767 resultados para Cyber-bullying sensibility


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The field of cyberbullying is relatively new and there is no universal consensus on its definition, measurement and intervention. Authors agree that bullying has entered into the digital domain and professionals require the skills to help identify and prevent these behaviours. Ninety two students were surveyed to determine their experience with different types of bullying behaviors (face-to-face, cyberbullying or both), as bully, victim or witness. Our objective was to explore the association between those types of bullying and anxiety. The results suggest a significant association between face-to-face bullying and anxiety. Similarly, there was significant association between experiencing both types of bullying and anxiety. Further studies are required with larger and more diverse samples in order to verify current findings and to test for additional associations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Loneliness is a distressing, complex, universal phenomena. This review focuses on loneliness in children and adolescents, specifically examining research on the relationship between young people’s social anxiety and loneliness and the role of bullying victimization and loneliness. The three concepts are distinct, yet inextricably intertwined as antecedents and consequences of each other. The constructs are bi-directional, often forming a feedback loop or negative cycle. Implications for interventions are addressed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article introduces a novel platform for conducting controlled and risk-free driving and traveling behavior studies, called Cyber-Physical System Simulator (CPSS). The key features of CPSS are: (1) simulation of multiuser immersive driving in a threedimensional (3D) virtual environment; (2) integration of traffic and communication simulators with human driving based on dedicated middleware; and (3) accessibility of multiuser driving simulator on popular software and hardware platforms. This combination of features allows us to easily collect large-scale data on interesting phenomena regarding the interaction between multiple user drivers, which is not possible with current single-user driving simulators. The core original contribution of this article is threefold: (1) we introduce a multiuser driving simulator based on DiVE, our original massively multiuser networked 3D virtual environment; (2) we introduce OpenV2X, a middleware for simulating vehicle-to-vehicle and vehicle to infrastructure communication; and (3) we present two experiments based on our CPSS platform. The first experiment investigates the “rubbernecking” phenomenon, where a platoon of four user drivers experiences an accident in the oncoming direction of traffic. Second, we report on a pilot study about the effectiveness of a Cooperative Intelligent Transport Systems advisory system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides an overview of ‘lessons learned’ from the author’s decade long involvement in online teaching and learning, including eight years in the development, implementation, teaching and administration of a wholly online Master of Arts in Applied Linguistics coursework degree program, which attracted several hundred students annually from around the world, and has won awards for innovation, including being identified as a ‘flagship’ program during an external review of the university.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study reports on differences in self-labelling versus the behavioural experience of workplace bullying across sectors and industries for a sample of 6,406 Australian employees, as well as differences in source of workplace bullying. It was found that overall prevalence rates of workplace bullying were 2.9% (self-labelling method) and 4.0% (behavioural experience method). Exposure to workplace bullying was found to decrease with age. There was no significant difference between the public and private sectors, or among industries, in the prevalence of workplace bullying; however, two industries (Construction; Health and Community Services) showed a significantly higher rate of workplace bullying with the behavioural experience method compared to the self-labelling method. For the overall sample, the most prevalent source of workplace bullying was reported to be coworkers (49.1%), followed by clients (35.7%), and then supervisors (27.4%). Subordinates were rated as the source in 7.9% of cases. Closer examination of source as a function of sector and industry revealed a number of significant differences specific to sectors and industries, highlighting the need for tailored approaches for managing workplace bullying.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect criticalnational infrastructure and critical information infrastructure. In particular,this protection is crucial for the proper functioning of a modern society and for a government to fulfill one of its most important prerogatives – namely, the protection of its people. Computer networks have many benefits that governments, corporations, and individuals alike take advantage of in order to promote and perform their duties and roles. Today, there is almost complete dependence on private sector telecommunication infrastructures and the associated computer hardware and software systems.1 These infrastructures and systems even support government and defense activity.2 This Article discusses possible attacks on critical information infrastructures and the government reactions to these attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose Ethnographic studies of cyber attacks typically aim to explain a particular profile of attackers in qualitative terms. The purpose of this paper is to formalise some of the approaches to build a Cyber Attacker Model Profile (CAMP) that can be used to characterise and predict cyber attacks. Design/methodology/approach The paper builds a model using social and economic independent or predictive variables from several eastern European countries and benchmarks indicators of cybercrime within the Australian financial services system. Findings The paper found a very strong link between perceived corruption and GDP in two distinct groups of countries – corruption in Russia was closely linked to the GDP of Belarus, Moldova and Russia, while corruption in Lithuania was linked to GDP in Estonia, Latvia, Lithuania and Ukraine. At the same time corruption in Russia and Ukraine were also closely linked. These results support previous research that indicates a strong link between been legitimate economy and the black economy in many countries of Eastern Europe and the Baltic states. The results of the regression analysis suggest that a highly skilled workforce which is mobile and working in an environment of high perceived corruption in the target countries is related to increases in cybercrime even within Australia. It is important to note that the data used for the dependent and independent variables were gathered over a seven year time period, which included large economic shocks such as the global financial crisis. Originality/value This is the first paper to use a modelling approach to directly show the relationship between various social, economic and demographic factors in the Baltic states and Eastern Europe, and the level of card skimming and card not present fraud in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is a serious concern to health practitioners and policymakers that, in spite of substantial investment, there has been no meaningful decline in the prevalence of mental illness in Australia (Slade et al., 2009). It is now understood that a complex array of biopsychosocial factors confer varying degrees of risk of mental illness. Genetic predisposition, obstetric complications, environmental toxins, poverty, developmental delay, substance abuse, exposure to loss and trauma, chaotic family environments with accompanying abuse and neglect, chronic physical illness and maladaptive interpersonal interactions all contribute to an increased risk of developing mental disorders (Kieling et al., 2011). Bullying in childhood and adolescence is an identified risk factor for mental disorders, suicide attempts and drug and alcohol problems (Copeland et al., 2013; Moore et al., 2013)...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article investigates the perceptions of 156 students who were victims of both traditional and cyberbullying (117 female, 45 male), ages 10 to 17 years, as to which form of bullying was more hurtful. Overall, students perceived traditional victimization to be more hurtful than cyber victimization. Reasons identified in the data to explain the different perceptions of victims were categorized and found to relate to: the bully, the bystanders, the bullying incidents, the emotional impact on the victim, and the victim’s ability to respond. The perceptions of these students challenge a number of suppositions presented in the literature that attempt to explain why cyberbullying is associated with more negative outcomes than traditional bullying. The implications for antibullying programs to address these issues are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective Bullying and peer victimization in school are serious concerns for students, parents, psychologists, and school officials around the world. This descriptive study examined bullying/victimization among Iranian students and the relationship between bullying and trauma symptoms. Methods This study was a cross-sectional research and descriptive correlative study. Descriptive statistics and Pearson correlation were used to analyze the data. The Revised Olweus Bully/Victim Questionnaire and Trauma symptoms checklist for children (TSCC-A) were administered to 591(325males and 266 females) students aged 10 to 14 year. Results The results revealed that 38.4 % of students reported bullying behavior. In addition, victims had the highest level of depression, anxiety, and anger compared to uninvolved students. Bullies were not related to trauma symptoms. Conclusion Conclusions include detailed recommendations for further empirical studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While bullying is often researched in children and adolescents and in the workplace, there is limited research in the emerging adult population, especially in students at university. This is perhaps due to the fact that bullying generally declines as children and young people become older (e.g., Nansel et al., 2001; Wang, Iannotti, & Nansel, 2009). Although this may indeed be the case, it is apparent that bullying does not completely abate when students graduate from high school. The plethora of literature evidencing workplace bullying, clearly shows that bullying continues beyond the school years (e.g., Hoel, Cooper, & Faragher, 2001; Privitera & Campbell, 2009). With the advent of cyberbullying in the last decade it has been shown that this particular form of bullying may not decrease with age as does traditional bullying (Kowalski & Limber, 2007; Raskauskas & Stoltz, 2007). In addition, we know there is a spike in prevalence rates during the transition from primary to high school Pellegrini et al., 2010), so it is possible that new university students are at an increased risk of victimisation due to this being a transition period. This has led to some interest in examining the prevalence of bullying in the emerging adult population at universities (Chapell, Casey, & de la Cruz, 2004; Pontzer, 2010; Wensley & Campbell, 2009).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Loneliness is a distressing, complex, universal phenomena. This chapter focuses on loneliness in children and adolescents, specifically examining research on the relationship between young people’s social anxiety and loneliness and the role of bullying victimisation and loneliness. It answers the question does social anxiety and bullying victimization create loneliness in young people. It was found from a review of the literature that all three concepts are distinct yet inextricably intertwined as antecedents and consequences of each other. The constructs are bi-directional, often forming a feedback loop or negative cycle. In addition these variables can also be mediating and moderating variables. Implications for interventions are discussed.