Cyber Report July-December 2020
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to -
People Are Either Too Fake Or Too Real'': Opportunities And
Behavior in Online Communities CHI 2017, May 6–11, 2017, Denver, CO, USA “People Are Either Too Fake or Too Real”: Opportunities and Challenges in Tie-Based Anonymity Xiao Ma Nazanin Andalibi Louise Barkhuus Jacobs Institute, Cornell Tech College of Computing and The IT University of New York, NY, USA Informatics, Drexel University Copenhagen [email protected] Philadelphia, PA, USA Copenhagen, Denmark [email protected] [email protected] Mor Naaman Jacobs Institute, Cornell Tech New York, NY, USA [email protected] ABSTRACT affected social interactions and dynamics in offline and on- In recent years, several mobile applications allowed individ- line environments [11, 27]. Anonymity allows people to feel uals to anonymously share information with friends and con- less constrained by the expectations of their everyday iden- tacts, without any persistent identity marker. The functions of tities [3, 25], which in turn allows more candid and honest these “tie-based” anonymity services may be notably differ- self-expressions [1, 43]. Anonymity also leads users to dis- ent than other social media services. We use semi-structured close more information [52], which may result in positive interviews to qualitatively examine motivations, practices and emotional outcomes for the person disclosing [45]. On the perceptions in two tie-based anonymity apps: Secret (now de- other hand, the lack of attribution and responsibility in anony- funct, in the US) and Mimi (in China). Among the findings, mous environments can encourage malicious behaviors such we show that: (1) while users are more comfortable in self- as trolling [33] and cyberbullying [5, 6, 34]. It is no wonder disclosure, they still have specific practices and strategies to that society in general, and HCI researchers in particular, have avoid or allow identification; (2) attempts for de-identification been fascinated with the topic of anonymity. -
Syria Crisis Countries
Issa - Syria Aleppo. Crisis 2016 Humanitarian Results ©UNICEF/ Syria 2016/ Aleppo/ Khudr Al Khudr Aleppo/ 2016/ Syria ©UNICEF/ Following intense fighting in east Aleppo, a UNICEF UNICEF a Aleppo, east in fighting intense Following supported mobile nutrition team screens children Jibreen, in malnutrition for ANNUAL 2016: SYRIA, JORDAN, LEBANON, IRAQ, TURKEY AND EGYPT SITUATION IN NUMBERS Highlights In Syria In 2016, there were verified reports of over 2,300 grave violations 5,800,000 against children by armed forces and groups throughout Syria. Of # of children affected these, killing and maiming of children and recruitment and use of children were the most prevalent violations. The actual numbers are 13,500,000 likely to be much higher. # of people affected (HNO, 2017) UNICEF has supported the coordination of the No Lost Generation across the Syria crisis countries. The scale up of education support by Outside Syria sector partners inside Syria has contributed to a decrease in the number of out-of-school children from 2.12 million (40%) in 2014/15 to 1.75 million 2,308,897 (32%) in 2015/16. UNICEF and partners reached over 1 million children with # of registered Syria refugee children structured psychosocial support, and expanded programming for adolescents and youth, including social cohesion and life skills. 4,860,897 # of registered Syrian refugees UNICEF has scaled up cash based programming across the Syria crisis (UNHCR, 5 January 2017) countries in 2016, including providing 12,963 Syrian teachers with incentives in Turkey, and supporting over 21,000 vulnerable households in Jordan, Iraq and Syria with regular cash to support their basic needs. -
Trolls Under the Bridge: Anonymous Online Comments and Gatekeeping in the Digital Realm
TROLLS UNDER THE BRIDGE: ANONYMOUS ONLINE COMMENTS AND GATEKEEPING IN THE DIGITAL REALM _______________________________________ A thesis presented to the faculty of the graduate school at the University of Missouri-Columbia ___________________________________________________________ in partial fulfillment of the requirements for the degree, master of arts ______________________________________________ by NOELLE M. STEELE Ryan J. Thomas, Thesis Supervisor DECEMBER 2013 The undersigned, appointed by the dean of the graduate school, have examined the thesis entitled TROLLS UNDER THE BRIDGE: ANONYMOUS ONLINE COMMENTS AND GATEKEEPING IN THE DIGITAL REALM presented by Noelle M. Steele, a candidate for the degree of master of arts, and hereby certify that, in their opinion, it is worthy of acceptance. __________________________________________ Dr. Ryan J. Thomas __________________________________________ Dr. Tim Vos ___________________________________________ Professor Joy Mayer ____________________________________________ Dr. Christina Wells ACKNOWLEDGEMENTS A special thank you to Sarah Smith-Frigerio for her unending encouragement, faithful guidance and witty responses that kept matters light when they might otherwise have been stressful. Many a graduate student would have lost their way without her prompt attention to every issue that cropped up and tireless dedication to resolving the problem. Endless thanks to my thesis chair, Dr. Ryan J. Thomas, for his attention to detail and refusal to allow me to settle for anything less than the most polished piece of work I could possibly produce. I owe the completion of this research to his persistence and enthusiasm for the project. And to the remainder of my thesis committee – Drs. Tim Vos and Christina Wells and Professor Joy Mayer – thank you for believing in my rough research idea and challenging me to refine it from the very beginning. -
Syria Crisis 2017 Humanitarian
Syria Crisis 2017 Humanitarian Results t to a UNICEF supported Makani centre. Makani supported UNICEF a to t © UNICEF/UN0135677/Rich/Photographer © (left) 12 Sara, Jordan, Amman, in 2017 October 15 On and Bayan, 13 (right) show their to drawings UNICEF Goodwill Ambassador Muzoon Almellehan during visi her ANNUAL 2017: SYRIA, JORDAN, LEBANON, IRAQ, TURKEY AND EGYPT SITUATION IN NUMBERS Highlights In Syria 6 million • The conflict in Syria continues to drive the largest refugee crisis in the world, with 5.4 million Syrian refugees registered in the region. Nearly half (48%) are children. About 92% of Syrian refugees live in # of children affected host communities in very precarious living conditions. Depleted resources, the high cost of living and restricted livelihood opportunities are making it difficult for vulnerable families to meet their children’s basic needs. Many Syrian refugee families are forced to resort to negative coping practices, 13,500,000 including early marriage and child labor. # of people affected • In line with the No Lost Generation Initiative, UNICEF supported national systems in Syria and in Syrian refugee host countries reaching over 773,000 children (98% target) with psychosocial support, and (HNO, 2017) helped over 3.2 million children (88% target) to enroll in formal education. Children’s exclusion from education remains a serious problem. An estimated 1.75 million school aged children in Syria and over 40% of Syrian refugee children remain out-of-school. Key challenges include funding shortfalls, Outside Syria capacity of partners and families’ lack of livelihoods. Nearly 3 million • With UNICEF support, more than 8.9 million children were vaccinated against polio in Syria, Jordan, Iraq and Egypt. -
The Community Industry: an Analysis of Reddit and /R/Socialism
THE COMMUNITY INDUSTRY: AN ANALYSIS OF REDDIT AND /R/SOCIALISM Richard Babb A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2021 Committee: Radhika Gajjala, Advisor Samuel T McAbee, Graduate Faculty Representative Lara Lengel Yanqin Lu © 2021 Richard Babb All Rights Reserved iii ABSTRACT Radhika Gajjala, Advisor Social media is an increasingly important space for community formation and interactions. Coinciding with the rise of social media has been an increasing interest in leftist ideologies once outside the mainstream. This analysis seeks to understand the social media site Reddit.com’s enabling and constraining features on the community /r/socialism. Using the communicative theory of identity and Marxist media theory not only to look at Reddit and /r/socialism’s relationship, but five key functions of a media: capital-economic, media sales and media market function, commodity circulation, domination, and the audience. Employing a mixed-methods approach enabled various data to be analyzed and relationally understood. Qualitative content analysis was used to examine user’s salient topics and their uses for the community. Survey methods were deployed to the community to gather demographic data on the /r/socialism community and user opinions on the group’s relationship with Reddit. Finally, secondary documents were analyzed to provide greater context to the other findings. Findings from the content analysis of salient subjects showed a preference for contemporary capitalist critique, socialist quotations, and class issues. However, topics impacting women and other minority groups were light to nonexistent. -
Defamation Law in the Age of the Internet: Young People’S Perspectives
DEFAMATION LAW IN THE AGE OF THE INTERNET: YOUNG PEOPLE’S PERSPECTIVES Defamation Law in the Internet Age June 2017 Commissioned by the Law Commission of Ontario Prepared by Jane Bailey Valerie Steeves The LCO commissioned this paper to provide background research for its Defamation Law in the Internet Age project. The views expressed in this paper do not necessarily reflect the views of the LCO. DEFAMATION LAW IN THE AGE OF THE INTERNET: YOUNG PEOPLE’S PERSPECTIVES Prepared by: Jane Bailey1 and Valerie Steeves2 Prepared for: Law Commission of Ontario Final Report 15 June 2017 Table of Contents ACKNOWLEDGMENTS ........................................................................................................................................ 3 EXECUTIVE SUMMARY ....................................................................................................................................... 4 INTRODUCTION .................................................................................................................................................. 10 I. THE MEANING AND VALUE OF REPUTATION .............................................................................. 13 A. Understanding Online Reputation ..................................................................................................... 13 B. Creating an Online Reputation ............................................................................................................ 18 C. Avoiding Reputational Harm............................................................................................................... -
LEAF:A Privacy-Conscious Social Network-Based Intervention Tool for IPV Survivors
LEAF:A Privacy-conscious Social Network-based Intervention Tool for IPV Survivors Balaji Palanisamy Sheldon Sensenig James Joshi Rose Constantinoy School of Information Sciences, University of Pittsburgh ySchool of Nursing, University of Pittsburgh fbpalan, sms233, jjoshi, [email protected] Abstract—Destructive relationship behavior directed from one acronym stands for lending encouragement, affirming futures. party to another in domestic relationships, both physical and These embody the vision for a system to provide support to emotional, is a common problem. When the behavior occurs those in difficult situations. in intimate relationships this is called intimate partner violence (IPV). There are many resources available to survivors of IPV LEAF is primarily focused on providing a secure privacy- in getting out of abusive situations, but the information is not conscious social-network based support system for survivors readily available and is not always easy to find. Furthermore, of intimate partner violence (IPV). We note that destructive once the survivor has escaped from the abusive situation, there relationship behavior directed from one party to another in are not many support type resources that are easily accessible, domestic relationships, both physical and emotional, is a especially to people lacking transportation and to those residing in rural or suburban areas. LEAF is being created to address the common problem. When the behavior occurs in intimate issues that arise from limits in physical community support. The relationships this is called intimate partner violence. LEAF acronym stands for lending encouragement, affirming futures. aims to provide an easily accessible support system to those These embody the vision for a system to provide support to those who have escaped from the abusive situation, especially to in difficult situations. -
The Loopix Anonymity System Ania M
The Loopix Anonymity System Ania M. Piotrowska and Jamie Hayes, University College London; Tariq Elahi, KU Leuven; Sebastian Meiser and George Danezis, University College London https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/piotrowska This paper is included in the Proceedings of the 26th USENIX Security Symposium August 16–18, 2017 • Vancouver, BC, Canada ISBN 978-1-931971-40-9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX The Loopix Anonymity System Ania M. Piotrowska Jamie Hayes Tariq Elahi University College London University College London KU Leuven Sebastian Meiser George Danezis University College London University College London Abstract cent leaks of extensive mass surveillance programs1, ex- posing such meta-data leads to significant privacy risks. We present Loopix, a low-latency anonymous commu- Since 2004, Tor [20], a practical manifestation of nication system that provides bi-directional ‘third-party’ circuit-based onion routing, has become the most popu- sender and receiver anonymity and unobservability. lar anonymous communication tool, with systems such Loopix leverages cover traffic and Poisson mixing—brief as Herd [33], Riposte [11], HORNET [10] and Vu- independent message delays—to provide anonymity and vuzela [46] extending and strengthening this paradigm. to achieve traffic analysis resistance against, including In contrast, message-based architectures, based on mix but not limited to, a global network adversary. Mixes and networks, have become unfashionable due to perceived clients self-monitor and protect against active attacks via higher latencies, that cannot accommodate real-time self-injected loops of traffic. The traffic loops also serve communications. However, unless cover traffic is em- as cover traffic to provide stronger anonymity and a mea- ployed, onion routing is susceptible to traffic analysis at- sure of sender and receiver unobservability. -
Evaluation of NRC's Host Community Education Programme in Jordan
Evaluation of NRC’s Host Community Education Programme in Jordan Dr. Ritesh Shah, University of Auckland July 2018 Executive summary Since 2015, the Norwegian Refugee Council (NRC) has been working to ensure that vulnerable Syrian and Jordanian children residing in host community settings in the north of Jordan have enhanced access to quality educational infrastructure and services. Specifically, NRC has supported the expansion and/or refurbishment of school facilities, to address the significant demands placed on existing infrastructure by the growth in student population since the start of the Syrian crisis. In these same schools, NRC has concurrently worked on strengthening school systems to address some of the endemic weaknesses facing overcrowded school in host communities, including issues of insufficient maintenance and cleaning of existing facilities, violence and bullying, a lack of parental and student engagement in school decision-making and planning, and poor-quality teaching and learning. The broad objective of this holistic approach is to ensure that vulnerable Syrian and Jordanian students attending these schools have access to protective and dynamic school environments which are conducive to quality teaching and learning, and that foster social cohesion. Ultimately, is hoped that in doing so, these students have increased access to school, remain in school, and that learning outcomes are improved. This evaluation was commissioned by NRC Jordan country office, and conducted by Dr. Ritesh Shah from the University of Auckland, Faculty of Education and Social Work in 2018. The purpose of this evaluation was two-fold. One is to look back and assess how NRC has improved access and learning outcomes for vulnerable students in host community schools in Jordan. -
FREEDOM MOVEMENT: a CASE STUDY of FEMINIST LEADERSHIP in KURDISTAN by AMANDA METCALFE B.S., Texas A&M University, 1999 M.A
FREEDOM MOVEMENT: A CASE STUDY OF FEMINIST LEADERSHIP IN KURDISTAN by AMANDA METCALFE B.S., Texas A&M University, 1999 M.A., University of Colorado, 2002 A dissertation submitted to the Graduate Faculty of the University of Colorado Colorado Springs in partial fulfillment of the requirement for the degree of Doctor of Philosophy Department of Leadership, Research, and Foundations 2018 This dissertation for the Doctor of Philosophy degree by Amanda Metcalfe has been approved for the Department of Leadership, Research, and Foundations by Sylvia Mendez, Chair Corinne Harmon Robert Mitchell Phillip Morris Wilbur Scott Date:12/04/2018 ii Metcalfe, Amanda (Ph.D. Educational Leadership, Research, and Policy) Freedom Movement: A Case Study of Feminist Leadership in Kurdistan Dissertation directed by Associate Professor Sylvia Mendez ABSTRACT The Kurds have endured a long struggle to secure a destiny of freedom. Kurdish women are now rising up to achieve their own freedom after decades of war, genocide, and statelessness. This study began in Kurdistan, Iraq with an intimate look at the Kurdish Women’s Freedom Movement, a feminist movement that is shifting its society away from social normative powers that have been dominant for generations. This exploratory case study was based upon academic reports, observations, and interviews with Kurdish female leaders. The case was used to create a critical understanding of feminist leadership from an age-old culture. Using Social Role Theory, this study investigated the experiences of Kurdish women moving into new leadership roles and shifting norms that allow such leadership to emerge. Transcripts from interviews with 20 Kurdish women from Iraq, Iran, Syria, Turkey, and the US and investigative field observations of Kurdish women’s leadership stories were used to highlight a remarkable case of leadership. -
RETHINKING the DESIGN MODELS of REFUGEE CAMPS 2 Abstract
RETHINKING THE DESIGN MODELS OF REFUGEE CAMPS 2 Abstract This research aims to find architectural and urban design related solutions to enhance the living conditions of refugees who are trapped in a protracted refugee situation. Such a situation results when 25,000 or more refugees from the same nationality have been in exile in a given asylum country for five or more years (US Department of State, n.d.). As an example of that refuge situation, focus within this research is upon the two refugee camp models found in Jordan; the Zaatari camp and the Azraq camp. Both were established as a consequence of the recent civil war in Syria, started in 2011. A comparison between the two refugee camps resulted in identifying the strong points and the shortcomings of the current models. In addition, an assessment of the refugees’ needs is made based on the refugee camp’s design guidelines and the official reports published by the different humanitarian organizations. The above mentioned researched information is utilized to develop a set of goals and strategies which is used within this research to redesign one village in the Azraq refugee camp. The new design applies sustainable urbanism principles and practices in the planning process of that village, aiming to enhance the living conditions of refugees staying there. This hypothetical exercise facilitated the study of the anticipated consequences that would stem from implementing the newly developed model in future designs. In conclusion, a summary of recommendations for future designs of refugee camps of similar social and ecological conditions are suggested based on the study of the anticipated consequences of the developed model.