodation, capacity, and equal participation need to be considered in conceptualizing and conducting ethical violence research with women with disabilities. We conclude that disability research in the area of violence is highly politicized and must be carefully scrutinized to ensure justice and the contribution of women with disabilities to their own welfare. Implications: We suggest that these issues are practically applied in the field and tested and critiqued to enhance best practice for undertaking ethical research with this particular group. It is important that not only researchers and ethics committees, but also disabled women and disabled organizations, are involved in enhancing and formalizing ethical research guidelines for marginalized populations.

Keywords: capacity, emancipatory disability research paradigm equal participation, reasonable accommodation, research ethics, violence against women with disabilities

Procedia PDF Downloads 331
649 Auditor with the Javanese Characters: Revealing the Relationship towards Its Client

Authors: Krisna Damayanti

Abstract:

Negative issue about the relationship between auditors and clients often heard. It arises in view of the rise of a variety of phenomena resulting from the audit practice of greed and do not appreciate the independence of the audit profession and professional code of ethics. It is a logical consequence of the practice of capitalism in accounting. The purpose of this paper would like to uncover the existing auditing practices in Indonesia, especially Java, which is associated with a strong influence of Javanese culture with reluctant/"shy", politely, "legowo", "ngemong" friendly, "not mentholo", "tepo seliro", "ngajeni", "acquiescent". The method used by interpretive approach that emphasizes the role of language, interpret and understand and see social reality as something other than a label, name or concept. Auditing practices in each country has a culture that will affect the standard set by those regulatory standards although there has been an adaptation of IAS. In Indonesia the majority of parties dominated by Javanesse racial regulators, so Java culture is embedded in every audit practices thus conditions in Java requires auditors to behave like that, sometimes interfere with standard Java code of conduct that must be executed by an auditor. Auditors who live in Java have the characters of Javanese culture that is hard to avoid in the audit practice. However, in practice, the auditor still are relevant in their profession.

Keywords: auditors, java, character, profession, code of ethics, client

Procedia PDF Downloads 434