783 resultados para cyber-bullying
Resumo:
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to distinct groups or classes have potential applications in targeted services, online fraud detection, extensive social sorting, and cyber-security. This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. More specifically, in this paper we discuss the design and implementation of two tools of the framework. The Twitter Geographic Profiler tool builds a map of the ethno-cultural communities of a person's friends on Twitter social media service. The E-mail Address Profiler tool identifies the probable identities of individuals from their e-mail addresses and maps their geographical distribution across the UK. To this end, this paper presents a framework for profiling the digital traces of individuals.
Resumo:
This chapter introduces Native Language Identification (NLID) and considers the casework applications with regard to authorship analysis of online material. It presents findings from research identifying which linguistic features were the best indicators of native (L1) Persian speakers blogging in English, and analyses how these features cope at distinguishing between native influences from languages that are linguistically and culturally related. The first chapter section outlines the area of Native Language Identification, and demonstrates its potential for application through a discussion of relevant case history. The next section discusses a development of methodology for identifying influence from L1 Persian in an anonymous blog author, and presents findings. The third part discusses the application of these features to casework situations as well as how the features identified can form an easily applicable model and demonstrates the application of this to casework. The research presented in this chapter can be considered a case study for the wider potential application of NLID.
Resumo:
The purpose of this study was to assess the prevalence of bullying and victimization in a metropolitan area. A cross-sectional study with kindergarten (n = 127) and first grade (n = 126) children was conducted in two Miami-Dade County Public Schools and three private schools in the same area. Bullying and victimization behavior and social acceptance were assessed through peer nomination and the mental health outcomes of depression and anxiety were assessed through children's self-report. Teachers and parents also completed a social behavior scale for each child. Three areas of analyses were conducted pertaining to membership classification of social roles and the social acceptance and mental health outcomes associated with those roles, reporter agreement within the social roles, and the psychometric properties of the Childhood Social Behavior Scale. Results showed an overall negative pattern of adjustment for children identified as a member of any of the negative social roles. Also, the results support a new analytic approach to the investigation of social roles. The implication of these findings for early identification, social policy, and effective prevention strategies are discussed. ^
Resumo:
The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
The arrival of Cuba’s Information Technology (IT) and Communications Minister Ramiro Valdés to Venezuela in the Spring of 2010 to serve as a ‘consultant’ to the Venezuelan government awakened a new reality in that country. Rampant with deep economic troubles, escalating crime, a murder rate that has doubled since Chávez took over in 1999, and an opposition movement led by university students and other activists who use the Internet as their primary weapon, Venezuela has resorted to Cuba for help. In a country where in large part traditional media outlets have been censored or are government-controlled, the Internet and its online social networks have become the place to obtain, as well as disseminate, unfiltered information. As such, Internet growth and use of its social networks has skyrocketed in Venezuela, making it one of Latin America’s highest Web users. Because of its increased use to spark political debate among Venezuelans and publish information that differs with the official government line, Chávez has embarked on an initiative to bring the Internet to the poor and others who would otherwise not have access, by establishing government-sponsored Internet Info Centers throughout the country, to disseminate information to his followers. With the help of Cuban advisors, who for years have been a part of Venezuela’s defense, education, and health care initiatives, Chávez has apparently taken to adapting Cuba’s methodology for the control of information. He has begun to take special steps toward also controlling the type of information flowing through the country’s online social networks, considering the implementation of a government-controlled single Internet access point in Venezuela. Simultaneously, in adapting to Venezuela’s Internet reality, Chávez has engaged online by creating his own Twitter account in an attempt to influence public opinion, primarily of those who browse the Web. With a rapidly growing following that may soon reach one million subscribers, Chávez claims to have set up his own online trench to wage cyber space battle.
Resumo:
E-commerce is an approach to achieving business goals through information technology and is quickly changing the way hospitality business is planned, monitored, and conducted. No longer do buyers and sellers need to engage in interpersonal communications for transactions to occur. The future of transaction processing, which includes cyber cash and digital checking, are directly attributable to e-commerce which provides and efficient, reliable, secure, and effective platform for conducting hospitality business on the web.
Resumo:
Bullying is a growing problem in all organizations. This paper will examine how transformational theory can be used to understand victims who are being bullied in the workplace. This research will provide useful information regarding all aspects of bullying and how it relates to this theory.
Resumo:
The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
The future power grid will effectively utilize renewable energy resources and distributed generation to respond to energy demand while incorporating information technology and communication infrastructure for their optimum operation. This dissertation contributes to the development of real-time techniques, for wide-area monitoring and secure real-time control and operation of hybrid power systems. ^ To handle the increased level of real-time data exchange, this dissertation develops a supervisory control and data acquisition (SCADA) system that is equipped with a state estimation scheme from the real-time data. This system is verified on a specially developed laboratory-based test bed facility, as a hardware and software platform, to emulate the actual scenarios of a real hybrid power system with the highest level of similarities and capabilities to practical utility systems. It includes phasor measurements at hundreds of measurement points on the system. These measurements were obtained from especially developed laboratory based Phasor Measurement Unit (PMU) that is utilized in addition to existing commercially based PMU’s. The developed PMU was used in conjunction with the interconnected system along with the commercial PMU’s. The tested studies included a new technique for detecting the partially islanded micro grids in addition to several real-time techniques for synchronization and parameter identifications of hybrid systems. ^ Moreover, due to numerous integration of renewable energy resources through DC microgrids, this dissertation performs several practical cases for improvement of interoperability of such systems. Moreover, increased number of small and dispersed generating stations and their need to connect fast and properly into the AC grids, urged this work to explore the challenges that arise in synchronization of generators to the grid and through introduction of a Dynamic Brake system to improve the process of connecting distributed generators to the power grid.^ Real time operation and control requires data communication security. A research effort in this dissertation was developed based on Trusted Sensing Base (TSB) process for data communication security. The innovative TSB approach improves the security aspect of the power grid as a cyber-physical system. It is based on available GPS synchronization technology and provides protection against confidentiality attacks in critical power system infrastructures. ^
Resumo:
The purpose of this study was to assess the prevalence of bullying and victimization in a metropolitan area. A cross-sectional study with kindergarten (n = 127) and first grade (n = 126) children was conducted in two Miami-Dade County Public Schools and three private schools in the same area. Bullying and victimization behavior and social acceptance were assessed through peer nomination and the mental health outcomes of depression and anxiety were assessed through children's self-report. Teachers and parents also completed a social behavior scale for each child. Three areas of analyses were conducted pertaining to membership classification of social roles and the social acceptance and mental health outcomes associated with those roles, reporter agreement within the social roles, and the psychometric properties of the Childhood Social Behavior Scale. Results showed an overall negative pattern of adjustment for children identified as a member of any of the negative social roles. Also, the results support a new analytic approach to the investigation of social roles. The implication of these findings for early identification, social policy, and effective prevention strategies are discussed.
Resumo:
The social and economic changes of the last decades have enhanced the dehumanization of labor relations and the deterioration of the work environment, by the adoption of management models that foster competitiveness and maximum productivity, making it susceptible to the practice of workplace bullying. Also called mobbing, bullying can occur through actions, omissions, gestures, words, writings, always with the intention of attacking the self-esteem of the victim and destroy it psychologically. In the public sector, where relations based on hierarchy prevail, and where the functional stability makes it difficult to punish the aggressor, bullying reaches more serious connotations, with severe consequences to the victim. The Federal Constitution of 1988, by inserting the Human Dignity as a fundamental principle of the Republic, the ruler of the entire legal system, sought the enforcement of fundamental rights, through the protection of honor and image of the individual, and ensuring reparation for moral and material damage resulting from its violation. Therefore, easy to conclude that the practice of moral violence violates fundamental rights of individuals, notably the employee's personality rights. This paper therefore seeked to analyze the phenomenon of bullying in the workplace, with emphasis on the harassment practiced in the public sector as well as the possibility of state liability for harassment committed by its agents. From a theoretical and descriptive methodology, this work intended to study the constitutional, infra and international rules that protect workers against this practice, emphasizing on the fundamental rights violated. With this research, it was found that doctrine and jurisprudence converge to the possibility of state objective liability for damage caused by its agents harassers, not forgetting the possibility of regressive action against the responsible agent, as well as its criminal and administrative accountability.
Resumo:
In a crescent connected and image-made society in various online social networks, each user taking pictures of him/herself and posting them on social online network, makes a self-registration that emerges in self-representation by aggregated daily practices of various themes. This research aims to study the dynamics of the relations of this photographic self-representation relations with agency, technology, affectivity, and consumption that goes beyond narcissism, composing a being integrated with the visual power and its reverberations, which I hereby call as Being -Image. The goal of this paper is an anthropological look over these practices. In this sense, I carry out the research developed in the field of image and cyber antropology with various interlocutors established in dialogues, analysis and virtual meetings. I tried, besides conversations and interviews, to analyze the profiles on the social network as well as daily posts, photo albums available on online network , sharings and mainly selfies.
Resumo:
The changes ocurred in the world of capitalist labor, especially from the last decades of the 20th century, accentuated the process of manipulation and domination of the working class, materialized mainly through naturalization and / or trivialization of violence, conducted in the work environment. From this process, emerge the elements of bullying, that is, the embarrassing and humiliating practices which extend through time, degrading human race, and becoming fruitful object for study, debate and the intervention of the professionals of the Social Service area. Thus, we assume the perspective of analyzing the concepts and the work of social workers, whom work at people management area before the bullying in the workplace. We propose the following objectives: apprehend the settings of bullying, in the contemporary context of competitiveness and flexibility of work, as well as its implications for workers' health; characterize the background of this expression of violence at work in the municipality of Natal- RN; and analyze the powers and duties of the social worker in the process of prevention, identification and addressing of bullying in the context of work. This study consisted of a qualitative approach, based on the dialectical-critical method as soon as we adopt methodological procedures such as: theoretical knowledge, documental and field research, and performed using semi-structured interviews. The subjects of this research were nine (09) the Social Service professionals working in personnel management area, in five (5) institutions with legal and branches of different activities, located in Natal-RN. Even interviewed one (01) representative of the Public Ministry of Rio Grande do Norte Office (MPT-RN). The findings of this analysis indicate that bullying is a contemporary expression of "social question", which is presented as a demand for the Social-assistants – covered up and / or camuflage – under the guise of problems related to workers' health or mere conflicts of interpersonal relationships, that is, without any causal connection with the organization of work. The fear of losing job, not to be inserted in the labor market, and / or suffering reprisals, deepens the subject levels of the victims of bullying. Hence the importance of Social Workers are capable to understand the social reality, by preventing and combating the elements of bullying.
Resumo:
This thesis starts from the proposition that postmodernity is the very cultural manifestation of Late Capitalism. The research was concerned with the publication of privacy that gives us news feeds of Facebook online social network. We used netnography, which is considered a construction method in action that combines study skills to immersion of the researcher in the investigated field. Netnography is an alternative methodology for the study of communication threads in cyber environments. We note that there is an exhibition of themselves in a related environment that reproduces the properties of the spectacle society, with an emphasis on the fact that this exhibition be made and want to be made by the individual himself, allegorically, window dresser and with spectacle. The subject is revealed by itself, shown and is induced to show and display at the same time. It is a large-scale exhibition of the private life events; it is more than spectacle, surpassing debordian sense, approaching the exhibitionism in the Freudian sense. It is a subject in a new way of existence. At the time of posting in public, the person violates their privacy. It is the desecration of stardom intimacy. We found that these new behavioral forms sharing of human experiences, under the mediation of typical technologies informationalism era, appear as a major brand of sociability, meshing the ongoing technological revolution.
Resumo:
Archaeologists are often considered frontrunners in employing spatial approaches within the social sciences and humanities, including geospatial technologies such as geographic information systems (GIS) that are now routinely used in archaeology. Since the late 1980s, GIS has mainly been used to support data collection and management as well as spatial analysis and modeling. While fruitful, these efforts have arguably neglected the potential contribution of advanced visualization methods to the generation of broader archaeological knowledge. This paper reviews the use of GIS in archaeology from a geographic visualization (geovisual) perspective and examines how these methods can broaden the scope of archaeological research in an era of more user-friendly cyber-infrastructures. Like most computational databases, GIS do not easily support temporal data. This limitation is particularly problematic in archaeology because processes and events are best understood in space and time. To deal with such shortcomings in existing tools, archaeologists often end up having to reduce the diversity and complexity of archaeological phenomena. Recent developments in geographic visualization begin to address some of these issues, and are pertinent in the globalized world as archaeologists amass vast new bodies of geo-referenced information and work towards integrating them with traditional archaeological data. Greater effort in developing geovisualization and geovisual analytics appropriate for archaeological data can create opportunities to visualize, navigate and assess different sources of information within the larger archaeological community, thus enhancing possibilities for collaborative research and new forms of critical inquiry.