Search results for: cyber violence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1033

Search results for: cyber violence

763 Unveiling the Truth of Female Reproductive Health: The Tied Shackles of Authoritative Knowledge and Domestic Violence: An Ethnographic Study on an Urban Slum of Dhaka City

Authors: Saba Nuzhat

Abstract:

The present ethnographic study examines how domestic violence and authoritative knowledge affect the reproductive health of females; in terms of contraceptive behavior and induced abortion. This qualitative study has been conducted by collecting in depth informal interviews and case studies of 12 female respondents living in an urban slum of Keraniganj, located Dhaka city. The study depicts how multivariable factors are linked to a woman’s ability to contracept and make abortion decisions in a cultural context where being a wife infers to submission, limited mobility, sexual availability, and restricted autonomy on her own reproduction health. This study shows how violence is being normalized and socially acceptable, every time women do not adhere to go through expected gender roles. The study primarily explores the subjective experiences and perceptions of the females about contraceptive behavior as well as abortions from a medical anthropological perspective. A number of salient examples are highlighted into this paper where women who go through abortion or adopt various measures of contraceptives get highly influenced by authoritative knowledge or under the pressure of male dominance. The lack of female autonomy or prevalence of domestic violence challenges the gender equality of Bangladeshi society and female sovereignty in accessing sexual or reproductive rights. This paper remarks the significance of medical anthropological research that helps to understand the intricate interrelationship between authoritative knowledge and male dominance with female reproductive health in order to reduce women’s risk of experiencing domestic violence and to promote reproductive health autonomy for themselves for espousing contraceptive behaviors and abortion decisions.

Keywords: abortion, authoritative knowledge, contraception, domestic violence, reproductive health

Procedia PDF Downloads 108
762 “Uninformed” Religious Orientation Can Lead to Violence in Any Given Community: The Case of African Independence Churches in South Africa

Authors: Ngwako Daniel Sebola

Abstract:

Introductory Statement: Religions are necessary as they offer and teach something to their adherence. People in one religion may not have a complete understanding of the Supreme Being (Deity) in a certain religion other than their own. South Africa, like other countries in the world, consists of various religions, including Christianity. Almost 80% of South African population adheres to the Christian faith, though in different denominations and sects. Each church fulfils spiritual needs that perhaps others cannot fill. African Independent Churches is one of the denominations in the country. These churches arose as a protest to the Western forms and expressions of Christianity. Their major concern was to develop an indigenous expression of Christianity. The relevance of African Independent Churches includes addressing the needs of the people holistically. Controlling diseases was an important aspect of change in different historical periods. Through healing services, leaders of African churches are able to attract many followers. The healing power associated with the founders of many African Initiated Churches leads to people following and respecting them as true leaders within many African communities. Despite its strong points, African Independent Churches, like many others, face a variety of challenges, especially conflicts. Ironically, destructive conflicts resulted in violence.. Such violence demonstrates a lack of informed religious orientation among those concerned. This paper investigates and analyses the causes of conflict and violence in the African Independent Church. The researcher used the Shembe and International Pentecostal Holiness Churches, in South Africa, as a point of departure. As a solution to curb violence, the researcher suggests useful strategies in handling conflicts. Methodology: Comparative and qualitative approaches have been used as methods of collecting data in this research. The intention is to analyse the similarities and differences of violence among members of the Shembe and International Pentecostal Holiness Churches. Equally important, the researcher aims to obtain data through interviews, questionnaires, focus groups, among others. The researcher aims to interview fifteen individuals from both churches. Finding: Leadership squabbles and power struggle appear to be the main contributing factors of violence in many Independent Churches. Ironically, violence resulted in the loss of life and destruction of properties, like in the case of the Shembe and International Pentecostal Holiness Churches. Violence is an indication that congregations and some leaders have not been properly equipped to deal with conflict. Concluding Statement: Conflict is a common part of every human existence in any given community. The concern is when such conflict becomes contagious; it leads to violence. There is a need to understand consciously and objectively towards devising the appropriate measures to handle the conflict. Conflict management calls for emotional maturity, self-control, empathy, patience, tolerance and informed religious orientation.

Keywords: African, church, religion, violence

Procedia PDF Downloads 95
761 Intimate Partner Violence Concerns during COVID-19 Pandemic

Authors: Fatemeh Abdollahi, Munn-Sann Lye, Jamshid Yazdani Charati, Mehran Zarghami

Abstract:

Background: In March 2020, the World Health Organization (WHO) declared the outbreak of a new coronavirus disease, COVID-19, as a public health concern and pandemic. This situation is generating psychological consequences such as stress, anxiety, depression, and intimate partner violence (IPV) throughout the population. This is a brief note on the magnitude of this threat and different ways for abused women to minimize the effects of it in their daily life. Methods: A literature review was conducted using the MEDLINE, PSYCHINFO, and SCIENCE DIRECT databases. The keywords used included intimate partner violence, abuse, victims, pandemic, quarantine, coronavirus, and COVID-19. A Google search was also conducted using these words to identify reports published in non-indexed health care and social science journals. The literature search was restricted to English language studies. Results: The prevalence of IPV and its consequences are rising during such a pandemic. Having sufficient support from healthcare workers and acquaintances is critical for women in such circumstances. Conclusion: Community members, healthcare providers, governments, and policymakers should be informed of the increased risk of IPV during such a pandemic. They should provide a supporting structure for abused women. Social networking is also a good approach that could help abusive women during this situation.

Keywords: covid-19, intimate partner violence, pandemic, women

Procedia PDF Downloads 39
760 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 502
759 Evaluation of the Accuracy of a ‘Two Question Screening Tool’ in the Detection of Intimate Partner Violence in a Primary Healthcare Setting in South Africa

Authors: A. Saimen, E. Armstrong, C. Manitshana

Abstract:

Intimate partner violence (IPV) has been recognised as a global human rights violation. It is universally under diagnosed and the institution of timeous multi-faceted interventions has been noted to benefit IPV victims. Currently, the concept of using a screening tool to detect IPV has not been widely explored in a primary healthcare setting in South Africa, and it was for this reason that this study has been undertaken. A systematic random sampling of 1 in 8 women over a period of 3 months was conducted prospectively at the OPD of a Level 1 Hospital. Participants were asked about their experience of IPV during the past 12 months. The WAST-short, a two-question tool, was used to screen patients for IPV. To verify the result of the screening, women were also asked the remaining questions from the WAST. Data was collected from 400 participants, with a response rate of 99.3%. The prevalence of IPV in the sample was 32%. The WAST-short was shown to have the following operating characteristics: sensitivity 45.2%, specificity 98%,positive predictive value 98%, negative predictive value 79%. The WAST-short lacks sufficient sensitivity and therefore is not an ideal screening tool for this setting. Improvement in the sensitivity of the WAST-short in this setting may be achieved by lowering the threshold for a positive result for IPV screening, and modification of the screening questions to better reflect IPV as understood by the local population.

Keywords: domestic violence, intimate partner violence, screening, screening tools

Procedia PDF Downloads 279
758 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 41
757 Inter-Generational Benefits of Improving Access to Justice for Women: Evidence from Peru

Authors: Iva Trako, Maris Micaela Sviatschi, Guadalupe Kavanaugh

Abstract:

Domestic violence is a major concern in developing countries, with important social, economic and health consequences. However, institutions do not usually address the problems facing women or ethnic and religious minorities. For example, the police do very little to stop domestic violence in rural areas of developing countries. This paper exploits the introduction of women’s justice centers (WJCs) in Peru to provide causal estimates on the effects of improving access to justice for women and children. These centers offer a new integrated public service model for women by including medical, psychological and legal support in cases of violence against women. Our empirical approach uses a difference in difference estimation exploiting variation over time and space in the opening of WJC together with province-by-year fixed effects. Exploiting administrative data from health providers and district attorney offices, we find that after the opening of these centers, there are important improvements on women's welfare: a large reduction in femicides and female hospitalizations for assault. Moreover, using geo-coded household surveys we find evidence that the existence of these services reduces domestic violence, improves women's health, increases women's threat points and, therefore, lead to household decisions that are more aligned with their interests. Using administrative data on the universe of schools, we find large gains on human capital for their children: affected children are more likely to enroll, attend school and have better grades in national exams, instead of working for the family. In sum, the evidence in this paper shows that providing access to justice for women can be a powerful tool to reduce domestic violence and increase education of children, suggesting a positive inter-generational benefit.

Keywords: access to justice, domestic violence, education, household bargaining

Procedia PDF Downloads 158
756 Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells

Authors: Andrea Tundis, Carlos García Cordero, Rolf Egert, Alfredo Garro, Max Mühlhäuser

Abstract:

Resilience is an important system property that relies on the ability of a system to automatically recover from a degraded state so as to continue providing its services. Resilient systems have the means of detecting faults and failures with the added capability of automatically restoring their normal operations. Mastering resilience in the domain of Cyber-Physical Systems is challenging due to the interdependence of hybrid hardware and software components, along with physical limitations, laws, regulations and standards, among others. In order to overcome these challenges, this paper presents a modeling approach, based on the concept of Dynamic Cells, tailored to the management of Smart Grids. Additionally, a heuristic algorithm that works on top of the proposed modeling approach, to find resilient configurations, has been defined and implemented. More specifically, the model supports a flexible representation of Smart Grids and the algorithm is able to manage, at different abstraction levels, the resource consumption of individual grid elements on the presence of failures and faults. Finally, the proposal is evaluated in a test scenario where the effectiveness of such approach, when dealing with complex scenarios where adequate solutions are difficult to find, is shown.

Keywords: cyber-physical systems, energy management, optimization, smart grids, self-healing, resilience, security

Procedia PDF Downloads 301
755 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability

Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi

Abstract:

There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitization

Keywords: cybersecurity, supply chain methodology, secure substation, digitization

Procedia PDF Downloads 39
754 Women with Invisible Wounds: A Qualitative Exploration of Emotional Abuse

Authors: Mehar Pruthi, Manjula V.

Abstract:

For the longest time, Indian households have been hosts to a variety of domestic evils such as intimate partner violence, physical abuse, sexual assaults, and more commonly gender-based violence. The prevalence of such heinous acts against women is often swept under the carpet of patriarchy and leaves women scarred. Many times, these wounds are caused by more insidious and subtle acts of violence. For this study, the choice of term for these acts is Emotional Abuse. The ill effects of emotional abuse on the victim’s sense of self and psychological health have been widely established. The current study takes a qualitative approach to explore women’s experiences at the brunt of emotional abuse. To this end, six participants (N=6) were identified using purposive and snowball sampling which was followed by a pre-screening form to assess for the presence of emotional abuse. A semi-structured interview guide was employed to investigate the victim’s perception of emotional abuse, the manifestation of emotional abuse in a patriarchal society, and the reasons women remain in abusive relationships. Each interview lasted about 50-60 mins and was accompanied by extensive note-making. A preliminary analysis of the interviews was done using the Interpretative Phenomenological Approach. Initial findings reveal the emergence of themes such as feelings of loneliness, intergenerational transmission of violence, denial, justifying the partner’s behavior, staying because of children, hoping things would change, and faith in God. The study is instrumental in conceptualizing the patterns of emotional abuse keeping in mind the patriarchal context of the Indian society. It has implications for professionals in the mental health field who work with this population so they can better understand their plight. Future research could focus on rebuilding relationships for those partners who decide to sustain such relationships and focus on various coping mechanisms with special emphasis on religious beliefs.

Keywords: emotional abuse, gender-based violence, intimate partner violence, marriage, patriarchy

Procedia PDF Downloads 68
753 Journey to Cybercrime and Crime Opportunity: Quantitative Analysis of Cyber Offender Spatial Decision Making

Authors: Sinchul Back, Sun Ho Kim, Jennifer LaPrade, Ilju Seong

Abstract:

Due to the advantage of using the Internet, cybercriminals can reach target(s) without border controls. Prior research on criminology and crime science has largely been void of empirical studies on journey-to-cybercrime and crime opportunity. Thus, the purpose of this study is to understand more about cyber offender spatial decision making associated with crime opportunity factors (i.e., co-offending, offender-stranger). Data utilized in this study were derived from 306 U.S. Federal court cases of cybercrime. The findings of this study indicated that there was a positive relationship between co-offending and journey-to-cybercrime, whereas there was no link between offender-stranger and journey-to-cybercrime. Also, the results showed that there was no relationship between cybercriminal sex, age, and journey-to-cybercrime. The policy implications and limitations of this study are discussed.

Keywords: co-offending, crime opportunity, journey-to-cybercrime, offender-stranger

Procedia PDF Downloads 148
752 A Psycho-Education Strategy as a Method for Reconstructing Identity in the Context of Family Violence

Authors: Charlene Petersen, Herman Grobler, Karel Botha

Abstract:

Restorative intervention with adolescents from a family violence context is a much needed resource given the limited access to mental health services in South Africa. In this research article the qualitative component which formed part of a mixed methods design of an overall research study, is discussed. A qualitative case study design was used. This article explores a psycho-education strategy, using a visual creative medium as a method for reconstructing identity in the context of family violence. The aim of this psycho-education strategy was to move away from interventions based on the biomedical model, but focused more on meaning-making about violent traumatic events adolescents have experienced, and to develop more positive, adaptive views about themselves in the present, and experience hope about the future. The research question that was asked was how the meaning, that adolescents from a specific community in South Africa give to family violence, contribute to defining their identity? Twelve participants were purposively selected for the study and included both male and female adolescents with ages ranging from 15 to 18 years from three secondary schools. The strategy was applied over five sessions with the intention to bring about awareness of different selves, identifying and naming the selves, and becoming aware of the configuration of identity that could lead to a redefined identity. The data were thematically and visually analyzed. Through the process of tailoring which forms the basis for reconstruction process, participants could identify the different selves, become aware of how they configure in the field. Through the process of tailoring the different self-parts, the sense of self became more self-cohesive and allowed the individual to become aware of the role of certain. Through identifying and naming the future self and resilient self the participants were able to accomplish some order and meaning in their lives. It provided them with a sense of predictability and an optimistic and hopefulness towards the future. The research findings indicated that this strategy can be used as a method for reconstructing identity in the context of family violence.

Keywords: identity, family violence, self-configuration, reconstructing identity, psycho-education strategy

Procedia PDF Downloads 350
751 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 94
750 Intimate Partner Offenders and Prevalent Affective-Cognitive Functioning: A Study with Inmates

Authors: Alexandra Serra, Nadia Torrão, Rui G. Serôdio, José A. Lima

Abstract:

The present study aimed to evaluate the incidence and the prevalence of domestic violence legitimatory beliefs, emotional regulation difficulties and, early maladaptive schemas regarding intimidate partner violence in a sample of 50 Portuguese inmates. As expected, results show high levels of legitimatory beliefs, significant difficulties of emotional regulation and a set of high levels of early maladaptive schemas that clearly compromise the inmates affective-cognitive functioning. The most prevalent set of maladaptive schemas are associated with depression, anxiety, hostility, reduced ability to empathize and, dependence on the approval of others, which, combined, may trigger aggressive responses towards the intimate’s partner. Being victimized in their childhood and having committing murder are not differentiating factors on the measures we analyzed, but alcohol consumption may be associated with an intensification of domestic violence legitimatory beliefs. In the discussion of our findings, we compare the pattern of the psychosocial measures we used with the equivalent results obtained with convicted individuals that attend a community compulsory program, specifically designed for domestic violence perpetrators. We also highlight the importance of implementing specialized interventions in prison settings focusing on an evidence-based-practice.

Keywords: affective-cognitive functioning, intimate partner offenders, psychological research with inmates

Procedia PDF Downloads 394
749 Refuge(e)s in Digital Diaspora: Reimagining and Reimaging ‘Ethnically Cleansed’ Villages as ‘Cyber Villages’

Authors: Hariz Halilovich

Abstract:

Based on conventional and digital ethnography, this paper discusses the ways Bosnian refugees utilise digital technologies and new media to recreate, synchronise and sustain their identities and memories in the aftermath of ‘ethnic cleansing’ and genocide and in the contexts of their new emplacements and home-making practices in diaspora. In addition to discussing representations of displacement and emplacement in the ‘digital age’, the paper also aims to make a contribution to the understanding and application of digital ethnography as an emerging method of inquiry in anthropology and related social science disciplines. While some researchers see digital ethnography as an exclusively online–based research, the author of this paper argues that it is critical to understand the online world in the context of the real world—made of real people, places, and social relations.

Keywords: Bosnia, cyber villages, digital diaspora, refugees

Procedia PDF Downloads 214
748 From Service Delivery Strikes to Anti-Immigrant March: A Paradigm Shift in the Post-Colonial Discourse of Politics of Belonging in the Twenty-First Century South Africa

Authors: Israel Ekanade, Richard Molapo, Patrick Dzimiri, Isaac Ndlovu

Abstract:

This study aims to unravel the myth behind animosity towards foreign nationals in South Africa. Systemic violence against foreign African nationals since 2008 to date necessitates critical research with regards to migration issues connected to social upheavals. Extensive research ubiquitously tagged black-on-black violence as xenophobia or Afrophobia. In all, escalation of violence indicates a connotation of belonging. With unemployment rates approaching a crescendo, other vices have also soared in the same regard. As a result, this present generation seems cynical as the South African state has not fulfilled her obligations towards the indigent population; a situation pitching locals against foreigners. Locals have repeatedly blamed African foreign nationals for the economic downturn, using service delivery strikes to express their grievances. These strikes have continued unabatedly over the years but February 2017 marked a turning point in ‘insider-outsider’ relations as the strike was now turned to an anti-immigrant march resulting into widespread violence as the police failed to restore normalcy at some point. Over time, migration has been a harbinger of violence against the foreign black population in South Africa. Our paper encourages the state and civil society to invent new peace-building mechanisms to reduce xenophobic orchestrated violence. Our paper also contends that since the political class has hijacked the situation by using the youths for political propaganda during crises periods, a re-education of the political class and a culture of tolerance is inevitable for peace and harmony between locals and foreigners in post-apartheid South Africa.

Keywords: anti-immigrant march, politics of belonging, service delivery strikes, South Africa

Procedia PDF Downloads 278
747 Adaptive Data Approximations Codec (ADAC) for AI/ML-based Cyber-Physical Systems

Authors: Yong-Kyu Jung

Abstract:

The fast growth in information technology has led to de-mands to access/process data. CPSs heavily depend on the time of hardware/software operations and communication over the network (i.e., real-time/parallel operations in CPSs (e.g., autonomous vehicles). Since data processing is an im-portant means to overcome the issue confronting data management, reducing the gap between the technological-growth and the data-complexity and channel-bandwidth. An adaptive perpetual data approximation method is intro-duced to manage the actual entropy of the digital spectrum. An ADAC implemented as an accelerator and/or apps for servers/smart-connected devices adaptively rescales digital contents (avg.62.8%), data processing/access time/energy, encryption/decryption overheads in AI/ML applications (facial ID/recognition).

Keywords: adaptive codec, AI, ML, HPC, cyber-physical, cybersecurity

Procedia PDF Downloads 50
746 Effectiveness of Video Interventions for Perpetrators of Domestic Violence

Authors: Zeynep Turhan

Abstract:

Digital tools can improve knowledge and awareness of strategies and skills for healthy and respectful intimate relationships. The website of the Healthy and Respectful Relationship Program has been developed and included five key videos about how to build healthy intimate relationships. This study examined the perspectives about informative videos by focusing on how individuals learn new information or challenge their preconceptions or attitudes regarding male privilege and women's oppression. Five individuals who received no-contact orders and attended group intervention were the sample of this study. The observation notes were the major methodology examining how participants responded to video tools. The data analysis method was the interpretative phenomenological analysis. The results showed that many participants found the tools useful in learning the types of violence and communication strategies. Nevertheless, obstacles to implementing some techniques were found in their relationships. These digital tools might enhance healthy and respectful relationships despite some limitations.

Keywords: healthy relationship, digital tools, intimate partner violence, perpetrators, video interventions

Procedia PDF Downloads 61
745 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 184
744 Escaping Domestic Violence in Time of Conflict: The Ways Female Refugees Decide to Flee

Authors: Zofia Wlodarczyk

Abstract:

I study the experiences of domestic violence survivors who flee their countries of origin in times of political conflict using insight and evidence from forty-five biographical interviews with female Chechen refugees and twelve refugee resettlement professionals in Poland. Both refugees and women are often described as having less agency—that is, they lack the power to decide to migrate – refugees less than economic migrants and women less than men. In this paper, I focus on how female refugees who have been victims of domestic violence make decisions about leaving their countries of origin during times of political conflict. I use several existing migration theories to trace how the migration experience of these women is shaped by dynamics at different levels of society: the macro level, the meso level and the micro level. At the macro level of analysis, I find that political conflict can be both a source of and an escape from domestic violence. Ongoing conflict can strengthen the patriarchal cultural norms, increase violence and constrain women’s choices when it comes to marriage. However, political conflict can also destabilize families and make pathways for women to escape. At the meso level I demonstrate that other political migrants and institutions that emerge due to politically triggered migration can guide those fleeing domestic violence. Finally, at the micro level, I show that family dynamics often force domestic abuse survivors to make their decision to escape alone or with the support of only the most trusted female relatives. Taken together, my analyses show that we cannot look solely at one level of society when describing decision-making processes of women fleeing domestic violence. Conflict-related micro, meso and macro forces interact with and influence each other: on the one hand, strengthening an abusive trap, and on the other hand, opening a door to escape. This study builds upon several theoretical and empirical debates. First, it expands theories of migration by incorporating both refugee and gender perspectives. Few social scientists have used the migration theory framework to discuss the unique circumstances of refugee flows. Those who have mainly focus on “political” migrants, a designation that frequently fails to account for gender, does not incorporate individuals fleeing gender-based violence, including domestic-violence victims. The study also enriches migration scholarship, typically focused on the US and Western-European context, with research from Eastern Europe and Caucasus. Moreover, it contributes to the literature on the changing roles of gender in the context of migration. I argue that understanding how gender roles and hierarchies influence the pre-migration stage of female refugees is crucial, as it may have implications for policy-making efforts in host countries that recognize the asylum claims of those fleeing domestic violence. This study also engages in debates about asylum and refugee law. Domestic violence is normatively and often legally considered an individual-level problem whereas political persecution is recognized as a structural or societal level issue. My study challenges these notions by showing how the migration triggered by domestic violence is closely intertwined with politically motivated refuge.

Keywords: AGENCY, DOMESTIC VIOLENCE, FEMALE REFUGEES, POLITICAL REFUGE, SOCIAL NETWORKS

Procedia PDF Downloads 141
743 A Digital Twin Approach to Support Real-time Situational Awareness and Intelligent Cyber-physical Control in Energy Smart Buildings

Authors: Haowen Xu, Xiaobing Liu, Jin Dong, Jianming Lian

Abstract:

Emerging smart buildings often employ cyberinfrastructure, cyber-physical systems, and Internet of Things (IoT) technologies to increase the automation and responsiveness of building operations for better energy efficiency and lower carbon emission. These operations include the control of Heating, Ventilation, and Air Conditioning (HVAC) and lighting systems, which are often considered a major source of energy consumption in both commercial and residential buildings. Developing energy-saving control models for optimizing HVAC operations usually requires the collection of high-quality instrumental data from iterations of in-situ building experiments, which can be time-consuming and labor-intensive. This abstract describes a digital twin approach to automate building energy experiments for optimizing HVAC operations through the design and development of an adaptive web-based platform. The platform is created to enable (a) automated data acquisition from a variety of IoT-connected HVAC instruments, (b) real-time situational awareness through domain-based visualizations, (c) adaption of HVAC optimization algorithms based on experimental data, (d) sharing of experimental data and model predictive controls through web services, and (e) cyber-physical control of individual instruments in the HVAC system using outputs from different optimization algorithms. Through the digital twin approach, we aim to replicate a real-world building and its HVAC systems in an online computing environment to automate the development of building-specific model predictive controls and collaborative experiments in buildings located in different climate zones in the United States. We present two case studies to demonstrate our platform’s capability for real-time situational awareness and cyber-physical control of the HVAC in the flexible research platforms within the Oak Ridge National Laboratory (ORNL) main campus. Our platform is developed using adaptive and flexible architecture design, rendering the platform generalizable and extendable to support HVAC optimization experiments in different types of buildings across the nation.

Keywords: energy-saving buildings, digital twins, HVAC, cyber-physical system, BIM

Procedia PDF Downloads 69
742 The Consequence of Being Perceived as An 'Immodest Woman': The Kuwaiti Criminal Justice System’s Response to Allegations of Sexual Violence

Authors: Eiman Alqattan

Abstract:

Kuwaiti criminal justice system’s responses to allegations of sexual violence against women during the pre-trial process, suggesting that the system in Kuwait is affected by an ethos that is male dominated and patriarchal, and which results in prejudicial, unfair, and unequal treatment of female victims of serious sexual offenses. Data derived from qualitative semi-structured face-to-face interviews with four main groups of criminal justice system personnel in Kuwait (prosecutors, police investigators, police officers, and investigators) reveal the characteristics of a complaint of sexual violence that contribute to cases being either sent to court or dismissed. This proposed paper will suggest that Arab cultural views of women appear to influence and even shape the views, perceptions, and conduct of the interviewed Kuwaiti criminal justice system personnel regarding complaints of sexual violence made by citizens. Data from the interviews show how the image of the ‘modest woman’ that exists within Arabic cultural views and norms greatly contributes to shaping the characteristics of what the majority of the interviewed officials considered to be a ‘credible’ allegation of sexual violence. In addition, it is clear that the interviewees’ definitions of ‘modesty’ varied. Yet the problem is not only about the stereotypical perceptions of complainants or the consequences of those perceptions on the decision to send the case to court. These perceptions also affected the behaviours of criminal justice system personnel towards citizen complainants. When complainants’ allegations were questioned, investigators went as far as abusing the women verbally or physically, often in order to force them to withdraw the so-called ‘false’ complaint in order to protect the ‘real’ victim: the ‘innocent defendant’. The proposed presentation will discuss these police approaches to women and the techniques used in assessing the credibility of their accusations, including how they differ depending on whether the complainant was under or over 21 years old.

Keywords: criminal justice system, law and Arab culture, modest woman, sexual violence

Procedia PDF Downloads 277
741 Violence in the School Environment: When the Teenager Encounters the Threat of Depression

Authors: Ndje Ndje Mireille

Abstract:

For some years in Cameroon, there has been an increase in violence in schools. This violence has gone from verbal to physical, sometimes going as far as murder. At the centre of this violence, we find the student who is a teenager in the midst of both physical and psychological changes. The unpredictable transformations of his body, the unexpected emotions arrouse when he encouters someonelse, intrusion, shortcomings, boredom, loneliness and self-deception are the threats to which the teenager faces daily. From the psychopathological point of view, the greatest threat in adolesence is probably the depresive threat. During adolescence and for several resons, the subject is confronted with the self image. He displays certantity which sometimes hides great uncertaintity about what leads him to manifest some particular behaviours or undertake certain actions. Faced with aggressiveness twards those he confronts, he feels more or less guilt. This can lead a certain number of adolescents to feel heplessness faced to their vis-à-vis, faced to life. This helplessness is sometimes reinforced by the social, cultural and economic context in which they are. The teeneger then feels threatens by this depression which, when it reaches its extreme, it is manifested by the feeling that he can no longer do anything. Generally, the depressive threats manifest itself in defensive forms vis-à-vis with the depression itself. Reason why, it is indeed a threat and not a threshold already crossed. This threat often manifests itself in inappropriate forms of attack on one’s own body as seen in a number of repetitive risky behaviours. We also see teenegers confront peers and even adults through physical attacks and often go as far as murder. All these behaviours appears as an absurd way of attacking and at the same time confronting the feeling of remaining alive. This depressive threats can also be expressed in forms of attacks on an individual’s thinking abilities or more explicitely in the form of accademic downfall. The depressive threats does not sum up all the problems of adolescence, but, undoubtly represents currently, one of the deepest form of unease adolescents face.

Keywords: violence, school, depression threats, adolescent, behavior

Procedia PDF Downloads 63
740 The Effect of Intimate Partner Violence Prevention Program on Knowledge and Attitude of Victims

Authors: Marzieh Nojomi, Azadeh Mottaghi, Arghavan Haj-Sheykholeslami, Narjes Khalili, Arash Tehrani Banihashemi

Abstract:

Background and objectives: Domestic violence is a global problem with severe consequences throughout the life of the victims. Iran’s Ministry of Health has launched an intimate partner violence (IPV) prevention program, integrated in the primary health care services since 2016. The present study is a part of this national program’s evaluation. In this section, we aimed to examine spousal abuse victims’ knowledge and attitude towards domestic violence before and after receivingthese services. Methods: To assess the knowledge and attitudes of victims, a questionnaire designed by Ahmadzadand colleagues in 2013 was used. This questionnaire includes 15 questions regarding knowledge in the fields of definition, epidemiology, and effects on children, outcomes, and prevention of domestic violence. To assess the attitudes, this questionnaire has 10 questions regarding the attitudes toward the causes, effects, and legal or protective support services of domestic violence. To assess the satisfaction and the effect of the program on prevention or reduction of spousal violence episodes, two more questions were also added. Since domestic violence prevalence differs in different parts of the country, we chose nine areas with the highest, the lowest, and moderate prevalence of IPVfor the study. The link to final electronic version of the questionnaire was sent to the randomly selected public rural or urban health centers in the nine chosen areas. Since the study had to be completed in one month, we used newly identified victims as pre-intervention group and people who had at least received one related service from the program (like psychiatric consultation, education about safety measures, supporting organizations and etc.) during the previous year, as our post- intervention group. Results: A hundred and ninety-two newly identified IPV victims and 267 victims who had at least received one related program service during the previous year entered the study. All of the victims were female. Basic characteristics of the two groups, including age, education, occupation, addiction, spouses’ age, spouses’ addiction, duration of the current marriage, and number of children, were not statistically different. In knowledge questions, post- intervention group had statistically better scores in the fields of domestic violence outcomes and its effects on children; however, in the remaining areas, the scores of both groups were similar. The only significant difference in the attitude across the two groups was in the field of legal or protective support services. From the 267 women who had ever received a service from the program, 91.8% were satisfied with the services, and 74% reported a decrease in the number of violent episodes. Conclusion: National IPV prevention program integrated in the primary health care services in Iran is effective in improving the knowledge of victims about domestic violence outcomes and its effects on children. Improving the attitude and knowledge of domestic violence victims about its causes and preventive measures needs more effective interventions. This program can reduce the number of IPV episodes between the spouses, and satisfaction among the service users is high.

Keywords: intimate partner violence, assessment, health services, efficacy

Procedia PDF Downloads 110
739 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 57
738 Violence against Police Officers in Germany

Authors: Anne T. Herr, Clemens Lorei

Abstract:

Employees of organizations with security tasks, such as emergency services, public order services, or police forces, work every day to ensure people's safety. Violence against police is, therefore, a relevant topic both socially and politically. An increase in violence is often discussed without there being any verifiable and generally valid data. So far, scientific research has mainly focused on offender characteristics and crime statistics. These surveys are mostly subjective, retrospective, and neglect the dynamics and interactions in concrete violent situations. Therefore, more recent research methods attempt to capture the issue of violence against emergency forces more comprehensively. However, the operationalization of the constructs and the methodological approach pose particular challenges. This contribution provides an overview of new perspectives on the understanding of violent assaults and identifies current research gaps. In addition, a new research project of the Hessian University of Police and Administration in Germany is presented. In the 'AMBOSafe' study, different theoretical backgrounds for understanding violence against police and emergency services personnel will be combined in order to capture as many different perspectives of violent assaults as possible in a multimodal research approach. In a retrospective as well as in a longitudinal survey, the conditions of escalation dynamics in the assaults are recorded and supplemented by the current and valid prevalence of physical and verbal assaults in a period of four months. In addition, qualitative interviews with those affected will be used to record more detailed descriptions of and the feelings during the assaults, as well as possible causes and connections between the different groups of people. In addition to the reports of the police forces, the motives of the attackers will be collected and supplemented by analyzing the criminal case files. This knowledge can contribute to a more comprehensive understanding of violent assaults against police forces in order to be able to derive scientifically based preventive measures.

Keywords: assaults, crime statistics, escalation dynamics, police

Procedia PDF Downloads 88
737 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 278
736 Gender: Schooling and Social Condition’s Women in Brazil

Authors: Simone Tamires Vieira

Abstract:

This paper aims to investigate the history of women's schooling in Brazil and to reflect on the condition and social space of women today. Therefore, the following question arises as a research problem: how does the history of the school in/exclusion of women in Brazil relate to the occupations occupied today? As for the objectives, we seek to collect data on the education of women and girls in Brazil, analyze some institutionalized educational legislation and policies, reflect on issues of opportunity and deprivation in order to problematize the female condition through the review of qualitative literature. The results showed that gender and symbolic violence are powerful categories to analyze this theme since the trajectories, choices, and opportunities given to women are permeated by veiled mechanisms perpetuated by a structurally patriarchal society, focused on the interests of the elite, which denies diversity to maintain its status. The aim of this research is to contribute to reflections on the potential of dialogical action, as it highlights the forces that act and permeate the trajectories of women to empower current and future generations.

Keywords: gender, school in/exclusion symbolic violence, women, symbolic violence, women

Procedia PDF Downloads 130
735 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation

Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.

Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques

Procedia PDF Downloads 258
734 Reshaping Male Masculinity to Combat Gender-Based Violence and Foster Gender Equality in West Africa: A Case Study of the Lagos State Domestic and Sexual Violence Agency Kings Club

Authors: Lola Vivour-Adeniyi, Oluwatoyosi Abikoye

Abstract:

Gender-Based Violence has persistently been an enduring epidemic rooted in various homes and cultures worldwide throughout history. Despite numerous multifaceted approaches aiming to eliminate gender disparity by empowering girls with independent, survival, or entrepreneurial skills, positive transformation efforts for boys are often neglected. This gap, particularly in West Africa, hinders the reshaping of generational perceptions of men's roles in eradicating all forms of violence against women, creating an imbalance in providing holistic, sustainable solutions in our society. In response to this, the Lagos State Domestic and Sexual Violence Agency established the Kings Club initiative in 2018 in Lagos, Nigeria, aligning with UN SDG 5 on 'gender equality and the empowerment of all women and girls.' This initiative aims to debunk sociocultural misconceptions, educate on sexual and Gender Violence issues, and promote positive masculinity among schoolboys. The objective is to foster a balance in the behavioral and attitudinal mindsets of young boys, contributing to the success of an equitable society for all in the eradication of gender disparity. The ongoing project demonstrates an annual 89% success rate in behavioral and attitudinal mindset shifts among schoolboys by employing qualitative assessments of participants aged 10–17. The paper uses data from 161 secondary school students drawn from 15 schools in Lagos State Education District 6, exposed to modules on Sexual and Reproductive Rights and Health, Masculinity, Sexual and Gender-Based Violence, Anger Management, and transitioning from boy to man in a 6-week program, with observations and feedback analyses. The paper evaluates changes in attitudes, behaviors, and gender role perceptions among the boys who are now pioneers of the Kings' Club in their respective schools, serving as positive influencers among their peers in schools and at home. The paper's findings provide a nuanced understanding of cultural dynamics shaping male masculinity in West Africa and offer valuable insights into the effectiveness of innovative interventions to end all forms of violence against women. In conclusion, by intentionally reshaping young boys alongside girls, who represent the future, we stand a chance to create culturally sensitive societal norms that bridge the gap of gender inequity and end all forms of violence against women. The paper posits that its outcomes hold research significance, providing targeted interventions in male masculinity in patriarchal societies.

Keywords: cultural dynamics, gender equality, gender-based violence, positive masculinity

Procedia PDF Downloads 34