68 resultados para cyber-bullying
Resumo:
Topic Background: Peace education initiatives in schools are often based on social psychological theories assuming that social identity affects ingroup and outgroup attitudes and, in turn, behaviors relating to relevant outgroups. However, research evidence on the role of children's social identity has often failed to take account of different social identity dimensions or to conceptualise behavior in the context of children's understandings of the social world. While recent research relating to bullying and bystander behavior amongst children has addressed the latter point, this has rarely been considered in conjunction with a differentiated view of social identity. This paper is therefore distinctive as it will address the role of social identity dimensions with regards to reported behavior as captured in bystander scenarios relating to outgroup derogation. This is particularly important in the context of divided societies, where peace education initiatives are crucial in promoting positive community relations for the future and where such initiative may be hampered by communities' concerns about loss of identity. In the context of Northern Ireland, a divided society emerging from conflict, social identity, outgroup attitudes and behaviours have been key concepts addressed by peace educators
for many years.
Research questions: This paper therefore set out to investigate the relationship between social identity, measured as affiliation with the group and exploration of its meaning for the child, sectarian attitudes and pupils' reported willingness to challenge sectarian bullying in their school environment in Northern Ireland.
Research methods: The findings are based on the analysis of a baseline survey, which forms part of a randomised control trial of an intervention aimed at promoting community relations and reconciliation. The trial includes 35 primary and post-primary schools and about 800 pupils from 8-11 years old who completed an online questionnaire at the start of the programme. Main instruments for this study included adapted scales measuring identity affiliation and identity exploration, sectarian attitudes and scenarios capturing pupils' intentions in bystander situations relating to sectarian bullying.
Analytical framework: Results are analysed using regression analysis and additionally investigate gender and religious differences.
Research findings and/or contribution to knowledge: Results are discussed in the light of the role of social identity dimensions and their relationship to outgroup attitudes and willingness to challenge outgroup derogation. The paper concludes with potential implications for peace education initiatives in Northern Ireland and beyond.
Resumo:
The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.
Resumo:
Greater complexity and interconnectivity across systems embracing Smart Grid technologies has meant that cyber-security issues have attracted significant attention. This paper describes pertinent cyber-security requirements, in particular cyber attacks and countermeasures which are critical for reliable Smart Grid operation. Relevant published literature is presented for critical aspects of Smart Grid cyber-security, such as vulnerability, interdependency, simulation, and standards. Furthermore, a preliminary study case is given which demonstrates the impact of a cyber attack which violates the integrity of data on the load management of real power system. Finally, the paper proposes future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues. This paper also provides an overview of Smart Grid cyber-security with reference to related cross-disciplinary research topics.
Resumo:
In this short paper, we present an integrated approach to detecting and mitigating cyber-attacks to modern interconnected industrial control systems. One of the primary goals of this approach is that it is cost effective, and thus whenever possible it builds on open-source security technologies and open standards, which are complemented with novel security solutions that address the specific challenges of securing critical infrastructures.
Resumo:
Invited talk, representing the Royal Society
Resumo:
As modern power grids move towards becoming a smart grid, there is an increasing reliance on the data that is transmitted and processed by ICT systems. This reliance introduces new digital attack vectors. Many of the proposed approaches that aim to address this problem largely focus on applying well-known ICT security solutions. However, what is needed are approaches that meet the complex concerns of the smart grid as a cyber-physical system. Furthermore, to support the automatic control loops that exist in a power grid, similarly automatic security and resilience mechanisms are needed that rely on minimal operator intervention. The research proposed in this paper aims to develop a framework that ensures resilient smart grid operation in light of successful cyber-attacks.
Resumo:
Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.
Resumo:
Purpose: Researchers have demonstrated associations between trauma and psychosis. Childhood trauma, in particular, appears to be an important determinant. Recently, bullying has become considered a traumatic experience in its own right. This review aims to analyse research with prospective designs, which will enable conclusions about whether or not bullying causes psychosis.
Methods: A systematic review of the literature was carried out independently by two reviewers. Eligibility and quality assessment criteria were applied. A meta-analysis and narrative synthesis were then completed.
Results: Ten studies met inclusion criteria. Four used data from the same large database, and were combined as one. The majority provided confirmation that bullying appears to cause later development of psychosis. A meta-analysis yielded an unadjusted odds ratio (OR) of 2.148 [95% confidence interval (CI) 1.140–4.044].
Conclusions: The studies reviewed here suggest that bullying does predict the later development of psychotic symptoms. What is lacking from the literature is adequate investigation into other potential mediating factors. The current review highlights the significant role of bullying within this complex interaction. Potential mediating variables are explored, including a dose–response effect for the severity and frequency of victimization. Suggestions for targeting intervention are also suggested alongside clinical implications and recommendations for future research.
Resumo:
Cyber-security research in the field of smart grids is often performed with a focus on either the power and control domain or the Information and Communications Technology (ICT) domain. The characteristics of the power equipment or ICT domain are commonly not collectively considered. This work provides an analysis of the physical effects of cyber-attacks on microgrids – a smart grid construct that allows continued power supply when disconnected from a main grid. Different types of microgrid operations are explained (connected, islanded and synchronous-islanding) and potential cyber-attacks and their physical effects are analyzed. A testbed that is based on physical power and ICT equipment is presented to validate the results in both the physical and ICT domain.