Search results for: defender
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19

Search results for: defender

19 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 424
18 System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez, Mehdi Mrad

Abstract:

We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defender-based-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k > 1. We investigate some variations of the problem and suggest polynomial-time solutions.

Keywords: defense/attack strategies, large scale, networks, partitioning a network

Procedia PDF Downloads 239
17 Efficacy of Defender 2% WS (Tebuconazole) and Imidal 70 WS (Imidacloprid) to Control Damping-Off Diseases and Early Insect Pests in Sesame in Rain Fed Areas, Sudan

Authors: Anas Fadlelmula, Elsafi M. M. Ahmed

Abstract:

The efficacy of Defender 2% WS (tebuconazole) and Imidal 70 WS (imidacloprid) to control damping-off diseases and early insect pests in sesame crop under rain fed conditions at Damazine and Gedarif areas was evaluated. Defender 2% WS with dosage rates 0.5, 0.75, 1.0 and 1.25 g/kg of seeds and Imidal 70 WS at 2.25, 3.0, and 3.75 g/ kg of seeds were tested singly and as a mixture during 2010/2011 and 2012/013. Sesame seeds treated with Defender at the rates of 0.5 g and 0.75 g/ kg of seeds gave a high significant increase in percent seedlings emergence (84% and 85%) respectively. Imidal 70 WS at rate of 3g/kg seed showed the least percent damaged leaves by sesame webworm (1.7%). However, the mixed Defender at rate 0.75g with Imidal at 3 g/kg seed, significantly gave a highest percentage of sesame seedling emergence (85.1%) and reduced the incidence of post-emergence damping off and percent damaged leaves to the least per cent (2.1% and 0.4% ) respectively, compared to other treatments. Consequently, the mixed treatment of 0.75 g of Defender + 3 g of Imidal improved the crop stand and significantly gave the highest yield (405.2 kg and 418.8 kg/fed) respectively in both sites compared to the other treatments.

Keywords: seed dressers, damage, daming off, insects

Procedia PDF Downloads 226
16 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 348
15 Multiplicity of Themes in Philip Roth's Fiction: Expressing Contemporariness

Authors: Shivani Sharma

Abstract:

Philip Roth is one of the most significant contemporary American novelists and is always engaged in creative activities. He is a recognized and prolific novelist of post-World War II period, an author of over 29 books where his text serves as a picture as well as critiques of contemporary culture from World War II to post 9/11 America. Roth is an honored author who has been awarded with prestigious literary awards. In his works he explains what is important to contemporary American Jews. His fiction is known for its autobiographical character, for blurring the distinction between reality and fiction, also for challenging exploration of Jewish and American identity. In many ways Roth is also considered as postmodern writer as his works can be read in the context of being a postmodern narration. He also stands as one of the most offensive novelist living today and has been read as a misogynist, a liberal defender, a solipsist, an anti-communist, and even an anti-Semite. It is not only the variety of contemporary issues that are discussed in his works but we can also see the strong element of multiplicity of themes in his writings. This paper is an attempt to explore the multiplicity of themes in the fiction of Philip Roth.

Keywords: multiple themes, Jewish-American literature, Philip Roth, expressing contemporariness

Procedia PDF Downloads 414
14 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 319
13 Distinct Antiviral Pathway for ZFP36-Like Family Members Against Flavivirus Infection

Authors: Ren-Jye Lin, Li-Hsiung Lin, Bing-Cheng Liu, Ching-Len Liao

Abstract:

The human zinc finger protein 36-like protein family, containing zinc finger protein 36-like 1 (ZFP36L1) and zinc finger protein 36-like 2 (ZFP36L2), belongs to CCCH-type zinc-finger protein identified as an RNA-binding protein that participates in controlling posttranscriptional regulation via RNA decay pathways. Recently, we demonstrated that human ZFP36L1 showed potent antiviral activity against flavivirus Infection by both 5´-3´ XRN1 and 3´-5´RNA-exosome RNA decay pathways (Journal of Virology 2022 Jan 12;96(1): e0166521). However, another zinc finger protein 36-like protein member, ZFP36L2, in the host defense response against flaviviruses has yet to be addressed. Here, we also demonstrate that ZFP36L2 functions as a host innate defender against flaviviruses, including Japanese encephalitis virus (JEV) and dengue virus (DENV). Overexpression of ZFP36L2 reduced JEV and DENV infection, and ZFP36L2 knockdown significantly promoted viral replication. Distinct from the antiviral mechanism of ZFP36L1, ZFP36L2 inhibits flavivirus infection by only a 5´-3´ XRN1-mediated RNA decay pathway but not the 3´-5´RNA-exosome RNA decay pathway. Human ZFP36L1 and ZFP36L2 can restrict flavivirus replication by directly binding and destabilizing viral RNA. Thus, for the first time, human zinc finger protein 36-like family members, ZFP36L1 and ZFP36L2, are identified as host antiviral factors that can bind and degrade flavivirus viral RNA by diverse antiviral mechanisms.

Keywords: ZFP36L1, ZFP36L2, 5'-3' exonuclease XRN1, antiviral mechansim

Procedia PDF Downloads 41
12 Discursive Construction of Strike in the Media Coverage of Academic Staff Union of Universities vs Federal Government of Nigeria Industrial Conflict of 2013

Authors: Samuel Alaba Akinwotu

Abstract:

Over the years, Nigeria’s educational system has greatly suffered from the menace of industrial conflict. The smooth running of the nation’s public educational institutions has been hampered by incessant strikes embarked upon by workers of these institutions. Even though industrial conflicts in Nigeria have enjoyed wide reportage in the media, there has been a dearth of critical examination of the language use that index the conflict’s discourse in the media. This study which is driven by a combination of Critical Discourse Analysis (CDA) and Conceptual Metaphor (CM) examines the discursive and ideological features of language indexing the industrial conflict between the Academic Staff Union of Universities (ASUU) and the Federal Government of Nigeria (FGN) in 2013. It aims to identify and assess the conceptual and cognitive motivations of the stances expressed by the parties and the public and the role of the media in the management and resolution of the conflict. For data, media reports and readers’ comments were purposively sampled from six print and online news sources (The Punch, This Day, Vanguard, The Nation, Osun Defender and AITonline) published between July and December 2013. The study provides further insight into industrial conflict and proves to be useful for the management and resolution of industrial conflicts especially in our public educational institutions.

Keywords: industrial conflict, critical discourse analysis, conceptual metaphor, federal government of Nigeria, academic staff union of universities

Procedia PDF Downloads 103
11 Understanding the Popularity of Historical Conservation in China: The Depoliticized Narratives as a Counter-Insurgency Strategy in Guangzhou

Authors: Luxi Chen

Abstract:

The land finance in China in recent years has propelled urban renewals in the name of historical conservation and led to massive gentrification and compulsory relocation. Such inequalities cause insurgence. Drawing on public planning information, ethnographic field notes, and online interview data about Guangzhou's Enninglu Area, this paper aims to present how such insurgence has been contained and put down gradually through depoliticization narratives represented by "improving living conditions," "conserving historical culture," and "public participation”. This paper's findings include that 1) Besides economic growth, maintaining social stability in alignment with the central government are equally important to local government, reveals the latter efforts to mediate the growth coalition, residents, media, and academics so as to reconstruct the interface between state and society; 2) To empower the insurgence, the media and academics use public interests for propaganda, that diverts attention away from its political dimension; 3) In response, the government introduces improved regulations and planning, turning social inequalities into technical inadequacy so as to become the defender of public interests, which justifies the incoming renewal and prevents public questioning. By comparing regime changes among governments, developers, residents, media, and academics caused by renewal policies, this paper presents the depoliticized narrative as a counter-insurgence strategy to contain social conflicts and to boost inner-city renewal.

Keywords: inner city renewal, depoliticization, historical conservation, public participation

Procedia PDF Downloads 190
10 Artificial intelligence and Law

Authors: Mehrnoosh Abouzari, Shahrokh Shahraei

Abstract:

With the development of artificial intelligence in the present age, intelligent machines and systems have proven their actual and potential capabilities and are mindful of increasing their presence in various fields of human life in the fields of industry, financial transactions, marketing, manufacturing, service affairs, politics, economics and various branches of the humanities .Therefore, despite the conservatism and prudence of law enforcement, the traces of artificial intelligence can be seen in various areas of law. Including judicial robotics capability estimation, intelligent judicial decision making system, intelligent defender and attorney strategy adjustment, dissemination and regulation of different and scattered laws in each case to achieve judicial coherence and reduce opinion, reduce prolonged hearing and discontent compared to the current legal system with designing rule-based systems, case-based, knowledge-based systems, etc. are efforts to apply AI in law. In this article, we will identify the ways in which AI is applied in its laws and regulations, identify the dominant concerns in this area and outline the relationship between these two areas in order to answer the question of how artificial intelligence can be used in different areas of law and what the implications of this application will be. The authors believe that the use of artificial intelligence in the three areas of legislative, judiciary and executive power can be very effective in governments' decisions and smart governance, and helping to reach smart communities across human and geographical boundaries that humanity's long-held dream of achieving is a global village free of violence and personalization and human error. Therefore, in this article, we are going to analyze the dimensions of how to use artificial intelligence in the three legislative, judicial and executive branches of government in order to realize its application.

Keywords: artificial intelligence, law, intelligent system, judge

Procedia PDF Downloads 82
9 Understanding Cyber Kill Chains: Optimal Allocation of Monitoring Resources Using Cooperative Game Theory

Authors: Roy. H. A. Lindelauf

Abstract:

Cyberattacks are complex processes consisting of multiple interwoven tasks conducted by a set of agents. Interdictions and defenses against such attacks often rely on cyber kill chain (CKC) models. A CKC is a framework that tries to capture the actions taken by a cyber attacker. There exists a growing body of literature on CKCs. Most of this work either a) describes the CKC with respect to one or more specific cyberattacks or b) discusses the tools and technologies used by the attacker at each stage of the CKC. Defenders, facing scarce resources, have to decide where to allocate their resources given the CKC and partial knowledge on the tools and techniques attackers use. In this presentation CKCs are analyzed through the lens of covert projects, i.e., interrelated tasks that have to be conducted by agents (human and/or computer) with the aim of going undetected. Various aspects of covert project models have been studied abundantly in the operations research and game theory domain, think of resource-limited interdiction actions that maximally delay completion times of a weapons project for instance. This presentation has investigated both cooperative and non-cooperative game theoretic covert project models and elucidated their relation to CKC modelling. To view a CKC as a covert project each step in the CKC is broken down into tasks and there are players of which each one is capable of executing a subset of the tasks. Additionally, task inter-dependencies are represented by a schedule. Using multi-glove cooperative games it is shown how a defender can optimize the allocation of his scarce resources (what, where and how to monitor) against an attacker scheduling a CKC. This study presents and compares several cooperative game theoretic solution concepts as metrics for assigning resources to the monitoring of agents.

Keywords: cyber defense, cyber kill chain, game theory, information warfare techniques

Procedia PDF Downloads 108
8 Religion and Democracy: Assessing Tolerance in the Diversity of Indonesia

Authors: Harsi Nastiti, Haidar Fikri

Abstract:

Indonesia has been known for its diversity of cultures, ethnics, religions, and races. This diversity signs as the uniqueness of the country, so tolerance becomes vital point here. As a unitary state, tolerance value is established strongly as the foundation of democracy implementation but recently this tolerance condition facing up some problems after regional election. In this case, religion issue takes a main role for the Indonesian political system which is managed into tolerance breaker especially for local democracy. The election of Jakarta’s Governor 2017 can be said as the momentum for the people to rethink the democracy and tolerance meaning. It begins from one of the governor candidates who makes statement about the majority religion and unfortunately the candidate comes from the minority. The statement emerges into a new social movement based on religiosity. Basically, the social movement which is coordinated by Islamic Defender Front (Front Pembela Islam or FPI) and National Movement to Safeguard the Fatwa-Indonesian Ulama Council (GNPF-MUI) want to demand the justice in the name of blasphemy. The action continuously happens in different names (Action 411, 212, etc.). So, this article analyzes the new phenomenon and how does the impact for the tolerance and democracy life in Indonesia. The method is using qualitative method by review of literature and media content analysis. Results show this phenomenon potentially spreading new conflicts far beyond the goal of the action itself; justice. It makes the conflicts more complex after there are actions such as; Parade Kebhinekaan and Aksi Lilin which contrary reacts to the actions before. These actions and reactions rise up the sensitive issues for Indonesia like religions, Pancasila, unity in diversity, ethnics, and races. At the same time raising skepticism; will it be over after the candidate is getting sentenced or becomes the dangerous latent conflict that will threaten tolerance and democracy in Indonesia.

Keywords: conflict, democracy, religion, tolerance

Procedia PDF Downloads 258
7 Modeling of Timing in a Cyber Conflict to Inform Critical Infrastructure Defense

Authors: Brian Connett, Bryan O'Halloran

Abstract:

Systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target and the resources to exploit the cyber physical systems exist. These resources are characterized in terms of patience, stealth, replication-ability and extraordinary robustness. System owners are obligated to maintain a high level of protection measures. The difficulty lies in knowing when to fortify a critical infrastructure against an impending attack. Models currently exist that demonstrate the value of knowing the attacker’s capabilities in the cyber realm and the strength of the target. The shortcomings of these models are that they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits of and the physical architecture of the infrastructure. A useful model will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group has used an existing theoretical model for estimating parameters, and through analysis, to develop a decision tool for would-be target owners. The continuation of the research develops further this model by estimating the variable parameters. Understanding these parameter estimations will uniquely position the decision maker to posture having revealed the vulnerabilities of an attacker’s, persistence and stealth. This research explores different approaches to improve on current attacker-defender models that focus on cyber threats. An existing foundational model takes the point of view of an attacker who must decide what cyber resource to use and when to use it to exploit a system vulnerability. It is valuable for estimating parameters for the model, and through analysis, develop a decision tool for would-be target owners.

Keywords: critical infrastructure, cyber physical systems, modeling, exploitation

Procedia PDF Downloads 159
6 A Corpus-Linguistic Analysis of Online Iranian News Coverage on Syrian Revolution

Authors: Amaal Ali Al-Gamde

Abstract:

The Syrian revolution is a major issue in the Middle East, which draws in world powers and receives a great focus in international mass media since 2011. The heavy global reliance on cyber news and digital sources plays a key role in conveying a sense of bias to a wide range of online readers. Thus, based on the assumption that media discourse possesses ideological implications, this study investigates the representation of Syrian revolution in online media. The paper explores the discursive constructions of anti and pro-government powers in Syrian revolution in 1000,000-word corpus of Fars online reports (an Iranian news agency), issued between 2013 and 2015. Taking a corpus assisted discourse analysis approach, the analysis investigates three types of lexicosemantic relations, the semantic macrostructures within which the two social actors are framed, the lexical collocations characterizing the news discourse and the discourse prosodies they tell about the two sides of the conflict. The study utilizes computer-based approaches, sketch engine and AntConc software to minimize the bias of the subjective analysis. The analysis moves from the insights of lexical frequencies and keyness scores to examine themes and the collocational patterns. The findings reveal the Fars agency’s ideological mode of representations in reporting events of Syrian revolution in two ways. The first is by stereotyping the opposition groups under the umbrella of terrorism, using words such as (law breakers, foreign-backed groups, militant groups, terrorists) to legitimize the atrocities of security forces against protesters and enhance horror among civilians. The second is through emphasizing the power of the government and depicting it as the defender of the Arab land by foregrounding the discourse of international conspiracy against Syria. The paper concludes discussing the potential importance of triangulating corpus linguistic tools with critical discourse analysis to elucidate more about discourses and reality.

Keywords: discourse prosody, ideology, keyness, semantic macrostructure

Procedia PDF Downloads 104
5 Human Rights in the United States: Challenges and Lessons from the Period 1948-2018

Authors: Mary Carmen Peloche Barrera

Abstract:

Since its early years as an independent nation, the United States has been one of the main promoters regarding the recognition, legislation, and protection of human rights. In the matter of freedom, the founding father Thomas Jefferson envisioned the role of the U.S. as a defender of freedom and equality throughout the world. This founding ideal shaped America’s domestic and foreign policy in the 19th and the 20th century and became an aspiration of the ideals of the country to expand its values and institutions. The history of the emergence of human rights cannot be studied without making reference to leaders such as Woodrow Wilson, Franklin, and Eleanor Roosevelt, as well as Martin Luther King. Throughout its history, this country has proclaimed that the protection of the freedoms of men, both inside and outside its borders, is practically the reason for its existence. Although the United States was one of the first countries to recognize the existence of inalienable rights for individuals, as well as the main promoter of the Universal Declaration of Human Rights of 1948, the country has gone through critical moments that had led to questioning its commitment to the issue. Racial segregation, international military interventions, national security strategy, as well as national legislation on immigration, are some of the most controversial issues related to decisions and actions driven by the United States, which at the same time mismatched with its role as an advocate of human rights, both in the Americas and in the rest of the world. The aim of this paper is to study the swinging of the efforts and commitments of the United States towards human rights. The paper will analyze the history and evolution of human rights in the United States, to study the greatest challenges for the country in this matter. The paper will focus on both the domestic policy (related to demographic issues) and foreign policy (about its role in a post-war world). Currently, more countries are joining the multilateral efforts for the promotion and protection of human rights. At the same time, the United States is one of the least committed countries in this respect, having ratified only 5 of the 18 treaties emanating from the United Nations. The last ratification was carried out in 2002 and, since then, the country has been losing ground, in an increasingly vertiginous way, in its credibility and, even worse, in its role as leader of 'the free world'. With or without the United States, the protection of human rights should remain the main goal of the international community.

Keywords: United States, human rights, foreign policy, domestic policy

Procedia PDF Downloads 87
4 An Empty Canvas is Full

Authors: Joonha Park

Abstract:

This essay examines the Soviet Artist Pavel Korin’s artistic pursuit towards his life-long project, “Requiem/Passing of the Rus,” framing the funeral of Tikhon, the last great defender of the Russian orthodox Church during the Great purge, as the final moment of “Rus,” which is the identity of the Russian people that built up in the 1000 year of history behind Russian Orthodoxy. Korin’s project remains in the form of a series of 29 man-sized portraits and a monumental blank canvas. Born in a family dedicated to iconography, Korin witnessed the historic drama during Stalin’s terror; therefore, he tried to convey the nation’s mourning for the disappearance of “Rus” and disapproval of the Soviet notion of atheism. Yet, due to Korin’s success as a state artist, many believed that the political pressure led Korin to give up his belief and controversy arose over the fact that Korin left the canvas blank. The empty 40-square-meter canvas, which remains untouched in his studio since 1930, supports this theory to an extent. However, resources such as Korin’s notes, primary accounts from his fellow Soviet Artists, and testimonies from his wife suggested that this assumption is incorrect. Moreover, Korin’s uninterrupted relationship with the church and the religious attributes in his commissioned works were brought up as evidence of Korin’s continued belief. The empty canvas not only represents Korin’s discontentment towards the repression and the hardships that the Orthodox Church experienced, but also depicts the identity that coexisted with the Church in order to bequeath this idea to future generations. The faultless canvas surrounded by the striking 29 portraits is a symbol of the highest spirit, similar to that of the iconography paintings placed in every Russian house that unites the Russian people till this day, therefore one can deduce that the legacy of “Requiem” is still relevant to the Russian people even under freedom of religious expression. Consequently, “Requiem” was on display at the Tretyakov Gallery for the first time in public in 2013 even though Korin started creating this piece in 1925, extolling Korin not only as an artist but also as a historian; by recording the turmoil of the Great Oppression, Korin exhibited the social responsibility universal to artists across time and space. In this essay, the legacy Korin left behind, both to his contemporaries and his posterity is reevaluated through the lens of his works, unfinished as they were.

Keywords: Pavel Korin, Art History, Art, Russia, Soviet Union, Requiem, Russian orthodox church, Treytyakov gallery, contemporary art, socialist realism, Maxim Gorky

Procedia PDF Downloads 370
3 “Divorced Women are Like Second-Hand Clothes” - Hate Language in Media Discourse

Authors: Sopio Totibadze

Abstract:

Although the legal framework of Georgia reflects the main principles of gender equality and is in line with the international situation, Georgia remains a male-dominated society. This means that men prevail in many areas of social, economic, and political life, which frequently gives women a subordinate status in society and the family. According to the latest studies, “violence against women and girls in Georgia is also recognized as a public problem, and it is necessary to focus on it”. Moreover, the Public Defender's report (2019) reveals that “in the last five years, 151 women were killed in Georgia due to gender and family violence”. Unfortunately, there are frequent cases of crimes based on gender-based oppression in Georgia, which pose a threat not only to women but also to people of any gender whose desires and aspirations do not correspond to the gender norms and roles prevailing in society. It is well-known that language is often used as a tool for gender oppression. Therefore, feminist and gender studies in linguistics ultimately serve to represent the problem, reflect on it, and propose ways to solve it. Together with technical advancement in communication, a new form of discrimination has arisen- hate language against women in electronic media discourse. Due to the nature of social media and the internet, messages containing hate language can spread in seconds and reach millions of people. However, only a few know about the detrimental effects they may have on the addressee and society. This paper aims to analyse the hateful comments directed at women on various media platforms to determine the linguistic strategies used while attacking women and the reasons why women may fall victim to this type of hate language. The data have been collected over six months, and overall, 500 comments will be examined for the paper. Qualitative and quantitative analysis was chosen for the methodology of the study. The comments posted on various media platforms have been selected manually due to several reasons, the most important being the problem of identifying hate speech as it can disguise itself in different ways- humour, memes, etc. The comments on the articles, posts, pictures, and videos selected for sociolinguistic analysis depict a woman, a taboo topic, or a scandalous event centred on a woman that triggered hate language towards the person to whom the post/article was dedicated. The study has revealed that a woman can become a victim of hatred directed at them if they do something considered to be a deviation from a societal norm, namely, get a divorce, be sexually active, be vocal about feministic values, and talk about taboos. Interestingly, people who utilize hate language are not only men trying to “normalize” the prejudiced patriarchal values but also women who are equally active in bringing down a "strong" woman. The paper also aims to raise awareness about the hate language directed at women, as being knowledgeable about the issue at hand is the first step to tackling it.

Keywords: femicide, hate language, media discourse, sociolinguistics

Procedia PDF Downloads 49
2 Early Return to Play in Football Player after ACL Injury: A Case Report

Authors: Nicola Milani, Carla Bellissimo, Davide Pogliana, Davide Panzin, Luca Garlaschelli, Giulia Facchinetti, Claudia Casson, Luca Marazzina, Andrea Sartori, Simone Rivaroli, Jeff Konin

Abstract:

The patient is a 26 year-old male amateur football player from Milan, Italy; (81kg; 185cm; BMI 23.6 kg/m²). He sustained a non-contact anterior cruciate ligament tear to his right knee in June 2021. In September 2021, his right knee ligament was reconstructed using a semitendinosus graft. The injury occurred during a football match on natural grass with typical shoes on a warm day (32 degrees celsius). Playing as a defender he sustained the injury during a change of direction, where the foot was fixated on the grass. He felt pain and was unable to continue playing the match. The surgeon approved his rehabilitation to begin two weeks post-operative. The initial physiotherapist assessment determined performing two training sessions per day within the first three months. In the first three weeks, the pain was 4/10 on Numerical Rating Scale (NRS), no swelling, a range of motion was 0-110°, with difficulty fully extending his knee and minimal quadriceps activation. Crutches were discontinued at four weeks with improved walking. Active exercise, electrostimulator, physical therapy, massages, osteopathy, and passive motion were initiated. At week 6, he completed his first functional movement screen; the score was 16/21 with no pain and no swelling. At week 8, the isokinetic test showed a 23% differential deficit between the two legs in maximum strength (at 90°/s). At week 10, he improved to 15% of injury-induced deficit which suggested he was ready to start running. At week 12, the athlete sustained his first threshold test. At week 16, he performed his first return to sports movement assessment, which revealed a 10% stronger difference between the legs. At week 16, he had his second threshold test. At week 17, his first on-field test revealed a 5% differential deficit between the two legs in the hop test. At week 18, isokinetic test demonstrates that the uninjured leg was 7% stronger than the recovering leg in maximum strength (at 90°/s). At week 20, his second on-field test revealed a 2% difference in hop test; at week 21, his third isokinetic test demonstrated a difference of 5% in maximum strength (at 90°/s). At week 21, he performed his second return to sports movement assessment which revealed a 2% difference between the limbs. Since it was the end of the championship, the team asked him to partake in the playoffs; moreover the player was very motivated to participate in the playoffs also because he was the captain of the team. Together with the player and the team, we decided to let him play even though we were aware of a heightened risk of injury than what is reported in the literature because of two factors: biological recovery times and the results of the tests we performed. In the decision making process about the athlete’s recovery time, it is important to balance the information available from the literature with the desires of the patient to avoid frustration.

Keywords: ACL, football, rehabilitation, return to play

Procedia PDF Downloads 82
1 “Divorced Women are Like Second-Hand Clothes” - Hate Language in Media Discourse (Using the Example of Electronic Media Platforms)

Authors: Sopio Totibadze

Abstract:

Although the legal framework of Georgia reflects the main principles of gender equality and is in line with the international situation (UNDP, 2018), Georgia remains a male-dominated society. This means that men prevail in many areas of social, economic, and political life, which frequently gives women a subordinate status in society and the family (UN women). According to the latest study, “violence against women and girls in Georgia is also recognized as a public problem, and it is necessary to focus on it” (UN women). Moreover, the Public Defender's report on the protection of human rights in Georgia (2019) reveals that “in the last five years, 151 women were killed in Georgia due to gender and family violence”. Sadly, these statistics have increased significantly since that time. The issue was acutely reflected in the document published by the Organization for Security and Cooperation in Europe, “Gender Hate Crime” (March 10, 2021). “Unfortunately, the rates of femicide ..... are still high in the country, and distrust of law enforcement agencies often makes such cases invisible, which requires special attention from the state.” More precisely, the cited document considers that there are frequent cases of crimes based on gender-based oppression in Georgia, which pose a threat not only to women but also to people of any gender whose desires and aspirations do not correspond to the gender norms and roles prevailing in society. According to the study, this type of crime has a “significant and lasting impact on the victim(s) and also undermines the safety and cohesion of society and gender equality”. It is well-known that language is often used as a tool for gender oppression (Rusieshvili-Cartledge and Dolidze, 2021; Totibadze, 2021). Therefore, feminist and gender studies in linguistics ultimately serve to represent the problem, reflect on it, and propose ways to solve it. Together with technical advancement in communication, a new form of discrimination has arisen- hate language against women in electronic media discourse. Due to the nature of social media and the internet, messages containing hate language can spread in seconds and reach millions of people. However, only a few know about the detrimental effects they may have on the addressee and society. This paper aims to analyse the hateful comments directed at women on various media platforms to determine (1) the linguistic strategies used while attacking women and (2) the reasons why women may fall victim to this type of hate language. The data have been collected over six months, and overall, 500 comments will be examined for the paper. Qualitative and quantitative analysis was chosen for the methodology of the study. The comments posted on various media platforms, including social media posts, articles, or pictures, have been selected manually due to several reasons, the most important being the problem of identifying hate speech as it can disguise itself in different ways- humour, memes, etc. The comments on the articles, posts, pictures, and videos selected for sociolinguistic analysis depict a woman, a taboo topic, or a scandalous event centred on a woman that triggered a lot of hatred and hate language towards the person to whom the post/article was dedicated. The study has revealed that a woman can become a victim of hatred directed at them if they do something considered to be a deviation from a societal norm, namely, get a divorce, be sexually active, be vocal about feministic values, and talk about taboos. Interestingly, people who utilize hate language are not only men trying to “normalize” the prejudiced patriarchal values but also women who are equally active in bringing down a "strong" woman. The paper also aims to raise awareness about the hate language directed at women, as being knowledgeable about the issue at hand is the first step to tackling it.

Keywords: femicide, hate language, media discourse, sociolinguistics

Procedia PDF Downloads 43