European Crime Prevention Network
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cyber Violence Against Women and Girls
CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement. -
Cyprus 2017 Human Rights Report
CYPRUS 2017 HUMAN RIGHTS REPORT Since 1974 the southern part of Cyprus has been under the control of the government of the Republic of Cyprus. The northern part of Cyprus, administered by Turkish Cypriots, proclaimed itself the “Turkish Republic of Northern Cyprus” (“TRNC”) in 1983. The United States does not recognize the “TRNC,” nor does any country other than Turkey. A substantial number of Turkish troops remained on the island. A buffer zone, or “Green Line,” patrolled by the UN Peacekeeping Force in Cyprus (UNFICYP), separates the two sides. REPUBLIC OF CYPRUS EXECUTIVE SUMMARY The Republic of Cyprus is a constitutional republic and multiparty presidential democracy. In 2013 voters elected President Nicos Anastasiades in free and fair elections. In May 2016 voters elected 56 representatives to the 80-seat House of Representatives (Vouli Antiprosopon) in free and fair elections. Civilian authorities maintained effective control over the security forces. The most significant human rights issues included instances of corruption, which the authorities investigated; and societal violence against members of minority ethnic and national groups. The government investigated and prosecuted officials who committed human rights abuses. There were no reports of impunity during the year. Section 1. Respect for the Integrity of the Person, Including Freedom from: a. Arbitrary Deprivation of Life and Other Unlawful or Politically Motivated Killings There were no reports that the government or its agents committed arbitrary or unlawful killings. b. Disappearance There were no reports of disappearances by or on behalf of government authorities. CYPRUS 2 c. Torture and Other Cruel, Inhuman, or Degrading Treatment or Punishment The constitution and law prohibit such practices. -
'Sharenting': the Forgotten Children of the GDPR
PHRG Peace Human Rights Governance Volume 4, Issue 1, March 2020 ‘Sharenting’: The Forgotten Children of the GDPR Sheila Donovan Research Articles* DOI: 10.14658/pupj-phrg-2020-1-2 How to cite: Donovan, S. (2020) ‘“Sharenting”: The Forgotten Children of the GDPR’, Peace Human Rights Governance, 4(1), 35-59. Article first published online March 2020 *All research articles published in PHRG undergo a rigorous double-blind review process by at least two independent, anonymous expert reviewers VA ADO UP P PHRG 4(1), March 2020 ‘Sharenting’: The Forgotten Children of the GDPR Sheila Donovan* Abstract The exponential growth of the internet and social media use in the recent past followed by a widespread increase of the scale, scope and sharing of information has impacted greatly on the concept of privacy. This growth has been accompanied by innumerable duplication and storage in perpetuity of personal data. While debates surrounding the protection and safety of social network users, in particular minor users have emerged as a matter of concern, there has been minimal focus on the privacy of minors, in particular, those minors who are the subject of ‘sharenting’ which is defined as ‘the online posting of images and data of children’. The introduction of the General Data Protection Regulation 2016 was designed to give more robust protection and rights to all individuals, in particular children, who were recognised as being particularly vulnerable. The GDPR, however, in seeking to address the security and safety of the private identity of minors who engage in social networking, places the oversight of minors’ digital privacy into parental hands, regardless of their digital competency. -
Staying Safe Online: Gender and Safety on the Internet
MEDITERRANEAN INSTITUTE OF GENDER STUDIES (MIGS) Staying Safe Online: Gender and Safety on the Internet Experiences of Young Women and Men in Cyprus Nicosia, Cyprus November 2014 Staying Safe Online: Gender and Safety on the Internet © 2014, Mediterranean Institute of Gender Studies, all rights reserved. 46 Makedonitissas Ave. P.O. Box 24005, Nicosia 1703 Cyprus Authors: Elena Rousou, Christina Kaili Edited by Susana Elisa Pavlou Published by the Mediterranean Institute of Gender Studies (M.I.G.S.) on December 2014 Coordinated by Gender Studies, o.p.s., Czech Republic Partner Organisations Feminoteka , Poland ProFem, Czech Republic Mediterranean Institute of Gender Studies (M.I.G.S.), Cyprus This publication has been produced with the financial support of the DAPHNE III Programme of the European Union. The contents of this publication are the sole responsibility of the Mediterranean Institute of Gender Studies (M.I.G.S.) and can in no way be taken to reflect the views of the European Commission. 1 Table of Contents 1. INTRODUCTION ........................................................................................................ 4 1.1 SCOPE, GOALS AND OBJECTIVES ....................................................................................... 4 1.2 METHODOLOGY ............................................................................................................. 4 1.3 DEFINITIONS ................................................................................................................. 6 2. THEORETICAL FRAMEWORK -
Coronavirus Social Engineering Attacks: Issues and Recommendations
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 5, 2020 Coronavirus Social Engineering Attacks: Issues and Recommendations Ahmed Alzahrani Faculty of Computing and Information Technology King Abdulaziz University, Jeddah Saudia Arabia Abstract—During the current coronavirus pandemic, Social engineering attacks fall into four types: physical, cybercriminals are exploiting people’s anxieties to steal technical, social, and socio-technical [3]. In general, there are confidential information, distribute malicious software, perform two methods of social engineering attacks, human-based and ransomware attacks and use other social engineering attacks. computer-based. Human-based social engineering requires The number of social engineering attacks is increasing day by interaction with humans to gain the desired information. day due to people's failure to recognize the attacks. Therefore, Impersonation is the most common approach for this type, via there is an urgent need for solutions to help people understand a phone call or text message (see Fig. 2), online, or even in social engineering attacks and techniques. This paper helps person. Computer-based social engineering uses computer individuals and industry by reviewing the most common software to try to gain the required information. This attack coronavirus social engineering attacks and provides includes sending scam emails asking the user to open an recommendations for responding to such an attack. The paper also discusses the psychology behind social engineering and attachment to check the latest statistics about coronavirus or introduces security awareness as a solution to reduce the risk of information about coronavirus safety measures (see Fig. 1). social engineering attacks. Cybercriminals can also create a fake website to trick users into downloading malware to steal users' credentials and online Keywords—Social engineering; coronavirus; COVID-19; banking information. -
Regulating Violence in Video Games: Virtually Everything
Journal of the National Association of Administrative Law Judiciary Volume 31 Issue 1 Article 7 3-15-2011 Regulating Violence in Video Games: Virtually Everything Alan Wilcox Follow this and additional works at: https://digitalcommons.pepperdine.edu/naalj Part of the Administrative Law Commons, Comparative and Foreign Law Commons, and the Entertainment, Arts, and Sports Law Commons Recommended Citation Alan Wilcox, Regulating Violence in Video Games: Virtually Everything, 31 J. Nat’l Ass’n Admin. L. Judiciary Iss. 1 (2011) Available at: https://digitalcommons.pepperdine.edu/naalj/vol31/iss1/7 This Comment is brought to you for free and open access by the Caruso School of Law at Pepperdine Digital Commons. It has been accepted for inclusion in Journal of the National Association of Administrative Law Judiciary by an authorized editor of Pepperdine Digital Commons. For more information, please contact [email protected], [email protected], [email protected]. Regulating Violence in Video Games: Virtually Everything By Alan Wilcox* TABLE OF CONTENTS I. INTRODUCTION ................................. ....... 254 II. PAST AND CURRENT RESTRICTIONS ON VIOLENCE IN VIDEO GAMES ........................................... 256 A. The Origins of Video Game Regulation...............256 B. The ESRB ............................. ..... 263 III. RESTRICTIONS IMPOSED IN OTHER COUNTRIES . ............ 275 A. The European Union ............................... 276 1. PEGI.. ................................... 276 2. The United -
Thursday, March 13, 2014 5:00Pm-6:20Pm Friday, March 14
1 Thursday, March 13, 2014 "DIFFERENTIATING GOAL-DIRECTED MOTIVATION FROM 5:00pm-6:20pm AROUSAL WITH A NOVEL PROGRESSIVE HOLD DOWN (PHD) TASK" Invited Speaker Georgian MATTHEW BAILEY, GREG JENSEN (COLUMBIA UNIVERSITY, PSI CHI INVITED KEYNOTE ADDRESS: ANTHONY DEPARTMENT OF PSYCHOLOGY), KATHLEEN TAYLOR GREENWALD (BARNARD COLLEGE, DEPARTMENT OF PSYCHOLOGY), Thursday, March 13, 2014 ELEANOR SIMPSON (COLUMBIA UNIVERSITY, 5:00pm-6:20pm DEPARTMENT OF PSYCHIATRY), CHRIS MEZIAS (BARNARD COLLEGE, DEPARTMENT OF PSYCOLOGY), CAIT WILLIAMSON (COLUMBIA UNIVERSITY, DEPARTMENT OF CHAIR: DEBORAH HARRIS-O'BRIEN (TRINITY WASHINGTON PSYCHIATRY), RAE SILVER (COLUMBIA UNIVERSITY, UNIVERSITY) DEPARTMENT OF PSYCHOLOGY), PETER BALSAM (COLUMBIA UNIVERSITY, DEPARTMENT OF PSYCHIATRY) HOW ‘HIDDEN BIASES OF GOOD PEOPLE’ PRODUCE We developed a novel motivation assay known as the DISCRIMINATION Progressive Hold Down (PHD) task. This task requires mice to make responses (holding levers in the depressed position) for ANTHONY GREENWALD (UNIVERSITY OF WASHINGTON) progressively longer durations of time. We characterized this novel task then tested mice on methamphetamine. Discrimination in the United States has changed greatly in the Methamphetamine increases the number of presses made and last 50 years. In the 1980s, the concept of ‘modern racism’ length of time mice press before quitting, but did not increase the captured some of these changes. More recently, the concept of breakpoint on the PHD task as would be expected from ‘implicit’ (or ‘hidden’) bias has been introduced to understand increased motivation. further changes, including changes in how gender biases operate. This presentation supports the conclusion that 8:40am - 8:55am societally significant discrimination now occurs mostly without either malice or intent—as products of mental processes that THE POST-REINFORCEMENT PAUSE IN VARIABLE operate automatically and unthinkingly. -
Cyberbullying: a Worldwide Trend of Misusing Technology to Harass Others
The Internet Society II: Advances in Education, Commerce & Governance 155 Cyberbullying: a worldwide trend of misusing technology to harass others E. Kraft School of Business, Georgian Court University, USA Abstract Cyberbullying: a worldwide trend of misusing technology to harass others. Technology has led to a new form of bullying in the 21st century called cyberbullying. Cyberbullying is using the Internet or a cell phone to harass a victim with pictures and text. There have been reports in the media of youth being harassed by e-mail, postings on websites, instant messages, and mobile text messages worldwide. This paper summarizes findings about the prevalence and effects of cyberbullying from studies conducted in Australia, Canada, the United Kingdom, and the United States. Results of the studies were compared to media reports of cyberbullying and traditional bullying research. Strategies to stop and prevent cyberbullying were discussed. The percentage of respondents experiencing incidents of cyberbullying in the studies ranged from 10% to 42%. The mobile phone was the predominant method of cyberbullying in Australia and the United Kingdom, whereas the Internet was the favoured method in the United States and Canada. Some victims of cyberbullying have been driven to suicide while others remain unaffected by it. The most common feelings of victims were anger, sadness, frustration, and fear. Independent studies in the United States, United Kingdom, and Canada documented that parents and children do not discuss cyberbullying. It is recommended that schools establish and post acceptable use policies for the Internet. Parents need to be educated about cyberbullying so that they can impose consequences if their child is harassing another child. -
Internet Safety 101
INTERNET SAFETY 101 Learn what you need to know to keep yourself and your family safe on the internet. Why are you here? To learn: About the type of threats you may encounter online To gain a safer mindset towards using the internet Precautions we should all be taking on a regular basis How to protect yourself and your device Google Yourself The easiest way to track your digital footprint Try searching for: Variations of your name Email address Home address Work address Phone number Found something you would like taken down? Alter your privacy settings on social media accounts. Deactivate old and unused accounts. Go through sites on an individual basis to see if you can delete your information from their listings or request to have it removed. Safe Browsing Practices Look at your browser’s built in security settings “Sandboxing” – Each tab is run in a separate application environment. If harmful content is discovered in one tab, it will not spread any further. Always keep browser updated for latest security features Downloading Content Treat all downloads as suspicious until proven safe. Always SAVE files, don’t RUN them. This will give your system a chance to check for threats. No one wants to do it, but read the terms and conditions. Freeware and P2P files should be treated with extreme caution. Safe Browsing Practices Continued… Pop-Ups Always keep your pop-up blockers ON Usually contain unwanted advertisements or malware “Malware” – any software specifically intended to damage your computer system Some pop-ups are legitimate. Use icon in the address bar to allow safe pop-ups. -
Social Engineering Attacks and the Corona Virus Pandemic
ISSN (Online): 2455-3662 EPRA International Journal of Multidisciplinary Research (IJMR) - Peer Reviewed Journal Volume: 6 | Issue: 10 | October 2020 || Journal DOI: 10.36713/epra2013 || SJIF Impact Factor: 7.032 ||ISI Value: 1.188 SOCIAL ENGINEERING ATTACKS AND THE CORONA VIRUS PANDEMIC Ajayi Adebowale. O.1 Ajayi Oluwabukola. F 2 1 Lecturer, 2 Lecturer, Computer Science Department, Computer Science Department, Babcock University, Babcock University, Ilishan-Remo Ogun State, Ilishan-Remo Ogun State, Nigeria. Nigeria. ABSTRACT Social engineering attacks are amongst the most successful and rampant cyber-attacks. The major focus of social engineering is the manipulation of human targets to further the objectives of an attacker. The present coronavirus pandemic has had a profound effect on how we live and work and has proved to be perfect fodder for the nefarious activities of cybercriminals. This study delineates the underlying problems in social engineering vis-à-vis the corona pandemic. A descriptive survey was carried out on social engineering attacks and the corona virus pandemic including focused group discussions with some cyber attackers and regular users of information systems. A review of current covid- 19 related social engineering schemes are presented. Insights gotten from synthesizing the knowledge gathered from the analysis of social engineering attacks during Covid-19 are also highlighted in this paper. It is very likely that many people will continue to work from home or, at the very least, switch back and forth between home and traditional offices in their normal routines. The study therefore recommends that as the global community stays on high alert for signs of new pandemics or recurrence of the present one, safeguards will need to be put in place ensure that these anxieties don’t expose enterprise IT assets to social engineering tactics. -
Peterhouse Crushes Student Ball Protests
Commentp16 Robert Should private Redford talks education be Hollywood, abolished? politics, and Lions for Lambs For ladies who live the leisurely life Interview p26 Fashionp20 Issue No 665 Friday November 9 2007 varsity.co.uk e Independent Cambridge Student Newspaper since 1947 University Peterhouse crushes Nursery fails Ofsted report Emma Inkester Senior Reporter student ball protests The University Nursery at West Cambridge has failed its recent Ofsted inspection, according to a » Condemnation of college as students threatened with fi nes damning report released this week. The nursery, which provides childcare for approximately 100 Camilla Temple removed the posters from students’ student parents at Cambridge Chief News Editor rooms without consent. Although University, was judged to be inad- two students claimed to have left equate in all fi ve areas in which it Peterhouse College have attempted their bins outside their rooms, the was examined on October 19. This to suppress student protests over the bedders reportedly came later in the resulted in a complete failure of the cancellation of this year’s May ball. day and removed the posters. inspection and a notice stating that The protests were sparked by The protestor responsible for the nursery does not meet the Na- frustration at both the fellows’ and the posters told Varsity, “If the fel- tional Standards for Under Eights the JCR’s handling of the situation lows were willing to talk to us we Day Care and Childminding. and were spurred on by national wouldn’t need to do this. It’s a way The report detailed how only media attention. -
Systems Engineering Approaches to Minimize the Viral Spread of Social Media Challenges
Clemson University TigerPrints All Dissertations Dissertations December 2019 Systems Engineering Approaches to Minimize the Viral Spread of Social Media Challenges Amro Khasawneh Clemson University, [email protected] Follow this and additional works at: https://tigerprints.clemson.edu/all_dissertations Recommended Citation Khasawneh, Amro, "Systems Engineering Approaches to Minimize the Viral Spread of Social Media Challenges" (2019). All Dissertations. 2526. https://tigerprints.clemson.edu/all_dissertations/2526 This Dissertation is brought to you for free and open access by the Dissertations at TigerPrints. It has been accepted for inclusion in All Dissertations by an authorized administrator of TigerPrints. For more information, please contact [email protected]. SYSTEMS ENGINEERING APPROACHES TO MINIMIZE THE VIRAL SPREAD OF SOCIAL MEDIA CHALLENGES A Dissertation Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Industrial Engineering by Amro Khasawneh December 2019 Accepted by: Dr. Kapil Chalil Madathil, Committee Chair Dr. Anand Gramopadhye Dr. Patrick Rosopa Dr. Kevin Taaffe Dr. Heidi Zinzow ABSTRACT Recently, adolescents’ and young adults’ use of social media has significantly increased. While this new landscape of cyberspace offers young internet users many benefits, it also exposes them to numerous risks. One such phenomenon receiving limited research attention is the advent and propagation of viral social media challenges. Several of these challenges entail self-harming behavior, which combined with their viral nature, poses physical and psychological risks for the participants and the viewers. One example of these viral social media challenges that could potentially be propagated through social media is the Blue Whale Challenge (BWC).